Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
The role of NIST and Technology in Mobile Security
. NIST, 2014.
Mobile Threat Report
. F-Secure Lab, 2013.
McAfee Lab Threat Report: Third Quarter 2013
. McAfee, 2013.
The Threat Landscape
. Kaspersky, 2013.
Kamau, Macharia
.
Kenya Wants EAC States to Hasten Fake Phone Switch Off
. Standard Digital, 2013.
Kigwe, Winfred
.
Kenya: 1.9 million Fake Phones Shut
. All Africa, 2012.
van Niekerk, Brett
, and
Manoj Maharaj
.
Mobile Security from an Information Warfare Perspective
. Information Security for South Africa (ISSA), 2010.
Seriot, Nicolas
.
iPhone Privacy
. Black Hat DC, 2010.
Renaud, Karen
, and
Wendy Goucher
.
"
Monkey See – Money Take Photo: The Risk of Mobile Information Leakage
."
International Journal of Cyber Warfare and Terrorism 3, no. 4
3, no. 4 (2013).
Morrow, Bill
.
"
BYOD Security challenges: control and protect your most sensitive data
."
Network Security
12 (2012): 5-8.
Okeowo, Alexis
.
"
SMSs used as a tool of hate in Kenya
."
The Mail and Guardian
(2008).
Howard, Philip
, and
Muzammil Hussain
.
Democracy Fourth Wave? Digital Media and the Arab Spring
. Oxford: Oxford University Press, 2013.
KICTANet 28-29 September 2007 Workshop Report
. KICTANet, 2007.
Impact of mobile Internet on people in Kenya, Nigeria and South Africa
. Device Research, 2014.
Internet Usage Statistics for Africa
In
World Internet Statistics
., 2014.
The South African Cyber Threat Barometer
. WolfPack, 2013.
Kenya Cyber Security Repor 2012
., 2012.
Cellphone Safety website
., 2015.
Local Resources on Cybercrime
In
Cybercrime
., 2015.
Grobler, Martie
,
Joey Jansen Van Vuuren
, and
Louise Leenen
.
"
Implementation of a Cyber Security Policy in South Africa: Reflection on Progress and the Way Forward
."
Council for Scientific and Industrial Research
(2012).
Magutu, Peterson Obara
,
Gladys Monchari Ondimu
, and
Christopher Jilo Ipu
.
"
Effects of Cybercrime on State Security: Types, Impact and Mitigations with Fibre Optic Deployment in Kenya
."
Journal of Information Assurance & Cybersecurity
(2011).
Geer, Dan
.
"
Cybersecurity as Realpolitik
." In
Black Hat USA 2014 Conference
., 2014.
Herley, Cormac
,
P.C. van Oorschot
, and
Andrew Patrick
.
"
Passwords: If We’re So Smart, Why Are We Still Using Them?
" In
Financial Cryptography and Data Security
, 230-237. Berlin/Heidelberg: Springer, 2009.
Schneier, Bruce
.
Carry On: Sound Advice from Schneier on Security
. Indianapolis, IN: John Wiley, 2004.
Phahlamohlaka, Jackie
,
Joey Jansen Van Vuuren
, and
A. C. Coetzee
.
Cyber Security Awareness Toolkit for National Security: An Approach to South Africa’s Cyber Security Policy Implementation
., 2011.
Pages
« първа
‹ предишна
…
109
110
111
112
113
114
115
116
117
…
следваща ›
последна »
389627 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance