Right now, the COVID pandemic is testing our students. Many are struggling to afford essentials like food, rent and the technology required to continue their studies. In order to offer practical support, ECU has launched the Student Hardship Fund and we need your help.
Lilburn Watson, D., Jones, A., (2013), Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements., 880, MA, USA.
Smith, C., Brooks, D., (2013), Security Science: The theory and practice of security. 280, Oxford, UK.
Cubbage, C., Brooks, D., (2012), Corporate Security in the Asia Pacific Region: Crisis, Crime, Fraud and Misconduct. 242, Boca Raton
Aly, A (2011) Terrorism and Global Security: Historical and Contemporary Perspectives. Melbourne: Palgrave Macmillan
Clarke, N., Transparent User Authentication Biometrics, RFID and Behavioural Profiling. Springer UK.
Aly, Anne (2010) A Study of Audience Responses to the Media Discourse About the ‘Other’:The Fear of Terrorism Between Australian Muslims and the Broader Community. Lampeter: Edwin Mellen Press
Clark, N (2010) Computer Forensics: A Pocket Guide. IT Governance Publishing.
Armistead, L (2010) Information Operations Matters: Best Practices. Potomac Books, Inc.
Jones, A. and C. Valli (2009). Building a Digital Forensic Laboratory., Butterworth-Heinemann.
Brooks, D. J. (2009). Key concepts in security risk management. Saarbrucken: VDM Verlag. ISBN 978-3-639-18598-0
Furnell, S.M. 2009. Mobile Security: A Pocket Guide. IT Governance Publishing. ISBN 1-84928-020-7.
Sarre, R., Brooks, D., Smith, C., Draper, R., (2013), Emerging Technologies Employed to Abate Crime and to Promote Security. The Routledge Handbook of International Crime and Justice Studies, 327-349, Abingdon.
Brooks, D., (2012), Security threats and risks of Intelligent Building Systems: Protecting facilities from current and emerging vulnerabilities. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection, 1-16, Hershey, PA, USA, DOI: 10.4018/978-1-4666-2659-1.ch001.
Cook, D.M., (2011) E-Governance of the Forest, Common Property Resource Management, (Eds: Amir Ullah Khan, Mousumi Majumdar), Academic Foundation: New Delhi
Mansoori, M. And Hunt, R (2011) An Overview of Browser Vulnerability Attacks, Countermeasures and Detection Tools, Journal of Network Forensics. Journal of Network Forensics. Volume 3 Issue 1, 32-47
Pye, G., Warren, M., and Hutchinson, W., Critical Infrastructure Protection: An Ethical Choice, (Ed: Kristin Klinger) ICT Ethics and Security in the 21st Century: New Developments and Applications, Hershey USA
Shanks, N. (2011) Hold Baggage Screening, (Eds: Sidney Chau) Aviation Security: Challenges and Solutions; Hong Kong
Shanks, N. (2011) Air Cargo Security, (Eds: Sidney Chau) Aviation Security: Challenges and Solutions; Hong Kong
Srinivasan, N., (2011) Security Training, (Eds: Sidney Chau) Aviation Security: Challenges and Solutions; Hong Kong
Williams, P.A.H. (2011). Is the biggest threat to medical information security simply a lack of understanding? In D.P. Hansen, A.J. Maeder, & L.K. Schaper (eds.) Health Informatics: The Transformative Power of Innovation, pp. 179-187. IOS Press: Amsterdam.
Hutchinson, W. (2011) Afghanistan - Information Operations, Influence and the Home Front. (Eds: Future Directions) Afghanistan: The Old-New Geopolitical Blackhole, West Perth, WA, 36-44
Aly, Anne (2010). “Fear, Victimisation and Identity: The Community Victimisation Perspective and Social Inclusion of Australian Muslims.” Muslims in Australia. Yasmeen, S (Ed). Melbourne: Melbourne University Press
Aly, Anne. (2009). “The historical roots of Al Qaeda’s ideology: understanding Ayman al Zawahri’s vision and developing an appropriate response.” Doomed to Repeat: Terrorism and the Lessons of History. Brawley, S (Ed). Canberra: New Academia Press
Aly, Anne. (2009). “Media hegemony, activism and identity: Muslim women re-presenting Muslim women.” Beyond the Hijab Debates: New Conversations on Gender, Race and Religion. Dreher, T and C. Ho (Eds). Cambridge Scholars Press.