SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
EECS 598-008: Medical Device Security. Winter 2013
University of Michigan, Computer Science and Engineering
http://www.eecs.umich.edu/courses/eecs598-008/
Instructor: Prof. Kevin Fu
N.B.: Additional reading material appears on the website.
Printed                                                                                                          Course
Readings                                                                                                         Reader
                                                                                                                 Pages
  1 This table of contents                                                                                       p. 0
  2 "Software Design" Chapter 16 from Reliable Design of Medical Devices                                         pp. 1-17
    by Richard Fries, CRC Press, 2006. (pp. 255-271)
  3 "Ramifications of Software Defects" Chapter 2 from Safe and Sound Software: Creating an Efficient and          pp. 18-39
    Effective Quality System for Software Medical Device Organizations
    by Thomas H. Faris, Quality Press, 2006. (pp. 21-42)
  4 "Dependability Requirements" Chapter 2 from Fundamentals of Dependable Computing for Software                pp. 40-64
    Engineers by John Knight, CRC Press, 2012. (pp. 27, 41-64)
  5 "Battery" Chapter 7 from Design of Cardiac Pacemakers by John G. Webster, IEEE Press, 1995. (pp.             pp. 65-74
    161-170)
  6 "Implantable Cardioverter-Defibrillators" Chapter 19 by Adrianus Djohan from Design of Cardiac                pp. 75-95
    Pacemakers edited by John G. Webster, IEEE Press, 1995. (pp. 21st)
  7 "Microprocessor-Based Pacemaker Design" Appendix by Surekha Palreddy from Design of Cardiac                  pp. 96-106
    Pacemakers edited by John G. Webster, IEEE Press, 1995. (pp. 460-470)
  8 "If I Only Changed the Software, Why Is the Phone on Fire" Chapter 6 from If I Only Changed the              pp. 107-141
    Software, Why Is the Phone on Fire: Embedded Debugging Methods Revealed
    by Lisa Simone, Elsevier, 2007. (pp. 147-181)
  9 "The Case of the Rapid Heartbeat: Meeting the Spirit of the Requirements" Chapter 7 from If I Only           pp. 142-170
    Changed the Software, Why Is the Phone on Fire: Embedded Debugging Methods Revealed
    by Lisa Simone, Elsevier, 2007. (pp. 183-211)
 10 "Computers and Risk" Chapter 2 from Safeware: System Safety and Computers                                    pp. 171-188
    by Nancy G. Leveson, Addison-Wesley, 1995. (pp. 21-38)
 11 "Verification of Safety" Chapter 18 from Safeware: System Safety and Computers                                pp. 189-208
    by Nancy G. Leveson, Addison-Wesley, 1995. (pp. 489-508)
 12 "Managing Safety and the Safety Culture" Chapter 13 from Engineering a Safer World: Systems Thinking         pp. 209-237
    Applied to Safety by Nancy G. Leveson, MIT Press, 2011. (pp. 415-443)
 13 "Wounds That Don't Heal: Nurses' Experience with Medication Errors" Chapter 9                                pp. 238-253
    by Linda A. Treiber and Jackie H. Jones from First Do Less Harm by editors Ross Koppel and Suzanne
    Gordon, Cornell University Press, 2012. (pp. 180-195)
 14 "The Framework of Contextual Integrity: Breaking Rules for Good" chapter from Privacy in Context:            pp. 254-257
    Technology, Policy, and the Integrity of Social Life by Helen Nissenbaum, Stanford Univ. Press, 2010. (pp.
    171-174)
 15 "The Economics of Cybersecurity" Chapter 9 from Security in Computing                                        pp. 258-289
    by Charles P. Pfleeger and Shari Lawrence Pfleeger, Prentice-Hall, 2007. (pp. 571-602)
 16 "States and Actions" Chapter 6 from Press On: Principles of Interaction Programming                          pp. 290-326
    by Harold Thimbleby, MIT Press, 2007. (pp. 163-199)
 17 "The Food and Drug Administration" Chapter 3 from Reliable Design of Medical Devices                         pp. 327-353
    by Richard Fries, CRC Press, 2006. (pp. 25-51)

Weitere ähnliche Inhalte

Was ist angesagt?

