LEADER 03733nam 2200601 a 450 001 9910825784103321 005 20240313214233.0 010 $a1-118-57861-9 010 $a1-118-57991-7 010 $a1-118-57865-1 035 $a(CKB)2670000000369864 035 $a(EBL)1187169 035 $a(OCoLC)843331672 035 $a(SSID)ssj0000904892 035 $a(PQKBManifestationID)11494814 035 $a(PQKBTitleCode)TC0000904892 035 $a(PQKBWorkID)10922416 035 $a(PQKB)11018759 035 $a(MiAaPQ)EBC1187169 035 $a(Au-PeEL)EBL1187169 035 $a(CaPaEBR)ebr10700376 035 $a(CaONFJC)MIL491909 035 $a(EXLCZ)992670000000369864 100 $a20121210d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSafety management for software-based equipment /$fJean-Louis Boulanger 205 $a1st ed. 210 $aHoboken, N.J. $cISTE Ltd./John Wiley and Sons Inc.$d2013 215 $a1 online resource (193 p.) 225 1 $aFocus series in computer engineering and IT,$x2051-2481 300 $aDescription based upon print version of record. 311 $a1-84821-452-9 320 $aIncludes bibliographical references and index. 327 $aCONTENTS; INTRODUCTION; CHAPTER 1. SAFETY MANAGEMENT; 1.1.Introduction; 1.2.Dependability; 1.3.Conclusion; 1.4.Bibliography; CHAPTER 2. FROM SYSTEM TO SOFTWARE; 2.1.Introduction; 2.2 Systems of command and control; 2.3 System; 2.4 Software implementation; 2.5.Conclusion; 2.6.Bibliography; 2.7.Glossary; CHAPTER 3. CERTIFIABLE SYSTEMS; 3.1. Introduction; 3.2. Normative context; 3.3.Conclusion; 3.4.Bibliography; 3.5.Glossary; CHAPTER 4. RISK AND SAFETY LEVELS; 4.1. Introduction; 4.2. Basic definitions; 4.3.Safety implementation; 4.4. In standards IEC 61508 and IEC 61511; 4.5.Conclusions 327 $a4.6.Bibliography4.7.Acronyms; CHAPTER 5. PRINCIPLES OF HARDWARE SAFETY; 5.1. Introduction; 5.2 Safe and/or available hardware; 5.3.Reset of a processing unit; 5.4. Presentation of safety control techniques; 5.5. Conclusion; 5.6.Bibliography; 5.7.Glossary; CHAPTER 6. PRINCIPLES OF SOFTWARE SAFETY; 6.1. Introduction; 6.2. Techniques to make software application safe; 6.3.Other forms of diversification; 6.4.Overall summary; 6.5.Quality management; 6.6.Conclusion; 6.7.Bibliography; 6.8.Glossary; CHAPTER 7. CERTIFICATION; 7.1. Introduction; 7.2. Independent assessment; 7.3. Certification 327 $a7.4. Certification in the rail sector7.5.Automatic systems; 7.6.Aircraft; 7.7. Nuclear; 7.8. Automotive; 7.9. Spacecraft; 7.10.Safety case; 7.11. Conclusion; 7.12. Bibliography; 7.13. Glossary; CONCLUSION; INDEX 330 $aA review of the principles of the safety of software-based equipment, this book begins by presenting the definition principles of safety objectives. It then moves on to show how it is possible to define a safety architecture (including redundancy, diversification, error-detection techniques) on the basis of safety objectives and how to identify objectives related to software programs. From software objectives, the authors present the different safety techniques (fault detection, redundancy and quality control). "Certifiable system" aspects are taken into account throughout the book. C 410 0$aFocus series in computer engineering and IT. 606 $aComputer security 615 0$aComputer security. 676 $a621.392 700 $aBoulanger$b Jean-Louis$0847395 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910825784103321 996 $aSafety management for software-based equipment$93968306 997 $aUNINA