Privacy Enhanced Wap
Browsing With Mcrowds Anonymity Properties And Performance Evaluation Of The
Mcrowds System |
Andersson, Christer |
An Investigation Into
Computer Forensic Tools |
Arthur, Kweko K. |
A Framework For
Aligning Information Security Risk Management Methods With It Governance
Recommendations |
Bornman, Werner G. |
Utilizing Neural
Networks For Effective Intrusion Detection |
Botha, Martin |
On Privacy And The
Web |
Brandi, Wesley A. |
Using A Central Data
Repository For Biometric Authentication In Passport Systems |
Breedt, Morné |
Intrinsic Legal
Issues In It Security |
Casmir, Respickius |
A Logic-Based Access
Control Approach For Web Services |
Coetzee, Marijke |
High Data Rate 8-Bit
Crypto Processor |
Farhan, Sheikh M. |
The “Art” Of Log
Correlation - Tools And Techniques For Correlating Events And Log Files |
Forte, Dario |
Biometric Protection
Of Smartcards Through Fingerprint Matching: A Technological Overview And
Possible Directions |
Frangopoulos, Evangelos D. |
A Comparative Study
Of Standards And Practices Related To Information Security Management |
Frangopoulos, Evangelos D. |
Advanced Platform For
Corporate Incident Detection And Management |
Ghioni, Fabio |
South African Online
Banking: Who Carries The Risk? |
Granova, Anna |
Assessing The Policy
Dimension Of Information Security |
Grobler, Telanie |
A Case For
Information Ownership In Erp Systems |
Hertenberger, Manfred P. |
Case Studies Of
Japan, South Korea And China In Implementation Of IPv6 |
Joe, Say |
Legality Of
Monitoring E-Mail At The Workplace: A Legal Update |
Jones, Mariette |
Categorizing
Vulnerabilities Using Data Clustering Techniques |
Li, Yun (Lillian) |
Integrated Security
System Based On Security Assertion Markup Language Standard |
Mwakalinga, Jeffy |
Applied Holistic
Approach For Security Awareness And Training - Computer Games As Means To
Increase Users’ Information And Communication Security Awareness |
N¨ackros, Kjell |
The Protection Of
Public Health Data - A Case Study |
Nkundlaa, S. |
Are Current B2b
Security Standards Antithetical To Global Interoperability? |
Pather, Maree |
An Investigation Into
Access Control For Mobile Devices |
Perelson, Stephen |
A Framework For
Monitoring Insider Misuse Of It Applications |
Phyo, A. H. |
A General Methodology
For The Development Of An Effective Information Security Policy |
Ramdeyal, Arvish |
Towards Hippocratic
Log Files |
Rutherford, Andrew |
Propagating Trust In
The Web Services Framework |
Thomas, Anitta |
Run-Time Protocol
Conformance Verification In Firewalls |
Ultes-Nitsche, Ulrich |
Security
Considerations In A Global Message Service Handler Design |
Van Eeden, Johannes J |
Organisational Learning Models For Information Security Education |
Van Niekerk, Johan |
A Virtual Machine For
Security In A Relational Database Management System: Design Issues |
Van Staden, Wynand |
A Unified
Architecture For Automatic Software Updates |
White, Dominic |
Applying Similarities
Between Immune Systems And Mobile Agent Systems In Intrusion Detection |
Zielinski, Marek |