ACM DL

Computing Education (TOCE)

Menu

Search Issue
enter search term and/or author name

Archive


Journal on Educational Resources in Computing (JERIC), Volume 6 Issue 4, December 2006

Editorial: Resources for the computer security and information assurance curriculum
D. Frincke, S. Oudekirk, B. Popovsky
Article No.: 1
DOI: 10.1145/1248453.1248454

This editorial introduces the articles in this companion issue to the first JERIC special issue on Computer Security and Information Assurance Curriculum. It includes an article that supports making computer security education more accessible...

Taking the network on the road: Portable network solutions for computer security educators
Timothy Rosenberg, Lance J. Hoffman
Article No.: 2
DOI: 10.1145/1248453.1248455

Educational institutions that wish to implement a specialized teaching laboratory often have a variety of obstacles to overcome. Some of these obstacles are related to adapting existing classroom infrastructure, building the laboratory, and...

A portable computer security workshop
Paul J. Wagner, Andrew T. Phillips
Article No.: 3
DOI: 10.1145/1248453.1248456

We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education...

Laboratory exercises in online information assurance courses
Bhagyavati
Article No.: 4
DOI: 10.1145/1248453.1248457

Information assurance courses delivered in an online environment pose challenges to the development of meaningful hands-on exercises for students. This article presents techniques on furnishing laboratory exercises to online students and presents...

Laboratory experiments for network security instruction
José Carlos Brustoloni
Article No.: 5
DOI: 10.1145/1248453.1248458

We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid...

Dispelling 10 common disaster recovery myths: Lessons learned from Hurricane Katrina and other disasters
Brett J. L. Landry, M. Scott Koger
Article No.: 6
DOI: 10.1145/1248453.1248459

Disasters happen all the time; yet despite this, many organizations are caught unprepared or make unrealistic assumptions. These factors create environments that will fail during a disaster. Most information technology (IT) curricula do not cover...