|
Search the dblp DataBase
Karin P. Badenhorst:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Karin P. Badenhorst, Jan H. P. Eloff
TOPM: a formal approach to the optimization of information technology risk management. [Citation Graph (0, 0)][DBLP] Computers & Security, 1994, v:13, n:5, pp:411-435 [Journal]
- Jan H. P. Eloff, Les Labuschagne, Karin P. Badenhorst
A comparative framework for risk analysis methods. [Citation Graph (0, 0)][DBLP] Computers & Security, 1993, v:12, n:6, pp:597-603 [Journal]
- Sharon Halliday, Karin P. Badenhorst, Rossouw von Solms
A business approach to effective information technology risk analysis and management. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 1996, v:4, n:1, pp:19-31 [Journal]
Computer security methodology: Risk analysis and project definition. [Citation Graph (, )][DBLP]
Framework of a methodology for the life cycle of computer security in an organization. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.001secs
|