940
Views
0
CrossRef citations to date
0
Altmetric
Original Article

Building a Virtual Constructivist Learning Environment for Learning Computing Security and Forensics

, &
Pages 49-61 | Published online: 15 Dec 2015

References

  • Debian Live (2013) Available at http://live.debian.net/ (accessed 05 June 2013).
  • George, B. and Valeva, A. (2006) A database security course on a shoestring. In Proceedings of the 37th Technical Symposium on Computer Science Education (SIGCSE’06). Houston, Texas. New York, NY: ACM.
  • Han, L. (2012) BLOSSOM Available at http://www.scmdt.mmu.ac.uk/blossom/deliverables.htm (accessed 19 December 2012).
  • Hill, J., Carver, C., Humphries, J. and Pooch, U. (2001) Using an isolated network laboratory to teach advanced networks and security. In Proceedings of the thirty-second SIGCSE technical symposium on Computer Science Education. New York, NY: ACM.
  • Irvine, C.E., Levin, T.E., Nguyen, T. and Dinolt, G.W. (2004) The trusted computing exemplar project. In Proceedings of the 2004 IEEE Systems Man and Cybernetics Information Assurance Workshop, pp109–115. Piscataway, NJ: IEEE Service Center.
  • KVM (2012) Available at http://www.linux-kvm.org/page/Main_Page (accessed 12 November 2012).
  • Micco, M. and Rossman, H. (2002) Building a cyberwar lab: lesson learned: teaching cybersecurity principles to undergraduates. In Proceedings of the 33rd Technical Symposium on Computer Science Education (SIGCSE’02), pp23–27. Cincinnati, Kentucky. New York, NY: ACM.
  • O’Leary, M. (2006) A laboratory based capstone course in computer security for undergraduates. In Proceedings of the 37th Technical Symposium on Computer Science Education (SIGCSE’06). Houston, Texas. New York, NY: ACM.
  • Piaget, J. (2001) The psychology of intelligence, second edition. London and New York: Routledge.
  • Romney, G.W. and Stevenson, B.R. (2004) An isolated, multi-platform network sandbox for teaching IT security system engineers. In Proceedings of the 5th Conference on Information Technlogy Education (CITCS’04). Salt Lake City, UT. New York, NY: ACM.
  • Scapy (2013) Available at http://www.secdev.org/projects/scapy/ (accessed 08 March 2013).
  • Tao, L., Chen, L.-C. and Lin, C. (2010) Virtual open-source labs for Web security. In Proceedings of the World Congress on Engineering and Computer Science. Hong Kong: Newswood Limited.
  • Vmware (2012) Available at http://www.vmware.com/ (accessed 11 November 2012).
  • Vygotsky, L.S. (1978) Mind in society: the development of higher psychological processes. Cambridge: Harvard University Press.
  • Wagner, P.J. and Wudi, J.M. (2004) Designing and implementing a cyber war laboratory exercise for a computer security course. In Proceedings of the 35th Technical Symposium on Computer Science Education (SIGCSE’04), pp402–406. New York, NY: ACM.
  • XEN (2012) Available at http://www.cl.cam.ac.uk/research/srg/netos/xen/ (accessed 03 March 2013).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.