MEMS Business Forum 2012-Emerging Usages Apps for Sensors in 2016+, 052412San...
MEMS Business Forum 2012-Emerging Usages Apps for Sensors in 2016+, 052412San...MEMS Business Forum 2012-Emerging Usages Apps for Sensors in 2016+, 052412San...
MEMS Business Forum 2012-Emerging Usages Apps for Sensors in 2016+, 052412San...sandhibhide
 
Uses of Computers
Uses of ComputersUses of Computers
Uses of Computerskamran1993
 
Micro Electro Mechanical Systems (MEMS) Class Materials - Lecture 01
Micro Electro Mechanical Systems (MEMS) Class Materials - Lecture 01Micro Electro Mechanical Systems (MEMS) Class Materials - Lecture 01
Micro Electro Mechanical Systems (MEMS) Class Materials - Lecture 01Manipal Institute of Technology
 
Micro Electro-mechanical system
Micro Electro-mechanical systemMicro Electro-mechanical system
Micro Electro-mechanical systemMohit Singh Rajput
 
Amazing Some Applications of Soft Computing
Amazing Some Applications of Soft ComputingAmazing Some Applications of Soft Computing
Amazing Some Applications of Soft ComputingDigitalThinkerHelp
 

Was ist angesagt? (9)

Mems in medical technology
Mems in medical technologyMems in medical technology
Mems in medical technology
 
Mems presentation
Mems presentationMems presentation
Mems presentation
 
MEMS Business Forum 2012-Emerging Usages Apps for Sensors in 2016+, 052412San...
MEMS Business Forum 2012-Emerging Usages Apps for Sensors in 2016+, 052412San...MEMS Business Forum 2012-Emerging Usages Apps for Sensors in 2016+, 052412San...
MEMS Business Forum 2012-Emerging Usages Apps for Sensors in 2016+, 052412San...
 
Uses of Computers
Uses of ComputersUses of Computers
Uses of Computers
 
Micro Electro Mechanical Systems (MEMS) Class Materials - Lecture 01
Micro Electro Mechanical Systems (MEMS) Class Materials - Lecture 01Micro Electro Mechanical Systems (MEMS) Class Materials - Lecture 01
Micro Electro Mechanical Systems (MEMS) Class Materials - Lecture 01
 
Title:
Title: 
Title:
Title:
 
Micro Electro-mechanical system
Micro Electro-mechanical systemMicro Electro-mechanical system
Micro Electro-mechanical system
 
Amazing Some Applications of Soft Computing
Amazing Some Applications of Soft ComputingAmazing Some Applications of Soft Computing
Amazing Some Applications of Soft Computing
 
Micro Electro Mechanical Systems (MEMS) - Lecture 05
Micro Electro Mechanical Systems (MEMS) - Lecture 05Micro Electro Mechanical Systems (MEMS) - Lecture 05
Micro Electro Mechanical Systems (MEMS) - Lecture 05
 

Andere mochten auch

Dependable Systems -Software Dependability (15/16)
Dependable Systems -Software Dependability (15/16)Dependable Systems -Software Dependability (15/16)
Dependable Systems -Software Dependability (15/16)Peter Tröger
 
Gewinnspielregeln deezer de
Gewinnspielregeln deezer deGewinnspielregeln deezer de
Gewinnspielregeln deezer deDeezerDE
 
Recommendation Letter
Recommendation LetterRecommendation Letter
Recommendation LetterEman_sabry
 
Hta t07-did-you-read-the-news-http-request-hijacking
Hta t07-did-you-read-the-news-http-request-hijackingHta t07-did-you-read-the-news-http-request-hijacking
Hta t07-did-you-read-the-news-http-request-hijackingКомсс Файквэе
 

Andere mochten auch (6)

Dependable Systems -Software Dependability (15/16)
Dependable Systems -Software Dependability (15/16)Dependable Systems -Software Dependability (15/16)
Dependable Systems -Software Dependability (15/16)
 
Gewinnspielregeln deezer de
Gewinnspielregeln deezer deGewinnspielregeln deezer de
Gewinnspielregeln deezer de
 
Recommendation Letter
Recommendation LetterRecommendation Letter
Recommendation Letter
 
Hta t07-did-you-read-the-news-http-request-hijacking
Hta t07-did-you-read-the-news-http-request-hijackingHta t07-did-you-read-the-news-http-request-hijacking
Hta t07-did-you-read-the-news-http-request-hijacking
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 
Mobile threat report_q3_2013
Mobile threat report_q3_2013Mobile threat report_q3_2013
Mobile threat report_q3_2013
 

