LEADER 04533nam 2200505 450 001 996464436903316 005 20211130133532.0 010 $a9783030659394 010 $a3-030-65939-9 024 7 $a10.1007/978-3-030-65939-4 035 $a(CKB)4100000011781436 035 $a(DE-He213)978-3-030-65939-4 035 $a(MiAaPQ)EBC6510182 035 $a(Au-PeEL)EBL6510182 035 $a(OCoLC)1241066176 035 $a(PPN)25472602X 035 $a(EXLCZ)994100000011781436 100 $a20211008d2021 uy 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAutomotive software architectures $ean introduction /$fMiroslaw Staron 205 $aSecond edition. 210 1$aCham, Switzerland :$cSpringer,$d2021. 215 $a1 online resource (XX, 274 p. 174 illus., 47 illus. in color.) 311 1 $a3-030-65938-0 311 1 $a9783030659387 320 $aIncludes bibliographical references and index. 327 $a1 Introduction -- 2. Software Architectures?Views and Documentation -- 3. Contemporary Software Architectures: Federated and Centralized -- 4. Automotive Software Development -- 5. AUTOSAR (AUTomotive Open System ARchitecture) -- 6. Detailed Design of Automotive Software -- 7. Machine Learning in Automotive Software -- 8. Evaluation of Automotive Software Architectures -- 9. Metrics for Software Design and Architectures -- 10. Functional Safety of Automotive Software -- 11. Current Trends in Automotive Software Architectures -- 12 Summary. 330 $aThis book introduces the concept of software architecture as one of the cornerstones of software in modern cars. Following a historical overview of the evolution of software in modern cars and a discussion of the main challenges driving that evolution, Chapter 2 describes the main architectural styles of automotive software and their use in cars? software. Chapter 3 details this further by presenting two modern architectural styles, i.e. centralized and federated software architectures. In Chapter 4, readers will find a description of the software development processes used to develop software on the car manufacturers? side. Chapter 5 then introduces AUTOSAR ? an important standard in automotive software. Chapter 6 goes beyond simple architecture and describes the detailed design process for automotive software using Simulink, helping readers to understand how detailed design links to high-level design. The new chapter 7 reports on how machine learning is exploited in automotive software e.g. for image recognition and how both on-board and off-board learning are applied. Next, Chapter 8 presents a method for assessing the quality of the architecture ? ATAM (Architecture Trade-off Analysis Method) ? and provides a sample assessment, while Chapter 9 presents an alternative way of assessing the architecture, namely by using quantitative measures and indicators. Subsequently Chapter 10 dives deeper into one of the specific properties discussed in Chapter 8 ? safety ? and details an important standard in that area, the ISO/IEC 26262 norm. Lastly, Chapter 11 presents a set of future trends that are currently emerging and have the potential to shape automotive software engineering in the coming years. This book explores the concept of software architecture for modern cars and is intended for both beginning and advanced software designers. It mainly aims at two different groups of audience ? professionals working with automotive software who need to understand concepts related to automotive architectures, and students of software engineering or related fields who need to understand the specifics of automotive software to be able to construct cars or their components. Accordingly, the book also contains a wealth of real-world examples illustrating the concepts discussed and requires no prior background in the automotive domain. Compared to the first edition, besides the two new chapters 3 and 7 there are considerable updates in chapters 5 and 8 especially. 606 $aOrdinadors d'automoció$2lemac 606 $aAutomotive computers 615 7$aOrdinadors d'automoció 615 0$aAutomotive computers. 676 $a629.27 700 $aStaron$b Miroslaw$0853108 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996464436903316 996 $aAutomotive software architectures$91904992 997 $aUNISA LEADER 07765nam 2200805 450 001 9910816453803321 005 20220518010514.0 010 $a1-118-93595-0 010 $a1-118-91502-X 010 $a1-118-93596-9 035 $a(CKB)3710000000198557 035 $a(EBL)1742833 035 $a(SSID)ssj0001261671 035 $a(PQKBManifestationID)11704136 035 $a(PQKBTitleCode)TC0001261671 035 $a(PQKBWorkID)11205492 035 $a(PQKB)10957208 035 $a(OCoLC)889308033 035 $a(DLC) 2014013652 035 $a(Au-PeEL)EBL1742833 035 $a(CaPaEBR)ebr10895757 035 $a(CaONFJC)MIL629214 035 $a(OCoLC)881387451 035 $a(CaSebORM)9781118935958 035 $a(MiAaPQ)EBC1742833 035 $a(EXLCZ)993710000000198557 100 $a20140804h20142014 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCyber threat! $ehow to manage the growing risk of cyber attacks /$fN. MacDonnell Ulsch 205 $a1st edition 210 1$aHoboken, New Jersey :$cWiley,$d2014. 210 4$d©2014 215 $a1 online resource (227 p.) 225 1 $aWiley Corporate F&A 300 $aIncludes index. 311 $a1-118-83635-9 320 $aIncludes bibliographical references and index. 