Author:Robertson, J; Lessing, M; Nare, SDate:Jul 2008The military’s decision to move from proprietary software to commercially available software leaves the military’s Information Technology security vulnerable and potentially unprotected. To be sufficiently prepared to these threats, the ...Read more
Author:Grobler, MMDate:May 2010The best Information Security infrastructure cannot guarantee that intrusions or other malicious acts will not happen. It is necessary to know the facts and prepare beforehand knowing cyber threats and trends; knowing the broadband impact on ...Read more
Author:Grobler, M; Dlamini, Z; Ngobeni, Sipho J; Labuschagne, ADate:Aug 2011A large portion of the South African rural community only have intermittent access to computers and are not familiar, nor entirely comfortable, with the use of internet communication or electronic devices. The research conducted by the authors ...Read more