Security Management for Industrial Safety Critical Applications
Kaur, Raj Kamal, Singh, Lalit Kumar, Singh, Pooja, Verma, Ajit K.
Produktnummer:
1838c9b3c175484192b9fbe5cfd1bc1f4f
Autor: | Kaur, Raj Kamal Singh, Lalit Kumar Singh, Pooja Verma, Ajit K. |
---|---|
Themengebiete: | Analysis Techniques Cyber Security Dependability Fault Tree Analysis HAZOP Markov Model Petri Nets Probability Qualitative Analysis Reliability Block Diagram |
Veröffentlichungsdatum: | 18.08.2024 |
EAN: | 9789819740178 |
Sprache: | Englisch |
Seitenzahl: | 211 |
Produktart: | Gebunden |
Verlag: | Springer Singapore |
Untertitel: | A Practical Approach |
Produktinformationen "Security Management for Industrial Safety Critical Applications"
The book introduces dependability (security metric) ideas, gives a general overview of the security analysis of Safety-Critical Systems (SCSs), explains why the study is necessary and defines key terms relevant to this research. It makes an effort to emphasize the significance of security in comparison to other dependability indicators and illustrates the key drivers of this research's purpose. The mathematical foundation of the security analysis process is briefly illustrated, and key mathematical terminology and concepts are presented that are crucial for the security evaluation of critical systems. This book's objective is to provide a thorough understanding of the security analysis process. It will be a research-focused book designed for undergraduate, graduate, and doctoral courses in software and cyber security. The fundamentals of reliability, security, metrics, and mathematical foundation have been covered in this book. Each technique's actual applications, along with benefits and drawbacks, are also shown. Applying each technique to the various case studies serves as a demonstration of how it works. By using the many case studies of safety-critical systems, the students can also learn different analysis approaches and how to model them. Students will be able to use these tools, in particular, on a case study of their choice to analyze system security. The book includes a comparison of various strategies and appropriate recommendations for further reading on these subjects. Moreover, this book's target audience includes software professionals who are interested in security analysis.

Sie möchten lieber vor Ort einkaufen?
Sie haben Fragen zu diesem oder anderen Produkten oder möchten einfach gerne analog im Laden stöbern? Wir sind gerne für Sie da und beraten Sie auch telefonisch.
Juristische Fachbuchhandlung
Georg Blendl
Parcellistraße 5 (Maxburg)
8033 München
Montag - Freitag: 8:15 -18 Uhr
Samstags geschlossen