Search
for Author
All Reviews
Debbabi, Mourad
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
4
of
4
reviews
Cloud security auditing
Majumdar S., Madi T., Wang Y., Tabiban A., Oqaily M., Alimohammadifar A., Jarraya Y., Pourzandi M., Wang L., Debbabi M., Springer International Publishing, New York, NY, 2019. 166 pp. Type: Book (978-3-030231-27-9)
Information technology (IT) systems auditing is important for good corporate governance, and essential where there is a need to formally demonstrate compliance with legislation and regulatory requirements. Information security manageme...
...
Jan 28 2020
Verification and validation in systems engineering: assessing UML/SysML design models
Debbabi M., Hassaïne F., Jarraya Y., Soeanu A., Alawneh L., Springer-Verlag New York, Inc., New York, NY, 2010. 270 pp. Type: Book (978-3-642152-27-6)
The five authors of this book tackle a very difficult subject, and must be commended for doing so. The result is a welcome addition to the body of professional literature. Unfortunately, I must add a “however.”...
...
May 10 2011
Embedded Java security: security for mobile devices
Debbabi M., Saleh M., Talhi C., Zhioua S., Springer-Verlag New York, Inc., Secaucus, NJ, 2006. 220 pp. Type: Book (9781846285905)
The widespread use of mobile and wireless devices, such as phones and personal digital assistants (PDA), offers great opportunities for deploying mobile applications. Whenever software is downloaded or shared, or when sensitive data is...
...
Feb 11 2008
A selective dynamic compiler for embedded Java virtual machines targeting ARM processors
Debbabi M., Gherbi A., Mourad A., Yahyaoui H. Science of Computer Programming 59(1-2): 38-63, 2006. Type: Article
Resource constrained embedded environments require an efficient, fast, and small Java Virtual Machine (JVM). There are many paths to such a JVM; one path involves adding threaded code and hot spot compilation to a JVM for embedded syst...
...
Aug 17 2006
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy