Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 1 |
Descriptor
| Computer Networks | 2 |
| Best Practices | 1 |
| Computer Security | 1 |
| Computer System Design | 1 |
| Courseware | 1 |
| Design | 1 |
| Design Preferences | 1 |
| Electronic Learning | 1 |
| Experiential Learning | 1 |
| Foreign Countries | 1 |
| Graduate Students | 1 |
| More ▼ | |
Source
| Computer Science Education | 2 |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 1 |
Audience
Location
| Maryland (Baltimore) | 1 |
| Spain | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Nielson, Seth James – Computer Science Education, 2017
Attempting to educate practitioners of computer security can be difficult if for no other reason than the breadth of knowledge required today. The security profession includes widely diverse subfields including cryptography, network architectures, programming, programming languages, design, coding practices, software testing, pattern recognition,…
Descriptors: Computer Security, Simulation, Graduate Students, Training
Retalis, Symeon; Georgiakakis, Petros; Dimitriadis, Yannis – Computer Science Education, 2006
Design pattern creation, especially in the e-learning domain, is a highly complex process that has not been sufficiently studied and formalized. In this paper, we propose a systematic pattern development cycle, whose most important aspects focus on reverse engineering of existing systems in order to elicit features that are cross-validated through…
Descriptors: Validated Programs, Instructional Design, Courseware, Electronic Learning

Peer reviewed
Direct link
