S H Basie B von Solms
S H Basie B von Solms
Bestätigte E-Mail-Adresse bei uj.ac.za - Startseite
Titel
Zitiert von
Zitiert von
Jahr
The 10 deadly sins of information security management
B Von Solms, R Von Solms
Computers & security 23 (5), 371-376, 2004
4422004
On blind signatures and perfect crimes
S Von Solms, D Naccache
Computers & Security 11 (6), 581-583, 1992
3311992
Information security-The third wave?
BV Solms
Computers & security 19 (7), 615-615, 2000
3052000
Information Security governance: COBIT or ISO 17799 or both?
B Von Solms
Computers & Security 24 (2), 99-104, 2005
2842005
From policies to culture
R Von Solms, B Von Solms
Computers & security 23 (4), 275-279, 2004
2762004
Information security–the fourth wave
B Von Solms
Computers & security 25 (3), 165-168, 2006
2442006
Information security—a multidimensional discipline
B Von Solms
Computers & security 20 (6), 504-508, 2001
2252001
Information Security Governance–compliance management vs operational management
SHB von Solms
Computers & Security 24 (6), 443-447, 2005
2112005
Cyber security for home users: A new way of protection through awareness enforcement
E Kritzinger, SH von Solms
Computers & Security 29 (8), 840-847, 2010
1832010
Corporate governance and information security
B Von Solms
Computers & Security 20 (3), 215-218, 2001
1632001
Information Security Governance: a model based on the direct–control cycle
R Von Solms, SHB von Solms
Computers & Security 25 (6), 408-412, 2006
1392006
Information security management: a hierarchical framework for various approaches
MM Eloff, SH von Solms
Computers & Security 19 (3), 243-256, 2000
1362000
Information security governance
SH Solms, R Solms
Springer Science & Business Media, 2008
1262008
From information security to… business security?
B Von Solms, R Von Solms
Computers & security 24 (4), 271-273, 2005
1262005
Information security management: an approach to combine process certification and product evaluation
MM Eloff, SH Von Solms
Computers & Security 19 (8), 698-709, 2000
1152000
A taxonomy for secure object-oriented databases
MS Olivier, SH Von Solms
ACM Transactions on Database Systems (TODS) 19 (1), 3-46, 1994
981994
A framework for information security evaluation
R von Solms, H Van Der Haar, SH von Solms, WJ Caelli
Information & Management 26 (3), 143-153, 1994
781994
Cybersecurity and information security–what goes where?
B von Solms, R von Solms
Information & Computer Security, 2018
752018
A multi-component view of digital forensics
CP Grobler, CP Louwrens, SH von Solms
2010 International Conference on Availability, Reliability and Security, 647-652, 2010
702010
The management of computer security profiles using a role-oriented approach
SH Von Solms, I Van Der Merwe
Computers and Security 13 (8), 673-680, 1994
681994
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20