{"id":78,"date":"2017-07-28T10:29:34","date_gmt":"2017-07-28T08:29:34","guid":{"rendered":"https:\/\/iste.yhello.co\/product\/applications-logicielles-certifiables-1\/"},"modified":"2024-01-03T14:13:04","modified_gmt":"2024-01-03T14:13:04","slug":"applications-logicielles-certifiables-1","status":"publish","type":"product","link":"https:\/\/www.istegroup.com\/en\/produit\/applications-logicielles-certifiables-1\/","title":{"rendered":"Applications logicielles certifiables 1"},"content":{"rendered":"<p>Cet ouvrage pr\u00e9sente l\u2019ensemble des moyens permettant de r\u00e9aliser une application logicielle pour un syst\u00e8me critique de s\u00e9curit\u00e9 en prenant en compte les besoins de certification, depuis la phase d\u2019analyse du besoin jusqu\u2019\u00e0 la phase de livraison.<\/p>\n<p>Dans les domaines ferroviaire, a\u00e9ronautique ou nucl\u00e9aire, le mauvais fonctionnement de certains syst\u00e8mes peut avoir de graves cons\u00e9quences, notamment en mati\u00e8re de s\u00e9curit\u00e9. Pour ces syst\u00e8mes dits \u00ab critiques \u00bb, des proc\u00e9d\u00e9s de certification, volontaires ou obligatoires, permettent de d\u00e9montrer la ma\u00eetrise de la qualit\u00e9 dans leur r\u00e9alisation.<\/p>\n<p>Or, dans ces syst\u00e8mes complexes, la s\u00e9curit\u00e9, la fiabilit\u00e9 et la maintenabilit\u00e9 d\u00e9pendent directement des applications logicielles. La cr\u00e9ation de ces applications doit donc elle aussi passer par des processus et des m\u00e9thodes sp\u00e9cifiques afin d\u2019\u00eatre conforme aux diff\u00e9rentes normes m\u00e9tiers.<\/p>\n<p>Ce volume d\u00e9taille les principes mis en oeuvre (s\u00fbret\u00e9 de fonctionnement, techniques de s\u00e9curisation, management des exigences\u2026) pour \u00e9viter, d\u00e9tecter et corriger les d\u00e9fauts d\u2019une application logicielle et la rendre certifiable.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cet ouvrage pr\u00e9sente l\u2019ensemble des moyens permettant de r\u00e9aliser une application logicielle pour un syst\u00e8me critique de s\u00e9curit\u00e9 en prenant en compte les besoins de certification, depuis la phase d\u2019analyse du besoin jusqu\u2019\u00e0 la phase de livraison. Dans les domaines ferroviaire, a\u00e9ronautique ou nucl\u00e9aire, le mauvais fonctionnement de certains syst\u00e8mes peut avoir de graves cons\u00e9quences, [&hellip;]<\/p>\n","protected":false},"featured_media":79,"template":"","meta":{"_acf_changed":false,"_links_to":"","_links_to_target":""},"product_brand":[],"product_cat":[667,675],"product_tag":[799,800,801,31,18,19,218,20,21,22,25,26,27,99,439,802,38,145,28,29,369,803,804,805],"class_list":{"0":"post-78","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-informatique-12506482","7":"product_cat-nouveauts-12519446","8":"product_tag-analyse","9":"product_tag-application","10":"product_tag-applications-logicielles-certifiables-1","11":"product_tag-ebook","12":"product_tag-edition-scientifique","13":"product_tag-editions-francaise","14":"product_tag-editions-ouvrage","15":"product_tag-editions-technique","16":"product_tag-iste-group","17":"product_tag-istegroup","18":"product_tag-livre-numerique","19":"product_tag-livre-scientifique-francais","20":"product_tag-livre-technique-francais","21":"product_tag-livres-numeriques","22":"product_tag-logiciel","23":"product_tag-logicielles-certifiables","24":"product_tag-ouvrage-numerique","25":"product_tag-ouvrage-scientifique","26":"product_tag-ouvrage-scientifique-francais","27":"product_tag-ouvrage-technique","28":"product_tag-procedes","29":"product_tag-processus","30":"product_tag-systeme-critique","31":"product_tag-systemes-complexes","33":"first","34":"instock","35":"shipping-taxable","36":"purchasable","37":"product-type-variable"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Applications logicielles certifiables 1 - ISTE Group<\/title>\n<meta name=\"description\" content=\"Applications logicielles certifiables 1 pr\u00e9sente l\u2019ensemble des moyens permettant de r\u00e9aliser une application logicielle pour un syst\u00e8me critique de s\u00e9curit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.istegroup.com\/fr\/produit\/applications-logicielles-certifiables-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Applications logicielles certifiables 1 - ISTE Group\" \/>\n<meta property=\"og:description\" content=\"Applications logicielles certifiables 1 pr\u00e9sente l\u2019ensemble des moyens permettant de r\u00e9aliser une application logicielle pour un syst\u00e8me critique de s\u00e9curit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.istegroup.com\/fr\/produit\/applications-logicielles-certifiables-1\/\" \/>\n<meta property=\"og:site_name\" content=\"ISTE Group\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-03T14:13:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/11264541572_4642567620-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"2048\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/applications-logicielles-certifiables-1\/\",\"url\":\"https:\/\/www.istegroup.com\/fr\/produit\/applications-logicielles-certifiables-1\/\",\"name\":\"Applications logicielles certifiables 1 - ISTE