Abstract is missing.
- An Analysis of Computer Forensic Practitioners Perspectives on Education and Training RequirementsColin J. Armstrong. 1-8 [doi]
- Resubmit my Information Security Thesis? - You must be joking!Helen Armstrong, Louise Yngström. 9-16 [doi]
- E-Voting as a Teaching ToolMatt Bishop. 17-24 [doi]
- Practical Assignments in IT Security for Contemporary Higher EducationAlan Davidson, Kjell Näckros. 25-32 [doi]
- Email Security Awareness - a Practical Assessment of Employee BehaviourHennie A. Kruger, Lynette Drevin, Tjaart Steyn. 33-40 [doi]
- SecSDM: A Model for Integrating Security into the Software Development Life CycleLynn Futcher, Rossouw von Solms. 41-48 [doi]
- A CBK for Information Security and Critical Infrastructure ProtectionMarianthi Theoharidou, Eleftheria Stougiannou, Dimitris Gritzalis. 49-56 [doi]
- A Course on Computer and Network Security: Teaching Online Versus Face-to-FaceSuresh Kalathur, Lubomir T. Chitkushev, Stuart Jacobs, Tanya Zlateva, Anatoly Temkin. 57-64 [doi]
- An Interdisciplinary Approach to Forensic IT and Forensic Psychology EducationClare Wilson, Vasilios Katos, Caroline Strevens. 65-71 [doi]
- Experiences from Educating Practitioners in Vulnerability AnalysisStefan Lindskog, Hans Hedbom, Leonardo A. Martucci, Simone Fischer-Hübner. 73-80 [doi]
- Information Security Specialist Training for the Banking SphereAndrey P. Kurilo, Natalia G. Miloslavskaya, Alexander I. Tolstoy. 87-93 [doi]
- Learning Security through Computer Games: Studying user behavior in a real-world situationKjell Näckros. 95-103 [doi]
- Forensic Computing Training, Certification and Accreditation: An Australian OverviewMatthew Simon, Jill Slay. 105-112 [doi]
- Software Assignments for a Course in Secure E-CommerceChris Steketee, Phillip Lock. 113-120 [doi]
- Teaching Cryptography to Continuing Education StudentsAnatoly Temkin. 121-128 [doi]
- The Role of Mathematics in Information Security EducationStephen D. Wolthusen. 129-136 [doi]
- The Role of Information Security Industry Training and Accreditation in Tertiary EducationHelen Armstrong, Colin J. Armstrong. 137-140 [doi]
- How to Design Computer Security ExperimentsSean Peisert, Matt Bishop. 141-148 [doi]