default search action
ACM Journal of Educational Resources in Computing, Volume 6
Volume 6, Number 1, March 2006
- Geoffrey G. Roy:
Designing and explaining programs with a literate pseudocode. 1 - Byron Marshall, Hsinchun Chen, Rao Shen, Edward A. Fox:
Moving digital libraries into the student learning space: The GetSmart experience. 2 - Chao Boon Teo, Robert Kheng Leng Gay:
A knowledge-driven model to personalize e-learning. 3
Volume 6, Number 2, June 2006
- Boris Koldehofe, Marina Papatriantafilou, Philippas Tsigas:
LYDIAN: An extensible educational animation environment for distributed algorithms. 1:1-1:21 - Gary J. Nutt:
Addressing small computers in the first OS course. 2:1-2:13
Volume 6, Number 3, September 2006
- Deborah A. Frincke, S. Oudekirk, B. Popovsky:
Editorial: Special issue on resources for the computer security and information assurance curriculum: Issue 1. 1 - Sanjay Goel, Damira Pon, Peter A. Bloniarz, Robert Bangert-Drowns, George Berg, Vince Delio, Laura Iwan, Thomas Hurbanek, Sandoor P. Schuman, Jagdish Gangolly, Adnan Baykal, Jon Hobbs:
Innovative model for information assurance curriculum: A teaching hospital. 2 - Matt Bishop:
Teaching context in information security. 3 - Jesús Adolfo García-Pasquel, José Galaviz:
Ganzúa: A cryptanalysis tool for monoalphabetic and polyalphabetic ciphers. 4 - Rose K. Shumba:
Teaching hands-on Linux host computer security. 5 - Warren Harrison:
A term project for a course on computer forensics. 6
Volume 6, Number 4, December 2006
- Deborah A. Frincke, S. Oudekirk, B. Popovsky:
Editorial: Resources for the computer security and information assurance curriculum. 1 - Timothy Rosenberg, Lance J. Hoffman:
Taking the network on the road: Portable network solutions for computer security educators. 2 - Paul J. Wagner, Andrew T. Phillips:
A portable computer security workshop. 3 - Bhagyavati:
Laboratory exercises in online information assurance courses. 4 - José Carlos Brustoloni:
Laboratory experiments for network security instruction. 5 - Brett J. L. Landry, M. Scott Koger:
Dispelling 10 common disaster recovery myths: Lessons learned from Hurricane Katrina and other disasters. 6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.