Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 4 |
Computers | 4 |
Computer Science | 2 |
Information Security | 2 |
Information Technology | 2 |
Laboratories | 2 |
Access to Computers | 1 |
Alphabets | 1 |
Barriers | 1 |
Classrooms | 1 |
Computer Centers | 1 |
More ▼ |
Source
Journal on Educational… | 4 |
Author
Du, Wenliang | 1 |
Galaviz, Jose | 1 |
Garcia-Pasquel, Jesus Adolfo | 1 |
Hoffman, Lance J. | 1 |
Rosenberg, Timothy | 1 |
Shumba, Rose | 1 |
Wang, Ronghua | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 4 |
Education Level
Higher Education | 2 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Du, Wenliang; Wang, Ronghua – Journal on Educational Resources in Computing, 2008
The security and assurance of our computing infrastructure has become a national priority. To address this priority, higher education has gradually incorporated the principles of computer and information security into the mainstream undergraduate and graduate computer science curricula. To achieve effective education, learning security principles…
Descriptors: Computer Security, Laboratories, Computers, Computer Science
Garcia-Pasquel, Jesus Adolfo; Galaviz, Jose – Journal on Educational Resources in Computing, 2006
Many introductory courses to cryptology and computer security start with or include a discussion of classical ciphers that usually contemplates some cryptanalysis techniques used to break them. Ganzua (picklock in Spanish) is an application designed to assist the cryptanalysis of ciphertext obtained with monoalphabetic or polyalphabetic ciphers.…
Descriptors: Introductory Courses, Alphabets, Computer Security, Technology
Shumba, Rose – Journal on Educational Resources in Computing, 2006
In the summer of 2003, a project to augment and improve the teaching of information assurance courses was started at IUP. Thus far, ten hands-on exercises have been developed. The exercises described in this article, and presented in the appendix, are based on actions required to secure a Linux host. Publicly available resources were used to…
Descriptors: Computer Security, Experiential Learning, Computer Software, Open Source Technology
Rosenberg, Timothy; Hoffman, Lance J. – Journal on Educational Resources in Computing, 2006
Educational institutions that wish to implement a specialized teaching laboratory often have a variety of obstacles to overcome. Some of these obstacles are related to adapting existing classroom infrastructure, building the laboratory, and meeting the demands for multiple-use classrooms to maximize the return on investment. In some cases, such as…
Descriptors: Higher Education, Professional Education, Computers, Specialization