<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stephen Cooper</style></author><author><style face="normal" font="default" size="100%">Christine Nickell</style></author><author><style face="normal" font="default" size="100%">Victor Piotrowski</style></author><author><style face="normal" font="default" size="100%">Brenda Oldfield</style></author><author><style face="normal" font="default" size="100%">Bill Caelli</style></author><author><style face="normal" font="default" size="100%">Lance Hoffman</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An Exploration of the Current State of Information Assurance Education</style></title><secondary-title><style face="normal" font="default" size="100%">ACM SIGCSE Bulletin</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><volume><style face="normal" font="default" size="100%">41</style></volume><pages><style face="normal" font="default" size="100%">109-125</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Lance Hoffman</style></author><author><style face="normal" font="default" size="100%">Timothy Rosenberg</style></author><author><style face="normal" font="default" size="100%">Ronald Dodge</style></author><author><style face="normal" font="default" size="100%">Daniel Ragsdale</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Exploring a national cybersecurity exercise for universities</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Security and privacy</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><volume><style face="normal" font="default" size="100%">3</style></volume><pages><style face="normal" font="default" size="100%">27– 33</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">5</style></issue></record></records></xml>