Information security: Process evaluation and product evaluation

  • M. M. Eloff
  • , S. H. von Solms

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Fingerprint

Dive into the research topics of 'Information security: Process evaluation and product evaluation'. Together they form a unique fingerprint.
Sort by

Computer Science

Keyphrases