Image from Google Jackets

Embedded software development for safety-critical systems / Chris Hobbs.

By: Material type: TextPublication details: Boca Raton, Florida : CRC Press / Taylor & Francis Group, LLC, c.2016.Description: xx, 343 p. : ill. ; 24 cmISBN:
  • 9781498726702
  • 1498726704
Subject(s): DDC classification:
  • 22 005.1  HOB
Contents:
Section 1. Background -- section 2. The project -- section 3. Design patterns -- section 4. Design validation -- section 5. Coding -- section 6. Verification -- section 7. Appendices.
Summary: "Embedded Software Development for Safety-Critical Systems discusses the development of safety-critical systems under the following standards: IEC 61508, ISO 26262, EN 50128, and IEC 62304. It details the advantages and disadvantages of many architectural and design practices recommended in the standards, ranging from replication and diversification through anomaly detection to the so-called "safety bag" systems."
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Cover image Item type Current library Home library Collection Shelving location Call number Materials specified Vol info URL Copy number Status Notes Date due Barcode Item holds Item hold queue priority Course reserves
Book - Borrowing Central Library Lower Floor Baccah 005.1 HOB (Browse shelf(Opens below)) 25842 Available 000034795
Total holds: 0

Index : p. 335-343.

Includes bibliographical references.

Section 1. Background -- section 2. The project -- section 3. Design patterns -- section 4. Design validation -- section 5. Coding -- section 6. Verification -- section 7. Appendices.

"Embedded Software Development for Safety-Critical Systems discusses the development of safety-critical systems under the following standards: IEC 61508, ISO 26262, EN 50128, and IEC 62304. It details the advantages and disadvantages of many architectural and design practices recommended in the standards, ranging from replication and diversification through anomaly detection to the so-called "safety bag" systems."

Wessam

There are no comments on this title.

to post a comment.

Novelist Select