Certifiable Software Applications 1: Main Processes
Autor Jean-Louis Boulangeren Limba Engleză Hardback – 3 iul 2016
- Presents the fundamental practices from the field
- Emphasizes the development of quality assurance and safety assurance
- Introduces the concept of software application
- Covers recent developments such as module, component, and the product line approach
Preț: 1017.85 lei
Preț vechi: 1272.32 lei
-20% Nou
Puncte Express: 1527
Preț estimativ în valută:
194.80€ • 202.34$ • 161.81£
194.80€ • 202.34$ • 161.81£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781785481178
ISBN-10: 1785481177
Pagini: 308
Dimensiuni: 152 x 229 x 26 mm
Greutate: 0.63 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 1785481177
Pagini: 308
Dimensiuni: 152 x 229 x 26 mm
Greutate: 0.63 kg
Editura: ELSEVIER SCIENCE
Public țintă
Information security professionals, system administrators. Security managers, academics in the field of computing securityCuprins
Chapter 1: System, Equipment and Software
Chapter 2: Software Application
Chapter 3: Principle of Dependability
Chapter 4: Safety Management of a Software Application
Chapter 5: Safety of a Software Application
Chapter 6: Technique to Manage Software Safety
Chapter 7: Assessment and Certification
Chapter 8: Different Sectors and Various Normative Referentials
Chapter 9: Quality Management
Chapter 10: Requirement Management
Chapter 2: Software Application
Chapter 3: Principle of Dependability
Chapter 4: Safety Management of a Software Application
Chapter 5: Safety of a Software Application
Chapter 6: Technique to Manage Software Safety
Chapter 7: Assessment and Certification
Chapter 8: Different Sectors and Various Normative Referentials
Chapter 9: Quality Management
Chapter 10: Requirement Management
Descriere
Certifiable Software Applications 1: Main Processes establishes the need and context for achieving a certifiable software application. The concept of a software application is presented along with recent developments that have taken place (module, component, and the product line approach). The applicable standards are presented and the security principles are described and discussed. Finally, the requirements for mastering quality and configuration are explained.