2006 | ||
---|---|---|
5 | EE | Mkhululi Tyukala, Dalenca Pottas, Rossouw von Solms, Helen van de Haar: The Organisational Information Security Profile - A Tool to Assist The Board. ISSA 2006: 1-13 |
2003 | ||
4 | EE | Helen van de Haar, Rossouw von Solms: A model for deriving information security control attribute profiles. Computers & Security 22(3): 233-244 (2003) |
2000 | ||
3 | Rossouw von Solms, Helen van de Haar: From Trusted Information Security Controls to a Trusted Information Security Environment. SEC 2000: 29-36 | |
1997 | ||
2 | W. Olivier, Helen van de Haar: Controlling Internet access at an educational institution. SEC 1997: 280-292 | |
1993 | ||
1 | EE | Helen van de Haar, Rossouw von Solms: A Tool for Information Security Management. Inf. Manag. Comput. Security 1(1): (1993) |
1 | W. Olivier | [2] |
2 | Dalenca Pottas | [5] |
3 | Rossouw von Solms | [1] [3] [4] [5] |
4 | Mkhululi Tyukala | [5] |