An overview of information system development methodlogies and an application by sturctured design methodology.

1985
Akyokuş, Selim

Suggestions

An overview of security attacks and countermeasures in osi-based computer networks.
Uslu, Zinnur; Tolun, Mehmet R.; Department of Computer Engineering (1988)
An overview of advances in combinatorial optimization related topics
Martello, Silvano; Weber, Gerhard Wilhelm; KASIMBEYLİ, REFAİL (2013-10-01)
An overview of trace based public key cryptography over finite fields
Akyıldız, Ersan (2014-03-15)
The Discrete Log Problem (DLP), that is computing x, given y = alpha(x) and (alpha) = G subset of F-q*, based Public Key Cryptosystem (PKC) have been studied since the late 1970's. Such development of PKC was possible because of the trapdoor function! : Z(l) -> G = (alpha) subset of F-q*, f (m) = alpha(m) is a group homomorphism. Due to this fact we have; Diffie Hellman (DH) type key exchange, EIGamal type message encryption, and Nyberg-Rueppel type digital signature protocols. The cryptosystems based on th...
An overview of the role of retrofitted instruments in dam safety
Yanmaz, Ali Melih (null; 2008-09-15)
An overview of integrating globalization and internationalization in teacher education context
Budak, Yusuf; Çakmak, Melek; Gündüz, Müge (Waxmann Verlag Muenster/New York, 2015-01-01)
Citation Formats
S. Akyokuş, “An overview of information system development methodlogies and an application by sturctured design methodology.,” Middle East Technical University, 1985.