{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T18:36:05Z","timestamp":1730313365278,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,10,20]]},"DOI":"10.1145\/1095714.1095760","type":"proceedings-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T12:34:39Z","timestamp":1131366879000},"page":"199-204","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Web-based interactive courseware for information security"],"prefix":"10.1145","author":[{"given":"Andy Ju An","family":"Wang","sequence":"first","affiliation":[{"name":"Southern Polytechnic State University, Marietta, GA"}]}],"member":"320","published-online":{"date-parts":[[2005,10,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Computer Emergency Response Team (CERT) Coordination Center http:\/\/www.cert.org\/ August 2003. Computer Emergency Response Team (CERT) Coordination Center http:\/\/www.cert.org\/ August 2003."},{"key":"e_1_3_2_1_2_1","unstructured":"John Viega and Gary McGraw Building Secure Software Addison Wesley 2002. John Viega and Gary McGraw Building Secure Software Addison Wesley 2002."},{"volume-title":"Addison Wesley","year":"2003","author":"James","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","unstructured":"Defense Information Systems Agency Cyber Protect: Interactive Training Exercise version 1.1 July 1999 http:\/\/iase.disa.mil\/ETA. Defense Information Systems Agency Cyber Protect: Interactive Training Exercise version 1.1 July 1999 http:\/\/iase.disa.mil\/ETA."},{"key":"e_1_3_2_1_5_1","first-page":"2","author":"Vigna G.","year":"2003","journal-title":"Journal of Information Warfare ("},{"key":"e_1_3_2_1_6_1","unstructured":"Source: http:\/\/www.cert.org\/tech_tips\/security_tools.html Source: http:\/\/www.cert.org\/tech_tips\/security_tools.html"},{"key":"e_1_3_2_1_7_1","first-page":"44099","volume-title":"Addison Wesley","author":"Bishop Matt","year":"2003"},{"key":"e_1_3_2_1_8_1","unstructured":"National Institute of Standards and Technology \"Common Criteria for Information Technology Security Evaluation Part I: Introduction and General Model\" Version 2.1 CCIMB-99-031 August 1999. National Institute of Standards and Technology \"Common Criteria for Information Technology Security Evaluation Part I: Introduction and General Model\" Version 2.1 CCIMB-99-031 August 1999."},{"key":"e_1_3_2_1_9_1","unstructured":"{CC2 99} National Institute of Standards and Technology \"Common Criteria for Information Technology Security Evaluation Part II: Security Function Requirements\" Version 2.1 CCIMB-99-031 August 1999. {CC2 99} National Institute of Standards and Technology \"Common Criteria for Information Technology Security Evaluation Part II: Security Function Requirements\" Version 2.1 CCIMB-99-031 August 1999."},{"key":"e_1_3_2_1_10_1","unstructured":"{CC3 99} National Institute of Standards and Technology \"Common Criteria for Information Technology Security Evaluation Part III: Security Assurance Requirements\" Version 2.1 CCIMB-99-031 August 1999. {CC3 99} National Institute of Standards and Technology \"Common Criteria for Information Technology Security Evaluation Part III: Security Assurance Requirements\" Version 2.1 CCIMB-99-031 August 1999."},{"key":"e_1_3_2_1_11_1","unstructured":"{CEC 91} Commission of the European Communities \"Information Technology Security Evaluation Criteria\" Version 1.2 1991. {CEC 91} Commission of the European Communities \"Information Technology Security Evaluation Criteria\" Version 1.2 1991."},{"key":"e_1_3_2_1_12_1","unstructured":"{DOD 85} Department of Defense \"Trusted Computer System Evaluation Criteria\" DOD 5200.28-STD December 1985. {DOD 85} Department of Defense \"Trusted Computer System Evaluation Criteria\" DOD 5200.28-STD December 1985."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/356850.356852"},{"key":"e_1_3_2_1_14_1","unstructured":"National Institute of Standards and Technology \"Security Requirements for Cryptographic Modules\" PIPS PUB 140-2 May 2001. National Institute of Standards and Technology \"Security Requirements for Cryptographic Modules\" PIPS PUB 140-2 May 2001."},{"key":"e_1_3_2_1_15_1","unstructured":"Marianne Swanson Nadya Bartol John Sabato Joan Hash and Laurie Graffo \"Security Metrics Guide for Information Technology Systems\" NIST Special Publication 800-55 National Institute of Standards and Technology http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-55\/sp800-55.pdf. July 2003. Marianne Swanson Nadya Bartol John Sabato Joan Hash and Laurie Graffo \"Security Metrics Guide for Information Technology Systems\" NIST Special Publication 800-55 National Institute of Standards and Technology http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-55\/sp800-55.pdf. July 2003."},{"key":"e_1_3_2_1_16_1","unstructured":"Michael Howard and David LeBlanc \"Writing Secure Code Microsoft Press 2003. Michael Howard and David LeBlanc \"Writing Secure Code Microsoft Press 2003."},{"volume-title":"Proceedings of Frontiers in Education Conference, Session F1C, IEEE Catalog Number 04CH37579C, ISBN: 0-7803-8553-5.","year":"2004","author":"Wang J. A.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","first-page":"044","volume":"1","author":"Wang J. A.","year":"2003","journal-title":"ISBN"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167253.1167295"},{"volume-title":"Embry-Riddle Aeronautical University","year":"2002","author":"Gerhart Susan","key":"e_1_3_2_1_20_1"}],"event":{"name":"SIGITE05: ACM Special Interest Group for Information Technology Education Conference 2005","sponsor":["ACM Association for Computing Machinery","SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Newark NJ USA","acronym":"SIGITE05"},"container-title":["Proceedings of the 6th conference on Information technology education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1095714.1095760","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T16:01:58Z","timestamp":1672934518000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1095714.1095760"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,10,20]]},"references-count":20,"alternative-id":["10.1145\/1095714.1095760","10.1145\/1095714"],"URL":"https:\/\/doi.org\/10.1145\/1095714.1095760","relation":{},"subject":[],"published":{"date-parts":[[2005,10,20]]},"assertion":[{"value":"2005-10-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}