{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:35Z","timestamp":1750307975492,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,18]],"date-time":"2007-10-18T00:00:00Z","timestamp":1192665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,18]]},"DOI":"10.1145\/1324302.1324357","type":"proceedings-article","created":{"date-parts":[[2007,12,7]],"date-time":"2007-12-07T19:19:41Z","timestamp":1197055181000},"page":"259-266","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Security auditing course development"],"prefix":"10.1145","author":[{"given":"Yin","family":"Pan","sequence":"first","affiliation":[{"name":"Rochester Institute of Technology, Rochester, New York"}]}],"member":"320","published-online":{"date-parts":[[2007,10,18]]},"reference":[{"volume-title":"Addison-Wesley","year":"2005","author":"Alberts C.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"AppScan from Watchfire: http:\/\/www.watchfire.com\/  AppScan from Watchfire: http:\/\/www.watchfire.com\/"},{"volume-title":"Addison Wesley","year":"2006","author":"Andrews M.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","unstructured":"Barnett R. Preventing Web Attacks with Apache Addison-Wesley January 2006.   Barnett R. Preventing Web Attacks with Apache Addison-Wesley January 2006."},{"key":"e_1_3_2_1_5_1","unstructured":"Hailstorm from Cenzic: http:\/\/www.cenzic.com\/  Hailstorm from Cenzic: http:\/\/www.cenzic.com\/"},{"key":"e_1_3_2_1_6_1","unstructured":"Mackey D. Web Security for Network and System Administrators Thomson June 2003   Mackey D. Web Security for Network and System Administrators Thomson June 2003"},{"volume-title":"McGraw Hill","year":"2005","author":"McClure S.","key":"e_1_3_2_1_7_1"},{"volume-title":"Addison Wesley","year":"2002","author":"McClure S.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"Natan R. Implementing Database Security and Auditing Elsevier Digital Press 2005.   Natan R. Implementing Database Security and Auditing Elsevier Digital Press 2005."},{"key":"e_1_3_2_1_10_1","unstructured":"Pipkin D. Halting the Hacker: a practical guide to computer security. 2 nd Edition. Prentice Hall NJ 2002.   Pipkin D. Halting the Hacker: a practical guide to computer security. 2 nd Edition. Prentice Hall NJ 2002."},{"key":"e_1_3_2_1_11_1","unstructured":"Rehman R. Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT Apache MySQL PHP and ACID. Prentice Hall NJ 2003.   Rehman R. Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT Apache MySQL PHP and ACID. Prentice Hall NJ 2003."},{"key":"e_1_3_2_1_12_1","unstructured":"Router Audit Tool (RAT): http:\/\/ncat.sourceforge.net\/  Router Audit Tool (RAT): http:\/\/ncat.sourceforge.net\/"},{"key":"e_1_3_2_1_13_1","unstructured":"SANs website: http:\/\/www.sans.org\/resources\/  SANs website: http:\/\/www.sans.org\/resources\/"},{"volume-title":"New Riders","year":"2002","author":"Schultz E.","key":"e_1_3_2_1_14_1"},{"volume-title":"January, 2006.","author":"Skoudis E.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","unstructured":"The website for Open Web Application Security Project: http:\/\/www.owasp.org\/index.php\/Main_Page.  The website for Open Web Application Security Project: http:\/\/www.owasp.org\/index.php\/Main_Page."}],"event":{"name":"SIGITE07: ACM Special Interest Group for Information Technology Education Conference 2007","sponsor":["ACM Association for Computing Machinery","SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Destin Florida USA","acronym":"SIGITE07"},"container-title":["Proceedings of the 8th ACM SIGITE conference on Information technology education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1324302.1324357","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1324302.1324357","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:58:26Z","timestamp":1750258706000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1324302.1324357"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,18]]},"references-count":16,"alternative-id":["10.1145\/1324302.1324357","10.1145\/1324302"],"URL":"https:\/\/doi.org\/10.1145\/1324302.1324357","relation":{},"subject":[],"published":{"date-parts":[[2007,10,18]]},"assertion":[{"value":"2007-10-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}