MARC details
000 -LEADER |
fixed length control field |
02257cam a2200313 a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
EG-GiCUC |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
190526s2018 ua dh f m 000 0 eng d |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
EG-GiCUC |
Language of cataloging |
eng |
Transcribing agency |
EG-GiCUC |
041 0# - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng |
049 ## - LOCAL HOLDINGS (OCLC) |
Holding library |
Deposite |
097 ## - Thesis Degree |
Thesis Level |
M.Sc |
099 ## - LOCAL FREE-TEXT CALL NUMBER (OCLC) |
Classification number |
Cai01.18.02.M.Sc.2018.In.I |
100 0# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Inas Abdelmonem Abbas |
245 13 - TITLE STATEMENT |
Title |
An integrative study of selected information security techniques in ISO/IEC and CMMI-DEV standards / |
Statement of responsibility, etc. |
Inas Abdelmonem Abbas ; Supervised Hesham Hefny , Abdelaziz A. Abdelaziz |
246 15 - VARYING FORM OF TITLE |
Title proper/short title |
ISO27001 & CMMI-DEV دراسة تكاملية فى بعض التقنيات المختارة من معايير تأمين المعلومات في |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Cairo : |
Name of publisher, distributor, etc. |
Inas Abdelmonem Abbas , |
Date of publication, distribution, etc. |
2018 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
140 Leaves : |
Other physical details |
charts , facsimiles ; |
Dimensions |
30cm |
502 ## - DISSERTATION NOTE |
Dissertation note |
Thesis (M.Sc.) - Cairo University - Institute of Statistical Studies and Researches - Department of Computer and Information Science |
520 ## - SUMMARY, ETC. |
Summary, etc. |
In recent years, the security objective started to become a very important issue in any software project to the degree that lack of the security factor might lead to the whole project{u2019}s failure. Therefore, many studies were conducted to discuss the best ways to mitigate risks that can threaten any software project. However, most of the studies conducted in that area have analyzed the software risks from a very high level, and little of them has subjected to specific areas like the Security Requirements Engineering (SRE) risks. Even those who subjected to that area have discussed only one side of the security requirements in the software (e.g. password requirements) but they neglected the security in the requirements engineering process itself (e.g., how the requirements gathered, analyzed and documented in a secure manner). Hence, the security objective still lacks to one important side that can threaten the information security objective of the project |
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE |
Additional physical form available note |
Issued also as CD |
653 #4 - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
CMMI-DEV standards |
653 #4 - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Information security techniques |
653 #4 - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
ISO/IEC |
700 0# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Abdelaziz A. Abdelaziz , |
Relator term |
|
700 0# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Hesham Hefny , |
Relator term |
|
905 ## - LOCAL DATA ELEMENT E, LDE (RLIN) |
Cataloger |
Asmaa |
Reviser |
Cataloger |
905 ## - LOCAL DATA ELEMENT E, LDE (RLIN) |
Cataloger |
Nazla |
Reviser |
Revisor |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Thesis |