Information security: Process evaluation and product evaluation

M. M. Eloff, S. H. von Solms

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Fingerprint

Dive into the research topics of 'Information security: Process evaluation and product evaluation'. Together they form a unique fingerprint.

Computer Science

Keyphrases