![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
2nd ISSA 2002: Muldersdrift, Gauteng, South Africa
- Proceedings of the ISSA 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa. ISSA, Pretoria, South Africa 2003
- Jacques Botha:
A cyclic approach to Business Continuity Planning. 1-11 - Wesley Brandi:
On the Semantic Web and its Web of Trust. 1-12 - Simon R. Chudley, Ulrich Ultes-Nitsche:
Configuring Firewalls - An XML-based Approach to Modelling and Implementing Firewall Configurations. 1-11 - Marijke Coetzee:
Secure Database Connectivity On The WWW. 1-10 - Peter Jonathan de Villiers:
Towards a Content-based Billing Model: The Synergy between Access Control and Billing. 1-10 - Evan James Dembskey:
Quantum Cryptography - Advances in computer science may radically alter cryptography. 1-12 - Lindie du Plessis:
Information Security Awareness: Baseline Education and Certification. 1-12 - Willem Engelbrecht:
Access control and separation of duty in agent-based workflow environments. 1-12 - Petrunel Gerber:
Information Security Health Check. 1-12 - Thomas Holz:
An Efficient Intrusion Detection System Design. 1-12 - Karin Höne:
Information Security Policy - What do International Information Security Standards say? 1-12 - Oliver Andre Hoppe:
Security architecture of the Microsoft .NET framework. 1-10 - Lance A. K. Ingram:
Towards a pattern-based approach for achieving semantic integrity in object-relational databases. 1-9 - Paula Kotzé:
Feedback And Task Analysis For E-Commerce Sites. 1-17 - Marianne Loock:
Minimizing Security Risk Areas revealed by Data mining. 1-15 - Adéle Martins:
Assessing Information Security Culture. 1-14 - Kim Munro:
Steganography - is it becoming a double-edged sword in computer security? 1-17 - Lizette Robbertze:
Information Security Implementation Methodologies. 1-19 - John Rollason, Tom Addison, Kim Munro:
IS Security: User Identification and Authentication - The First Pillar of IS Security. 1-15 - Francois Searle:
An Analysis of Anonymity on the Internet. 1-13 - Simon Taylor:
Practical Unix Security - Securing IBM's AIX. 1-13 - Kerry-Lynn Thomson:
Corporate Governance: Information security the weakest link? 1-10 - Ulrich Ultes-Nitsche, InSeon Yoo:
An Integrated Network Security Approach - Pairing Detecting Malicious Patterns with Anomaly Detection. 1-12 - Johan Van Niekerk:
A Web-Based Portal For Information Security Education. 1-10 - Hein S. Venter:
Comparing Intrusion Detection Tools using Generic Vulnerability Categories. 1-18 - Karin Venter:
The Delegation Authorization Model: A Model For The Dynamic Delegation Of Authorization Rights In A Secure Workflow Management System. 1-13 - Cheryl Vroom:
Auditing the Employee in the Work Environment with Regard to Information Security. 1-11 - Albin Zuccato:
A modified mean value approach to assess security risk.
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.