Sciweavers

6164 search results - page 55 / 1233
» Teaching Computer Security
Sort
View
ITICSE
2000
ACM
15 years 7 months ago
The Internet-based lecture: converging teaching and technology
Network-based distributed education is a reality today. At George Mason University, we have been pursuing a capability beyond the widespread practice of supporting courses with we...
J. Mark Pullen
116
Voted
ERSHOV
2003
Springer
15 years 7 months ago
The Outside-In Method of Teaching Introductory Programming
The new design for the introductory programming course at ETH relies on object technology, Eiffel, extensive reuse, a graphics-rich library (TRAFFIC) built specifically for the c...
Bertrand Meyer
SPW
1997
Springer
15 years 6 months ago
Secure Books: Protecting the Distribution of Knowledge
We undertook a project to secure the distribution of medical information using Wax. This is a proprietary hypertext-based system used for information such as treatment protocols, d...
Ross J. Anderson, Václav Matyás Jr.,...
105
Voted
ACE
2004
197views Education» more  ACE 2004»
15 years 4 months ago
The Cryptic Crossword Puzzle as a Useful Analogue in Teaching Programming
Contrary to the apparent beliefs of many students, computer programming and problem solving are not amenable to purely book learning. These skills can be acquired only by practice...
Simon
ACE
2004
258views Education» more  ACE 2004»
15 years 4 months ago
Using a Maze Case Study to Teach Object-Oriented Programming and Design Patterns
In order to teach object-oriented design and programming in introductory computer science it is imperative to teach objects from the very beginning of the course. The use of inter...
Chris Nevison, Barbara Wells