Ähnlich wie Course reader-title

Jackie Rees
Jackie ReesJackie Rees
Jackie Reesbutest
 
Trends in Information Management
Trends in Information ManagementTrends in Information Management
Trends in Information ManagementAlexander Deucalion
 
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...PacificResearchPlatform
 
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanWho Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanMichael Roytman
 
Trends in Advanced Computing in 2020 - Advanced Computing: An International J...
Trends in Advanced Computing in 2020 - Advanced Computing: An International J...Trends in Advanced Computing in 2020 - Advanced Computing: An International J...
Trends in Advanced Computing in 2020 - Advanced Computing: An International J...acijjournal
 
Designing a useful and usable mobile EMR application through a participatory...
Designing a useful and usable mobile EMR application through a participatory...Designing a useful and usable mobile EMR application through a participatory...
Designing a useful and usable mobile EMR application through a participatory...Robin De Croon
 
Waterloo September 00 Presentations
Waterloo September 00 PresentationsWaterloo September 00 Presentations
Waterloo September 00 Presentationsbrighteyes
 
New Research Articles 2020 September Issue International Journal of Software ...
New Research Articles 2020 September Issue International Journal of Software ...New Research Articles 2020 September Issue International Journal of Software ...
New Research Articles 2020 September Issue International Journal of Software ...ijseajournal
 
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...ijwmn
 
The Role of Internet-of-Things (IoT) in Healthcare
The Role of Internet-of-Things (IoT) in HealthcareThe Role of Internet-of-Things (IoT) in Healthcare
The Role of Internet-of-Things (IoT) in HealthcareLuís Rita
 
Webinar: Innovations in Mobile Health: Highlights and Future Directions
Webinar: Innovations in Mobile Health: Highlights and Future DirectionsWebinar: Innovations in Mobile Health: Highlights and Future Directions
Webinar: Innovations in Mobile Health: Highlights and Future DirectionsHHS Digital
 
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...IJNSA Journal
 
Analysis and detection of computer viruses and worms
Analysis and detection of computer viruses and wormsAnalysis and detection of computer viruses and worms
Analysis and detection of computer viruses and wormsUltraUploader
 
Hesse hopkins 6.20.2018
Hesse hopkins 6.20.2018Hesse hopkins 6.20.2018
Hesse hopkins 6.20.2018Bradford Hesse
 
International Journal of Data Mining & Knowledge Management Process - novemb...
International Journal of Data Mining & Knowledge Management Process  - novemb...International Journal of Data Mining & Knowledge Management Process  - novemb...
International Journal of Data Mining & Knowledge Management Process - novemb...IJDKP
 
IRJET- Review on Structural Health Monitoring with the Help of Wireless Sensi...
IRJET- Review on Structural Health Monitoring with the Help of Wireless Sensi...IRJET- Review on Structural Health Monitoring with the Help of Wireless Sensi...
IRJET- Review on Structural Health Monitoring with the Help of Wireless Sensi...IRJET Journal
 
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...ijujournal
 
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thTaunyaCoffman887
 

Ähnlich wie Course reader-title (20)

Jackie Rees
Jackie ReesJackie Rees
Jackie Rees
 
Trends in Information Management
Trends in Information ManagementTrends in Information Management
Trends in Information Management
 
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
 
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanWho Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
 
Trends in Advanced Computing in 2020 - Advanced Computing: An International J...
Trends in Advanced Computing in 2020 - Advanced Computing: An International J...Trends in Advanced Computing in 2020 - Advanced Computing: An International J...
Trends in Advanced Computing in 2020 - Advanced Computing: An International J...
 
Designing a useful and usable mobile EMR application through a participatory...
Designing a useful and usable mobile EMR application through a participatory...Designing a useful and usable mobile EMR application through a participatory...
Designing a useful and usable mobile EMR application through a participatory...
 
Waterloo September 00 Presentations
Waterloo September 00 PresentationsWaterloo September 00 Presentations
Waterloo September 00 Presentations
 
New Research Articles 2020 September Issue International Journal of Software ...
New Research Articles 2020 September Issue International Journal of Software ...New Research Articles 2020 September Issue International Journal of Software ...
New Research Articles 2020 September Issue International Journal of Software ...
 
