| 000 | 03283nam a22005055i 4500 | ||
|---|---|---|---|
| 001 | 978-0-387-26065-5 | ||
| 003 | DE-He213 | ||
| 005 | 20250710083935.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100301s2005 xxu| s |||| 0|eng d | ||
| 020 |
_a9780387260655 _a99780387260655 |
||
| 024 | 7 |
_a10.1007/b136702 _2doi |
|
| 082 | 0 | 4 |
_a005.74 _223 |
| 100 | 1 |
_aWeippl, Edgar. _eauthor. |
|
| 245 | 1 | 0 |
_aSecurity in E-Learning _h[recurso electrónico] / _cby Edgar Weippl. |
| 264 | 1 |
_aBoston, MA : _bSpringer US, _c2005. |
|
| 300 |
_aXVIII, 185 p. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_arecurso en línea _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aAdvances in Information Security, _x1568-2633 ; _v16 |
|
| 505 | 0 | _aQuick Start -- Authors -- Teachers -- Managers -- Students -- In-Depth -- Protecting Content -- Security Risk Analysis -- Personal Security Checklist -- Access Control, Authentication & Auditing -- Cryptography -- Additional Resources -- PGP - Pretty Good Privacy -- Plagiarism Detection and Prevention. | |
| 520 | _aSecurity in E-Learning is organized in three parts. First, the author raises awareness that security is an important issue in the context of education. The second part of the book emphasizes that security is mainly an organizational and management issue. The third goal highlights improving security as an ongoing process. Security in E-Learning includes technical fundamentals (buzz words), examples and case studies covering each of these three topics. Considering the enormous costs of creating and maintaining courses, it is surprising that security is not yet considered an important issue by professionals, professors and students. Traditional security research has been largely driven by military requirements to enforce secrecy in the realm of e-learning. In most cases, the knowledge contained in e-learning programs is widely available. Therefore, the asset is not the information itself, but the hypermedia presentation used to convey the information. Security in E-Learning is designed for a professional audience composed of researchers and practitioners in industry and IT professionals. This volume is also suitable for upper undergraduate-level and graduate-level students in computer science. | ||
| 650 | 0 | _aCOMPUTER SCIENCE. | |
| 650 | 0 | _aSOFTWARE ENGINEERING. | |
| 650 | 0 | _aDATA STRUCTURES (COMPUTER SCIENCE). | |
| 650 | 0 | _aDATA ENCRYPTION (COMPUTER SCIENCE). | |
| 650 | 0 | _aINFORMATION SYSTEMS. | |
| 650 | 1 | 4 | _aCOMPUTER SCIENCE. |
| 650 | 2 | 4 | _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY. |
| 650 | 2 | 4 | _aINFORMATION SYSTEMS APPLICATIONS (INCL.INTERNET). |
| 650 | 2 | 4 | _aDATA ENCRYPTION. |
| 650 | 2 | 4 | _aSOFTWARE ENGINEERING/PROGRAMMING AND OPERATING SYSTEMS. |
| 650 | 2 | 4 | _aPROGRAMMING TECHNIQUES. |
| 650 | 2 | 4 | _aSOFTWARE ENGINEERING. |
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9780387243412 |
| 830 | 0 |
_aAdvances in Information Security, _x1568-2633 ; _v16 |
|
| 856 | 4 | 0 |
_uhttp://dx.doi.org/10.1007/b136702 _zVer el texto completo en las instalaciones del CICY |
| 912 | _aZDB-2-SCS | ||
| 942 |
_2ddc _cER |
||
| 999 |
_c56521 _d56521 |
||