000 03283nam a22005055i 4500
001 978-0-387-26065-5
003 DE-He213
005 20250710083935.0
007 cr nn 008mamaa
008 100301s2005 xxu| s |||| 0|eng d
020 _a9780387260655
_a99780387260655
024 7 _a10.1007/b136702
_2doi
082 0 4 _a005.74
_223
100 1 _aWeippl, Edgar.
_eauthor.
245 1 0 _aSecurity in E-Learning
_h[recurso electrónico] /
_cby Edgar Weippl.
264 1 _aBoston, MA :
_bSpringer US,
_c2005.
300 _aXVIII, 185 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x1568-2633 ;
_v16
505 0 _aQuick Start -- Authors -- Teachers -- Managers -- Students -- In-Depth -- Protecting Content -- Security Risk Analysis -- Personal Security Checklist -- Access Control, Authentication & Auditing -- Cryptography -- Additional Resources -- PGP - Pretty Good Privacy -- Plagiarism Detection and Prevention.
520 _aSecurity in E-Learning is organized in three parts. First, the author raises awareness that security is an important issue in the context of education. The second part of the book emphasizes that security is mainly an organizational and management issue. The third goal highlights improving security as an ongoing process. Security in E-Learning includes technical fundamentals (buzz words), examples and case studies covering each of these three topics. Considering the enormous costs of creating and maintaining courses, it is surprising that security is not yet considered an important issue by professionals, professors and students. Traditional security research has been largely driven by military requirements to enforce secrecy in the realm of e-learning. In most cases, the knowledge contained in e-learning programs is widely available. Therefore, the asset is not the information itself, but the hypermedia presentation used to convey the information. Security in E-Learning is designed for a professional audience composed of researchers and practitioners in industry and IT professionals. This volume is also suitable for upper undergraduate-level and graduate-level students in computer science.
650 0 _aCOMPUTER SCIENCE.
650 0 _aSOFTWARE ENGINEERING.
650 0 _aDATA STRUCTURES (COMPUTER SCIENCE).
650 0 _aDATA ENCRYPTION (COMPUTER SCIENCE).
650 0 _aINFORMATION SYSTEMS.
650 1 4 _aCOMPUTER SCIENCE.
650 2 4 _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY.
650 2 4 _aINFORMATION SYSTEMS APPLICATIONS (INCL.INTERNET).
650 2 4 _aDATA ENCRYPTION.
650 2 4 _aSOFTWARE ENGINEERING/PROGRAMMING AND OPERATING SYSTEMS.
650 2 4 _aPROGRAMMING TECHNIQUES.
650 2 4 _aSOFTWARE ENGINEERING.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9780387243412
830 0 _aAdvances in Information Security,
_x1568-2633 ;
_v16
856 4 0 _uhttp://dx.doi.org/10.1007/b136702
_zVer el texto completo en las instalaciones del CICY
912 _aZDB-2-SCS
942 _2ddc
_cER
999 _c56521
_d56521