Yüklüyor…

Effective Model-Based Systems Engineering

This textbook presents a proven, mature Model-Based Systems Engineering (MBSE) methodology that has delivered success in a wide range of system and enterprise programs. The authors introduce MBSE as the state of the practice in the vital Systems Engineering discipline that manages complexity and int...

Ful tanımlama

Detaylı Bibliyografya
Asıl Yazarlar: Borky, John M. (Yazar), Bradley, Thomas H. (Yazar)
Müşterek Yazar: SpringerLink (Online service)
Materyal Türü: e-Kitap
Dil:İngilizce
Baskı/Yayın Bilgisi: Cham : Springer International Publishing : Imprint: Springer, 2019.
Edisyon:1st ed. 2019.
Konular:
Online Erişim:Full-text access
OPAC'ta görüntüle
İçindekiler:
  • Introduction - Framing the Problem
  • Applying Object Orientation to System Architecture
  • MBSAP Methodology Overview
  • Analyzing Requirements in an Operational Viewpoint
  • Designing in a Logical/Functional Viewpoint
  • Implementing in a Physical Viewpoint
  • Implementing Service-Oriented Architectures for Enterprise Integration
  • Extending Architecture to Real-Time Domains
  • Developing the Network Dimension
  • Protecting Information with Cybersecurity
  • Using Prototypes Verification, and Validation to Evaluate and Enhance System Architecture
  • Using Reference Architectures and Frameworks
  • Architecting the Enterprise
  • Applying Advanced Concepts
  • Implementing Governance to Measure and Maintain Architecture Quality
  • Appendix A - Quick Reference to Object-Oriented Design (OOD) and the Unified Modeling Language (UML)
  • Appendix B - Quick Reference to the System Modeling Language (SysML), Profile of the Unified Modeling Language (UML)
  • Appendix C
  • System Architecture Example: E-X AirborneMultisensor Platform
  • Appendix D - Summary of the Modeling and Analysis of Real-Time and Embedded (MARTE) Systems Profile of UML
  • Appendix E - Listing of Information Technology (IT) Core Standards and Sources
  • Appendix F - Defense in Depth (DiD) Defintions
  • Appendix G - Common Cyber Attack Methods
  • Appendix H - IEEE Computer Society Center for Secure Design (SD) List of Top 10 Security Flaws
  • Appendix I - Software Testing Methods and Tools
  • Appendix J - Open System Interconnect (OSI) Layers and Protocols
  • Appendix K - Service-Oriented Architecture (SOA) Policy Requirements for Department of Defense (DoD) Programs.