{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:42Z","timestamp":1750307142839,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,9,30]],"date-time":"2011-09-30T00:00:00Z","timestamp":1317340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,9,30]]},"DOI":"10.1145\/2047456.2047469","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"84-93","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Embedding security into visual programming courses"],"prefix":"10.1145","author":[{"given":"Myung Ah","family":"Park","sequence":"first","affiliation":[{"name":"University of Central Oklahoma, Edmond, OK"}]}],"member":"320","published-online":{"date-parts":[[2011,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"L. -C. Chen Secure Web Development Teaching Modules (SWEET) Pace University  L. -C. Chen Secure Web Development Teaching Modules (SWEET) Pace University"},{"key":"e_1_3_2_1_2_1","unstructured":"W. Du Seed: Developing Instructional Laboratories for Computer Security Education Syracuse University  W. Du Seed: Developing Instructional Laboratories for Computer Security Education Syracuse University"},{"key":"e_1_3_2_1_3_1","unstructured":"B. Taylor Security Injection Towson University  B. Taylor Security Injection Towson University"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352135.1352246"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1940941.1940946"},{"key":"e_1_3_2_1_6_1","unstructured":"M. Mina and et al \"Learning Streams: A Case Study in Curriculum Integration \" The 35th ASEE\/IEEE Frontiers in Education Conference October 19--22 2005 Indianapolis IN  M. Mina and et al \"Learning Streams: A Case Study in Curriculum Integration \" The 35th ASEE\/IEEE Frontiers in Education Conference October 19--22 2005 Indianapolis IN"},{"key":"e_1_3_2_1_7_1","unstructured":"AWS Security and Compliance Center http:\/\/aws.amazon.com\/security\/  AWS Security and Compliance Center http:\/\/aws.amazon.com\/security\/"},{"key":"e_1_3_2_1_8_1","unstructured":"OWASP Testing Multiple Factors Authentication  OWASP Testing Multiple Factors Authentication"},{"key":"e_1_3_2_1_9_1","unstructured":"Anne Boehm Murach's Visual Basic 2010   Anne Boehm Murach's Visual Basic 2010"},{"key":"e_1_3_2_1_10_1","unstructured":"P. J Deitel and H. M Deitel Visual C# 2008: How to Program Pearson Prentice Hall   P. J Deitel and H. M Deitel Visual C# 2008: How to Program Pearson Prentice Hall"},{"key":"e_1_3_2_1_11_1","unstructured":"J. C Bradley and A. C. Millspaugh Programming in Visual Basic 2010 McGraw Hill.   J. C Bradley and A. C. Millspaugh Programming in Visual Basic 2010 McGraw Hill."},{"key":"e_1_3_2_1_12_1","unstructured":"T. Gaddis and K. Irvine Starting out with Visual Basic 2010 Addison Wesley   T. Gaddis and K. Irvine Starting out with Visual Basic 2010 Addison Wesley"},{"key":"e_1_3_2_1_13_1","unstructured":"J. C. Bradley A. C. Millspaugh Advanced Visual Programming Using Visual Basic 2008 McGrawHill   J. C. Bradley A. C. Millspaugh Advanced Visual Programming Using Visual Basic 2008 McGrawHill"},{"key":"e_1_3_2_1_14_1","unstructured":"K. Irvine and T. Gaddis Advanced Visual Basic 2010 Addison Wesley   K. Irvine and T. Gaddis Advanced Visual Basic 2010 Addison Wesley"},{"key":"e_1_3_2_1_15_1","unstructured":"S. Walther K. Hoffman and N. Dudek ASP. NET 4 Unleashed SAMS   S. Walther K. Hoffman and N. Dudek ASP. NET 4 Unleashed SAMS"},{"key":"e_1_3_2_1_16_1","unstructured":"I. Spaanjaars Beginning ASP.NET 4 in C# and VB Wrox Publisher   I. Spaanjaars Beginning ASP.NET 4 in C# and VB Wrox Publisher"},{"key":"e_1_3_2_1_17_1","unstructured":"B. Evjen S. Hanselman and D. Rader Professional ASP.NET 4 in C# and VB Wrox Publisher   B. Evjen S. Hanselman and D. Rader Professional ASP.NET 4 in C# and VB Wrox Publisher"},{"key":"e_1_3_2_1_18_1","unstructured":"WM. A. Conklin and G. White Principles of Computer Security McGraw Hill.   WM. A. Conklin and G. White Principles of Computer Security McGraw Hill."