Table of Contents - According to Paper Title

Title Author(s)
A Framework for the Rapid Development of Anomaly Detection Algorithms in Network Intrusion Detection Systems Richard Barnett and Barry Irwin
A Framework for Web Services Security Policy Negotiation Tristan Lavarack and Marijke Coetzee
A high-level overview for Digital Forensics Cornelia Grobler and Buks Louwrens
A Survey of Computer Crime and Security in South Africa Adrie Stander, A Dunnet and J Rizzo
A Theoretical Approach to Live Forensic Acquisition Marthie Grobler and Basie von Solms
An analysis of authentication for passive RFID tags Gregory Smith and Marijke Coetzee
An examination of the Generic Exploit Prevention Mechanisms on Apple's Leopard Operating System Haroon Meer
An Introduction to Emerging Threats and Vulnerabilities to Create User Awareness Namosha Veerasamy and Barend Taute
Automated Firewall Rule Set Generation Through Passive Traffic Inspection Georg-Christian Pranschke, Barry Irwin and Richard Barnett
BC3I – Towards Requirements Specification for Preparing an Information Security Budget M Dlamini, M M Eloff, J H P Eloff and K Hohne
Discussing E-Government Maturity Models for the Developing World Geoffrey Karokola and Louise Yngström
E-mail Security awareness at Nelson Mandela Metropolitan University (Registrar's Division) Ryno Boshoff and Johan van Niekerk
Evaluating Information Security Controls Applied by Service-Oriented Architecture Governance Frameworks Jacqui Chetty and Marijke Coetzee
Help Us! We Want to be ‘E-Secured’: Digital Banking Customers’ Security Needs in South Africa Arthur Goldstuck and Rabelani Dagada
How appropriate is k-anonymity for addressing the conflict between privacy and information utility in microdata anonymisation Marek P. Zielinski and Martin S. Olivier
Identification of Basic Measurable Security Components in Software-Intensive Systems Reijo Savola
Inductively Deriving an Organisational Information Security Risk Management Agenda by Exploring Process Improvisation Kennedy Njenga and Irwin Brown
Integrating Information Security with Information System Architecture and Administration Curricula Erik Hjelmas, Nils Kalstad Svendsen and Stephen D. Wolthusen
Investigating identity concealing and email tracing techniques Ickin Vural and Hein Venter
Investigating the effect of Genetic Algorithms on filter optimisation within fast packet classifiers Alastair Nottingham and Barry Irwin
Phishing: How an Organization can Protect Itself Edwin Frauenstein and Rossouw von Solms
RBAC Enhanced Presence Handling Rudi Victor, Andrew Rutherford and Reinhardt Botha
The Design of a Wireless Forensic Readiness Model (WFRM) Sipho Josia Ngobeni and Hein Venter
Too Many Laws But Very Little Progress! Is South African Highly Acclaimed Information Security Legislation Redundant? Rabelani Dagada, Mariki Eloff and Lucas Venter