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
 
The Role of Internet-of-Things (IoT) in Healthcare
The Role of Internet-of-Things (IoT) in HealthcareThe Role of Internet-of-Things (IoT) in Healthcare
The Role of Internet-of-Things (IoT) in Healthcare
 
Webinar: Innovations in Mobile Health: Highlights and Future Directions
Webinar: Innovations in Mobile Health: Highlights and Future DirectionsWebinar: Innovations in Mobile Health: Highlights and Future Directions
Webinar: Innovations in Mobile Health: Highlights and Future Directions
 
cv
cvcv
cv
 
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
 
Analysis and detection of computer viruses and worms
Analysis and detection of computer viruses and wormsAnalysis and detection of computer viruses and worms
Analysis and detection of computer viruses and worms
 
Hesse hopkins 6.20.2018
Hesse hopkins 6.20.2018Hesse hopkins 6.20.2018
Hesse hopkins 6.20.2018
 
International Journal of Data Mining & Knowledge Management Process - novemb...
International Journal of Data Mining & Knowledge Management Process  - novemb...International Journal of Data Mining & Knowledge Management Process  - novemb...
International Journal of Data Mining & Knowledge Management Process - novemb...
 
Big Data and the Internet of Things
Big Data and the Internet of ThingsBig Data and the Internet of Things
Big Data and the Internet of Things
 
IRJET- Review on Structural Health Monitoring with the Help of Wireless Sensi...
IRJET- Review on Structural Health Monitoring with the Help of Wireless Sensi...IRJET- Review on Structural Health Monitoring with the Help of Wireless Sensi...
IRJET- Review on Structural Health Monitoring with the Help of Wireless Sensi...
 
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
 
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve th
 

Mehr von Комсс Файквэе

Rp data breach-investigations-report-2013-en_xg
Rp data breach-investigations-report-2013-en_xgRp data breach-investigations-report-2013-en_xg
Rp data breach-investigations-report-2013-en_xgКомсс Файквэе
 

Mehr von Комсс Файквэе (20)

Ksb 2013 ru
Ksb 2013 ruKsb 2013 ru
Ksb 2013 ru
 
Rp quarterly-threat-q3-2013
Rp quarterly-threat-q3-2013Rp quarterly-threat-q3-2013
Rp quarterly-threat-q3-2013
 
Rp data breach-investigations-report-2013-en_xg
Rp data breach-investigations-report-2013-en_xgRp data breach-investigations-report-2013-en_xg
Rp data breach-investigations-report-2013-en_xg
 
Apwg trends report_q2_2013
Apwg trends report_q2_2013Apwg trends report_q2_2013
Apwg trends report_q2_2013
 
Scimp paper
Scimp paperScimp paper
Scimp paper
 
Analitika web 2012_positive_technologies
Analitika web 2012_positive_technologiesAnalitika web 2012_positive_technologies
Analitika web 2012_positive_technologies
 
B istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-usB istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-us
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 
B intelligence report-08-2013.en-us
B intelligence report-08-2013.en-usB intelligence report-08-2013.en-us
B intelligence report-08-2013.en-us
 
Dtl 2013 q2_home.1.2
Dtl 2013 q2_home.1.2Dtl 2013 q2_home.1.2
Dtl 2013 q2_home.1.2
 
Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012
 
Kaspersky lab av_test_whitelist_test_report
Kaspersky lab av_test_whitelist_test_reportKaspersky lab av_test_whitelist_test_report
Kaspersky lab av_test_whitelist_test_report
 
The modern-malware-review-march-2013
The modern-malware-review-march-2013 The modern-malware-review-march-2013
The modern-malware-review-march-2013
 
Dtl 2012 kl-app_ctl1.2
Dtl 2012 kl-app_ctl1.2Dtl 2012 kl-app_ctl1.2
Dtl 2012 kl-app_ctl1.2
 
Panda labs annual-report-2012
Panda labs annual-report-2012Panda labs annual-report-2012
Panda labs annual-report-2012
 
H02 syllabus
H02 syllabusH02 syllabus
H02 syllabus
 
Rp threat-predictions-2013
Rp threat-predictions-2013Rp threat-predictions-2013
Rp threat-predictions-2013
 
