Secure Appreciative Inquiry Fuzzy Quantification Technique For Quantifying Software Security Requirements

Software developers generally focused on the core’s functions and features, but the security was only addressed as afterthought even though it was too late. The lack of proper consideration of security requirements during the early stages may lead to the development of an application with a poor sec...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Omar Isam Homaidi Al Mrayat
التنسيق: أطروحة
اللغة:en_US
الموضوعات:
الوصول للمادة أونلاين:https://oarep.usim.edu.my/bitstreams/47d76fb4-a625-43c5-8766-4cec0b78679b/download
https://oarep.usim.edu.my/bitstreams/47c5d0d0-e00e-469f-aad2-6628647e4939/download
https://oarep.usim.edu.my/bitstreams/bfa8758e-b4f7-4e5b-bfe6-97b5e4d6b7fe/download
https://oarep.usim.edu.my/bitstreams/009ecc46-9c0e-4d01-9940-bbcd37f5dcce/download
https://oarep.usim.edu.my/bitstreams/5b1b185d-fe16-496b-a36d-ced0312f252b/download
https://oarep.usim.edu.my/bitstreams/c3c17d35-2b08-4ff7-a360-25b80c00dbe4/download
https://oarep.usim.edu.my/bitstreams/975c6811-eeaa-42e7-86f6-d43c8c6a633e/download
https://oarep.usim.edu.my/bitstreams/ba47c75c-1624-4779-9edc-a1b3b2daefa8/download
https://oarep.usim.edu.my/bitstreams/fd0ada8d-090b-412e-a914-eca68c07a25b/download
https://oarep.usim.edu.my/bitstreams/a7d5b5b2-1378-410b-94fc-1517b40326a0/download
https://oarep.usim.edu.my/bitstreams/4b68d46d-fcca-4cac-a589-1c7b6930cd39/download
https://oarep.usim.edu.my/bitstreams/8028d147-94bc-4963-9bf0-2af5c63f1130/download
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!