Security practices in scrum method
| Main Author: | Azham, Zulkarnain |
|---|---|
| Format: | Thesis |
| Published: |
2012
|
| Subjects: |
Similar Items
Method and tool to generate requirement traceability Matrix for scrum development methodology
by: Duraisamy, Gunavathi
Published: (2014)
by: Duraisamy, Gunavathi
Published: (2014)
A qualitative study on best practices and process of eliciting unambiguous quality attributes in scrum-based projects
by: Mahmoud, Hussin Ahmed Abdelkader
Published: (2022)
by: Mahmoud, Hussin Ahmed Abdelkader
Published: (2022)
Applying scrum methodologies in the development of e-directory system for ASWARA
by: Mohd. Nazeri, Nor Hafizah
Published: (2017)
by: Mohd. Nazeri, Nor Hafizah
Published: (2017)
Enhancing task management in scrum-agile using hybrid requirement prioritization technique
by: Che Wil, Che Suhana
Published: (2019)
by: Che Wil, Che Suhana
Published: (2019)
Testing model using risk poker technique for scrum-based software development projects / Siti Noor Hasanah Ghazali
by: Siti Noor Hasanah , Ghazali
Published: (2017)
by: Siti Noor Hasanah , Ghazali
Published: (2017)
Secure blood bag labeling via 2d barcode authentication
by: Subramaniam, Asvhini
Published: (2012)
by: Subramaniam, Asvhini
Published: (2012)
Intrusion Alert Quality Framework For
Security False Alert Reduction
by: Abu Bakar, Najwa
Published: (2007)
by: Abu Bakar, Najwa
Published: (2007)
Ekspresi Reseptor Retinoid X (Α Dan Β) Dalam Diabetes Autoimun.
by: Mustapha, Zulkarnain
Published: (2005)
by: Mustapha, Zulkarnain
Published: (2005)
An empirical study of the information security awareness model in Oman
by: Al Shanfari, Issam Shaaban Moshaded
Published: (2023)
by: Al Shanfari, Issam Shaaban Moshaded
Published: (2023)
Steganography for securing image data using hybrid SLT and DCT
by: Rachmawanto, Eko Hari
Published: (2012)
by: Rachmawanto, Eko Hari
Published: (2012)
A New Router Certification Authority
Protocol For Securing Mobile Internet
Protocol Version 6
by: Abdul Hadi Ali Alsalihy, Wafaa
Published: (2007)
by: Abdul Hadi Ali Alsalihy, Wafaa
Published: (2007)
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
by: Fatin Nabila , Abd Latiff
Published: (2021)
by: Fatin Nabila , Abd Latiff
Published: (2021)
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000)
by: Al-Qdah, Majdi Taysir
Published: (2000)
Information quality structure framework in developing an information security management system (ISMS)
by: Palaniappan, P Siva Shamala
Published: (2017)
by: Palaniappan, P Siva Shamala
Published: (2017)
Solving fractional diffusion equation using variational iteration method and adomian decomposition method
by: Dzulkarnain, Norizkiah
Published: (2013)
by: Dzulkarnain, Norizkiah
Published: (2013)
A Template-Based Approach To Write Complete Security Requirements For Software Development Environment
by: Mustafa, Nuridawati
Published: (2020)
by: Mustafa, Nuridawati
Published: (2020)
A model of artificial intelligence in cyber security of scada to enhance public safety in UAE
by: Alhashmi, Omar
Published: (2023)
by: Alhashmi, Omar
Published: (2023)
Numerical solution of one dimensional burgers’ equation solving with explicit FTCS method and implcit BTCS method
by: Azmi, Nurfarhana
Published: (2017)
by: Azmi, Nurfarhana
Published: (2017)
A new human-centric model of airport smart security system to enhance the passenger experience
by: Almarri, Ghalib Abdulla
Published: (2021)
by: Almarri, Ghalib Abdulla
Published: (2021)
Finite element method for beam bending problem
by: Abdullah Sani, Sarah A'Fifah
Published: (2012)
by: Abdullah Sani, Sarah A'Fifah
Published: (2012)
The application of finite element method in burgers’ equation
by: Adnan, Nurul Akidah
Published: (2013)
by: Adnan, Nurul Akidah
Published: (2013)
Security Analysis Techniques Using Differential Relationships For Block Ciphers
by: Buja, Alya Geogiana