2012 browser phishing
2012 browser phishing2012 browser phishing
2012 browser phishing
 
Technology auto protection_from_exploit
Technology auto protection_from_exploitTechnology auto protection_from_exploit
Technology auto protection_from_exploit
 
Ndss12 woodpecker
Ndss12 woodpeckerNdss12 woodpecker
Ndss12 woodpecker
 

Kürzlich hochgeladen

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Course reader-title

  • 1. EECS 598-008: Medical Device Security. Winter 2013 University of Michigan, Computer Science and Engineering http://www.eecs.umich.edu/courses/eecs598-008/ Instructor: Prof. Kevin Fu N.B.: Additional reading material appears on the website. Printed Course Readings Reader Pages 1 This table of contents p. 0 2 "Software Design" Chapter 16 from Reliable Design of Medical Devices pp. 1-17 by Richard Fries, CRC Press, 2006. (pp. 255-271) 3 "Ramifications of Software Defects" Chapter 2 from Safe and Sound Software: Creating an Efficient and pp. 18-39 Effective Quality System for Software Medical Device Organizations by Thomas H. Faris, Quality Press, 2006. (pp. 21-42) 4 "Dependability Requirements" Chapter 2 from Fundamentals of Dependable Computing for Software pp. 40-64 Engineers by John Knight, CRC Press, 2012. (pp. 27, 41-64) 5 "Battery" Chapter 7 from Design of Cardiac Pacemakers by John G. Webster, IEEE Press, 1995. (pp. pp. 65-74 161-170) 6 "Implantable Cardioverter-Defibrillators" Chapter 19 by Adrianus Djohan from Design of Cardiac pp. 75-95 Pacemakers edited by John G. Webster, IEEE Press, 1995. (pp. 21st) 7 "Microprocessor-Based Pacemaker Design" Appendix by Surekha Palreddy from Design of Cardiac pp. 96-106 Pacemakers edited by John G. Webster, IEEE Press, 1995. (pp. 460-470) 8 "If I Only Changed the Software, Why Is the Phone on Fire" Chapter 6 from If I Only Changed the pp. 107-141 Software, Why Is the Phone on Fire: Embedded Debugging Methods Revealed by Lisa Simone, Elsevier, 2007. (pp. 147-181) 9 "The Case of the Rapid Heartbeat: Meeting the Spirit of the Requirements" Chapter 7 from If I Only pp. 142-170 Changed the Software, Why Is the Phone on Fire: Embedded Debugging Methods Revealed by Lisa Simone, Elsevier, 2007. (pp. 183-211) 10 "Computers and Risk" Chapter 2 from Safeware: System Safety and Computers pp. 171-188 by Nancy G. Leveson, Addison-Wesley, 1995. (pp. 21-38) 11 "Verification of Safety" Chapter 18 from Safeware: System Safety and Computers pp. 189-208 by Nancy G. Leveson, Addison-Wesley, 1995. (pp. 489-508) 12 "Managing Safety and the Safety Culture" Chapter 13 from Engineering a Safer World: Systems Thinking pp. 209-237 Applied to Safety by Nancy G. Leveson, MIT Press, 2011. (pp. 415-443) 13 "Wounds That Don't Heal: Nurses' Experience with Medication Errors" Chapter 9 pp. 238-253 by Linda A. Treiber and Jackie H. Jones from First Do Less Harm by editors Ross Koppel and Suzanne Gordon, Cornell University Press, 2012. (pp. 180-195) 14 "The Framework of Contextual Integrity: Breaking Rules for Good" chapter from Privacy in Context: pp. 254-257 Technology, Policy, and the Integrity of Social Life by Helen Nissenbaum, Stanford Univ. Press, 2010. (pp. 171-174) 15 "The Economics of Cybersecurity" Chapter 9 from Security in Computing pp. 258-289 by Charles P. Pfleeger and Shari Lawrence Pfleeger, Prentice-Hall, 2007. (pp. 571-602) 16 "States and Actions" Chapter 6 from Press On: Principles of Interaction Programming pp. 290-326 by Harold Thimbleby, MIT Press, 2007. (pp. 163-199) 17 "The Food and Drug Administration" Chapter 3 from Reliable Design of Medical Devices pp. 327-353 by Richard Fries, CRC Press, 2006. (pp. 25-51)