Search dblp for Publications

export results for "toc:db/conf/infoseccd/infoseccd2007.bht:"

 download as .bib file

@inproceedings{DBLP:conf/infoseccd/Al-Hamdani07,
  author       = {Wasim A. Al{-}Hamdani},
  title        = {Education organization baseline control protection and trusted level
                  security},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {14:1},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409924},
  doi          = {10.1145/1409908.1409924},
  timestamp    = {Tue, 11 Jun 2019 10:42:50 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Al-Hamdani07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Alexander07,
  author       = {Tammy Alexander},
  title        = {Questionable qualifications: an in-depth look at diploma mills},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {19:1--19:7},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409929},
  doi          = {10.1145/1409908.1409929},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Alexander07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Austin07,
  author       = {Richard D. Austin},
  title        = {Digital forensics on the cheap: teaching forensics using open source
                  tools},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {6:1--6:5},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409915},
  doi          = {10.1145/1409908.1409915},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Austin07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/BaiSB07,
  author       = {Yan Bai and
                  Wayne Summers and
                  Edward Bosworth},
  title        = {Teaching network risk assessment to online graduate students},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {8:1--8:6},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409917},
  doi          = {10.1145/1409908.1409917},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/BaiSB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Blake07,
  author       = {Errol A. Blake},
  title        = {Network and database security: regulatory compliance, network, and
                  database security-a unified process and goal},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {26:1},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409937},
  doi          = {10.1145/1409908.1409937},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Blake07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Blake07a,
  author       = {Errol A. Blake},
  title        = {Network security: VoIP security on data network-a guide},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {27:1--27:7},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409938},
  doi          = {10.1145/1409908.1409938},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Blake07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/BoatwrightL07,
  author       = {Michelle Boatwright and
                  Xin Luo},
  title        = {What do we know about biometrics authentication?},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {31:1--31:5},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409942},
  doi          = {10.1145/1409908.1409942},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/BoatwrightL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/BowmanBP07,
  author       = {Michael Bowman and
                  Heath D. Brown and
                  Paul Pitt},
  title        = {An undergraduate rootkit research project: How available? How hard?
                  How dangerous?},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {7:1--7:6},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409916},
  doi          = {10.1145/1409908.1409916},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/BowmanBP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Boynton07,
  author       = {Brian C. Boynton},
  title        = {Identification of process improvement methodologies with application
                  in information security},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {28:1--28:5},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409939},
  doi          = {10.1145/1409908.1409939},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Boynton07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Carrow07,
  author       = {Erwin Louis Carrow},
  title        = {Puppetnets and botnets: information technology vulnerability exploits
                  that threaten basic internet use},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {13:1--13:7},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409923},
  doi          = {10.1145/1409908.1409923},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Carrow07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Carrow07a,
  author       = {Erwin Louis Carrow},
  title        = {InfoSec technology management of user space and services through security
                  threat gateways},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {21:1--21:6},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409932},
  doi          = {10.1145/1409908.1409932},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Carrow07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Fabian07,
  author       = {Michael Fabian},
  title        = {Endpoint security: managing USB-based removable devices with the advent
                  of portable applications},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {24:1--24:5},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409935},
  doi          = {10.1145/1409908.1409935},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Fabian07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/FloydHH07,
  author       = {Kevin S. Floyd and
                  Susan J. Harrington and
                  Prachi Hivale},
  title        = {The autotelic propensity of types of hackers},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {16:1--16:4},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409926},
  doi          = {10.1145/1409908.1409926},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/FloydHH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/FranciaEFNS07,
  author       = {Guillermo Francia III and
                  Brian Estes and
                  Rahjima R. Francia and
                  Vu Nguyen and
                  Alex Scroggins},
  title        = {The design and implementation of an automated security compliance
                  toolkit: a pedagogical exercise},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {4:1},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409913},
  doi          = {10.1145/1409908.1409913},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/FranciaEFNS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Fumey-Nassah07,
  author       = {Godwin Fumey{-}Nassah},
  title        = {The management of economic ramification of information and network
                  security on an organization},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {25:1--25:4},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409936},
  doi          = {10.1145/1409908.1409936},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Fumey-Nassah07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Gay07,
  author       = {Stephen C. Gay},
  title        = {An examination of virtualization's role in contingency planning},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {17:1--17:8},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409927},
  doi          = {10.1145/1409908.1409927},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Gay07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/GraefeLGGGHA07,