327 $aCyber Threat!: How to Manage the Growing Risk of Cyber Attacks; Contents; Foreword; Preface; Acknowledgments; Introduction: What Every Current and Future Senior Executive Must Know about the Cyber Threat: A Perfect Digital Storm Is Forming; What Factors Create a Perfect Storm?; Industry Vulnerability; Threat Intensification; Inadequate Government Preparedness; Low Level of Awareness; Inadequate Risk Assessments; Offshoring of Data; Insider Threat; Denial of Vulnerability; Increasingly Sophisticated Attacks; Mobile Devices at Higher Risk; Sometimes Security Just Doesn't Take Hold 327 $aIt Wasn't Always Like ThisWithout a Bang; A Board Issue; The Cyber Frankenstein Cometh; Defining Success; Notes; Part I: The Cyber Threat to the Corporate Brand: How It Will Impact Your Company; Chapter 1: The Rise of Cyber Organized Crime and Its Global Impact; Is Nothing Sacred?; The Liberty Reserve Case: Money Laundering in the Digital Age; The Corruption Factor; Information Threat, Physical Threat; Notes; Chapter 2: The Emergence of the Cyber Nation-State and Technology Espionage: Red China Rising and Its Global Cyber Theft Strategy; A Case of Cyber Espionage Conspiracy? 327 $aAccording to the Select Committee . . .Notes; Chapter 3: Cyber Al Qaeda Poses a Threat to Critical Infrastructure; A Disabled America; A New Age: Inspiring Terrorists and Terrorism; A Call Heard Vaguely; Attack upon Attack, No Peace in Sight; Notes; Part II: Corporate Vulnerabilitiesin the Digital Society: Prepare to Defend Yourself and Your Brand; Chapter 4: What Is the True Cost of a Cyber Attack?; Cyber Attack Detection Sometimes Takes Years; One of the First Questions: "How Much Will This Cost?"; A Few Common Cost Factors; What about Unreported Breaches? 327 $aCyber Attacks Result in a Wider Impact: The CommunityNotes; Chapter 5: U.S. Cyber Public Policy: Don't Rely on It to Protect the Brand; No Guarantees with This Executive Order; Government-Industry Cooperation: No Silver Bullet; The Challenge of Defining Cyber Public Policy; Cold War II: The Cyber Chapter; Is There a Silver Lining in an Attack?; Notes; Chapter 6: Four Trends Driving Cyber Breaches and Increasing Corporate Risk: Technological, Cultural, Economic, and Geopolitical Shifts; Technology Trend; Loss of Situational Awareness: Distraction; Culture; Technology Is a Double-Edged Sword 327 $aNotesChapter 7: Social Media and Digital Protest; Social Media: A Tool for Disruption, a Model for Change; The Hacker Group Anonymous; Anonymous Is an "Anti" Outfit of Malcontents; In Reckless Move, Anonymous Targeted Law Enforcement; Anonymous: Making All Information Free for All; In Pursuit of the Anonymous Definition of Civil Liberties; Anarchaos: In the Image of Anonymous; Notes; Part III: Protecting the Brand: Actions Executive Management Must Take to Reduce Cyber Risk; Chapter 8: Managing the Brand When the Worst Occurs; Be Prepared; 1. Initiation 327 $a2. Discovery and Forensic Evidence Capture 330 $a"Conquering cyber attacks requires a multi-sector, multi-modal approachCyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences. Much more than just cyber security, the necessary solutions require government and industry to work cooperatively and intelligently. This resource reveals the extent of the problem, and provides a plan to change course and better manage and protect critical information.Recent news surrounding cyber hacking operations show how intellectual property theft is now a matter of national security, as well as economic and commercial security. Consequences are far-reaching, and can have enormous effects on national economies and international relations. Aggressive cyber forces in China, Russia, Eastern Europe and elsewhere, the rise of global organized criminal networks, and inattention to vulnerabilities throughout critical infrastructures converge to represent an abundantly clear threat. Managing the threat and keeping information safe is now a top priority for global businesses and government agencies. Cyber Threat! breaks the issue down into real terms, and proposes an approach to effective defense. Topics include: The information at risk The true extent of the threat The potential consequences across sectors The multifaceted approach to defense The growing cyber threat is fundamentally changing the nation's economic, diplomatic, military, and intelligence operations, and will extend into future technological, scientific, and geopolitical influence. The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe"--$cProvided by publisher. 330 $a"Cyber Threat! is an in-depth examination of the very real risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. The book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences"--$cProvided by publisher. 410 0$aWiley corporate F & A series. 606 $aCorporations$xSecurity measures 606 $aBusiness enterprises$xComputer networks$xSecurity measures 606 $aComputer crimes$xPrevention 606 $aComputer security 606 $aComputer networks$xSecurity measures 615 0$aCorporations$xSecurity measures. 615 0$aBusiness enterprises$xComputer networks$xSecurity measures. 615 0$aComputer crimes$xPrevention. 615 0$aComputer security. 615 0$aComputer networks$xSecurity measures. 676 $a658.4/78 686 $aBUS083000$2bisacsh 700 $aUlsch$b N. MacDonnell$f1951-$01696348 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910816453803321 996 $aCyber threat$94076262 997 $aUNINA