The 10 deadly sins of information security management B Von Solms, R Von Solms Computers & security 23 (5), 371-376, 2004 | 424 | 2004 |
On blind signatures and perfect crimes S Von Solms, D Naccache Computers & Security 11 (6), 581-583, 1992 | 324 | 1992 |
Information security-The third wave? BV Solms Computers & security 19 (7), 615-615, 2000 | 284 | 2000 |
Information Security governance: COBIT or ISO 17799 or both? B Von Solms Computers & Security 24 (2), 99-104, 2005 | 276 | 2005 |
From policies to culture R Von Solms, B Von Solms Computers & security 23 (4), 275-279, 2004 | 258 | 2004 |
Information security–the fourth wave B Von Solms Computers & security 25 (3), 165-168, 2006 | 227 | 2006 |
Information security—a multidimensional discipline B Von Solms Computers & security 20 (6), 504-508, 2001 | 216 | 2001 |
Information Security Governance–compliance management vs operational management SHB von Solms Computers & Security 24 (6), 443-447, 2005 | 198 | 2005 |
Cyber security for home users: A new way of protection through awareness enforcement E Kritzinger, SH von Solms Computers & Security 29 (8), 840-847, 2010 | 172 | 2010 |
Corporate governance and information security B Von Solms Computers & Security 20 (3), 215-218, 2001 | 155 | 2001 |
Information Security Governance: a model based on the direct–control cycle R Von Solms, SHB von Solms Computers & Security 25 (6), 408-412, 2006 | 132 | 2006 |
Information security management: a hierarchical framework for various approaches MM Eloff, SH von Solms Computers & Security 19 (3), 243-256, 2000 | 132 | 2000 |
From information security to… business security? B Von Solms, R Von Solms Computers & security 24 (4), 271-273, 2005 | 121 | 2005 |
Information security governance SH Solms, R Solms Springer Science & Business Media, 2008 | 119 | 2008 |
Information security management: An approach to combine process certification and product evaluation MM Eloff, SH Von Solms Computers & Security 19 (8), 698-709, 2000 | 109 | 2000 |
A taxonomy for secure object-oriented databases MS Olivier, SH Von Solms ACM Transactions on Database Systems (TODS) 19 (1), 3-46, 1994 | 95 | 1994 |
A framework for information security evaluation R von Solms, H Van Der Haar, SH von Solms, WJ Caelli Information & Management 26 (3), 143-153, 1994 | 71 | 1994 |
The management of computer security profiles using a role-oriented approach SH Von Solms, I Van Der Merwe Computers and Security 13 (8), 673-680, 1994 | 70 | 1994 |
A multi-component view of digital forensics CP Grobler, CP Louwrens, SH von Solms 2010 International Conference on Availability, Reliability and Security, 647-652, 2010 | 65 | 2010 |
Hypermedia, multimedia and hypertext: definitions and overview H Bornman, SH Von Solms The electronic library, 1993 | 62 | 1993 |