700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ ReadersThis Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)
Research Article Open Access
Now days the software Development is the most powerful area in the field of “Information Technology”. Most of the people choose Waterfall model, Spiral model & agile model for software development. If we will use Waterfall model & if we will not secured the phases of Waterfall model then it will leads to breach in software development. So to avoid this & to secure different phases of SDLC the paper is written into which the methodologies of Secure SDLC are studied by creating software requirements, Designing software securely, implementing secure software, assuring software quality and deploying software with security.
To read the full article Peer-reviewed Article PDF
Author(s): Y.C.Kulkarni , Dr. S.D.Joshi
Software, Security, SDLC, Digital Signal Processing,Satellite Communication,Diagnosis and Sensing Systems,Control Theory and Application,Bio Electronics