An integrative study of selected information security techniques in ISO/IEC and CMMI-DEV standards / Inas Abdelmonem Abbas ; Supervised Hesham Hefny , Abdelaziz A. Abdelaziz
Material type: TextLanguage: English Publication details: Cairo : Inas Abdelmonem Abbas , 2018Description: 140 Leaves : charts , facsimiles ; 30cmOther title:- ISO27001 & CMMI-DEV دراسة تكاملية فى بعض التقنيات المختارة من معايير تأمين المعلومات في [Added title page title]
- Issued also as CD
Item type | Current library | Home library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Thesis | قاعة الرسائل الجامعية - الدور الاول | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.18.02.M.Sc.2018.In.I (Browse shelf(Opens below)) | Not for loan | 01010110078231000 | |||
CD - Rom | مخـــزن الرســائل الجـــامعية - البدروم | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.18.02.M.Sc.2018.In.I (Browse shelf(Opens below)) | 78231.CD | Not for loan | 01020110078231000 |
Browsing المكتبة المركزبة الجديدة - جامعة القاهرة shelves Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | ||
Cai01.18.02.M.Sc.2018.Eb.I An improved approach for association rule extraction using fuzzy formal concept analysis / | Cai01.18.02.M.Sc.2018.Ha.E Enhancing social network data analysis using events on network of User / | Cai01.18.02.M.Sc.2018.Ha.E Enhancing social network data analysis using events on network of User / | Cai01.18.02.M.Sc.2018.In.I An integrative study of selected information security techniques in ISO/IEC and CMMI-DEV standards / | Cai01.18.02.M.Sc.2018.In.I An integrative study of selected information security techniques in ISO/IEC and CMMI-DEV standards / | Cai01.18.02.M.Sc.2018.Ma.A Automatic image tagging using facial recognition / | Cai01.18.02.M.Sc.2018.Ma.A Automatic image tagging using facial recognition / |
Thesis (M.Sc.) - Cairo University - Institute of Statistical Studies and Researches - Department of Computer and Information Science
In recent years, the security objective started to become a very important issue in any software project to the degree that lack of the security factor might lead to the whole project{u2019}s failure. Therefore, many studies were conducted to discuss the best ways to mitigate risks that can threaten any software project. However, most of the studies conducted in that area have analyzed the software risks from a very high level, and little of them has subjected to specific areas like the Security Requirements Engineering (SRE) risks. Even those who subjected to that area have discussed only one side of the security requirements in the software (e.g. password requirements) but they neglected the security in the requirements engineering process itself (e.g., how the requirements gathered, analyzed and documented in a secure manner). Hence, the security objective still lacks to one important side that can threaten the information security objective of the project
Issued also as CD
There are no comments on this title.