3. AISM 2005:
Perth,
Australia
Craig Valli, Andrew Woodward (Eds.):
Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005.
School of Computer and Information Science, Edith Cowan University, Western Australia 2005, ISBN 0-7298-0611-1 BibTeX
- Marwan Al-Zarouni:
Taxonomy of WRT54G(S) Hardware and Custom Firmware.
1-10 BibTeX
- Martin Dart:
Seeking information superiority: strategies for business in the commercial application of information operations.
11-19 BibTeX
- Rosanna Fanciulli:
An investigation into the paradox of organisational flexibility versus security: A research project overview.
20-26 BibTeX
- Lennon Hopkins:
Identity Synthesis: Creating An Identity From Scratch.
27-32 BibTeX
- William Hutchinson:
Information Security: a Misnomer.
33-37 BibTeX
- Wayne A. Jansen, Serban I. Gavrila, Clément Séveillac:
Smart Card Authentication for Mobile Devices.
38-46 BibTeX
- K. Koh, Anthonie B. Ruighaver, Sean B. Maynard, A. Ahmad:
Security Governance: Its Impact on Security Culture.
47-58 BibTeX
- Yi-Chi Lin, Jill Slay:
Non-Repudiation in Pure Mobile Ad Hoc Network.
59-66 BibTeX
- Leanne Ngo, Wanlei Zhou, Matthew Warren:
Understanding Transition towards Information Security Culture Change.
67-73 BibTeX
- Aaron Olding, Paul Turner:
My Problem or Our Problem? - Exploring the use of information sharing as a component of a holistic approach to e-security in response to the growth of 'Malicious Targeted Attacks'.
74-79 BibTeX
- Graeme Pye, Matthew J. Warren:
Benchmarking E-business Security: A Model and Framework.
80-87 BibTeX
- Reijo Savola:
Architecture for Self-Estimation of Security Level in Ad Hoc Network Nodes.
88-94 BibTeX
- Mahdi Seify:
Risk Management in CRM Security Management.
95-102 BibTeX
- Zhiqi Tao, Anthonie B. Ruighaver:
Detecting Rogue Access Points that endanger the Maginot Line of Wireless Authentication.
103-110 BibTeX
- Patricia A. H. Williams:
Physician secure thyself.
111-116 BibTeX
- Patricia A. H. Williams:
The underestimation of threats to patient data in clinical practice.
117-122 BibTeX
- Lih Wern Wong:
Potential Bluetooth Vulnerabilities in Smartphones.
123-132 BibTeX
- Andrew Woodward:
Recommendations for wireless network security policy: an analysis and classification of current and emerging threats and solutions for different organisations.
133-140 BibTeX
Copyright © Sat May 16 22:57:31 2009
by Michael Ley (ley@uni-trier.de)