微信公众号随时随地查标准

QQ交流1群(已满)

QQ群标准在线咨询2

QQ交流2群

购买标准后,可去我的标准下载或阅读

This International Standard establishes a set of processes for the development and management of systems and software architectures. The Standard specifies processes for the governance and management of a related collection, or portfolio, of architectures and the enabling activities in support of these architecting processes.

定价: 0元 / 折扣价: 0

在线阅读 收 藏

This standard describes an iterative process for managing and executing software maintenance activities. Use of this standard is not restricted by size, complexity, criticality, or application of the software product. This standard uses a process model to discuss and depict aspects of software maintenance. The criteria established apply to both the planning of maintenance for software while under development, as well as the planning and execution of software maintenance activities for existing… read more software products. Ideally, maintenance planning should begin during planning for software development. This International Standard provides the framework within which generic and specific software maintenance plans may be executed, evaluated, and tailored to the maintenance scope and magnitude of given software products. This International Standard provides the framework, precise terminology, and processes to allow the consistent application of technology (tools, techniques, and methods) to software maintenance. This International Standard provides requirements and guidance for the maintenance of software. The basis for the Maintenance Process and its activities is consistent with ISO/IEC/IEEE 12207:2017, Systems and software engineering -- Software life cycle processes. This standard defines the activities and tasks of software maintenance, and provides maintenance planning requirements. It does not address the operation of software and the operational functions, e.g., backup, recovery, or system administration, which are normally performed by those who operate the software. read less

定价: 70元 / 折扣价: 60

在线阅读 收 藏

This document describes a set of useful activities, tasks, methods, and practices that acquirers of software and related services from unrelated (external) suppliers can apply to help ensure an efficient and effective acquisition of software or software services. These practices can be applied in competitive and in sole source procurements, regardless of the type, size, complexity, and cost of the acquisition. The document can be applied to software that runs on any computer system regardless… read more of its size, complexity, or criticality. The software supply chain can include integration of off-the-shelf (OTS), custom, software as a service (SaaS), or open-source software. Software services can include software development and sustainment (maintenance), integration, verification (testing) and operation. Security and safety are included as attributes to be considered during the acquisition. However, specific requirements for acquisition of information assurance (security), safety, and cloud services are not included. read less

定价: 110元 / 折扣价: 94

在线阅读 收 藏

The scope of the original standard is: This standard will describe a process for the management of risk during software development, operations and maintenance. It will be consistent with IEEE/EIA 12207. The revision is being performed jointly with ISO/IEC JTC1/SC7. The scope of the revision is to resolve the issues raised during the fast-track ballot of IEEE 1540 (DIS 16085).

定价: 45元 / 折扣价: 39

在线阅读 收 藏

This document establishes a common framework of process descriptions for describing the life cycle of systems created by humans, defining a set of processes and associated terminology from an engineering viewpoint. These processes can be applied to systems of interest, their system elements, and to systems of systems. Selected sets of these processes can be applied throughout the stages of a system's life cycle. This is accomplished through the involvement of stakeholders, with the ultimate goal of achieving customer satisfaction.

定价: 127元 / 折扣价: 108

在线阅读 收 藏

This document: — provides risk management elaborations for the processes described in ISO/IEC/IEEE 15288 and ISO/IEC/IEEE 12207, — provides the users of ISO/IEC/IEEE 15288, ISO/IEC/IEEE 12207 and their associated elaboration standards with common terminology and specialized guidance for performing risk management within the context of systems and software engineering projects, — specifies the required information items that are to be produced through the implementation of risk management… read more process for claiming conformance, and — specifies the required contents of the information items. This document provides a universally applicable standard for practitioners responsible for managing risks associated with systems and software over their life cycle. This document is suitable for the management of all risks encountered in any organization or project appropriate to the systems or software projects regardless of context, type of industry, technologies utilized, or organizational structures involved. This document does not provide detailed information about risk management practices, techniques, or tools which are widely available in other publications. Instead this document focuses on providing a comprehensive reference for integrating the large and wide variety of processes, practices, techniques, and tools encountered in systems and software engineering projects and other lifecycle activities into a unified approach for risk management, with the purpose of providing effective and efficient risk management while meeting the expectations and requirements of organization and project stakeholders. read less

定价: 81元 / 折扣价: 69

在线阅读 收 藏

There is no separate Scope statement in the final draft International Standard.

