Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Walid Al-Ahmad"'
Autor:
Abedallah Al-Oqaili, Walid Al-Ahmad
Publikováno v:
Journal of King Saud University - Computer and Information Sciences. 25:229-240
Outsourcing information systems services is considered a strategic decision for many organizations because it is a risky endeavor. When issues arise during the outsourcing process, many organizations tend to switch their operations from external vend
Autor:
Walid Al-Ahmad
Publikováno v:
International Journal of Information Technology Project Management. 3:56-71
Traditionally, project success/failure is considered only after the project is completed or cancelled. Integrating project success and failure factors knowledge and software engineering activities would result in a situation where project success/fai
Autor:
Walid Al-Ahmad
Publikováno v:
International Journal of Secure Software Engineering. 2:63-76
Security is an important and challenging aspect that needs to be considered at an early stage during software development. Traditional software development methodologies do not deal with security issues and so there is no structured guidance for secu
Publikováno v:
Journal of Computer Science. 4:565-570
Problem statement: Routers are very important components in any network. They control and organize the in-bound traffic and the out-bound traffic. Controlling a router by an intruder leaves the entire network unsecured. In different studies, Router s
Autor:
Walid Al-Ahmad, Basil Mohammed
Publikováno v:
InfoSec
A low-level code of practice is presented in this paper to help information security (IS) risk management professionals manage enterprise IS risks effectively and efficiently using COBIT 5 framework1. The proposed code of practice is the result of th
Autor:
Walid Al-Ahmad
Publikováno v:
Journal of the Franklin Institute. 343:532-544
There are several language constructs and mechanisms that provide some sort of support for conceptual modeling in object-oriented programming: the Liskov substitution principle, the Meyer programming by contract, the Beta inner construct, interfaces
Autor:
Walid Al-Ahmad
Security is an important and challenging aspect that needs to be considered at an early stage during software development. Traditional software development methodologies do not deal with security issues and so there is no structured guidance for secu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::69719b57988da4cfb4b0a9db9e57f7ef
https://doi.org/10.4018/978-1-4666-2482-5.ch010
https://doi.org/10.4018/978-1-4666-2482-5.ch010
Autor:
Walid Al-Ahmad, R. Al-Kaabi
Publikováno v:
ISI
Many governments have delivered their services in ways that meet the desires of the citizens and businesses they serve, enabling them to interact securely in places and at times that are convenient for them. E-government is one of the most important
Autor:
Eric Steegmans, Walid Al-Ahmad
Publikováno v:
TOOLS (31)
In this paper, we present a new approach to integrate the two views of inheritance, conceptual modeling and code reuse. These two viewpoints are usually at odds i.e. to maximize reuse one should sacrifice modeling and vice versa. The integration of t
Autor:
Walid Al-Ahmad
Publikováno v:
AICCSA
Both the Liskov substitution principle (LSP) and Meyer programming by contract (MPG) are powerful and useful mechanisms to ensure semantic compatibility of subclasses with superclasses. When applied, they lead to more correct inheritance hierarchies