Assessment Method of Step-by-Step Cyber Security in the Software Development Life Cycle

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Development and Assessment of Computerized Software for Nursing Process: a Step toward Promotion of Nursing Education and Care

  Abstract     Introduction : Electronic technology has been developed in health system like other areas. Application of electronic software for nursing process can facilitate this service. Foreign software cannot be an appropriate one for domestic use in terms of its language, clinical situations, cultural factors, and social variables. As a result, the aim of this study is to design and asses...

متن کامل

Secure Coding: Building Security into the Software Development Life Cycle

any of the security properties that are outlined repeatedly in the newer regulations and standards can easily be side-stepped. Too often the culprits are unsophisticated software development techniques, a lack of securityfocused quality assurance, and scarce security training for software developers, software architects, and project managers. To meet future needs, opportunities, and threats ass...

متن کامل

Using Software in Qualitative Research: A Step-by-Step Guide

This chapter introduces the eclectic field of Computer Assisted Qualitative Data AnalysiS (CAQDAS) in the context of qualitative research methodology and the techniques of analysis generally. We discuss the practicalities of research in the software context, outline some basic principles and distinctions which resonate throughout the book; discuss software developments, debates and functionalit...

متن کامل

A step-by-step dual cycle sequencing method for unit-load automated storage and retrieval systems

Résumé : The sequencing of requests in an automated storage and retrieval system was the subject of many studies in literature. However, these studies assumed that the locations of items to be stored and retrieved are known and the sequencing problem consisted in determining a route of minimal travel time between these locations. In reality, for a retrieval request, an item can be in multiple l...

متن کامل

Adopting Knowledge Based Security System for Software Development Life Cycle

The high-demand from the software industry led to the development of many Software Development Life Cycle (SDLC) models that help produce high quality software within budget and time constraints. Most of these SDLC models do not completely cover security as early as possible in the development cycle. Since security is a major concern to the users and the developers, adopting it at the early sta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology

سال: 2015

ISSN: 1598-3986

DOI: 10.13089/jkiisc.2015.25.2.363