


default search action
ACM Journal of Educational Resources in Computing, Volume 6
Volume 6, Number 1, March 2006
- Geoffrey G. Roy:

Designing and explaining programs with a literate pseudocode. 1 - Byron Marshall, Hsinchun Chen, Rao Shen, Edward A. Fox

:
Moving digital libraries into the student learning space: The GetSmart experience. 2 - Chao Boon Teo, Robert Kheng Leng Gay:

A knowledge-driven model to personalize e-learning. 3
Volume 6, Number 2, June 2006
- Boris Koldehofe

, Marina Papatriantafilou
, Philippas Tsigas
:
LYDIAN: An extensible educational animation environment for distributed algorithms. 1:1-1:21 - Gary J. Nutt:

Addressing small computers in the first OS course. 2:1-2:13
Volume 6, Number 3, September 2006
- Deborah A. Frincke, S. Oudekirk, B. Popovsky:

Editorial: Special issue on resources for the computer security and information assurance curriculum: Issue 1. 1 - Sanjay Goel, Damira Pon, Peter A. Bloniarz, Robert Bangert-Drowns, George Berg, Vince Delio, Laura Iwan, Thomas Hurbanek, Sandoor P. Schuman, Jagdish Gangolly, Adnan Baykal, Jon Hobbs:

Innovative model for information assurance curriculum: A teaching hospital. 2 - Matt Bishop

:
Teaching context in information security. 3 - Jesús Adolfo García-Pasquel, José Galaviz:

Ganzúa: A cryptanalysis tool for monoalphabetic and polyalphabetic ciphers. 4 - Rose K. Shumba:

Teaching hands-on Linux host computer security. 5 - Warren Harrison:

A term project for a course on computer forensics. 6
Volume 6, Number 4, December 2006
- Deborah A. Frincke, S. Oudekirk, B. Popovsky:

Editorial: Resources for the computer security and information assurance curriculum. 1 - Timothy Rosenberg, Lance J. Hoffman:

Taking the network on the road: Portable network solutions for computer security educators. 2 - Paul J. Wagner, Andrew T. Phillips

:
A portable computer security workshop. 3 - Bhagyavati:

Laboratory exercises in online information assurance courses. 4 - José Carlos Brustoloni:

Laboratory experiments for network security instruction. 5 - Brett J. L. Landry

, M. Scott Koger:
Dispelling 10 common disaster recovery myths: Lessons learned from Hurricane Katrina and other disasters. 6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














