Secure Appreciative Inquiry Fuzzy Quantification Technique For Quantifying Software Security Requirements

Software developers generally focused on the core’s functions and features, but the security was only addressed as afterthought even though it was too late. The lack of proper consideration of security requirements during the early stages may lead to the development of an application with a poor sec...

全面介紹

Saved in:
書目詳細資料
主要作者: Omar Isam Homaidi Al Mrayat
格式: Thesis
語言:en_US
主題:
在線閱讀:https://oarep.usim.edu.my/bitstreams/47d76fb4-a625-43c5-8766-4cec0b78679b/download
https://oarep.usim.edu.my/bitstreams/47c5d0d0-e00e-469f-aad2-6628647e4939/download
https://oarep.usim.edu.my/bitstreams/bfa8758e-b4f7-4e5b-bfe6-97b5e4d6b7fe/download
https://oarep.usim.edu.my/bitstreams/009ecc46-9c0e-4d01-9940-bbcd37f5dcce/download
https://oarep.usim.edu.my/bitstreams/5b1b185d-fe16-496b-a36d-ced0312f252b/download
https://oarep.usim.edu.my/bitstreams/c3c17d35-2b08-4ff7-a360-25b80c00dbe4/download
https://oarep.usim.edu.my/bitstreams/975c6811-eeaa-42e7-86f6-d43c8c6a633e/download
https://oarep.usim.edu.my/bitstreams/ba47c75c-1624-4779-9edc-a1b3b2daefa8/download
https://oarep.usim.edu.my/bitstreams/fd0ada8d-090b-412e-a914-eca68c07a25b/download
https://oarep.usim.edu.my/bitstreams/a7d5b5b2-1378-410b-94fc-1517b40326a0/download
https://oarep.usim.edu.my/bitstreams/4b68d46d-fcca-4cac-a589-1c7b6930cd39/download
https://oarep.usim.edu.my/bitstreams/8028d147-94bc-4963-9bf0-2af5c63f1130/download
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!