LEADER 03736nam 2200589 a 450 001 9910141563803321 005 20200520144314.0 010 $a1-118-57861-9 010 $a1-118-57991-7 010 $a1-118-57865-1 035 $a(CKB)2670000000369864 035 $a(EBL)1187169 035 $a(OCoLC)843331672 035 $a(SSID)ssj0000904892 035 $a(PQKBManifestationID)11494814 035 $a(PQKBTitleCode)TC0000904892 035 $a(PQKBWorkID)10922416 035 $a(PQKB)11018759 035 $a(MiAaPQ)EBC1187169 035 $a(Au-PeEL)EBL1187169 035 $a(CaPaEBR)ebr10700376 035 $a(CaONFJC)MIL491909 035 $a(EXLCZ)992670000000369864 100 $a20121210d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSafety management for software-based equipment$b[electronic resource] /$fJean-Louis Boulanger 210 $aHoboken, N.J. $cISTE Ltd./John Wiley and Sons Inc.$d2013 215 $a1 online resource (193 p.) 225 1 $aFocus series in computer engineering and IT,$x2051-2481 300 $aDescription based upon print version of record. 311 $a1-84821-452-9 320 $aIncludes bibliographical references and index. 327 $aCONTENTS; INTRODUCTION; CHAPTER 1. SAFETY MANAGEMENT; 1.1.Introduction; 1.2.Dependability; 1.3.Conclusion; 1.4.Bibliography; CHAPTER 2. FROM SYSTEM TO SOFTWARE; 2.1.Introduction; 2.2 Systems of command and control; 2.3 System; 2.4 Software implementation; 2.5.Conclusion; 2.6.Bibliography; 2.7.Glossary; CHAPTER 3. CERTIFIABLE SYSTEMS; 3.1. Introduction; 3.2. Normative context; 3.3.Conclusion; 3.4.Bibliography; 3.5.Glossary; CHAPTER 4. RISK AND SAFETY LEVELS; 4.1. Introduction; 4.2. Basic definitions; 4.3.Safety implementation; 4.4. In standards IEC 61508 and IEC 61511; 4.5.Conclusions 327 $a4.6.Bibliography4.7.Acronyms; CHAPTER 5. PRINCIPLES OF HARDWARE SAFETY; 5.1. Introduction; 5.2 Safe and/or available hardware; 5.3.Reset of a processing unit; 5.4. Presentation of safety control techniques; 5.5. Conclusion; 5.6.Bibliography; 5.7.Glossary; CHAPTER 6. PRINCIPLES OF SOFTWARE SAFETY; 6.1. Introduction; 6.2. Techniques to make software application safe; 6.3.Other forms of diversification; 6.4.Overall summary; 6.5.Quality management; 6.6.Conclusion; 6.7.Bibliography; 6.8.Glossary; CHAPTER 7. CERTIFICATION; 7.1. Introduction; 7.2. Independent assessment; 7.3. Certification 327 $a7.4. Certification in the rail sector7.5.Automatic systems; 7.6.Aircraft; 7.7. Nuclear; 7.8. Automotive; 7.9. Spacecraft; 7.10.Safety case; 7.11. Conclusion; 7.12. Bibliography; 7.13. Glossary; CONCLUSION; INDEX 330 $aA review of the principles of the safety of software-based equipment, this book begins by presenting the definition principles of safety objectives. It then moves on to show how it is possible to define a safety architecture (including redundancy, diversification, error-detection techniques) on the basis of safety objectives and how to identify objectives related to software programs. From software objectives, the authors present the different safety techniques (fault detection, redundancy and quality control). "Certifiable system" aspects are taken into account throughout the book. C 410 0$aFocus series in computer engineering and IT. 606 $aComputer security 615 0$aComputer security. 676 $a621.392 700 $aBoulanger$b Jean-Louis$0847395 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910141563803321 996 $aSafety management for software-based equipment$92180532 997 $aUNINA