|
Privacy Enhanced Wap
Browsing With Mcrowds Anonymity Properties And Performance Evaluation Of The
Mcrowds System |
Andersson, Christer |
|
An Investigation Into
Computer Forensic Tools |
Arthur, Kweko K. |
|
A Framework For
Aligning Information Security Risk Management Methods With It Governance
Recommendations |
Bornman, Werner G. |
|
Utilizing Neural
Networks For Effective Intrusion Detection |
Botha, Martin |
|
On Privacy And The
Web |
Brandi, Wesley A. |
|
Using A Central Data
Repository For Biometric Authentication In Passport Systems |
Breedt, Morné |
|
Intrinsic Legal
Issues In It Security |
Casmir, Respickius |
|
A Logic-Based Access
Control Approach For Web Services |
Coetzee, Marijke |
|
High Data Rate 8-Bit
Crypto Processor |
Farhan, Sheikh M. |
|
The “Art” Of Log
Correlation - Tools And Techniques For Correlating Events And Log Files |
Forte, Dario |
|
Biometric Protection
Of Smartcards Through Fingerprint Matching: A Technological Overview And
Possible Directions |
Frangopoulos, Evangelos D. |
|
A Comparative Study
Of Standards And Practices Related To Information Security Management |
Frangopoulos, Evangelos D. |
|
Advanced Platform For
Corporate Incident Detection And Management |
Ghioni, Fabio |
|
South African Online
Banking: Who Carries The Risk? |
Granova, Anna |
|
Assessing The Policy
Dimension Of Information Security |
Grobler, Telanie |
|
A Case For
Information Ownership In Erp Systems |
Hertenberger, Manfred P. |
|
Case Studies Of
Japan, South Korea And China In Implementation Of IPv6 |
Joe, Say |
|
Legality Of
Monitoring E-Mail At The Workplace: A Legal Update |
Jones, Mariette |
|
Categorizing
Vulnerabilities Using Data Clustering Techniques |
Li, Yun (Lillian) |
|
Integrated Security
System Based On Security Assertion Markup Language Standard |
Mwakalinga, Jeffy |
|
Applied Holistic
Approach For Security Awareness And Training - Computer Games As Means To
Increase Users’ Information And Communication Security Awareness |
N¨ackros, Kjell |
|
The Protection Of
Public Health Data - A Case Study |
Nkundlaa, S. |
|
Are Current B2b
Security Standards Antithetical To Global Interoperability? |
Pather, Maree |
|
An Investigation Into
Access Control For Mobile Devices |
Perelson, Stephen |
|
A Framework For
Monitoring Insider Misuse Of It Applications |
Phyo, A. H. |
|
A General Methodology
For The Development Of An Effective Information Security Policy |
Ramdeyal, Arvish |
|
Towards Hippocratic
Log Files |
Rutherford, Andrew |
|
Propagating Trust In
The Web Services Framework |
Thomas, Anitta |
|
Run-Time Protocol
Conformance Verification In Firewalls |
Ultes-Nitsche, Ulrich |
|
Security
Considerations In A Global Message Service Handler Design |
Van Eeden, Johannes J |
|
Organisational Learning Models For Information Security Education |
Van Niekerk, Johan |
|
A Virtual Machine For
Security In A Relational Database Management System: Design Issues |
Van Staden, Wynand |
|
A Unified
Architecture For Automatic Software Updates |
White, Dominic |
|
Applying Similarities
Between Immune Systems And Mobile Agent Systems In Intrusion Detection |
Zielinski, Marek |