Spremljaj
S H Basie B von Solms
S H Basie B von Solms
Preverjeni e-poštni naslov na uj.ac.za - Domača stran
Naslov
Navedeno
Navedeno
Leto
The 10 deadly sins of information security management
B Von Solms, R Von Solms
Computers & security 23 (5), 371-376, 2004
5272004
On blind signatures and perfect crimes
S Von Solms, D Naccache
Computers & Security 11 (6), 581-583, 1992
3771992
Information security—the third wave?
B Von Solms
Computers & security 19 (7), 615-620, 2000
3422000
Information Security governance: COBIT or ISO 17799 or both?
B Von Solms
Computers & Security 24 (2), 99-104, 2005
3362005
From policies to culture
R Von Solms, B Von Solms
Computers & security 23 (4), 275-279, 2004
3242004
Information security–the fourth wave
B Von Solms
Computers & security 25 (3), 165-168, 2006
2952006
Cyber security for home users: A new way of protection through awareness enforcement
E Kritzinger, SH von Solms
Computers & Security 29 (8), 840-847, 2010
2632010
Cybersecurity and information security–what goes where?
B Von Solms, R Von Solms
Information & Computer Security 26 (1), 2-9, 2018
2422018
Information security—a multidimensional discipline
B Von Solms
Computers & security 20 (6), 504-508, 2001
2412001
Information Security Governance–compliance management vs operational management
SHB von Solms
Computers & Security 24 (6), 443-447, 2005
2352005
Corporate governance and information security
B Von Solms
Computers & Security 20 (3), 215-218, 2001
1842001
Information Security Governance: a model based on the direct–control cycle
R Von Solms, SHB von Solms
Computers & security 25 (6), 408-412, 2006
1732006
A review of industry 4.0 manufacturing process security risks
J Prinsloo, S Sinha, B Von Solms
Applied Sciences 9 (23), 5105, 2019
1622019
Information security governance
SH Solms, R Solms
Springer Science & Business Media, 2008
1592008
Information security management: a hierarchical framework for various approaches
MM Eloff, SH von Solms
Computers & Security 19 (3), 243-256, 2000
1502000
From information security to… business security?
B Von Solms, R Von Solms
Computers & security 24 (4), 271-273, 2005
1452005
Socio-technical systems cybersecurity framework
M Malatji, S Von Solms, A Marnewick
Information & Computer Security 27 (2), 233-272, 2019
1302019
Information security management: an approach to combine process certification and product evaluation
MM Eloff, SH Von Solms
Computers & Security 19 (8), 698-709, 2000
1302000
A taxonomy for secure object-oriented databases
MS Olivier, SH Von Solms
ACM Transactions on Database Systems (TODS) 19 (1), 3-46, 1994
1041994
A multi-component view of digital forensics
CP Grobler, CP Louwrens, SH von Solms
2010 International Conference on Availability, Reliability and Security, 647-652, 2010
1002010
Sistem trenutno ne more izvesti postopka. Poskusite znova pozneje.
Članki 1–20