Note: Not guaranteed to come with supplemental materials (access cards, study guides, lab manuals, CDs, etc.)
Extend Your Rental at Any Time
Need to keep your rental past your due date? At any time before your due date you can extend or purchase your rental through your account.
Sorry, this item is currently unavailable.
We will present in this book the principles of securization of software-based equipment. At first, we will present the definition principles of security objectives. Secondly, we will show how it is possible to define a security architecture (including redundancy, diversification, error-detection techniques) on the basis of security objectives and how to identify objectives related to software programs. From software objectives, we will present the different securization techniques (fault detection, redundancy and quality control). The book will take the "certifiable system" aspects into account.
Table of Contents
Chapter 1 – Decomposition, from system to software
Chapter 2 – Certifiable system
Chapter 3 – Risk and security level
Chapter 4 – Securization principles of a hardware architecture