Security in E-Learning Security in E-Learning
    • $119.99

Publisher Description

Security in E-Learning is organized in three parts. First, the author raises awareness that security is an important issue in the context of education. The second part of the book emphasizes that security is mainly an organizational and management issue. The third goal highlights improving security as an ongoing process. Security in E-Learning includes technical fundamentals (buzz words), examples and case studies covering each of these three topics.

Considering the enormous costs of creating and maintaining courses, it is surprising that security is not yet considered an important issue by professionals, professors and students. Traditional security research has been largely driven by military requirements to enforce secrecy in the realm of e-learning. In most cases, the knowledge contained in e-learning programs is widely available. Therefore, the asset is not the information itself, but the hypermedia presentation used to convey the information.

Security in E-Learning is designed for a professional audience composed of researchers and practitioners in industry and IT professionals. This volume is also suitable for upper undergraduate-level and graduate-level students in computer science.

GENRE
Computers & Internet
RELEASED
2006
March 30
LANGUAGE
EN
English
LENGTH
203
Pages
PUBLISHER
Springer US
SELLER
Springer Nature B.V.
SIZE
7
MB
ISSE 2009 Securing Electronic Business Processes ISSE 2009 Securing Electronic Business Processes
2010
Computer and Information Security Handbook Computer and Information Security Handbook
2009
ISSE 2008 Securing Electronic Business Processes ISSE 2008 Securing Electronic Business Processes
2009
Practical Data Security Practical Data Security
2019
Cyberspace and Cybersecurity Cyberspace and Cybersecurity
2017
ISSE 2013 Securing Electronic Business Processes ISSE 2013 Securing Electronic Business Processes
2013
Trust, Privacy and Security in Digital Business Trust, Privacy and Security in Digital Business
2020
Trust, Privacy and Security in Digital Business Trust, Privacy and Security in Digital Business
2019
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Security for Telecommunications Networks Security for Telecommunications Networks
2008
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015
Network Security Policies and Procedures Network Security Policies and Procedures
2007