Assessment Method of Step-by-Step Cyber Security in the Software Development Life Cycle
نویسندگان
چکیده
منابع مشابه
Development and Assessment of Computerized Software for Nursing Process: a Step toward Promotion of Nursing Education and Care
Abstract Introduction : Electronic technology has been developed in health system like other areas. Application of electronic software for nursing process can facilitate this service. Foreign software cannot be an appropriate one for domestic use in terms of its language, clinical situations, cultural factors, and social variables. As a result, the aim of this study is to design and asses...
متن کاملSecure Coding: Building Security into the Software Development Life Cycle
any of the security properties that are outlined repeatedly in the newer regulations and standards can easily be side-stepped. Too often the culprits are unsophisticated software development techniques, a lack of securityfocused quality assurance, and scarce security training for software developers, software architects, and project managers. To meet future needs, opportunities, and threats ass...
متن کاملUsing Software in Qualitative Research: A Step-by-Step Guide
This chapter introduces the eclectic field of Computer Assisted Qualitative Data AnalysiS (CAQDAS) in the context of qualitative research methodology and the techniques of analysis generally. We discuss the practicalities of research in the software context, outline some basic principles and distinctions which resonate throughout the book; discuss software developments, debates and functionalit...
متن کاملA step-by-step dual cycle sequencing method for unit-load automated storage and retrieval systems
Résumé : The sequencing of requests in an automated storage and retrieval system was the subject of many studies in literature. However, these studies assumed that the locations of items to be stored and retrieved are known and the sequencing problem consisted in determining a route of minimal travel time between these locations. In reality, for a retrieval request, an item can be in multiple l...
متن کاملAdopting Knowledge Based Security System for Software Development Life Cycle
The high-demand from the software industry led to the development of many Software Development Life Cycle (SDLC) models that help produce high quality software within budget and time constraints. Most of these SDLC models do not completely cover security as early as possible in the development cycle. Since security is a major concern to the users and the developers, adopting it at the early sta...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology
سال: 2015
ISSN: 1598-3986
DOI: 10.13089/jkiisc.2015.25.2.363