Teach Them When They Aren't Looking: Introducing Security in CS1 (Englisch)
- Neue Suche nach: Nance, K.
- Neue Suche nach: Nance, K.
In:
IEEE SECURITY AND PRIVACY MAGAZINE
;
7
, 5
;
53-55
;
2009
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Teach Them When They Aren't Looking: Introducing Security in CS1
-
Beteiligte:Nance, K. ( Autor:in )
-
Erschienen in:IEEE SECURITY AND PRIVACY MAGAZINE ; 7, 5 ; 53-55
-
Verlag:
- Neue Suche nach: IEEE COMPUTER SOCIETY
-
Erscheinungsdatum:01.01.2009
-
Format / Umfang:3 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 005.8
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 005.8 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 7, Ausgabe 5
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Table of contents| 2009
- 3
-
From the Editors - In Clouds Shall We Trust?Michael, Bret et al. | 2009
- 3
-
In Clouds Shall We Trust?Michael, Bret et al. | 2009
- 4
-
IEEE Security & Privacy [masthead]| 2009
- 5
-
Interview - Silver Bullet Talks with Bob BlakleyMcGraw, Gary et al. | 2009
- 5
-
Silver Bullet Talks with Bob BlakleyMcGraw, Gary et al. | 2009
- 9
-
News - News BriefsFigueroa, James et al. | 2009
- 9
-
News BriefsFigueroa, James et al. | 2009
- 11
-
Securing the Domain Name System - Guest Editors' IntroductionMassey, Daniel et al. | 2009
- 11
-
Guest Editors' Introduction: Securing the Domain Name SystemMassey, Daniel / Denning, Dorothy E. et al. | 2009
- 12
-
IEEE Computer Society information| 2009
- 14
-
Protecting the DNS from Routing Attacks: Two Alternative Anycast ImplementationsAvramopoulos, I. / Suchara, M. et al. | 2009
- 14
-
Protecting the DNS from Routing Attacks: Two Alternative Anycast Implementations - The authors evaluate the relative resilience to routing attacks of two alternative anycast DNS implementations, the first operating at the network layer and the second at the application layer. This evaluation informs fundamental DNS design decisions and an important debate on the Internet's routing architecture.Avramopoulos, Ioannis et al. | 2009
- 21
-
Phishing Infrastructure Fluxes All the WayMcGrath, D.K. / Kalafut, A. / Gupta, M. et al. | 2009
- 21
-
Phishing Infrastructure Fluxes All the Way - Fast flux aims to keep phishing and scam campaigns afloat by provisioning a fraudulent Web site's DNS records to make the site resolve to numerous, short-lived IP addresses. Although fast flux hurts take-down efforts, it's possible to detect and defend against it.McGrath, D.Kevin et al. | 2009
- 28
-
IEEE Reliability Society information| 2009
- 29
-
Open Issues in Secure DNS DeploymentChandramouli, R. / Rose, S. et al. | 2009
- 29
-
Open Issues in Secure DNS Deployment - The DNS's growth has been unprecedented, but protocol vulnerabilities threaten its stability and trustworthiness. The Internet Engineering Task Force's DNS Security Extensions specification aims to protect the system from these attacks.Chandramouli, Ramaswamy et al. | 2009
- 36
-
Securing DNS: Extending DNS Servers with a DNSSEC ValidatorWijngaards, W.C.A. / Overeinder, B.J. et al. | 2009
- 36
-
Securing DNS: Extending DNS Servers with a DNSSEC Validator - DNS Security Extensions (DNSSEC) is a proposed standard for securely authenticating information in the DNS. DNSSEC validators check the digital signatures on DNS data. However, designing a validator worth the operational costs is a challenge.Wijngaards, Wouter C.A. et al. | 2009
- 44
-
Interadministrative Challenges in Managing DNSKEYsOsterweil, E. / Lixia Zhang, et al. | 2009
- 44
-
Interadministrative Challenges in Managing DNSKEYs - Although the visible deployment of DNS Security Extensions is growing at a tremendous rate, evidence suggests that managing cryptographic keys is deceptively complex. Here, the authors outline the problem of managing DNSKEYs and present a survey comparison of existing proposed solutions.Osterweil, Eric et al. | 2009
- 52
-
Call for Papers: Cloud Computing Security| 2009
- 53
-
Education - Teach Them When They Aren't Looking: Introducing Security in CS1Nance, Kara et al. | 2009
- 53
-
Teach Them When They Aren't Looking: Introducing Security in CS1Nance, K. et al. | 2009
- 56
-
The Evolution of Online IdentityCharney, S. et al. | 2009
- 56
-
On the Horizon - The Evolution of Online IdentityCharney, Scott et al. | 2009
- 60
-
Security, Privacy, and the Role of LawCate, F.H. et al. | 2009
- 60
-
Privacy Interests - Security, Privacy, and the Role of LawCate, Fred H. et al. | 2009
- 64
-
Green Cryptography: Cleaner Engineering through Recycling, Part 2Troutman, J. / Rijmen, V. et al. | 2009
- 64
-
Crypto Corner - Green Cryptography: Cleaner Engineering through Recycling, Part 2Troutman, Justin et al. | 2009
- 66
-
Managing the Security Wall of DataHoward, M. et al. | 2009
- 66
-
Basic Training - Managing the Security Wall of DataHoward, Michael et al. | 2009
- 69
-
Call for Papers: Security and Reliability of Embedded Systems| 2009
- 70
-
Wireless Malware Propagation: A Reality CheckZanero, S. et al. | 2009
- 70
-
Attack Trends - Wireless Malware Propagation: A Reality CheckZanero, Stefano et al. | 2009
- 75
-
Secure Systems - Taking Surveillance Out of the ShadowsBlaze, Matt et al. | 2009
- 75
-
Taking Surveillance Out of the ShadowsBlaze, M. et al. | 2009
- 78
-
Incentives to Innovate: Improve the Past or Break with It?Lesk, M. et al. | 2009
- 78
-
Security & Privacy Economics - Incentives to Innovate: Improve the Past or Break with It?Lesk, Michael et al. | 2009
- 82
-
Are Patched Machines Really Fixed?Gardner, R.W. / Bishop, M. / Kohno, T. et al. | 2009
- 82
-
Building Security In - Are Patched Machines Really Fixed?Gardner, Ryan W. et al. | 2009
- 86
-
For Good Measure - Risk ConcentrationGeer Jr, Daniel E. et al. | 2009
- 86
-
Risk ConcentrationGeer Jr., Daniel E. / Conway, Daniel G. et al. | 2009
- 87
-
Advertiser Index| 2009
- 88
-
Security as a Systems PropertyBellovin, Steven M. et al. | 2009
- 88
-
Clear Text - Security as a Systems PropertyBellovin, Steven M. et al. | 2009
- c1
-
[Front cover]| 2009
- c2
-
Usenix| 2009
- c3
-
2010 Student Membership| 2009
- c4
-
IEEE Biometrics Certification [advertisement]| 2009