Abstract is missing.
- A Best Practice Approach to Live Forensic AcquisitionMarthie Grobler, Basie von Solms. 3-13 [doi]
- High-Level Integrated Vie of Digital ForensicsCornelia Grobler, Buks Louwrens. 15-34 [doi]
- The Design of a Wireless Forensic Readiness Model(WFRM)Sipho Josia Ngobeni, Hein S. Venter. 35-52 [doi]
- BC3I - Towards Requirements Specification for Preparing an Information Security BudgetMoses Dlamini, Mariki M. Eloff, Jan H. P. Eloff, Karin Höne. 53-68 [doi]
- Identification of Basic Measurable Security Components in Software-Intensive SystemsReijo Savola. 69-80 [doi]
- Discussing E-Government Maturity Models for the Developing World - Security ViewGeoffrey Karokola, Louise Yngström. 81-98 [doi]
- Investigating the effect of Genetic Algorithms on Filter Optimisation Within Fast Packet ClassifiersAlastair Nottingham, Barry Irwin. 99-116 [doi]
- Help Us! We Want to be "E-Secured": Digital Banking Customers' Security Needs in South AfricaArthur Godlstuck, Rabelani Dagada. 117-136 [doi]
- An examination of the Generic Exploit Prevention Mechanisms on Apple's Leopard Operating SystemHaroon Meer. 137-152 [doi]
- A Framework for Web Services Security Policy NegotiationTristan Lavarack, Marijke Coetzee. 153-170 [doi]
- How Appropriate is K-Anonymity for Addressing the Conflict Between Privacy and Information Utility in Microdata ASnonymisationMarek P. Zielinski, Martin S. Olivier. 171-188 [doi]
- An Analysis of Authentication for Passive RFID TagsGregory Stuart Smith, Marijke Coetzee. 189-204 [doi]
- An Introduction to Emerging Threats and Vulnerabilities to Create User AwarenessNamosha Veerasamy, Barend Taute. 205-216 [doi]
- A Survey of Computer Crime and Security in South AfricaAdrie Stander, A. Dunnet, J. Rizzo. 217-226 [doi]
- Evaluating Information Security Controls Applied by Service-Oriented Architecture Governance FrameworksJacqui Chetty, Marijke Coetzee. 227-242 [doi]
- Automated Firewall Rule Set Generation Through Passive Traffic InspectionGeorge-Christian Pranschke, Barry Irwin, Richard J. Barnett. 243-252 [doi]
- Phishing: How an Organization can Protect ItselfEdwin Donald Frauenstein, Rossouw von Solms. 253-268 [doi]
- A Framework for the Rapid Development of Anomaly Detection Algorithms in Network Intrusion Detection SystemsRichard J. Barnett, Barry Irwin. 269-278 [doi]
- E-mail Security awareness at Nelson Mandela Metropolitan University (Registrar's Division)Ryno Boshoff, Johan Van Niekerk. 279-292 [doi]
- Investigating Identity Concealing and Email Tracing TechniquesIckin Vural, Hein S. Venter. 293-308 [doi]
- Enhanced Presence HandlingRudi Victor, Andrew Rutherford, Reinhardt Botha. 309-326 [doi]
- Too Many Laws But Very Little Progress! Is South African Highly Acclaimed Information Security Legislation Redundant?Rabelani Dagada, Mariki M. Eloff, Lucas M. Venter. 327-346 [doi]
- Inductively Deriving an Organisational Information Security Risk Management Agenda by Exploring Process ImprovisationKennedy Njenga, Irwin Brown. 347-362 [doi]
- Integrating Information Security with Information System Architecture and Administration CurriculaErik Hjelmås, Nils Kalstad Svendsen, Stephen D. Wolthusen. 363-376 [doi]
- A Proof of Concept Implementation of a Secure E-Commerce Authentication SchemeCarolin Latze, Andreas Ruppen, Ulrich Ultes-Nitsche. 379-392 [doi]
- Usage Control Policy Enforcement in OpenOffice.org and Information FlowChristian Schaefer, Thomas Walter, Matús Harvan, Alexander Pretschner. 393-406 [doi]
- The Design of a Logical Traffic Isolation Forensic ModelInnocentia Dlamini, Martin S. Olivier. 407-418 [doi]
- Methodology for Considering Environments and Culture in Developing Information Security SystemsJeffy Mwakalinga, Stewart Kowalski, Louise Yngström. 419-436 [doi]
- The State of the Art of Spam and Anti-Spam Strategies and a Possible Solution using Digital ForensicsFranscois Van Staden, Hein S. Venter. 437-454 [doi]
- Information Security Policies for Governmental Organisations, The Minimum CriteriaSipho Josia Ngobeni, Marthie Grobler. 455-466 [doi]
- Concealing the Medicine: Information Security Education through Game PlayThomas Monk, Johan Van Niekerk, Rossouw von Solms. 467-478 [doi]
- Management, Processing and Analysis of Cryptographic Network ProtocolsBradley Cowie, Barry Irwin, Richard J. Barnett. 479-488 [doi]
- Mobile Communications Security Research at CSIR-MDSAnna B. Adimo, Fisseha Mekuria. 489-490 [doi]