Kamali, R., Liles, S., Jiang, K., Nicolai, B., “A Curriculum Model Based on the SIGITE Guidelines“. Journal of Information Technology Education, Volume 5, 2006.
Martin Bengal
The Bengal Tiger is a ten foot long 500 pound silent killing machine. The Martin Bengal Compound Bow is a 32 inch ATA 4 pound silent killing machine. Either Bengal is a sinewy silent slick like oil on water shining…
Hunting in Sabinal Texas
Two days in a truck and when you finally get there the heat hits like a sledge hammer. Burning, tearing, soul searing, which makes the skin crinkle kind of heat. It’s a humid lung choking heat that makes the mind…
An Information Assurance and Security curriculum implementation
Liles, S., Kamali, R., 2006. “An Information Assurance and Security curriculum implementation“. In proceedings of International Informing Science + Information Technology Education joint Conference (Manchester, England, UK, June 25 -28 2006).
An Information Assurance and Security curriculum implementation
Liles, S., Kamali, R., 2006. An Information Assurance and Security curriculum implementation. Issues in Information Systems and Information Technology Volume 3
Network Architecture & Design: Virtualized Network Design for Computer Information Technology Department
Update (Fall 2007)This project was done by the Summer Session ITS 472 Network Architecture Class at Purdue University Calumet. The full document is available for download (4mb) here. The project design was followed closely with some element overcome by events,…
Digital Forensics Learning Objects
A day with NBEF
The punishing sound of the alarm clock punches through the dreams of warm beaches and sunshine. Those soft jabs in the ribs my spouse loves to bestow on an early Saturday morning have my feet hitting the floor. Some time…
I’d like to continue helping…
I have truly grown to love and enjoy Archery. The surprising feeling of the arrow driving a perfect circle into the X is glorious. I never imagined 8 months ago that I would even consider shooting spots as anything more…
Insanity from a new JOAD dad
So, I’m a father of 3 sons. Twin six year olds, and a fourteen year old honest to goodness moppy read headed gangling fourteen year old. You would think that having three boys would never be an issue, but then…
Hurricane Isabelle Design Project
Students in my CIS 420 Wide Area Networking (WAN) course have completed a network design for a large scale communications solution for a disaster riddled region. This project was done by undergraduate students as part of a course. The class name has…
Not a normal legislation and hunting rights essay
I’m not a political scientist but I do have a hypothesis. I think that there is a cultural war brewing between the rural populations and the urbanized populations. This is especially important to understand if you hunt or use open…
An implementation of the SIGITE model curriculum
Kamali, R., Liles, S., Winer, C., Jiang, K., and Nicolai, B. 2005. “An implementation of the SIGITE model curriculum“. In Proceedings of the 6th Conference on information Technology Education (Newark, NJ, USA, October 20 – 22, 2005). SIGITE ’05. ACM…
Information Assurance Domains & Defining Software Assurance
Information assurance and security are a compilation of two other domains. The first domain is systems assurance. Systems assurance is the practice of hardening operating systems from known threats, analyzing and auditing hardware and devices for known threats, and remediating…
The Jeep CJ Debacle
This is my sad and triumphant story about my CJ rebuild project. It is chronicled on the CJOffroad.com web forum. The guys on the web forum have been a great help in providing information. The link directly to the original…