@inbook{RID:0814170417398-29,
title = {Proceedings of the ISSA 2014 Conference 13-14 August 2014 Radisson Blu Gautrain Hotel Sandton Johannesburg South Africa Introduction},
chapter = {},
pages = {},
publisher = {},
year = {2014},
author = {Venter, Hein and Loock, Marianne and Coetzee, Marijke and Eloff, Mariki},
editor = {},
booktitle = {2014 Information Security For South Africa (Issa)}
}
2014
Requirements for preparing the cloud to become ready for digital forensic investigation
@article{Venter2014,title = {Requirements for preparing the cloud to become ready for digital forensic investigation},journal = {European Conference on Information Warfare and Security, ECCWS},year = {2014},volume = {2014-January},pages = {242-250},author = {Dlamini, M. and Venter, H. and Eloff, J. and Eloff, M.}}
2014
Security issues in the security cyber supply chain in South Africa
@article{RID:0814170417398-24,
title = {Security issues in the security cyber supply chain in South Africa},
journal = {Technovation},
year = {2014},
author = {Venter, Hein S.},
volume = {34},
number = {7},
pages = {392-393}
}
@inbook{RID:0814170417399-25,
title = {Social Engineering Attack Framework},
chapter = {},
pages = {},
publisher = {},
year = {2014},
author = {Mouton, Francois and Malan, Mercia M. and Leenen, Louise and Venter, H. S.},
editor = {},
booktitle = {2014 Information Security For South Africa (Issa)}
}
@article{Venter2014,title = {Social engineering attack framework},journal = {2014 Information Security for South Africa - Proceedings of the ISSA 2014 Conference},year = {2014},author = {Mouton, F. and Malan, M.M. and Leenen, L. and Venter, H.S.}}