2008 |
22 | | Hein S. Venter,
Mariki M. Eloff,
Jan H. P. Eloff,
Les Labuschagne:
Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008
ISSA, Pretoria, South Africa 2008 |
2007 |
21 | | Hein S. Venter,
Mariki M. Eloff,
Les Labuschagne,
Jan H. P. Eloff,
Rossouw von Solms:
New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa
Springer 2007 |
2006 |
20 | | Jan H. P. Eloff,
Les Labuschagne,
Mariki M. Eloff,
Hein S. Venter:
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa
ISSA, Pretoria, South Africa 2006 |
19 | EE | Liesl van Niekerk,
Les Labuschagne:
The Peculium Model: Information Security Risk Management for the South African SMME.
ISSA 2006: 1-14 |
2005 |
18 | | Jan H. P. Eloff,
Les Labuschagne,
Mariki M. Eloff,
Hein S. Venter:
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa
ISSA, Pretoria, South Africa 2005 |
17 | EE | Werner Bornman,
Les Labuschagne:
A Framework for Information Security Risk Management Communication.
ISSA 2005: 1-11 |
16 | EE | Eduardo Da Cruz,
Les Labuschagne:
A new framework for bridging the gap between IT Service Management and IT Governance from a security perspective.
ISSA 2005: 1-12 |
15 | EE | Carl Marnewick,
Les Labuschagne:
A security framework for an ERP system.
ISSA 2005: 1-15 |
2004 |
14 | | Jan H. P. Eloff,
Les Labuschagne,
Mariki M. Eloff,
Hein S. Venter:
Proceedings of the ISSA 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa
ISSA, Pretoria, South Africa 2004 |
2003 |
13 | EE | J. Johnston,
Jan H. P. Eloff,
Les Labuschagne:
Security and human computer interfaces.
Computers & Security 22(8): 675-684 (2003) |
2001 |
12 | | Jan H. P. Eloff,
Les Labuschagne,
Rossouw von Solms,
Gurpreet Dhillon:
Advances in Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Eigth Annual Working Conference on Information Security Management & Small Systems Security, September 27-28, 2001, Las Vegas, Nevada, USA
Kluwer 2001 |
11 | | Les Labuschagne:
Web Asssurance: Information Security Management for e-commerce.
Conference on Information Security Management & Small Systems Security 2001: 1-12 |
10 | | Les Labuschagne,
Jan H. P. Eloff:
E-Commerce Strategy Formulation.
I3E 2001: 289-302 |
2000 |
9 | | Les Labuschagne:
A Framework for Electronic Commerce Security.
SEC 2000: 441-450 |
8 | EE | Les Labuschagne,
Jan H. P. Eloff:
Electronic commerce: the information-security challenge.
Inf. Manag. Comput. Security 8(3): 154-157 (2000) |
1999 |
7 | | Jan H. P. Eloff,
Les Labuschagne,
Rossouw von Solms,
Jan Verschuren:
Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30 - October 1, 1999, Amsterdam, The Netherlands
Kluwer 1999 |
6 | | H. S. Venter,
Les Labuschagne,
Jan H. P. Eloff:
Real-time Risk Analysis on the Internet: a prototype.
Conference on Information Security Management & Small Systems Security 1999: 11-28 |
1998 |
5 | EE | Les Labuschagne,
Jan H. P. Eloff:
The use of real-time risk analysis to enable dynamic activation of countermeasures.
Computers & Security 17(4): 347-357 (1998) |
4 | EE | Les Labuschagne,
Jan H. P. Eloff:
Real-time risk analysis using Java concepts.
Inf. Manag. Comput. Security 6(5): 212-217 (1998) |
1997 |
3 | EE | Les Labuschagne,
Jan H. P. Eloff:
Improved system-access control using complementary technologies.
Computers & Security 16(6): 543-549 (1997) |
1996 |
2 | | Les Labuschagne,
Jan H. P. Eloff:
Activating dynamic counter measures to reduce risk.
SEC 1996: 187-196 |
1993 |
1 | EE | Jan H. P. Eloff,
Les Labuschagne,
Karin P. Badenhorst:
A comparative framework for risk analysis methods.
Computers & Security 12(6): 597-603 (1993) |