default search action
4th ISSA 2004: Midrand, South Africa
- Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter:
Proceedings of the ISSA 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa. ISSA, Pretoria, South Africa 2004, ISBN 1-86854-522-9 - Manfred P. Hertenberger:
A Case For Information Ownership In Erp Systems. 1-11 - Evangelos D. Frangopoulos:
A Comparative Study Of Standards And Practices Related To Information Security Management. 1-15 - W. G. Bornman:
A Framework For Aligning Information Security Risk Management Methods With It Governance Recommendations. 1-14 - Aung Htike Phyo:
A Framework For Monitoring Insider Misuse Of It Applications. 1-10 - Arvish Ramdeyal:
A General Methodology For The Development Of An Effective Information Security Policy. 1-10 - Marijke Coetzee:
A Logic-Based Access Control Approach For Web Services. 1-11 - Dominic White:
A Unified Architecture For Automatic Software Updates. 1-11 - Wynand van Staden:
A Virtual Machine For Security In A Relational Database Management System: Design Issues. 1-13 - Fabio Ghioni:
Advanced Platform For Corporate Incident Detection And Management. 1-11 - Stephen Perelson:
An Investigation Into Access Control For Mobile Devices. 1-10 - K. K. Arthur:
An Investigation Into Computer Forensic Tools. 1-11 - Kjell Näckros:
Applied Holistic Approach For Security Awareness And Training - Computer Games As Means To Increase Users' Information And Communication Security Awareness. 1-10 - Marek Zielinski:
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection. 1-12 - Maree Pather:
Are Current B2b Security Standards Antithetical To Global Interoperability? 1-10 - Telanie Grogler:
Assessing The Policy Dimension Of Information Security. 1-18 - Evangelos D. Frangopoulos:
Biometric Protection Of Smartcards Through Fingerprint Matching: A Technological Overview And Possible Directions. 1-13 - Say Joe:
Case Studies Of Japan, South Korea And China In Implementation Of IPv6. 1-11 - Yun (Lillian) Li:
Categorizing Vulnerabilities Using Data Clustering Techniques. 1-11 - Sheikh Muhammad Farhan:
High Data Rate 8-Bit Crypto Processor. 1-11 - Jeffy Mwakalinga:
Integrated Security System Based On Security Assertion Markup Language Standard. 1-9 - Respickius Casmir:
Intrinsic Legal Issues In It Security. 1-11 - Mariette Jones:
Legality Of Monitoring E-Mail At The Workplace: A Legal Update. 1-11 - Wesley Brandi:
On Privacy And The Web. 1-8 - Johan Van Niekerk:
Organisational Learning Models For Information Security Education. 1-11 - Christer Andersson:
Privacy Enhanced Wap Browsing With Mcrowds Anonymity Properties And Performance Evaluation Of The Mcrowds System. 1-12 - Anitta Thomas:
Propagating Trust In The Web Services Framework. 1-11 - Ulrich Ultes-Nitsche:
Run-Time Protocol Conformance Verification In Firewalls. 1-11 - Johannes J. van Eeden:
Security Considerations In A Global Message Service Handler Design. 1-12 - Anna Granova:
South African Online Banking: Who Carries The Risk? 1-12 - Dario Forte:
The "Art" Of Log Correlation - Tools And Techniques For Correlating Events And Log Files. 1-15 - S. Nkundlaa:
The Protection Of Public Health Data - A Case Study. 1-11 - Andrew Rutherford:
Towards Hippocratic Log Files. 1-10 - Morné Breedt:
Using A Central Data Repository For Biometric Authentication In Passport Systems. 1-12 - Martin Botha:
Utilizing Neural Networks For Effective Intrusion Detection. 1-15
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.