Secure Appreciative Inquiry Fuzzy Quantification Technique For Quantifying Software Security Requirements
Software developers generally focused on the core’s functions and features, but the security was only addressed as afterthought even though it was too late. The lack of proper consideration of security requirements during the early stages may lead to the development of an application with a poor sec...
Saved in:
Similar Items
-
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016) -
Securities regulation and the prevention of securities fraud : a comparative study /
by: Engku Rabiah Adawiah Engku Ali
Published: (1998) -
Wireless home security system / Mohammad Firdaus Azizan
by: Azizan, Mohammad Firdaus
Published: (2012) -
Defence and security in Asean /
by: Zainal Hasfi Hashim
Published: (1994) -
Automated intrusion prevention mechanism in enhancing network security /
by: He, Xiao Dong
Published: (2008)