Atnaujinkite slapukų nuostatas

El. knyga: Information Security Education - Adapting to the Fourth Industrial Revolution: 15th IFIP WG 11.8 World Conference, WISE 2022, Copenhagen, Denmark, June 13-15, 2022, Proceedings

Edited by , Edited by , Edited by , Edited by

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book constitutes the refereed proceedings of the 15th IFIP WG 11.8 World Conference on Information Security Education, WISE 2022, held in Copenhagen, Denmark, in June 2021.

The 8 papers presented were carefully reviewed and selected from 17 submissions. The papers are categorized into the following topical sub-headings: Securing the Fourth Industrial Revolution through Programming; Cybersecurity in the Fourth Industrial Revolution: Charting the Way Forward in Education; and Real-World Cybersecurity-Inspired Capacity Building.

Securing the Fourth Industrial Revolution through Programming.-
Analyzing Error Rates in Cryptological Programming Assignments.- SecTutor: An
Intelligent Tutoring System For Secure Programming .- Cybersecurity in the
Fourth Industrial Revolution: Charting the Way Forward in Education.- How to
Overcome Staff Shortage in Professionals for SOCs and NSICs.- Collaborative
Cybersecurity Learning: Establishing Educator and Learner Expectations and
Requirements.- A Maturity Assessment Model for Cyber Security Education in
Europe.- Real-World Cybersecurity-Inspired Capacity Building.- ForCyRange: An
Educational IoT Cyber Range for Live Digital Forensics.- South Africas taxi
industry as a cybersecurity-awareness game changer: why and how?.- Maritime
Cyber Threats Detection Framework: Building Capabilities.