|
Search the dblp DataBase
Mariki M. Eloff:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Paula Kotzé, Mariki M. Eloff, Ayodele Adesina-Ojo, Jan H. P. Eloff
Accessible Computer Interaction for People with Disabilities: The Case of Quadriplegics. [Citation Graph (0, 0)][DBLP] ICEIS (5), 2004, pp:97-106 [Conf]
- Mariki M. Eloff, Jan H. P. Eloff
Human Computer Interaction: An Information Security Perspectives. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:535-546 [Conf]
- Mariki M. Eloff, Jan H. P. Eloff
Information Security Management System: Processes and Products. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:193-204 [Conf]
- Mariki M. Eloff, Sebastiaan H. von Solms
Information Security: Process Evaluation and Product Evaluation. [Citation Graph (0, 0)][DBLP] SEC, 2000, pp:11-18 [Conf]
- Mariki M. Eloff, Sebastiaan H. von Solms
Information Security Management: A Hierarchical Framework for Various Approaches. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:3, pp:243-256 [Journal]
- Mariki M. Eloff, Sebastiaan H. von Solms
Information Security Management: An Approach to Combine Process Certification And Product Evaluation. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:8, pp:698-709 [Journal]
- E. Smith, Mariki M. Eloff, L. M. Venter, A. Barnard, Laurette Pretorius
Agents, security and ethics : a framework for analysis. [Citation Graph (0, 0)][DBLP] South African Computer Journal, 2003, v:31, n:, pp:18-24 [Journal]
Denial-of-Service & Distributed Denial-of-Service on The Internet. [Citation Graph (, )][DBLP]
Social Aspects of Information Security. [Citation Graph (, )][DBLP]
Secure Authentication combined with Anonymity: The end of an oxymoron? [Citation Graph (, )][DBLP]
Information security: The moving target. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|