Search the dblp DataBase
Les Labuschagne :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Les Labuschagne , Jan H. P. Eloff E-Commerce Strategy Formulation. [Citation Graph (0, 0)][DBLP ] I3E, 2001, pp:289-302 [Conf ] Les Labuschagne Web Asssurance: Information Security Management for e-commerce. [Citation Graph (0, 0)][DBLP ] Conference on Information Security Management & Small Systems Security, 2001, pp:1-12 [Conf ] H. S. Venter , Les Labuschagne , Jan H. P. Eloff Real-time Risk Analysis on the Internet: a prototype. [Citation Graph (0, 0)][DBLP ] Conference on Information Security Management & Small Systems Security, 1999, pp:11-28 [Conf ] Les Labuschagne A Framework for Electronic Commerce Security. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:441-450 [Conf ] Les Labuschagne , Jan H. P. Eloff Activating dynamic counter measures to reduce risk. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:187-196 [Conf ] Jan H. P. Eloff , Les Labuschagne , Karin P. Badenhorst A comparative framework for risk analysis methods. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:6, pp:597-603 [Journal ] J. Johnston , Jan H. P. Eloff , Les Labuschagne Security and human computer interfaces. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:8, pp:675-684 [Journal ] Les Labuschagne , Jan H. P. Eloff Improved system-access control using complementary technologies. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1997, v:16, n:6, pp:543-549 [Journal ] Les Labuschagne , Jan H. P. Eloff The use of real-time risk analysis to enable dynamic activation of countermeasures. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:4, pp:347-357 [Journal ] Les Labuschagne , Jan H. P. Eloff Electronic commerce: the information-security challenge. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2000, v:8, n:3, pp:154-157 [Journal ] Les Labuschagne , Jan H. P. Eloff Real-time risk analysis using Java concepts. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 1998, v:6, n:5, pp:212-217 [Journal ] The Peculium Model: Information Security Risk Management for the South African SMME. [Citation Graph (, )][DBLP ] A Framework for Information Security Risk Management Communication. [Citation Graph (, )][DBLP ] A security framework for an ERP system. [Citation Graph (, )][DBLP ] A new framework for bridging the gap between IT Service Management and IT Governance from a security perspective. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.004secs