Securization Techniques of Software-Based Equipment

  • ISBN13:


  • ISBN10:


  • Format: Hardcover
  • Copyright: 5/20/2013
  • Publisher: Iste/Hermes Science Pub
  • Purchase Benefits
  • Free Shipping On Orders Over $59!
    Your order must be $59 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $100.95 Save up to $4.04
  • Buy New
    Add to Cart Free Shipping


Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.


We will present in this book the principles of securization of software-based equipment. At first, we will present the definition principles of security objectives. Secondly, we will show how it is possible to define a security architecture (including redundancy, diversification, error-detection techniques) on the basis of security objectives and how to identify objectives related to software programs. From software objectives, we will present the different securization techniques (fault detection, redundancy and quality control). The book will take the "certifiable system" aspects into account.

Table of Contents

Chapter 1 – Decomposition, from system to software

Chapter 2 – Certifiable system

Chapter 3 – Risk and security level

Chapter 4 – Securization principles of a hardware architecture

Chapter 5 – Principles of software securization

Chapter 6 – Certification


Rewards Program

Write a Review