9781118579916

Securization techniques of Software-based Equipment

by
  • ISBN13:

    9781118579916

  • ISBN10:

    1118579917

  • Edition: 1st
  • Format: eBook
  • Copyright: 1/30/2013
  • Publisher: Wiley-ISTE

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $59!
    Your order must be $59 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now

Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Summary

We will present in this book the principles of securization of software-based equipment. At first, we will present the definition principles of security objectives. Secondly, we will show how it is possible to define a security architecture (including redundancy, diversification, error-detection techniques) on the basis of security objectives and how to identify objectives related to software programs. From software objectives, we will present the different securization techniques (fault detection, redundancy and quality control). The book will take the “certifiable system” aspects into account.

Table of Contents

Chapter 1 – Decomposition, from system to software

Chapter 2 – Certifiable system

Chapter 3 – Risk and security level

Chapter 4 – Securization principles of a hardware architecture

Chapter 5 – Principles of software securization

Chapter 6 – Certification

Conclusion

Rewards Program

Write a Review