Cybersecurity Teaching in Higher Education [[electronic resource] /] / edited by Leslie F. Sikos, Paul Haskell-Dowland
| Cybersecurity Teaching in Higher Education [[electronic resource] /] / edited by Leslie F. Sikos, Paul Haskell-Dowland |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (144 pages) |
| Disciplina | 005.8071 |
| Soggetto topico |
Education—Data processing
Computer security Computer networks—Security measures Data protection Computers and Education Principles and Models of Security Mobile and Network Security Data and Information Security |
| Soggetto non controllato | Mathematics |
| ISBN |
9783031242168
9783031242151 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter. 1. Challenges and Opportunities of Teaching Cybersecurity in UK University Computing Programmes -- Chapter. 2. Using the Delphi Method to Elicit Requirements for an International Master’s Program in Information Security Management -- Chapter. 3. Designing and Developing a Scenario-Based Curriculum for Cyber Education in HE -- Chapter. 4. Enabling teamwork in Cybersecurity courses -- Chapter. 5. Towards a Light-Weight Certification Scheme for Cybersecurity MOOCs -- Chapter. 6. Learning Environments for Digital Forensics Teaching in Higher Education. |
| Record Nr. | UNISA-996547960803316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Cybersecurity Teaching in Higher Education / / edited by Leslie F. Sikos, Paul Haskell-Dowland
| Cybersecurity Teaching in Higher Education / / edited by Leslie F. Sikos, Paul Haskell-Dowland |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (144 pages) |
| Disciplina |
005.8071
005.80711 |
| Soggetto topico |
Education - Data processing
Computer security Computer networks - Security measures Data protection Computers and Education Principles and Models of Security Mobile and Network Security Data and Information Security |
| ISBN |
9783031242168
9783031242151 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter. 1. Challenges and Opportunities of Teaching Cybersecurity in UK University Computing Programmes -- Chapter. 2. Using the Delphi Method to Elicit Requirements for an International Master’s Program in Information Security Management -- Chapter. 3. Designing and Developing a Scenario-Based Curriculum for Cyber Education in HE -- Chapter. 4. Enabling teamwork in Cybersecurity courses -- Chapter. 5. Towards a Light-Weight Certification Scheme for Cybersecurity MOOCs -- Chapter. 6. Learning Environments for Digital Forensics Teaching in Higher Education. |
| Record Nr. | UNINA-9910725095103321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Hardware Security Training, Hands-on! / / by Mark Tehranipoor, N. Nalla Anandakumar, Farimah Farahmandi
| Hardware Security Training, Hands-on! / / by Mark Tehranipoor, N. Nalla Anandakumar, Farimah Farahmandi |
| Autore | Tehranipoor Mohammad H. <1974-> |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (XXIV, 320 p. 250 illus., 218 illus. in color.) |
| Disciplina |
621.3815
005.8071 |
| Soggetto topico |
Electronic circuits
Embedded computer systems Electronic circuit design Electronic Circuits and Systems Embedded Systems Electronics Design and Verification |
| ISBN | 3-031-31034-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1. Physical Unclonable Functions (PUFs) -- Chapter 2. True Random Number Generator (TRNG) -- Chapter 3. Recycled Chip Detection using RO-based Odometer -- Chapter 4. Recycled FPGA Detection -- Chapter 5. Hardware Trojan Insertion -- Chapter 6. Hardware Trojan Detection -- Chapter 7. Security Verification -- Chapter 8. Power Analysis Attacks on AES -- Chapter 9. EM Side-Channel Attack on AES -- Chapter 10. Logic Locking Insertion and Assessment -- Chapter 11. Clock Glitch Fault Attack on FSM in AES Controller -- Chapter 12. Voltage Glitch Attack on an FPGA AES Implementation -- Chapter 13. Laser Fault Injection Attack (FIA) -- Chapter 14. Optical Probing Attack on Logic Locking -- Chapter 15. Universal Fault Sensor -- Chapter 16. Scanning Electron Microscope Training. |
| Record Nr. | UNINA-9910742492103321 |
Tehranipoor Mohammad H. <1974->
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Innovations in Cybersecurity Education / / edited by Kevin Daimi, Guillermo Francia III
| Innovations in Cybersecurity Education / / edited by Kevin Daimi, Guillermo Francia III |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (XII, 391 p. 146 illus., 101 illus. in color.) |
| Disciplina | 005.8071 |
| Soggetto topico |
Technical education
Telecommunication Data protection Security systems Engineering and Technology Education Communications Engineering, Networks Data and Information Security Security Science and Technology |
| ISBN |
9783030502447
3030502449 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction -- Cyber Security -- Biometric Security -- Security Countermeasures -- Hardware Security -- Risk Management -- Software Security -- Security Education -- Cybersecurity Curriculum -- Cybersecurity Laboratory Exercises -- Cybersecurity Scenarios -- Conclusion. |
| Record Nr. | UNINA-9910468235203321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Research methods for cyber security / / Thomas W. Edgar, David O. Manz
| Research methods for cyber security / / Thomas W. Edgar, David O. Manz |
| Autore | Edgar Thomas W. |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Cambridge, Massachusetts : , : Syngress, an imprint of Elsevier, , [2017] |
| Descrizione fisica | 1 online resource (xxiii, 404 pages) : illustrations (some color) |
| Disciplina | 005.8071 |
| Collana | Gale eBooks |
| Soggetto topico |
Computer security
Cyberspace - Security measures |
| ISBN | 0-12-812930-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | pt. 1. Introduction -- pt. 2. Observational research methods -- pt. 3. Mathematical research methods -- pt. 4. Experimental research methods -- pt. 5. Applied research methods -- pt. 6. Additional materials. |
| Record Nr. | UNINA-9910583324603321 |
Edgar Thomas W.
|
||
| Cambridge, Massachusetts : , : Syngress, an imprint of Elsevier, , [2017] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||