  author       = {Jonathan M. Graefe and
                  Laurel Lashley and
                  M{\'{a}}rio A. M. Guimar{\~{a}}es and
                  Eghosa Guodabia and
                  Amol K. Gupta and
                  David Henry and
                  Richard Austin},
  title        = {Credit card transaction security},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {18:1--18:6},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409928},
  doi          = {10.1145/1409908.1409928},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/GraefeLGGGHA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Green07,
  author       = {Andy Green},
  title        = {Management of security policies for mobile devices},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {22:1--22:4},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409933},
  doi          = {10.1145/1409908.1409933},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Green07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/GuimaraesMA07,
  author       = {M{\'{a}}rio A. M. Guimar{\~{a}}es and
                  Meg Murray and
                  Richard Austin},
  title        = {Incorporating database security courseware into a database security
                  class},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {5:1--5:5},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409914},
  doi          = {10.1145/1409908.1409914},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/GuimaraesMA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Hedrick07,
  author       = {Alison Hedrick},
  title        = {Cyberinsurance: a risk management tool?},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {20:1--20:4},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409931},
  doi          = {10.1145/1409908.1409931},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Hedrick07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/ImsandH07,
  author       = {Eric S. Imsand and
                  John A. Hamilton Jr.},
  title        = {Impact of daily computer usage on {GUI} usage analysis},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {30:1--30:9},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409941},
  doi          = {10.1145/1409908.1409941},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/ImsandH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Joubert07,
  author       = {Scott Joubert},
  title        = {Managing data access and voice service for remote workers},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {23:1--23:4},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409934},
  doi          = {10.1145/1409908.1409934},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Joubert07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Mattord07,
  author       = {Herbert J. Mattord},
  title        = {Rethinking risk-based information security},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {11:1},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409921},
  doi          = {10.1145/1409908.1409921},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Mattord07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Newman07,
  author       = {Robert C. Newman},
  title        = {Covert computer and network communications},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {12:1--12:8},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409922},
  doi          = {10.1145/1409908.1409922},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Newman07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/PatelL07,
  author       = {Dipti Patel and
                  Xin Luo},
  title        = {Take a close look at phishing},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {32:1--32:4},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409943},
  doi          = {10.1145/1409908.1409943},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/PatelL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/PowellDJWTP07,
  author       = {Valerie J. H. Powell and
                  Christopher T. Davis and
                  Randall S. Johnson and
                  Peter Y. Wu and
                  John C. Turchek and
                  Ian W. Parker},
  title        = {VLabNet: the integrated design of hands-on learning in information
                  security and networking},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {9:1--9:7},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409918},
  doi          = {10.1145/1409908.1409918},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/PowellDJWTP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/ReidG07,
  author       = {Randall Craig Reid and
                  Arthur H. Gilbert},
  title        = {Managing security from the perspective of the business executive},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {15:1--15:5},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409925},
  doi          = {10.1145/1409908.1409925},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/ReidG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Snyder07,
  author       = {Robin M. Snyder},
  title        = {Introducing Python programming into the data communications and security
                  courses},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {1:1--1:5},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409910},
  doi          = {10.1145/1409908.1409910},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Snyder07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Snyder07a,
  author       = {Robin M. Snyder},
  title        = {Security programming using Python: man-in-the-middle attacks},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {2:1--2:6},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409911},
  doi          = {10.1145/1409908.1409911},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Snyder07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Spencer07,
  author       = {Wesley Spencer},
  title        = {Teaching advanced network security concepts to high school students
                  in a laboratory-based summer camp environment},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {29:1--29:7},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409940},
  doi          = {10.1145/1409908.1409940},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Spencer07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Taylor07,
  author       = {Richard G. Taylor},
  title        = {Making molehills out of mountains: bringing security research to the
                  classroom},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {3:1},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409912},
  doi          = {10.1145/1409908.1409912},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Taylor07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/Twitchell07,
  author       = {Douglas P. Twitchell},
  title        = {SecurityCom: a multi-player game for researching and teaching information
                  security teams},
  booktitle    = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  pages        = {10:1},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908.1409919},
  doi          = {10.1145/1409908.1409919},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/Twitchell07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/infoseccd/2007,
  title        = {Proceedings of the 4th Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28,
                  2007},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1409908},
  doi          = {10.1145/1409908},
  isbn         = {978-1-59593-909-8},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}