Table of Contents - According to Paper Title

Title Author(s)
A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code Leonard Shand and Theodore Tryfonas
A Novel Security Metrics Taxonomy for R&D Organisations Reijo Savola
A Proof-of-Concept Implementation of EAP-TLS with TPM Support Carolin Latze and Ulrich Ultes-Nitsche
A User Centric Model for Online Identity and Access Management Matthew Deas and Stephen Flowerday
An Introduction to Standards related to Information Security Johann Amsenga
Application of Message Digests for the Verification of Logical Forensic Data Pontjho Mokhonoana and Martin Olivier
Bloom’s Taxonomy for Information Security Education Johan van Niekerk and Rossouw von Solms
Collective Improvisation: Complementing Information Security Frameworks with Self-Policing Kennedy Njenga and Irwin Brown
Computer Monitoring in the 21st Century Workplace Sri Warna Mahanamahewa
Emerging Framework for The Evaluation of Open Source Security Tools Elmarie Biermann and Jan Mentz
Immune System Based Intrusion Detection System Christoph Ehret and Ulrich Ultes-Nitsche
Lessons Learnt in the Process of Computerization, Automation and Management of ICT Security in the Developing World: A Case Study of The University of Dar Es Salaam, Tanzania Geoffrey Karokola and Louise Yngström
No Age Discrimination for Biometrics Marthie Lessing and Lara Weissenberger
Password Management: Empirical Results from a RSA and USA Study Hennie Kruger, Tjaart Steyn, Lynette Drevin and Dawn Medlin
Social Aspects of Information Security Evangelos Frangopoulos, Mariki Eloff and Lucas Venter
Spam Construction Trends Barry Irwin and Blake Friedman
Spam Over Internet Telephony and How to Deal with it Rachid El Khayari, Nicolai Kuntze and Andreas Schmidt
The Impact of Information Security Awareness Training on Information Security Behaviour: The Case for Further Research Tony Stephanou and Rabelani Dagada
The Information Security of a Bluetooth-Enabled Handheld Device Frankie Tvrz and Marijke Coetzee
The IP Protection of Electronic Databases: Copyright or Copywrong? Tana Pistorius
The Principle of Security Safeguards: Accidental Activities Rasika Dayarathna
The Use of File Timestamps in Digital Forensics Renico Koen and Martin Olivier
Towards a Framework for a Network Warfare Capability Namosha Veerasamy and Jan Eloff
UML Modelling of Digital Forensic Process Models (DFPMs) MD Köhn, JHP Eloff and MS Olivier