136
click to vote
ISSA
15 years 1 months ago
2008
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still nee...
81
Voted
ISSA
15 years 1 months ago
2008
The drive from the South African Government towards the adoption of open source software across all platforms, incurred a number of research and development questions. The open so...
95
Voted
ISSA
15 years 1 months ago
2008
Bluetooth connectivity allows workers to access information anywhere, including both personal and corporate information. Software and applications have been specifically developed...
88
Voted
ISSA
15 years 1 months ago
2008
This paper intends to discuss and sift out current and important challenges in Information and Communication Technology (ICT) security for developing countries in the Sub-Saharan ...
111
click to vote
ISSA
15 years 1 months ago
2008
Biometric advances apply to a range of disciplines to ensure the safety and security of individuals and groups. To stress the value of biometrics, this study focuses on the applic...
|