


default search action
4th ISSA 2004: Midrand, South Africa
- Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter:

Proceedings of the ISSA 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa. ISSA, Pretoria, South Africa 2004, ISBN 1-86854-522-9 - Manfred P. Hertenberger:

A Case For Information Ownership In Erp Systems. 1-11 - Evangelos D. Frangopoulos:

A Comparative Study Of Standards And Practices Related To Information Security Management. 1-15 - W. G. Bornman:

A Framework For Aligning Information Security Risk Management Methods With It Governance Recommendations. 1-14 - Aung Htike Phyo:

A Framework For Monitoring Insider Misuse Of It Applications. 1-10 - Arvish Ramdeyal:

A General Methodology For The Development Of An Effective Information Security Policy. 1-10 - Marijke Coetzee:

A Logic-Based Access Control Approach For Web Services. 1-11 - Dominic White:

A Unified Architecture For Automatic Software Updates. 1-11 - Wynand van Staden:

A Virtual Machine For Security In A Relational Database Management System: Design Issues. 1-13 - Fabio Ghioni:

Advanced Platform For Corporate Incident Detection And Management. 1-11 - Stephen Perelson:

An Investigation Into Access Control For Mobile Devices. 1-10 - K. K. Arthur:

An Investigation Into Computer Forensic Tools. 1-11 - Kjell Näckros:

Applied Holistic Approach For Security Awareness And Training - Computer Games As Means To Increase Users' Information And Communication Security Awareness. 1-10 - Marek Zielinski:

Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection. 1-12 - Maree Pather:

Are Current B2b Security Standards Antithetical To Global Interoperability? 1-10 - Telanie Grogler:

Assessing The Policy Dimension Of Information Security. 1-18 - Evangelos D. Frangopoulos:

Biometric Protection Of Smartcards Through Fingerprint Matching: A Technological Overview And Possible Directions. 1-13 - Say Joe:

Case Studies Of Japan, South Korea And China In Implementation Of IPv6. 1-11 - Yun (Lillian) Li:

Categorizing Vulnerabilities Using Data Clustering Techniques. 1-11 - Sheikh Muhammad Farhan:

High Data Rate 8-Bit Crypto Processor. 1-11 - Jeffy Mwakalinga:

Integrated Security System Based On Security Assertion Markup Language Standard. 1-9 - Respickius Casmir:

Intrinsic Legal Issues In It Security. 1-11 - Mariette Jones:

Legality Of Monitoring E-Mail At The Workplace: A Legal Update. 1-11 - Wesley Brandi:

On Privacy And The Web. 1-8 - Johan Van Niekerk:

Organisational Learning Models For Information Security Education. 1-11 - Christer Andersson:

Privacy Enhanced Wap Browsing With Mcrowds Anonymity Properties And Performance Evaluation Of The Mcrowds System. 1-12 - Anitta Thomas:

Propagating Trust In The Web Services Framework. 1-11 - Ulrich Ultes-Nitsche:

Run-Time Protocol Conformance Verification In Firewalls. 1-11 - Johannes J. van Eeden:

Security Considerations In A Global Message Service Handler Design. 1-12 - Anna Granova:

South African Online Banking: Who Carries The Risk? 1-12 - Dario Forte:

The "Art" Of Log Correlation - Tools And Techniques For Correlating Events And Log Files. 1-15 - S. Nkundlaa:

The Protection Of Public Health Data - A Case Study. 1-11 - Andrew Rutherford:

Towards Hippocratic Log Files. 1-10 - Morné Breedt:

Using A Central Data Repository For Biometric Authentication In Passport Systems. 1-12 - Martin Botha:

Utilizing Neural Networks For Effective Intrusion Detection. 1-15

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