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_20_1","unstructured":"The OWASP Top 10 Web Application Security Risks for 2010  The OWASP Top 10 Web Application Security Risks for 2010"},{"key":"e_1_3_2_1_21_1","unstructured":"Microsoft Anti-Cross Site Scripting Library  Microsoft Anti-Cross Site Scripting Library"},{"key":"e_1_3_2_1_22_1","unstructured":"OWASP XSS Prevention Cheat Sheet  OWASP XSS Prevention Cheat Sheet"},{"key":"e_1_3_2_1_23_1","unstructured":"OWASP SQL Injection Prevention Cheat Sheet  OWASP SQL Injection Prevention Cheat Sheet"},{"key":"e_1_3_2_1_24_1","unstructured":"HTML Sanitization in Anti-XSS Library http:\/\/blogs.msdn.com\/b\/securitytools\/archive\/2009\/09\/01\/html-sanitization-in-anti-xss-library.aspx  HTML Sanitization in Anti-XSS Library http:\/\/blogs.msdn.com\/b\/securitytools\/archive\/2009\/09\/01\/html-sanitization-in-anti-xss-library.aspx"},{"key":"e_1_3_2_1_25_1","unstructured":"2010 Economic Analysis of Role-Based Access Control NIST Final Report  2010 Economic Analysis of Role-Based Access Control NIST Final Report"},{"key":"e_1_3_2_1_26_1","unstructured":"ASP.NET Validation in Depth Microsoft MSDN Library  ASP.NET Validation in Depth Microsoft MSDN Library"},{"key":"e_1_3_2_1_27_1","unstructured":"Client-Side Validation for ASP.NET Server Controls Microsoft MSDN Library  Client-Side Validation for ASP.NET Server Controls Microsoft MSDN Library"},{"key":"e_1_3_2_1_28_1","unstructured":"Authentication in ASP.NET: .NET Security Guidance Microsoft MSDN Library  Authentication in ASP.NET: .NET Security Guidance Microsoft MSDN Library"},{"key":"e_1_3_2_1_29_1","unstructured":"ASP.NET Forms Authentication Overview Microsoft MSDN Library  ASP.NET Forms Authentication Overview Microsoft MSDN Library"},{"key":"e_1_3_2_1_30_1","unstructured":"ASP.NET security tutorial http:\/\/www.asp.net\/security\/tutorials\/  ASP.NET security tutorial http:\/\/www.asp.net\/security\/tutorials\/"},{"key":"e_1_3_2_1_31_1","unstructured":"Explained: Forms Authentication in ASP.NET 2.0 Microsoft MSDN Library  Explained: Forms Authentication in ASP.NET 2.0 Microsoft MSDN Library"},{"key":"e_1_3_2_1_32_1","unstructured":"machineKey Element (ASP.NET Settings Schema) Microsoft MSDN Library  machineKey Element (ASP.NET Settings Schema) Microsoft MSDN Library"},{"key":"e_1_3_2_1_33_1","unstructured":"How To: Configure MachineKey in ASP.NET 2.0 Microsoft MSDN Library  How To: Configure MachineKey in ASP.NET 2.0 Microsoft MSDN Library"},{"key":"e_1_3_2_1_34_1","unstructured":"Understand How the ASP.NET Cookieless Feature Works Microsoft MSDN Library  Understand How the ASP.NET Cookieless Feature Works Microsoft MSDN Library"},{"key":"e_1_3_2_1_35_1","unstructured":"How To: Protect Forms Authentication in ASP.NET 2.0 Microsoft MSDN Library  How To: Protect Forms Authentication in ASP.NET 2.0 Microsoft MSDN Library"},{"key":"e_1_3_2_1_36_1","unstructured":"ASP.NET Page Life Cycle Overview Microsoft MSDN Library  ASP.NET Page Life Cycle Overview Microsoft MSDN Library"},{"key":"e_1_3_2_1_37_1","unstructured":"How To: Use Membership in ASP.NET Microsoft MSDN Library  How To: Use Membership in ASP.NET Microsoft MSDN Library"},{"key":"e_1_3_2_1_38_1","unstructured":"Customizing the CreateUserWizard Control http:\/\/www.4guysfromrolla.com\/articles\/070506-1.aspx  Customizing the CreateUserWizard Control http:\/\/www.4guysfromrolla.com\/articles\/070506-1.aspx"},{"key":"e_1_3_2_1_39_1","unstructured":"Regex Tutorial http:\/\/www.regular-expressions.info  Regex Tutorial http:\/\/www.regular-expressions.info"},{"key":"e_1_3_2_1_40_1","unstructured":"Regular Expressions in ASP.NET Microsoft MSDN Library  Regular Expressions in ASP.NET Microsoft MSDN Library"},{"key":"e_1_3_2_1_41_1","unstructured":"Understanding Role Management Microsoft MSDN Library  Understanding Role Management Microsoft MSDN Library"},{"key":"e_1_3_2_1_42_1","unstructured":"Security Practices: ASP.NET Security Practices at a Glance Microsoft MSDN Library  Security Practices: ASP.NET Security Practices at a Glance Microsoft MSDN Library"},{"key":"e_1_3_2_1_43_1","unstructured":"Preventing SQL Injections in ASP MSDN Library  Preventing SQL Injections in ASP MSDN Library"},{"key":"e_1_3_2_1_44_1","unstructured":"ADO.NET 3.5 LINQ and the Entity Framework with C# 2008 Murach  ADO.NET 3.5 LINQ and the Entity Framework with C# 2008 Murach"}],"event":{"name":"InfoSecCD '11: Information Security Curriculum Development Conference","sponsor":["KSU - CISE KSU Center for InfoSec Education","SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Kennesaw Georgia","acronym":"InfoSecCD '11"},"container-title":["Proceedings of the 2011 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2047456.2047469","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2047456.2047469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:54Z","timestamp":1750240134000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2047456.2047469"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9,30]]},"references-count":44,"alternative-id":["10.1145\/2047456.2047469","10.1145\/2047456"],"URL":"https:\/\/doi.org\/10.1145\/2047456.2047469","relation":{},"subject":[],"published":{"date-parts":[[2011,9,30]]},"assertion":[{"value":"2011-09-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}