Effective model-based systems engineering. ([2019])
- Record Type:
- Book
- Title:
- Effective model-based systems engineering. ([2019])
- Main Title:
- Effective model-based systems engineering
- Further Information:
- Note: John M. Borky, Thomas H. Bradley.
- Authors:
- Borky, John M
Bradley, Thomas H - Contents:
- Introduction - Framing the Problem.- Applying Object Orientation to System Architecture.- MBSAP Methodology Overview.- Analyzing Requirements in an Operational Viewpoint.- Designing in a Logical/Functional Viewpoint.- Implementing in a Physical Viewpoint.- Implementing Service-Oriented Architectures for Enterprise Integration.- Extending Architecture to Real-Time Domains.- Developing the Network Dimension.- Protecting Information with Cybersecurity.- Using Prototypes Verification, and Validation to Evaluate and Enhance System Architecture.- Using Reference Architectures and Frameworks.- Architecting the Enterprise.- Applying Advanced Concepts.- Implementing Governance to Measure and Maintain Architecture Quality.- Appendix A - Quick Reference to Object-Oriented Design (OOD) and the Unified Modeling Language (UML).- Appendix B - Quick Reference to the System Modeling Language (SysML), Profile of the Unified Modeling Language (UML).- Appendix C.- System Architecture Example: E-X Airborne Multisensor Platform.- Appendix D - Summary of the Modeling and Analysis of Real-Time and Embedded (MARTE) Systems Profile of UML.- Appendix E - Listing of Information Technology (IT) Core Standards and Sources.- Appendix F - Defense in Depth (DiD) Defintions.- Appendix G - Common Cyber Attack Methods.- Appendix H - IEEE Computer Society Center for Secure Design (SD) List of Top 10 Security Flaws.- Appendix I - Software Testing Methods and Tools.- Appendix J - Open System Interconnect (OSI)Introduction - Framing the Problem.- Applying Object Orientation to System Architecture.- MBSAP Methodology Overview.- Analyzing Requirements in an Operational Viewpoint.- Designing in a Logical/Functional Viewpoint.- Implementing in a Physical Viewpoint.- Implementing Service-Oriented Architectures for Enterprise Integration.- Extending Architecture to Real-Time Domains.- Developing the Network Dimension.- Protecting Information with Cybersecurity.- Using Prototypes Verification, and Validation to Evaluate and Enhance System Architecture.- Using Reference Architectures and Frameworks.- Architecting the Enterprise.- Applying Advanced Concepts.- Implementing Governance to Measure and Maintain Architecture Quality.- Appendix A - Quick Reference to Object-Oriented Design (OOD) and the Unified Modeling Language (UML).- Appendix B - Quick Reference to the System Modeling Language (SysML), Profile of the Unified Modeling Language (UML).- Appendix C.- System Architecture Example: E-X Airborne Multisensor Platform.- Appendix D - Summary of the Modeling and Analysis of Real-Time and Embedded (MARTE) Systems Profile of UML.- Appendix E - Listing of Information Technology (IT) Core Standards and Sources.- Appendix F - Defense in Depth (DiD) Defintions.- Appendix G - Common Cyber Attack Methods.- Appendix H - IEEE Computer Society Center for Secure Design (SD) List of Top 10 Security Flaws.- Appendix I - Software Testing Methods and Tools.- Appendix J - Open System Interconnect (OSI) Layers and Protocols.- Appendix K - Service-Oriented Architecture (SOA) Policy Requirements for Department of Defense (DoD) Programs. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2019
- Extent:
- 1 online resource (xx, 779 pages), illustrations (some color)
- Subjects:
- 003
Engineering
Systems engineering
Systems theory
Computer simulation
Science -- System Theory
Computers -- Computer Simulation
Cybernetics & systems theory
3D graphics & modelling
Social research & statistics
Technology & Engineering -- General
Electronic books - Languages:
- English
- ISBNs:
- 9783319956695
3319956698 - Related ISBNs:
- 9783319956688
- Notes:
- Note: Includes bibliographical references and index.
Note: Online resource; title from PDF title page (SpringerLink, viewed September 18, 2018). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.328390
- Ingest File:
- 02_333.xml