Best practices show the way to information security maturity

6th National Conference on Process Establishment, Assessment and Improvement in Information Technology (ImproveIT 2008), Johannesburg, South Africa, 17 - 19 September 2008

[1]  Rossouw von Solms,et al.  Information security governance: Due care , 2006, Comput. Secur..

[2]  Paul Williams Information Security Governance , 2001, Inf. Secur. Tech. Rep..

[3]  Gary McGraw,et al.  On Bricks and Walls: Why Building Secure Software is Hard , 2002, Computers & security.

[4]  Luo Huai,et al.  System Security Engineering Capability Maturity Model , 2003 .

[5]  Martha Maria Lessing A model for best practice driven information security governance , 2008 .

[6]  Rolf Moulton,et al.  Applying information security governance , 2003, Comput. Secur..

[7]  Bruce Hunter Information Security: Raising Awareness , 2000 .

[8]  Rossouw von Solms,et al.  Information Security Governance - A Re-Definition , 2004, IICIS.

[9]  E. Sandstrom,et al.  Cyber security , 2005, International Symposium CIGRE/IEEE PES, 2005..

[10]  J. van Leeuwen,et al.  Information Security , 2003, Lecture Notes in Computer Science.