Search the dblp DataBase
Basie von Solms :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Colette Reekie , Basie von Solms A Corporate Capital Protection and Assurance Model. [Citation Graph (0, 0)][DBLP ] OTM Workshops (1), 2006, pp:546-553 [Conf ] Basie von Solms Information Security - The Third Wave? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:7, pp:615-620 [Journal ] Basie von Solms Corporate Governance and Information Security. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2001, v:20, n:3, pp:215-218 [Journal ] Basie von Solms Information Security - A Multidimensional Discipline. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2001, v:20, n:6, pp:504-508 [Journal ] Basie von Solms Information Security governance: COBIT or ISO 17799 or both? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:2, pp:99-104 [Journal ] Basie von Solms Information Security Governance - Compliance management vs operational management. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:6, pp:443-447 [Journal ] Basie von Solms , Rossouw von Solms Incremental Information Security Certification. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2001, v:20, n:4, pp:308-310 [Journal ] Basie von Solms , Rossouw von Solms From information security to ... business security? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:4, pp:271-273 [Journal ] Is the Information Security King Naked?. [Citation Graph (, )][DBLP ] Biovault: Solving the Problem of Replay in Biometrics. [Citation Graph (, )][DBLP ] Development and Application of a Proxy Server for Transparently, Digitally Signing E-Learning Content. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.003secs