default search action
3. AISM 2005: Perth, Australia
- Craig Valli, Andrew Woodward:
Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005. School of Computer and Information Science, Edith Cowan University, Western Australia 2005, ISBN 0-7298-0611-1 - Marwan Al-Zarouni:
Taxonomy of WRT54G(S) Hardware and Custom Firmware. AISM 2005: 1-10 - Martin Dart:
Seeking information superiority: strategies for business in the commercial application of information operations. AISM 2005: 11-19 - Rosanna Fanciulli:
An investigation into the paradox of organisational flexibility versus security: A research project overview. AISM 2005: 20-26 - Lennon Hopkins:
Identity Synthesis: Creating An Identity From Scratch. AISM 2005: 27-32 - William Hutchinson:
Information Security: a Misnomer. AISM 2005: 33-37 - Wayne A. Jansen, Serban I. Gavrila, Clément Séveillac:
Smart Card Authentication for Mobile Devices. AISM 2005: 38-46 - K. Koh, Anthonie B. Ruighaver, Sean B. Maynard, Atif Ahmad:
Security Governance: Its Impact on Security Culture. AISM 2005: 47-58 - Yi-Chi Lin, Jill Slay:
Non-Repudiation in Pure Mobile Ad Hoc Network. AISM 2005: 59-66 - Leanne Ngo, Wanlei Zhou, Matthew J. Warren:
Understanding Transition towards Information Security Culture Change. AISM 2005: 67-73 - Aaron Olding, Paul Turner:
My Problem or Our Problem? - Exploring the use of information sharing as a component of a holistic approach to e-security in response to the growth of 'Malicious Targeted Attacks'. AISM 2005: 74-79 - Graeme Pye, Matthew J. Warren:
Benchmarking E-business Security: A Model and Framework. AISM 2005: 80-87 - Reijo Savola:
Architecture for Self-Estimation of Security Level in Ad Hoc Network Nodes. AISM 2005: 88-94 - Mahdi Seify:
Risk Management in CRM Security Management. AISM 2005: 95-102 - Zhiqi Tao, Anthonie B. Ruighaver:
Detecting Rogue Access Points that endanger the Maginot Line of Wireless Authentication. AISM 2005: 103-110 - Patricia A. H. Williams:
Physician secure thyself. AISM 2005: 111-116 - Patricia A. H. Williams:
The underestimation of threats to patient data in clinical practice. AISM 2005: 117-122 - Lih Wern Wong:
Potential Bluetooth Vulnerabilities in Smartphones. AISM 2005: 123-132 - Andrew Woodward:
Recommendations for wireless network security policy: an analysis and classification of current and emerging threats and solutions for different organisations. AISM 2005: 133-140
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.