Normal view MARC view ISBD view

Security in E-Learning [electronic resource] / by Edgar Weippl.

By: Weippl, Edgar [author.].
Contributor(s): SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Advances in Information Security: 16Publisher: Boston, MA : Springer US, 2005Description: XVIII, 185 p. 43 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9780387260655.Subject(s): Computer science | Software engineering | Computer programming | Data structures (Computer science) | Data encryption (Computer science) | Computer Science | Data Structures, Cryptology and Information Theory | Information Systems Applications (incl. Internet) | Data Encryption | Software Engineering/Programming and Operating Systems | Programming Techniques | Software EngineeringAdditional physical formats: Printed edition:: No titleDDC classification: 005.74 Online resources: Click here to access online
Contents:
Quick Start -- Authors -- Teachers -- Managers -- Students -- In-Depth -- Protecting Content -- Security Risk Analysis -- Personal Security Checklist -- Access Control, Authentication & Auditing -- Cryptography -- Additional Resources -- PGP - Pretty Good Privacy -- Plagiarism Detection and Prevention.
In: Springer eBooksSummary: Security in E-Learning is organized in three parts. First, the author raises awareness that security is an important issue in the context of education. The second part of the book emphasizes that security is mainly an organizational and management issue. The third goal highlights improving security as an ongoing process. Security in E-Learning includes technical fundamentals (buzz words), examples and case studies covering each of these three topics. Considering the enormous costs of creating and maintaining courses, it is surprising that security is not yet considered an important issue by professionals, professors and students. Traditional security research has been largely driven by military requirements to enforce secrecy in the realm of e-learning. In most cases, the knowledge contained in e-learning programs is widely available. Therefore, the asset is not the information itself, but the hypermedia presentation used to convey the information. Security in E-Learning is designed for a professional audience composed of researchers and practitioners in industry and IT professionals. This volume is also suitable for upper undergraduate-level and graduate-level students in computer science.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode
e-Books e-Books Bangalore University Library
Available BUSP000328

Quick Start -- Authors -- Teachers -- Managers -- Students -- In-Depth -- Protecting Content -- Security Risk Analysis -- Personal Security Checklist -- Access Control, Authentication & Auditing -- Cryptography -- Additional Resources -- PGP - Pretty Good Privacy -- Plagiarism Detection and Prevention.

Security in E-Learning is organized in three parts. First, the author raises awareness that security is an important issue in the context of education. The second part of the book emphasizes that security is mainly an organizational and management issue. The third goal highlights improving security as an ongoing process. Security in E-Learning includes technical fundamentals (buzz words), examples and case studies covering each of these three topics. Considering the enormous costs of creating and maintaining courses, it is surprising that security is not yet considered an important issue by professionals, professors and students. Traditional security research has been largely driven by military requirements to enforce secrecy in the realm of e-learning. In most cases, the knowledge contained in e-learning programs is widely available. Therefore, the asset is not the information itself, but the hypermedia presentation used to convey the information. Security in E-Learning is designed for a professional audience composed of researchers and practitioners in industry and IT professionals. This volume is also suitable for upper undergraduate-level and graduate-level students in computer science.

There are no comments for this item.

Log in to your account to post a comment.

Copyright © 2019 Bangalore University, Bangalore. All Rights Reserved.
You are Visitor No.
Web Counter

Powered by Koha