定价: 66元 / 折扣价: 57

在线阅读 收 藏

This document: specifies the required processes implemented in the engineering activities that result in requirements for systems and software products (including services) throughout the life cycle; provides guidelines for applying the requirements and requirements-related processes described in ISO/IEC/IEEE 15288 and ISO/IEC/IEEE 12207; specifies the required information items produced through the implementation of the requirements processes; specifies the required contents of the required information items; provides guidelines for the format of the required and related information items. This document is applicable to: those who use or plan to use ISO/IEC/IEEE 15288 and ISO/IEC/IEEE 12207 on projects dealing with man-made systems, software-intensive systems, software and hardware products, and services related to those systems and products, regardless of the project scope, product(s), methodology,size or complexity; anyone performing requirements engineering activities to aid in ensuring that their application of the requirements engineering processes conforms to ISO/IEC/IEEE 15288 and/or ISO/IEC/IEEE 12207; those who use or plan to use ISO/IEC/IEEE 15289 on projects dealing with man-made systems, software-intensive systems, software and hardware products and services related to those systems and products, regardless of the project scope, product(s), methodology, size or complexity; anyone performing requirements engineering activities to aid in ensuring that the information items developed during the application of requirements engineering processes conforms to ISO/IEC/IEEE 15289.

定价: 159元 / 折扣价: 136

在线阅读 收 藏

This document establishes a common framework for software life cycle processes, with well defined terminology, that can be referenced by the software industry. It contains processes, activities, and tasks that are to be applied during the acquisition of a software system, product or service and during the supply, development, operation, maintenance and disposal of software products. This is accomplished through the involvement of stakeholders, with the ultimate goal of achieving customer… read more satisfaction. Software includes the software portion of firmware. This document includes those aspects of system definition needed to provide the context for software systems and services. This document also provides processes that can be employed for defining, controlling, and improving software life cycle processes within an organization or a project. read less

定价: 167元 / 折扣价: 142

在线阅读 收 藏

This standard describes a set of useful activities, tasks and methods that can be selected and applied during the acquisition of software or software services. The standard can be applied to software that runs on any computer system regardless of the size, complexity, or criticality of the software. The software supply chain may include integration of commercial-off-the-shelf (COTS), custom, or open source software. Software services can include software development and sustainment, software… read more integration, and software verification and validation. Security is included as a quality attribute considered during the acquisition. However, specific requirements for acquisition of information assurance (security) services and cloud services are not included. read less

定价: 109元 / 折扣价: 93

在线阅读 收 藏

This document specifies test processes that can be used to govern, manage and implement software testing for any organization, project or testing activity. It comprises generic test process descriptions that define the software testing processes. Supporting informative diagrams describing the processes are also provided. This document is applicable to testing in all software development lifecycle models. This document is intended for, but not limited to, testers, test managers, developers and project managers, particularly those responsible for governing, managing and implementing software testing.

定价: 84元 / 折扣价: 72

在线阅读 收 藏

Within the context of secure plug-and-play interoperability, cybersecurity is the process and capability of preventing unauthorized access or modification, misuse, denial of use, or the unauthorized use of information that is stored on, accessed from, or transferred to and from a PHD/PoCD. The process part of cybersecurity is risk analysis of use cases specific to a PHD/PoCD. For PHDs/PoCDs, this standard defines an iterative, systematic, scalable, and auditable approach to identification of… read more cybersecurity vulnerabilities and estimation of risk. This iterative vulnerability assessment uses the Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege (STRIDE) classification scheme and the embedded Common Vulnerability Scoring System (eCVSS). The assessment includes system context, system decomposition, pre-mitigation scoring, mitigation, and post-mitigation scoring and iterates until the remaining vulnerabilities are reduced to an acceptable level of risk. read less

定价: 74元 / 折扣价: 63

在线阅读 收 藏
369 条记录,每页 15 条,当前第 24 / 25 页 第一页 | 上一页 | 下一页 | 最末页  |     转到第   页