The search found 3 results in 0.046 seconds.
This report summarises audits of 45 public sector entities' information technology controls in Victoria.
This report summarises the results of our audits of 45 public sector entities' IT controls performed in support of VAGO's 2014–15 financial audits. This report is in...
This paper discusses the Islamic State's success in using social media and other communications technologies to recruit fighters from Southeast Asia and Australia.
Southeast Asia has direct experience of returning extremists. Indonesian veterans of the Soviet invasion of Afghanistan laid the...
This paper sets out the topics and themes to be examined at the second and final workshop (hosted by the National Security Council) which discussed the challenges to Australian research and development in cyber security.
The three main topics are:...