- Methods
Opportunities & Approaches
Showing 5 articles tagged with Reuse or Security
Title | Topic | Author | Date | Reading time |
---|---|---|---|---|
Opportunities & ApproachesRe-Use of Requirements via Libraries:Opportunities & Approaches |
Methods
|
30.04.2014 | 9 minutes | |
Cyber Security Requirements EngineeringHands-on guidance for developing and managing security requirements |
Practice
Methods
|
29.10.2015 | 14 minutes | |
Building in security instead of testing it inEliciting security requirements needs a different process |
Practice
|
30.04.2015 | 14 minutes | |
Mission PossibleConcept for the successful handling of integral NFRs in Scaled Agile Environments. |
Practice
Cross-discipline
|
14.12.2022 | 11 minutes | |
Requirements ReuseRequirements Reuse with the PABRE Framework |
Studies and Research
|
30.01.2014 | 22 minutes |