Software protection through dedicated hardware

Download
1996
Rayis, Osama

Suggestions

Software process improvement in a software development environment
Konuralp, Zeynep; Bilgen, Semih; Department of Electrical and Electronics Engineering (2007)
A software process improvement study is presented. The literature on software development processes and their improvement is reviewed. The current peer review process at Software Engineering Directorate of the X Company, Ankara, Türkiye (XCOM) is studied and the static software development metrics based on a recent proposal have been evaluated. The static software metrics based improvement suggestions and the author’s improvement suggestions discussed with the senior staff are compared. An improved peer rev...
Software process improvement based on static process evaluation
Seçkin, Haldun; Bilgen, Semih; Department of Electrical and Electronics Engineering (2006)
This study investigates software development process improvement approaches. In particular, the static process evaluation methodology proposed by S. Güceğlioğlu is applied on the requirements analysis and validation process applied in Project X in MYCOMPANY and an improved process is proposed. That methodology is an extension of the ISO/IEC 9126 approach for software quality assessment, and is based on evaluating a set of well-defined metrics on the static model of software development processes. The improv...
Software development on a microprocessor based two-axis CNC system
User, A. Murat; Eskicioğlu, Hakkı; Department of Mechanical Engineering (1987)
Access control in windows/netware environment
Yağdereli, Eray; Oğuztüzün, Halit; Department of Computer Engineering (1997)
DATABASE SECURITY IN PRIVATE DATABASE CLOUDS
Cinar, Onur; Guncer, R. Haluk; Yazıcı, Adnan (2016-12-22)
Cloud computing and cloud systems are very popular in today's Information Technology (IT) and systems and have grown very quickly. Cloud computing helps organizations solve increasing IT costs such as their licenses, power consumption, physical protection, by providing better standardization, higher benefit, greater performance, and quicker responses of information services. Carrying vital importance for our private and secret information, cloud systems must provide extra security solutions for database sys...
Citation Formats
O. Rayis, “Software protection through dedicated hardware,” Middle East Technical University, 1996.