dblp.uni-trier.dewww.uni-trier.de

Karin P. Badenhorst Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*1996
5EESharon Halliday, Karin P. Badenhorst, Rossouw von Solms: A business approach to effective information technology risk analysis and management. Inf. Manag. Comput. Security 4(1): 19-31 (1996)
1994
4EEKarin P. Badenhorst, Jan H. P. Eloff: TOPM: a formal approach to the optimization of information technology risk management. Computers & Security 13(5): 411-435 (1994)
1993
3EEJan H. P. Eloff, Les Labuschagne, Karin P. Badenhorst: A comparative framework for risk analysis methods. Computers & Security 12(6): 597-603 (1993)
1990
2EEKarin P. Badenhorst, Jan H. P. Eloff: Computer security methodology: Risk analysis and project definition. Computers & Security 9(4): 339-346 (1990)
1989
1EEKarin P. Badenhorst, Jan H. P. Eloff: Framework of a methodology for the life cycle of computer security in an organization. Computers & Security 8(5): 433-442 (1989)

Coauthor Index

1Jan H. P. Eloff [1] [2] [3] [4]
2Sharon Halliday [5]
3Les Labuschagne [3]
4Rossouw von Solms [5]

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)