M M Eloff
M M Eloff
Vahvistettu sähköpostiosoite verkkotunnuksessa unisa.ac.za
Nimike
Viittaukset
Viittaukset
Vuosi
The management of security in cloud computing
S Ramgovind, MM Eloff, E Smith
2010 Information Security for South Africa, 1-7, 2010
5412010
Information security: The moving target
MT Dlamini, JHP Eloff, MM Eloff
computers & security 28 (3-4), 189-198, 2009
1972009
Information security management: a new paradigm
JHP Eloff, M Eloff
Proceedings of the 2003 annual research conference of the South African …, 2003
1542003
Information security management: a hierarchical framework for various approaches
MM Eloff, SH von Solms
Computers & Security 19 (3), 243-256, 2000
1252000
Information security architecture
JHP Eloff, MM Eloff
Computer Fraud & Security 2005 (11), 10-16, 2005
1242005
Integrated digital forensic process model
MD Kohn, MM Eloff, JHP Eloff
Computers & Security 38, 103-115, 2013
1172013
Information security management: An approach to combine process certification and product evaluation
MM Eloff, SH Von Solms
Computers & Security 19 (8), 698-709, 2000
1012000
Accommodating soft skills in software project management
A Sukhoo, A Barnard, MM Eloff, JA Van der Poll, M Motah
Issues in Informing Science and Information Technology 2, 691-704, 2005
962005
Internet of people, things and services-the convergence of security, trust and privacy
JHP Eloff, MM Eloff, MT Dlamini, MP Zielinski
3rd CompanionAble Workshop – IoPTS, 02 December 2009, Novotel Brussels, 2009
322009
Design of cyber security awareness game utilizing a social media framework
WA Labuschagne, I Burke, N Veerasamy, MM Eloff
2011 Information Security for South Africa, 1-9, 2011
242011
Internet of things: emerging and future scenarios from an information security perspective
MT Dlamini, MM Eloff, JHP Eloff
Southern Africa Telecommunication Networks and Applications Conference, 2009
232009
An evolutionary software project management maturity model for Mauritius.
A Sukhoo, A Barnard, MM Eloff, JA Van der Poll
Interdisciplinary Journal of Information, Knowledge & Management 2, 2007
232007
A sustainable information security framework for e-Government–case of Tanzania
CK Wangwe, MM Eloff, L Venter
Technological and Economic Development of Economy 18 (1), 117-131, 2012
192012
An assessment of software project management maturity in Mauritius
A Sukhoo, A Barnard, JA Van der Poll, MM Eloff
Issues in Informing Science and Information Technology 2, 671-690, 2006
192006
Psychosocial risks: Can their effects on the security of information systems really be ignored?
ED Frangopoulos, MM Eloff, LM Venter
Information Management & Computer Security 21 (1), 53-65, 2013
182013
Psychosocial Risks: can their effects on the Security of Information Systems really be ignored?.
ED Frangopoulos, MM Eloff, LM Venter
6th International Symposium on Human Aspects of Information Security …, 2012
182012
Information Security: Process Evaluation and Product
MM ELOFF, SH VONSOLMS
Information Security for Global Information Infrastructures: IFIP TC11 …, 2000
16*2000
Accessible computer interaction for people with disabilities: The case of quadriplegics
P Kotzé, MM Eloff, A Adesina-Ojo
6th International Conference on Enterprise Information Systems, Porto …, 2004
142004
Digital forensics: a multi-dimensional discipline
CP Grobler, B Louwrens, J Eloff, L Labuschagne, M Eloff, R Venter
Proceedings of the ISSA 2006 from Insight to Foresight Conference. Pretoria …, 2006
132006
Too many laws but very little progress! Is South African highly acclaimed information security legislation redundant?
R Dagada, MM Eloff, LM Venter
Proceedings of the ISSA 2009 Conference, 327-346, 2009
12*2009
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20