Published: (2018)
by: Buja, Alya Geogiana
Published: (2018)
Secure unlinkability schemes for privacy preserving data publishing in weighted social networks / Chong Kah Meng
by: Chong , Kah Meng
Published: (2020)
by: Chong , Kah Meng
Published: (2020)
Characterization of calcium oxide prepared by hydration-dehydration method
by: Wahab, Nuruhuda
Published: (2010)
by: Wahab, Nuruhuda
Published: (2010)
Secure software development practice selection model
by: Kanniah, Sri Lakshmi
Published: (2020)
by: Kanniah, Sri Lakshmi
Published: (2020)
A Framework For Classification Software Security Using Common Vulnerabilities And Exposures
by: Hassan, Nor Hafeizah
Published: (2018)
by: Hassan, Nor Hafeizah
Published: (2018)
Identify Human Error In Using Mobile Device That Lead To Security Threat
by: Abdul Mubin, Norzul Masri
Published: (2017)
by: Abdul Mubin, Norzul Masri
Published: (2017)
Unstructured grid using triangular elements for finite element method
by: Sapar , Sakilah
Published: (2010)
by: Sapar , Sakilah
Published: (2010)
Parallel calculation of differential quadrature method for the burgers-huxley equation
by: Ng, Su Ling
Published: (2010)
by: Ng, Su Ling
Published: (2010)
Elzaki transform homotopy perturbation method for partial differential equations
by: Zulkiflee, Fasihah
Published: (2017)
by: Zulkiflee, Fasihah
Published: (2017)
Parametric and semiparametric estimation methods for bivariate copula in rainfall application
by: Mohd. Lokoman, Rahmah
Published: (2017)
by: Mohd. Lokoman, Rahmah
Published: (2017)
Parametric and semiparametric estimation methods for bivariate copula in rainfall application
by: Mohd. Lokoman, Rahmah
Published: (2017)
by: Mohd. Lokoman, Rahmah
Published: (2017)
Practical Development Of An Open Architecture Personal Computer-Based Numerical Control (Oapc-Nc) System
by: Pang, Tze Hong
Published: (2005)
by: Pang, Tze Hong
Published: (2005)
Solving job shop scheduling problem using the method of simulated annealing
by: Ramdzan, Nur Amira
Published: (2012)
by: Ramdzan, Nur Amira
Published: (2012)
Determination of heavy metals in hair of sanitation workers using the method of EDXRF
by: Md. Khudzari, Jauharah
Published: (2010)
by: Md. Khudzari, Jauharah
Published: (2010)
Parameters estimation of holt-winter smoothing method using genetic algorithm
by: Mohd. Azmi, Nur Intan Liyana
Published: (2013)
by: Mohd. Azmi, Nur Intan Liyana
Published: (2013)
Parallelization technique of two dimensional heat problem using finite element method
by: Mansor, Nur Hidayah
Published: (2010)
by: Mansor, Nur Hidayah
Published: (2010)
Theory of bichromatic wave groups amplitude amplification using implicit variational method
by: Tan, Wooi Nee
Published: (2006)
by: Tan, Wooi Nee
Published: (2006)
Finite difference method for numerical solution of a generalized burgers-huxley equation
by: Mohamed Daud, Nuraisyah
Published: (2017)
by: Mohamed Daud, Nuraisyah
Published: (2017)
Multiscale finite element method for pde constrained optimization in high gradient problems
by: Akeremale, Olusola Collins
Published: (2022)
by: Akeremale, Olusola Collins
Published: (2022)
Similar Items
-
Method and tool to generate requirement traceability Matrix for scrum development methodology
by: Duraisamy, Gunavathi
Published: (2014) -
A qualitative study on best practices and process of eliciting unambiguous quality attributes in scrum-based projects
by: Mahmoud, Hussin Ahmed Abdelkader
Published: (2022) -
Applying scrum methodologies in the development of e-directory system for ASWARA
by: Mohd. Nazeri, Nor Hafizah
Published: (2017) -
Enhancing task management in scrum-agile using hybrid requirement prioritization technique
by: Che Wil, Che Suhana
Published: (2019) -
Testing model using risk poker technique for scrum-based software development projects / Siti Noor Hasanah Ghazali
by: Siti Noor Hasanah , Ghazali
Published: (2017)