Computer Safety, Reliability and Security (Record no. 188527)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 06359nam a22006735i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-540-49646-5 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240423132516.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 121227s1998 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783540496465 |
-- | 978-3-540-49646-5 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/3-540-49646-7 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA268 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | GPJ |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM083000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | GPJ |
Source | thema |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.824 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | Computer Safety, Reliability and Security |
Medium | [electronic resource] : |
Remainder of title | 17th International Conference, SAFECOMP'98, Heidelberg Germany, October 5-7, 1998, Proceedings / |
Statement of responsibility, etc | edited by Wolfgang Ehrenberger. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 1998. |
264 #1 - | |
-- | Berlin, Heidelberg : |
-- | Springer Berlin Heidelberg : |
-- | Imprint: Springer, |
-- | 1998. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XVI, 404 p. |
Other physical details | online resource. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Computer Science, |
International Standard Serial Number | 1611-3349 ; |
Volume number/sequential designation | 1516 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Formal Methods I - Analysis and Specification -- CoRSA - A Constraint Based Approach to Requirements and Safety Analysis -- An Agenda for Specifying Software Components with Complex Data Models -- Safety in Production Cell Components: An Approach Combining Formal Real Time Specifications and Patterns -- Safety Properties Ensured by the OASIS Model for Safety Critical Real-Time Systems -- Linking Hazard Analysis to Formal Specification and Design in B -- Management and Human Factors -- Controlling Your Design through Your Software Process -- Operator Errors and Their Causes -- Security -- A Performance Comparison of Group Security Mechanisms -- Towards Secure Downloadable Executable Content: The JAVA Paradigm -- Model and Implementation of a Secure SW-Development Process for Mission Critical Software -- Impact of Object-Oriented Software Engineering Applied to the Development of Security Systems -- Medical Informatics -- “Profit by Safety” or Quackery in Biomedical Information Technology? -- Formal Methods II - Languages and Verification -- Towards Automated Proof of Fail-Safe Behavior -- Verifying a time-triggered protocol in a multi-language environment -- Methods and Languages for Safety Related Real Time Programming -- ANSI-C in Safety Critical Applications Lessons-Learned from Software Evaluation -- Applications -- A Structured Approach to the Formal Certification of Safety of Computer Aided Development Tools -- Applying Formal Methods in Industry The UseGat Project -- Increasing System Safety for By-Wire Applications in Vehicles by Using a Time Triggered Architecture -- Fault-Tolerant Communication in Large-Scale Manipulators -- Distributed Fault Tolerant and Safety Critical Applications in Vehicles - A Time-Triggered Approach -- Model Checking Safety Critical Software with SPIN: anApplication to a Railway Interlocking System -- EURIS, a Specification Method for Distributed Interlockings -- Object Oriented Safety Analysis of an Extra High Voltage Substation Bay -- Formal Methods III - Petri Nets -- Integration of Logical and Physical Properties of Embedded Systems by Use of Time Petri Nets -- Safety Verification of Software Using Structured Petri Nets -- Reliability -- Refinement of Safety-Related Hazards into Verifiable Code Assertions -- Conceptual Comparison of two Commonly Used Safeguarding Principles -- A Holistic View on the Dependability of Software-Intensive Systems -- Verifying Integrity of Decision Diagrams. |
520 ## - SUMMARY, ETC. | |
Summary, etc | Computers and their interactions are becoming the characteristic features of our time: Many people believe that the industrial age is going over into the information age. In the same way as life of the beginning of this century was dominated by machines, factories, streets and railways, the starting century will be characterised by computers and their networks. This change naturally affects also the institutions and the installations our lives depend upon: power plants, including nuclear ones, chemical plants, mechanically working factories, cars, railways and medical equipment; they all depend on computers and their connections. In some cases it is not human life that may be endangered by computer failure, but large investments; e. g. if a whole plant interrupts its production for a long time. In addition to loss of life and property one must not neglect public opinion, which is very critical in many countries against major technical defects. The related computer technology, its hardware, software and production process differ between standard applications and safety related ones: In the safety case it is normally not only the manufacturers and the customers that are involved, but a third party, usually an assessor, who is taking care of the public interest on behalf of a state authority. Usually safety engineers are in a better position than their colleagues from the conventional side, as they may spend more time and money on a particular task and use better equipment. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computers and civilization. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Software engineering. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Coding theory. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Information theory. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer science. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computers, Special purpose. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptology. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computers and Society. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Software Engineering. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Coding and Information Theory. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer Science Logic and Foundations of Programming. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Special Purpose and Application-Based Systems. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Ehrenberger, Wolfgang. |
Relator term | editor. |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783540651109 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783662197288 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Lecture Notes in Computer Science, |
-- | 1611-3349 ; |
Volume number/sequential designation | 1516 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/3-540-49646-7">https://doi.org/10.1007/3-540-49646-7</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
912 ## - | |
-- | ZDB-2-BAE |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-CSE-Springer |
No items available.