default search action
2nd ISSA 2002: Muldersdrift, Gauteng, South Africa
- Proceedings of the ISSA 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa. ISSA, Pretoria, South Africa 2003
- Jacques Botha:
A cyclic approach to Business Continuity Planning. 1-11 - Wesley Brandi:
On the Semantic Web and its Web of Trust. 1-12 - Simon R. Chudley, Ulrich Ultes-Nitsche:
Configuring Firewalls - An XML-based Approach to Modelling and Implementing Firewall Configurations. 1-11 - Marijke Coetzee:
Secure Database Connectivity On The WWW. 1-10 - Peter Jonathan de Villiers:
Towards a Content-based Billing Model: The Synergy between Access Control and Billing. 1-10 - Evan James Dembskey:
Quantum Cryptography - Advances in computer science may radically alter cryptography. 1-12 - Lindie du Plessis:
Information Security Awareness: Baseline Education and Certification. 1-12 - Willem Engelbrecht:
Access control and separation of duty in agent-based workflow environments. 1-12 - Petrunel Gerber:
Information Security Health Check. 1-12 - Thomas Holz:
An Efficient Intrusion Detection System Design. 1-12 - Karin Höne:
Information Security Policy - What do International Information Security Standards say? 1-12 - Oliver Andre Hoppe:
Security architecture of the Microsoft .NET framework. 1-10 - Lance A. K. Ingram:
Towards a pattern-based approach for achieving semantic integrity in object-relational databases. 1-9 - Paula Kotzé:
Feedback And Task Analysis For E-Commerce Sites. 1-17 - Marianne Loock:
Minimizing Security Risk Areas revealed by Data mining. 1-15 - Adéle Martins:
Assessing Information Security Culture. 1-14 - Kim Munro:
Steganography - is it becoming a double-edged sword in computer security? 1-17 - Lizette Robbertze:
Information Security Implementation Methodologies. 1-19 - John Rollason, Tom Addison, Kim Munro:
IS Security: User Identification and Authentication - The First Pillar of IS Security. 1-15 - Francois Searle:
An Analysis of Anonymity on the Internet. 1-13 - Simon Taylor:
Practical Unix Security - Securing IBM's AIX. 1-13 - Kerry-Lynn Thomson:
Corporate Governance: Information security the weakest link? 1-10 - Ulrich Ultes-Nitsche, InSeon Yoo:
An Integrated Network Security Approach - Pairing Detecting Malicious Patterns with Anomaly Detection. 1-12 - Johan Van Niekerk:
A Web-Based Portal For Information Security Education. 1-10 - Hein S. Venter:
Comparing Intrusion Detection Tools using Generic Vulnerability Categories. 1-18 - Karin Venter:
The Delegation Authorization Model: A Model For The Dynamic Delegation Of Authorization Rights In A Secure Workflow Management System. 1-13 - Cheryl Vroom:
Auditing the Employee in the Work Environment with Regard to Information Security. 1-11 - Albin Zuccato:
A modified mean value approach to assess security risk.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.