Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications McAfee Lab Threat Report: Third Quarter 2013. McAfee, 2013. The Threat Landscape. Kaspersky, 2013. Kamau, Macharia. Kenya Wants EAC States to Hasten Fake Phone Switch Off. Standard Digital, 2013. Kigwe, Winfred. Kenya: 1.9 million Fake Phones Shut. All Africa, 2012. van Niekerk, Brett, and Manoj Maharaj. Mobile Security from an Information Warfare Perspective. Information Security for South Africa (ISSA), 2010. Seriot, Nicolas. iPhone Privacy. Black Hat DC, 2010. Renaud, Karen, and Wendy Goucher. "Monkey See – Money Take Photo: The Risk of Mobile Information Leakage." International Journal of Cyber Warfare and Terrorism 3, no. 4 3, no. 4 (2013). Morrow, Bill. "BYOD Security challenges: control and protect your most sensitive data." Network Security 12 (2012): 5-8. Okeowo, Alexis. "SMSs used as a tool of hate in Kenya." The Mail and Guardian (2008). Howard, Philip, and Muzammil Hussain. Democracy Fourth Wave? Digital Media and the Arab Spring. Oxford: Oxford University Press, 2013. KICTANet 28-29 September 2007 Workshop Report. KICTANet, 2007. Impact of mobile Internet on people in Kenya, Nigeria and South Africa. Device Research, 2014. Internet Usage Statistics for Africa In World Internet Statistics., 2014. The South African Cyber Threat Barometer. WolfPack, 2013. Kenya Cyber Security Repor 2012., 2012. Cellphone Safety website., 2015. Local Resources on Cybercrime In Cybercrime., 2015. Grobler, Martie, Joey Jansen Van Vuuren, and Louise Leenen. "Implementation of a Cyber Security Policy in South Africa: Reflection on Progress and the Way Forward." Council for Scientific and Industrial Research (2012). Magutu, Peterson Obara, Gladys Monchari Ondimu, and Christopher Jilo Ipu. "Effects of Cybercrime on State Security: Types, Impact and Mitigations with Fibre Optic Deployment in Kenya." Journal of Information Assurance & Cybersecurity (2011). Geer, Dan. "Cybersecurity as Realpolitik." In Black Hat USA 2014 Conference., 2014. Herley, Cormac, P.C. van Oorschot, and Andrew Patrick. "Passwords: If We’re So Smart, Why Are We Still Using Them?" In Financial Cryptography and Data Security, 230-237. Berlin/Heidelberg: Springer, 2009. Schneier, Bruce. Carry On: Sound Advice from Schneier on Security. Indianapolis, IN: John Wiley, 2004. Phahlamohlaka, Jackie, Joey Jansen Van Vuuren, and A. C. Coetzee. Cyber Security Awareness Toolkit for National Security: An Approach to South Africa’s Cyber Security Policy Implementation., 2011. Christin, Nicholas, Serge Egelman, Timothy Vidas, and Jens Grossklags. "It’s All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice." In Financial Cryptography and Data Security, 16-30. Berlin/Heidelberg: Springer, 2012. "Social Engineering: People Hacking." In Control Essentials. Enterprise Risk Management, 2009. Pages« първа ‹ предишна … 109 110 111 112 113 114 115 116 117 … следваща › последна »