default search action
6th ISSA 2006: Sandton, South Africa
- Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter:
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa. ISSA, Pretoria, South Africa 2006, ISBN 1-86854-636-5 - Demetrios Loutsios, Maree Pather:
A Brokered Approach to Interoperable Security in OGSA-Based Grid Systems. 1-11 - Hennie A. Kruger, Lynette Drevin, Tjaart Steyn:
A Framework for Evaluating ICT Security Awareness. 1-11 - Abdullah Haroon Rasheed, Muhammad Essam, Umair Khalid, Shoab Ahmed Khan, Sheikh Muhammad Farhan:
A Low Bit Architecture for a Very Compact Hardware Implementation of the AES Algorithm. 1-8 - Jacobus A. Ophoff, Stephen Perelson, Reinhardt A. Botha:
A Model for Secure Value-Added Service Subscriptions in Cellular Networks. 1-9 - Thomas McDonald van der Merwe:
A Profile of The Distance Computing Student Softlifter. 1-20 - Charles N. Tarimo, Jabiri Kuwe Bakari, Louise Yngström, Stewart Kowalski:
A Social-Technical View of ICT Security Issues, Trends, and Challenges: Towards a Culture of ICT Security - The Case of Tanzania. 1-12 - Andreas U. Schmidt, Jan Piechalski:
Authorised Translations of Electronic Documents. 1-14 - Dirk Willie du Preez, Vreda Pieterse:
Calculating Compliance Standards. 1-11 - Torsten Braun, Christoph Graf, Ulrich Ultes-Nitsche, Aurelius Baier, Thomas Bernoulli:
Case Study of the Usage of an Authentication and Authorization Infrastructure (AAI) in an E-Learning Project. 1-10 - Kennedy Nduati Njenga, Irwin Brown:
Conceptualising the Influence of Tacit Knowledge in Security Risk Management Activities. 1-12 - Kate Ormiston, Mariki M. Eloff:
Denial-of-Service & Distributed Denial-of-Service on The Internet. 1-14 - Michael Köhn, Martin S. Olivier, Jan H. P. Eloff:
Framework for a Digital Forensic Investigation. 1-7 - Jeffy Mwakalinga, Louise Yngström:
Framework for Securing Mobile Software Agents. 1-12 - Jean-Pierre van Riel, Barry Irwin:
Identifying and Investigating Intrusive Scanning Patterns by Visualizing Network Telescope Traffic in a 3-D Scatter-plot. 1-12 - Verine Etsebeth:
Information Security Policies - The Legal Risk of Uninformed Personnel. 1-10 - Bradley Clayton, Barry Irwin, Alfredo Terzoli:
Integrating Secure RTP into the Open Source VoIP PBX Asterisk. 1-12 - Murdoch Watney:
Justifiability of State Surveillance of the Internet as E-Security Mechanism. 1-11 - Dominic White, Barry Irwin:
Monthly Patch Release Schedules: Do the Benefits Outweigh the Risks? 1-18 - Wesley Brandi, Martin S. Olivier:
On bidder zones, cell phones and ballot stuffing. 1-11 - Jabiri Kuwe Bakari, Christer Magnusson, Charles N. Tarimo, Louise Yngström:
Outsourcing ICT Security to MSSP: Issues and Challenges for The Developing World. 1-11 - Alf Zugenmaier, Anand R. Prasad, Julien Laganier:
Performance Analysis of a Secure Seamless Handover Mechanism in All-IP Networks. 1-11 - Mark Branagan, Robert Dawson, Dennis Longley:
Security Risk Analysis for Complex Systems. 1-12 - Neil J. Croft, Martin S. Olivier:
Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation. 1-14 - Fred Otten, Barry Irwin, Hannah Slay:
The Need for Centralised, Cross Platform Information Aggregation. 1-12 - Mkhululi Tyukala, Dalenca Pottas, Rossouw von Solms, Helen van de Haar:
The Organisational Information Security Profile - A Tool to Assist The Board. 1-13 - Liesl van Niekerk, Les Labuschagne:
The Peculium Model: Information Security Risk Management for the South African SMME. 1-14 - Alapan Arnab, Andrew Hutchison:
Ticket Based Identity System for DRM. 1-10 - Rabbie Maphakela, Dalenca Pottas:
Towards Regulatory Compliance - A model for the South African Financial Sector. 1-11 - Reijo Savola:
Towards Security Evaluation based on Evidence Collection. 1-10 - Nicolai Kuntze, Andreas U. Schmidt:
Trusted Computing in Mobile Action. 1-12 - Johan Van Niekerk, Rossouw von Solms:
Understanding Information Security Culture: A Conceptual Framework. 1-10 - Frank Innerhofer-Oberperfler, Ruth Breu:
Using an Enterprise Architecture for IT Risk Management. 1-12 - Leonie McManus, Jan H. P. Eloff:
Using IT Benchmarking Principles to Design an Information Security Benchmark Model. 1-11
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.