Open Educational Resources are freely accessible educational resources that can be used, re-mixed, and altered for educational purposes. They can include full courses, parts of courses, videos, handouts, tutorials, etc...
The Open Education Consortium is a global, non-profit consortium of educational institutions that advocates for global open education. Its website includes news and information on recent initiatives.
SPARC is another global coalition that advocates for open education, open access, and open data. Its website includes background information on open initiatives as well as news on recent legislation.
U.S. government works are not restricted by copyright, and there are many resources that may be useful for instructors.
Examines the intellectual content of the emerging field of CPS ("engineered systems that are built from, and depend upon, the seamless integration of computational algorithms and physical components." )and its implications for engineering and computer science education.
Explore anomaly detection, artificial intelligence, cloud computing, data security, cyber crime, and network security.
Covers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence analysis, vulnerability, artificial intelligence security, IPv6 risk research, cybersecurity policy and regulation research, big data analysis and industrial security..
Explores software update as an important mechanism by which security changes and improvements are made in software, as well as related practices, mechanisms, policies, and technologies.
Discusses several specific policy measures government and businesses should take in order to be better prepared to deal with a digital disruption and prevent further escalation.
Presents the scientific results from the H2020 GUARD project that aimed to fill the gaps between software management paradigms and cybersecurity models.
Cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. This book discusses theories, problems and solutions on the relevant ethical issues involved.
Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries.This book addresses cybersecurity training, malware analysis techniques, ransomware attacks and maturity assessment frameworks.
Addresses the significant concern among policymakers, security practitioners, technologists, researchers, and the public about the potential implications of AI and ML for cybersecurity.
Explores research frontiers in computer security with algorithms and implementation details for use in the real world,including deep learning, artificial intelligence data mining and visualization.
Discusses various subjects ranging from cyberattack or criminal activities detection, evaluation of the attacker skills, modeling of the cyber-attacks, and mobile application security evaluation