Author of the publication

Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum).

, , , , , and . ACSAC, page 265-. IEEE Computer Society, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Value of Capture-the-Flag Exercises in Education: An Interview with Chris Eagle.. IEEE Secur. Priv., 9 (6): 58-60 (2011)MYSEA: the monterey security architecture., , , , , , , and . STC, page 39-48. ACM, (2009)A security architecture for transient trust., , , and . CSAW, page 1-8. ACM, (2008)A Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security Approach., and . International Information Security Workshops, volume 148 of IFIP, page 173-180. Kluwer, (2004)Architecture for an embedded secure data base management system., , and . ACSAC, page 125-136. IEEE, (1990)Trusted Hardware: Can It Be Trustworthy?, and . DAC, page 1-4. IEEE, (2007)Active Learning with the CyberCIEGE Video Game., and . CSET, USENIX Association, (2011)Security Architecture for a Virtual Heterogeneous Machine., , and . ACSAC, page 167-177. IEEE Computer Society, (1998)An Overview of MSHN: The Management System for Heterogeneous Networks., , , , , , , , , and 10 other author(s). Heterogeneous Computing Workshop, page 184-198. IEEE Computer Society, (1999)Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture., , , , , , , and . TRUST, volume 5471 of Lecture Notes in Computer Science, page 133-152. Springer, (2009)