Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building a cloud based systems lab., , , , and . SIGITE Conference, page 151-154. ACM, (2012)Infusing social science into cybersecurity education.. SIGITE Conference, page 121-124. ACM, (2013)The information technology minor: filling a need in the workforce of today., , , and . SIGITE Conference, page 31-34. ACM, (2006)Insider hacking: applying situational crime prevention to a new white-collar crime.. RIIT, page 53-56. ACM, (2014)An implementation of a software development track in an information technology degree program., , , , , , and . SIGITE Conference, page 206-210. ACM, (2004)An implementation of a core curriculum in an information technology degree program., , , , , , , , , and 5 other author(s). SIGITE Conference, page 94-100. ACM, (2004)Research Findings on a Virtual Training Center: Lessons Learned in Measuring Web-Based Training as an Effective Project Management Intervention., and . WebNet, page 554-559. AACE, (2001)Creating remotely accessible "virtual networks" on a single PC to teach computer networking and operating systems.. CITC, page 67-71. ACM, (2003)A teaching pedagogy for networking/system administration courses: freshman through senior years., and . SIGITE Conference, page 15-20. ACM, (2010)Engaging students in information storage management courses., , , , and . SIGITE Conference, page 153-154. ACM, (2010)