default search action
7th ISSA 2008: Gauteng Region (Johannesburg), South Africa
- Hein S. Venter, Mariki M. Eloff, Jan H. P. Eloff, Les Labuschagne:
Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008. ISSA, Pretoria, South Africa 2008, ISBN 978-1-86854-693-0 - Leonard Shand, Theodore Tryfonas:
A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code. 1-18 - Reijo Savola:
A Novel Security Metrics Taxonomy for R&D Organisations. 1-12 - Carolin Latze, Ulrich Ultes-Nitsche:
A Proof-of-Concept Implementation of EAP-TLS with TPM Support. 1-12 - Matthew Deas, Stephen Flowerday:
A User Centric Model for Online Identity and Access Management. 1-21 - Johann Amsenga:
An Introduction to Standards related to Information Security. 1-18 - Pontjho Mokhonoana, Martin S. Olivier:
Application of Message Digests for the Verification of Logical Forensic Data. 1-11 - Johan Van Niekerk, Rossouw von Solms:
Bloom's Taxonomy for Information Security Education. 1-13 - Kennedy Njenga, Irwin Brown:
Collective Improvisation: Complementing Information Security Frameworks with Self-Policing. 1-16 - Sri Warna Mahanamahewa:
Computer Monitoring in the 21st Century Workplace. 1-15 - Elmarie Biermann, Jan Mentz:
Emerging Framework for The Evaluation of Open Source Security Tools. 1-15 - Christoph Ehret, Ulrich Ultes-Nitsche:
Immune System Based Intrusion Detection System. 1-12 - Geoffrey Karokola, Louise Yngström:
Lessons Learnt in the Process of Computerization, Automation and Management of ICT Security in the Developing World: A Case Study of The University of Dar Es Salaam, Tanzania. 1-24 - Marthie Lessing, Lara Weissenberger:
No Age Discrimination for Biometrics. 1-26 - Hennie A. Kruger, Tjaart Steyn, Lynette Drevin, Dawn Medlin:
Password Management: Empirical Results from a RSA and USA Study. 1-11 - Evangelos D. Frangopoulos, Mariki M. Eloff, Lucas M. Venter:
Social Aspects of Information Security. 1-33 - Barry Irwin, Blake Friedman:
Spam Construction Trends. 1-12 - Rachid El Khayari, Nicolai Kuntze, Andreas U. Schmidt:
Spam Over Internet Telephony and How to Deal with it. 1-25 - Tony Stephanou, Rabelani Dagada:
The Impact of Information Security Awareness Training on Information Security Behaviour: The Case for Further Research. 1-21 - Frankie Tvrz, Marijke Coetzee:
The Information Security of a Bluetooth-Enabled Handheld Device. 1-12 - Tana Pistorius:
The IP Protection of Electronic Databases: Copyright or Copywrong? 1-18 - Rasika Dayarathna:
The Principle of Security Safeguards: Accidental Activities. 1-18 - Renico Koen, Martin S. Olivier:
The Use of File Timestamps in Digital Forensics. 1-16 - Namosha Veerasamy, Jan H. P. Eloff:
Towards a Framework for a Network Warfare Capability. 1-18 - Michael Köhn, Jan H. P. Eloff, Martin S. Olivier:
UML Modelling of Digital Forensic Process Models (DFPMs). 1-13
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.