


default search action
5th ISSA 2005: Sandton, South Africa
- Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter:

Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa. ISSA, Pretoria, South Africa 2005, ISBN 1-86854-625-X - Job Asheri Chaula, Louise Yngström, Stewart Kowalski:

A Framework for Evaluation of Information Systems Security. 1-11 - Werner Bornman, Les Labuschagne:

A Framework for Information Security Risk Management Communication. 1-11 - Johan Van Niekerk, Rossouw von Solms:

A holistic framework for the fostering of an information security sub-culture in organizations. 1-13 - Marianne Loock, Jan H. P. Eloff:

A new Access Control model based on the Chinese Wall Security Policy Model. 1-10 - Eduardo Da Cruz, Les Labuschagne:

A new framework for bridging the gap between IT Service Management and IT Governance from a security perspective. 1-12 - Carl Marnewick, Les Labuschagne:

A security framework for an ERP system. 1-15 - M. Jansen:

Access to copyrighted work: right or privelege? 1-11 - Norman Tinyiko Baloyi:

Analysis of the financial institutions' strategic e-business security solutions: Technical and non-Technical. 1-12 - Charles N. Tarimo, Louise Yngström, Stewart Kowalski:

An approach to enhance the security of ICT infrastructure through legal, regulatory influences. 1-12 - S. A. Mlangeni, E. Biermann:

An assessment of Information Security Policies within the Polokwane area: A case study. 1-9 - Tayana Morkel, Jan H. P. Eloff, Martin S. Olivier:

An overview of image steganography. 1-11 - Marco Slaviero, Jaco Kroon, Martin S. Olivier:

Attacking Signed Binaries. 1-10 - Shingo Okamura, Maki Yoshida, Toru Fujiwara:

Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors. 1-12 - Emile Parkin:

Cryptographic Key Management principles applied in South African Internet Banking. 1-12 - Dennis Longley, Mark Branagan:

Developing Threat Networks for Risk Analysis of Information Systems. 1-10 - Pieter Blaauw:

Fighting spam in a corporate environment using open-source solutions - a case study. 1-11 - Vafa D. Izadinia, Jan H. P. Eloff, Derrick G. Kourie:

Foiling an Attack - Defeating IPSec Tunnel Fingerprinting. 1-14 - Thomas Schlienger, Stephanie Teufel, Raphael Rues:

Information Security Culture - Status Quo in Switzerland. ISSA 2005 - Tite Tuyikeze, Dalenca Pottas:

Information Security Management and Regulatory Compliance in the South African Health Sector. 1-12 - Christoff Breytenbach:

Introduction to Assessing and Securing Web Services. 1-14 - Fabio Ghioni:

Invasion of the RFIDs: are we heading towards "Modern Times"? 1-5 - Johann Hershensohn:

IT Forensics: the collection of and presentation of digital evidence. 1-14 - Hennie A. Kruger, Wayne D. Kearney:

Measuring Information Security Awareness - A West Africa Gold Mining Environment Case. 1-10 - William List, David Brewer:

Measuring the effectivness of an internal control system. 1-13 - Marijke Coetzee, Jan H. P. Eloff:

Metadata for trust in service-oriented architectures. 1-12 - Alapan Arnab, Andrew Hutchison:

Requirement Analysis of Enterprise DRM Systems. 1-14 - Jacobus A. Ophoff, Reinhardt A. Botha:

Revisiting Reachability Management as a Multilateral Security Mechanism. 1-12 - Evangelos D. Frangopoulos, Lucas M. Venter, Mariki M. Eloff:

Secure Authentication combined with Anonymity: The end of an oxymoron? 1-11 - Maree Pather, L. M. Venter:

Securing SOAP Messages with a Global Message Handler and a Standardized Envelope. 1-13 - Andreas U. Schmidt, Nicolai Kuntze, Thomas Rauch:

Security for Distributed Web-Services via Aspect-Oriented Programming. 1-12 - Jeffy Mwakalinga, Louise Yngström:

Sketch of a generic security framework based on the paradigms of systemic-holistic approach and the immune system. 1-11 - R. Mulder, Rossouw von Solms:

The Proliferation of Wireless Devices and its Role in Corporate Governance. 1-11 - Russell Cloran, Barry Irwin:

Trust on the Web. 1-9 - Barry Irwin:

Unlocking the armour : enabling intrusion detection and analysis of encrypted traffic streams. ISSA 2005: 1-10

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














