{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:37Z","timestamp":1750307917108,"version":"3.41.0"},"reference-count":6,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2006,12,1]],"date-time":"2006-12-01T00:00:00Z","timestamp":1164931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Educ. Resour. Comput."],"published-print":{"date-parts":[[2006,12]]},"abstract":"<jats:p>Educational institutions that wish to implement a specialized teaching laboratory often have a variety of obstacles to overcome. Some of these obstacles are related to adapting existing classroom infrastructure, building the laboratory, and meeting the demands for multiple-use classrooms to maximize the return on investment. In some cases, such as computer security, they must also maintain a controlled environment. Portable educational networks of computers allow teaching specialized topics that have heretofore required specialized laboratories in existing classrooms. Their flexibility allows them to be used for a variety of content---operating systems, networking, security, and forensics. These systems are in use today supporting undergraduate, graduate, and professional education.<\/jats:p>","DOI":"10.1145\/1248453.1248455","type":"journal-article","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T14:37:11Z","timestamp":1181140631000},"page":"2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Taking the network on the road"],"prefix":"10.1145","volume":"6","author":[{"given":"Timothy","family":"Rosenberg","sequence":"first","affiliation":[{"name":"The George Washington University, Washington, DC"}]},{"given":"Lance J.","family":"Hoffman","sequence":"additional","affiliation":[{"name":"The George Washington University, Washington, DC"}]}],"member":"320","published-online":{"date-parts":[[2006,12]]},"reference":[{"volume-title":"Using an instructional operating system in teaching computer security courses","author":"Du W.","key":"e_1_2_1_1_1"},{"volume-title":"Proceedings of the 32nd SIGCSE Technical Symposium on Computer Science Education","author":"Hill J.M.D.","key":"e_1_2_1_2_1"},{"volume-title":"Proceedings of the 4th World Information Security Education Conference","author":"Hoffman L.J.","key":"e_1_2_1_3_1"},{"key":"e_1_2_1_4_1","unstructured":"Hoffman L.J. Dodge R. Rosenberg T. and Ragsdale D.J. 2003. Information assurance laboratory innovations. Presented to the 7th Colloquium for Information Systems Security Education (Washington DC June).  Hoffman L.J. Dodge R. Rosenberg T. and Ragsdale D.J. 2003. Information assurance laboratory innovations. Presented to the 7th Colloquium for Information Systems Security Education (Washington DC June)."},{"volume-title":"Proceedings of the 30th SIGCSE Technical Symposium on Computer Science Education","author":"Mayo J.","key":"e_1_2_1_5_1"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.25"}],"container-title":["Journal on Educational Resources in Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1248453.1248455","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1248453.1248455","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:26Z","timestamp":1750258286000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1248453.1248455"}},"subtitle":["Portable network solutions for computer security educators"],"short-title":[],"issued":{"date-parts":[[2006,12]]},"references-count":6,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2006,12]]}},"alternative-id":["10.1145\/1248453.1248455"],"URL":"https:\/\/doi.org\/10.1145\/1248453.1248455","relation":{},"ISSN":["1531-4278","1531-4278"],"issn-type":[{"type":"print","value":"1531-4278"},{"type":"electronic","value":"1531-4278"}],"subject":[],"published":{"date-parts":[[2006,12]]},"assertion":[{"value":"2006-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}