7. ISSA 2008:
Gauteng Region (Johannesburg),
South Africa
Hein S. Venter, Mariki M. Eloff, Jan H. P. Eloff, Les Labuschagne (Eds.):
Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008.
ISSA, Pretoria, South Africa 2008, ISBN 978-1-86854-693-0 BibTeX
- Leonard Shand, Theodore Tryfonas:
A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code.
1-18
Electronic Edition (link) BibTeX
- Reijo Savola:
A Novel Security Metrics Taxonomy for R&D Organisations.
1-12
Electronic Edition (link) BibTeX
- Carolin Latze, Ulrich Ultes-Nitsche:
A Proof-of-Concept Implementation of EAP-TLS with TPM Support.
1-12
Electronic Edition (link) BibTeX
- Matthew Deas, Stephen Flowerday:
A User Centric Model for Online Identity and Access Management.
1-21
Electronic Edition (link) BibTeX
- Johann Amsenga:
An Introduction to Standards related to Information Security.
1-18
Electronic Edition (link) BibTeX
- Pontjho Mokhonoana, Martin S. Olivier:
Application of Message Digests for the Verification of Logical Forensic Data.
1-11
Electronic Edition (link) BibTeX
- Johan Van Niekerk, Rossouw von Solms:
Bloom's Taxonomy for Information Security Education.
1-13
Electronic Edition (link) BibTeX
- Kennedy Njenga, Irwin Brown:
Collective Improvisation: Complementing Information Security Frameworks with Self-Policing.
1-16
Electronic Edition (link) BibTeX
- Sri Warna Mahanamahewa:
Computer Monitoring in the 21st Century Workplace.
1-15
Electronic Edition (link) BibTeX
- Elmarie Biermann, Jan Mentz:
Emerging Framework for The Evaluation of Open Source Security Tools.
1-15
Electronic Edition (link) BibTeX
- Christoph Ehret, Ulrich Ultes-Nitsche:
Immune System Based Intrusion Detection System.
1-12
Electronic Edition (link) BibTeX
- Geoffrey Karokola, Louise Yngström:
Lessons Learnt in the Process of Computerization, Automation and Management of ICT Security in the Developing World: A Case Study of The University of Dar Es Salaam, Tanzania.
1-24
Electronic Edition (link) BibTeX
- Marthie Lessing, Lara Weissenberger:
No Age Discrimination for Biometrics.
1-26
Electronic Edition (link) BibTeX
- Hennie A. Kruger, Tjaart Steyn, Lynette Drevin, Dawn Medlin:
Password Management: Empirical Results from a RSA and USA Study.
1-11
Electronic Edition (link) BibTeX
- Evangelos Frangopoulos, Mariki M. Eloff, Lucas M. Venter:
Social Aspects of Information Security.
1-33
Electronic Edition (link) BibTeX
- Barry Irwin, Blake Friedman:
Spam Construction Trends.
1-12
Electronic Edition (link) BibTeX
- Rachid El Khayari, Nicolai Kuntze, Andreas Schmidt:
Spam Over Internet Telephony and How to Deal with it.
1-25
Electronic Edition (link) BibTeX
- Tony Stephanou, Rabelani Dagada:
The Impact of Information Security Awareness Training on Information Security Behaviour: The Case for Further Research.
1-21
Electronic Edition (link) BibTeX
- Frankie Tvrz, Marijke Coetzee:
The Information Security of a Bluetooth-Enabled Handheld Device.
1-12
Electronic Edition (link) BibTeX
- Tana Pistorius:
The IP Protection of Electronic Databases: Copyright or Copywrong?
1-18
Electronic Edition (link) BibTeX
- Rasika Dayarathna:
The Principle of Security Safeguards: Accidental Activities.
1-18
Electronic Edition (link) BibTeX
- Renico Koen, Martin S. Olivier:
The Use of File Timestamps in Digital Forensics.
1-16
Electronic Edition (link) BibTeX
- Namosha Veerasamy, Jan H. P. Eloff:
Towards a Framework for a Network Warfare Capability.
1-18
Electronic Edition (link) BibTeX
- Michal Köhn, Jan H. P. Eloff, Martin S. Olivier:
UML Modelling of Digital Forensic Process Models (DFPMs).
1-13
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:26:19 2009
by Michael Ley (ley@uni-trier.de)