A Hands-on Approach to Information Operations Education and Training, 14th Colloquium for Information Systems Security Education, pp.7-9, 2010. ,
Combining Theory with Practice in Information Security Education, 11th Colloquium for Information Systems Security Education, pp.4-7, 2007. ,
Development of an Interdisciplinary Information Technology Auditing Program, 13th Colloquium for Information Systems Security Education, pp.1-3, 2009. ,
Running a Computer Security Course: Challenges, Tools and Projects, River Academic Journal, vol.61, 2010. ,
Teaching information systems security courses: A hands-on??approach, Computers & Security, vol.26, issue.4, pp.290-99, 2007. ,
DOI : 10.1016/j.cose.2006.11.005
Anatomy of a Data Breach, http://www.govinfosecurity.com/external/rp_2009-data-breach-investigations- supplemental-report_en_xg.pdf (3 Feb, 2011. ,