Hilfe Warenkorb Konto Anmelden
 
 
   Schnellsuche   
     zur Expertensuche                      
Security in E-Learning
  Großes Bild
 
Security in E-Learning
von: Edgar R. Weippl
Springer-Verlag, 2005
ISBN: 9780387260655
194 Seiten, Download: 31280 KB
 
Format:  PDF
geeignet für: Apple iPad, Android Tablet PC's Online-Lesen PC, MAC, Laptop

Typ: A (einfacher Zugriff)

 

 
eBook anfordern
Inhaltsverzeichnis

  Contents 6  
  List of Figures 12  
  Preface 15  
  Part I Quick Start 19  
     1 Introduction 21  
        1.1 Basic Security Terminology 22  
        1.2 E-Learning 25  
        1.3 Getting Started: a Brief Review of the Literature 27  
     2 Authors 31  
        2.1 The Most Important Questions for Authors 31  
        2.2 Why is Security Relevant to Authors? 32  
        2.3 Security Requirements for Authors 33  
        2.4 Assets in the Author's View 35  
        2.5 Security Risk Analysis for Authors 36  
     3 Teachers 39  
        3.1 The Most Important Questions for Teachers 39  
        3.2 Security Requirements in Teaching 40  
        3.3 How to Improve Security in Teaching 44  
     4 Managers 53  
        4.1 The Most Important Questions for Managers 53  
        4.2 Organizational Security 54  
        4.3 Motivation 59  
        4.4 Structural Security Measures 61  
        4.5 Learning Management and Learning Content Management Systems 63  
        4.6 Business Continuity Management 65  
     5 Students 67  
        5.1 Why is Security Relevant? 67  
        5.2 How Students Can Contribute 69  
  Part II In-Depth 73  
     6 Protecting Content 75  
        6.1 How do I Protect Documents? 75  
        6.2 How do I Protect Texts? 76  
        6.3 How do I Protect Images? 78  
        6.4 Protection of Audio Content 82  
        6-5 Copy Protection for Programs 83  
        6.6 Protecting Content against Unauthorized Modification 88  
     7 Security Risk Analysis 91  
        7.1 Frequently Asked Questions 92  
        7.2 Standard Method 96  
        7.3 Quantitative and Qualitative Risk Analysis 100  
        7.4 Risk Analysis in 90 Minutes 101  
        7.5 Example of a 90-Minute Analysis 106  
        7.6 Exercise: Security Risk Analysis 114  
     8 Personal Security Checklist 115  
        8.1 Viruses, Trojan Horses, Worms, and other Animals 115  
        8.2 Email 118  
        8.3 Web-based Email Services 119  
        8.4 Network Connections 119  
        8.5 Wireless Networks 120  
        8.6 Encryption of Sensitive Information 121  
        8.7 Backups 121  
        8.8 Deleting files 123  
     9 Access Control, Authentication & Auditing 129  
        9.1 Access Control 129  
        9.2 Authentication 136  
        9.3 Auditing 141  
     10 Cryptography 149  
        10.1 Secret Key Algorithms 150  
        10.2 Public Key Algorithms 151  
        10.3 Digital Signatures 160  
        10.4 Cryptographic File Systems 162  
        10.5 Cryptographic Envelopes 163  
        10.6 Cryptanalysis 165  
        10.7 SSL 167  
  Part III Additional Resources 173  
     11 PGP - Pretty Good Privacy 175  
        11.1 Encryption with PGP 175  
        11.2 Generating new keys with PGP 176  
        11.3 Secure deletion with PGP 181  
     12 Plagiarism Detection and Prevention 185  
        12.1 Turnitin.com 185  
        12.2 MyDropbox.com 187  
     13 Glossary 191  
  Bibliography 195  
  Index 201  


nach oben


  Mehr zum Inhalt
Kapitelübersicht
Kurzinformation
Inhaltsverzeichnis
Leseprobe
Blick ins Buch
Fragen zu eBooks?

  Medientyp
  eBooks
  eJournal
  alle

  Navigation
Belletristik / Romane
Computer
Geschichte
Kultur
Medizin / Gesundheit
Philosophie / Religion
Politik
Psychologie / Pädagogik
Ratgeber
Recht
Reise / Hobbys
Sexualität / Erotik
Technik / Wissen
Wirtschaft

  Info
Hier gelangen Sie wieder zum Online-Auftritt Ihrer Bibliothek
© 2008-2024 ciando GmbH | Impressum | Kontakt | F.A.Q. | Datenschutz