Group\",\"isPartOf\":{\"@id\":\"https:\/\/www.istegroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/applications-logicielles-certifiables-1\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/applications-logicielles-certifiables-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/11264541572_4642567620-1.jpg\",\"datePublished\":\"2017-07-28T08:29:34+00:00\",\"dateModified\":\"2024-01-03T14:13:04+00:00\",\"description\":\"Applications logicielles certifiables 1 pr\u00e9sente l\u2019ensemble des moyens permettant de r\u00e9aliser une application logicielle pour un syst\u00e8me critique de s\u00e9curit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/applications-logicielles-certifiables-1\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.istegroup.com\/fr\/produit\/applications-logicielles-certifiables-1\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/applications-logicielles-certifiables-1\/#primaryimage\",\"url\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/11264541572_4642567620-1.jpg\",\"contentUrl\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/11264541572_4642567620-1.jpg\",\"width\":1366,\"height\":2048,\"caption\":\"Processus principaux\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.istegroup.com\/fr\/produit\/applications-logicielles-certifiables-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.istegroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/www.istegroup.com\/fr\/nouveautes\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Applications logicielles certifiables 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.istegroup.com\/#website\",\"url\":\"https:\/\/www.istegroup.com\/\",\"name\":\"ISTE Group\",\"description\":\"Publishing Knowledge\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.istegroup.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Applications logicielles certifiables 1 - ISTE Group","description":"Applications logicielles certifiables 1 pr\u00e9sente l\u2019ensemble des moyens permettant de r\u00e9aliser une application logicielle pour un syst\u00e8me critique de s\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.istegroup.com\/fr\/produit\/applications-logicielles-certifiables-1\/","og_locale":"en_US","og_type":"article","og_title":"Applications logicielles certifiables 1 - ISTE Group","og_description":"Applications logicielles certifiables 1 pr\u00e9sente l\u2019ensemble des moyens permettant de r\u00e9aliser une application logicielle pour un syst\u00e8me critique de s\u00e9curit\u00e9.","og_url":"https:\/\/www.istegroup.com\/fr\/produit\/applications-logicielles-certifiables-1\/","og_site_name":"ISTE Group","article_modified_time":"2024-01-03T14:13:04+00:00","og_image":[{"width":1366,"height":2048,"url":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/11264541572_4642567620-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.istegroup.com\/fr\/produit\/applications-logicielles-certifiables-1\/","url":"https:\/\/www.istegroup.com\/fr\/produit\/applications-logicielles-certifiables-1\/","name":"Applications logicielles certifiables 1 - ISTE Group","isPartOf":{"@id":"https:\/\/www.istegroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.istegroup.com\/fr\/produit\/applications-logicielles-certifiables-1\/#primaryimage"},"image":{"@id":"https:\/\/www.istegroup.com\/fr\/produit\/applications-logicielles-certifiables-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/11264541572_4642567620-1.jpg","datePublished":"2017-07-28T08:29:34+00:00","dateModified":"2024-01-03T14:13:04+00:00","description":"Applications logicielles certifiables 1 pr\u00e9sente l\u2019ensemble des moyens permettant de r\u00e9aliser une application logicielle pour un syst\u00e8me critique de s\u00e9curit\u00e9.","breadcrumb":{"@id":"https:\/\/www.istegroup.com\/fr\/produit\/applications-logicielles-certifiables-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.istegroup.com\/fr\/produit\/applications-logicielles-certifiables-1\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.istegroup.com\/fr\/produit\/applications-logicielles-certifiables-1\/#primaryimage","url":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/11264541572_4642567620-1.jpg","contentUrl":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2017\/07\/11264541572_4642567620-1.jpg","width":1366,"height":2048,"caption":"Processus principaux"},{"@type":"BreadcrumbList","@id":"https:\/\/www.istegroup.com\/fr\/produit\/applications-logicielles-certifiables-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.istegroup.com\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/www.istegroup.com\/fr\/nouveautes\/"},{"@type":"ListItem","position":3,"name":"Applications logicielles certifiables 1"}]},{"@type":"WebSite","@id":"https:\/\/www.istegroup.com\/#website","url":"https:\/\/www.istegroup.com\/","name":"ISTE Group","description":"Publishing Knowledge","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.istegroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product\/78","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/media\/79"}],"wp:attachment":[{"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/media?parent=78"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product_brand?post=78"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product_cat?post=78"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/www.istegroup.com\/en\/wp-json\/wp\/v2\/product_tag?post=78"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}