000 03966nam a22004935i 4500
001 978-3-658-37182-1
003 DE-He213
005 20240423125406.0
007 cr nn 008mamaa
008 220720s2022 gw | s |||| 0|eng d
020 _a9783658371821
_9978-3-658-37182-1
024 7 _a10.1007/978-3-658-37182-1
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
082 0 4 _a005.8
_223
100 1 _aFurrer, Frank J.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aSafety and Security of Cyber-Physical Systems
_h[electronic resource] :
_bEngineering dependable Software using Principle-based Development /
_cby Frank J. Furrer.
250 _a1st ed. 2022.
264 1 _aWiesbaden :
_bSpringer Fachmedien Wiesbaden :
_bImprint: Springer Vieweg,
_c2022.
300 _aXXXVI, 537 p. 169 illus., 166 illus. in color. Textbook for German language market.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aCyber-physical systems (CPSs) -- Three Devils of Safety and Security -- Safety, Security and Risk -- Safe Software and Secure Software -- The Future -- Principle-Based Engineering -- Principles for Business and Organization -- General Principles -- Principles for Safety -- Principles for Security -- Principles for Risk.
520 _aCyber-physical systems (CPSs) consist of software-controlled computing devices communicating with each other and interacting with the physical world through sensors and actuators. Typical examples are a water treatment plant, an unmanned aerial vehicle, and a heart pacemaker. Because most of the functionality is implemented in software, the software is of crucial importance for the safety and security of the CPS. As software engineering becomes disciplined and mature, generally accepted principles have emerged. This book advocates principle-based engineering for the development and operation of dependable software. A total of 62 principles are introduced and cataloged into five categories: Business & organization, general principles, safety, security, and risk management principles. The principles are rigorous, teachable, and enforceable. The terminology used is precisely defined. The material is supported by numerous examples and enriched by illustrative quotes from celebrities in the field. The material addresses organizations that want to improve their methodologies to build safe and secure software for mission-critical cyber-physical systems and is suitable for a two-semester, advanced computer science lecture at a Technical University. The book Presents a successful strategy for the management of vulnerabilities, threats, and failures in mission-critical cyber-physical systems Offers deep practical insight into principle-based software development Provides direct guidance on architecting dependable cyber-physical systems for software managers and architects The Author Prof. Dr. Frank J. Furrer is a longstanding consultant for very large information systems, author or co-author of 6 books, and a computer science teacher at the Technical University of Dresden, Germany.
650 0 _aComputer security.
650 0 _aSoftware engineering.
650 0 _aCooperating objects (Computer systems).
650 1 4 _aPrinciples and Models of Security.
650 2 4 _aSoftware Engineering.
650 2 4 _aCyber-Physical Systems.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783658371814
776 0 8 _iPrinted edition:
_z9783658371838
776 0 8 _iPrinted edition:
_z9783658371845
856 4 0 _uhttps://doi.org/10.1007/978-3-658-37182-1
912 _aZDB-2-STI
942 _cSPRINGER
999 _c177425
_d177425