رکورد قبلیرکورد بعدی

" Using the common criteria for IT security evaluation / "


Document Type : BL
Record Number : 953345
Doc. No : b707715
Main Entry : Herrmann, Debra S.
Title & Author : Using the common criteria for IT security evaluation /\ Debra S. Herrmann.
Publication Statement : Boca Raton, Fla. :: Auerbach Publications,, ©2003.
Page. NO : 1 online resource (xvi, 288 pages)
ISBN : 0203972805
: : 0849314046
: : 1420031422
: : 9780203972809
: : 9780849314049
: : 9781420031423
Bibliographies/Indexes : Includes bibliographical references (pages 253-259) and index.
Contents : Introduction<BR>Background<BR>Purpose<BR>Scope<BR>Intended Audience<BR>Organization<BR>What Are the Common Criteria?<BR>History<BR>Purpose and Intended Use<BR>Major Components of the Methodology and How They Work<BR>Relationship to Other Standards<BR>CC User Community and Stakeholders<BR>Future of the CC<BR>Summary<BR>Discussion Problems<BR>Specifying Security Requirements: The Protection Profile<BR>Purpose<BR>Structure<BR>Introduction<BR>TOE Description<BR>TOE Security Environment<BR>Security Objectives<BR>Security Requirements<BR>PP Application Notes<BR>Rationale<BR>Summary<BR>Discussion Problems<BR>Designing a Security Architecture: The Security Target<BR>Purpose<BR>Structure<BR>Introduction<BR>TOE Description<BR>Security Environment<BR>Security Objectives<BR>Security Requirements<BR>TOE Summary Specification<BR>PP Claims<BR>Rationale<BR>Summary<BR>Discussion Problems<BR>Verifying a Security Solution: Security Assurance Activities<BR>Purpose<BR>ISO/IEC 15408-3<BR>Common Evaluation Methodology (CEM)<BR>National Evaluation Schemes<BR>Interpretation of Results<BR>Relation to Security Certification and Accreditation (C&A) Activities<BR>Summary<BR>Discussion Problems<BR>Postscript<BR>ASE-Security Target Evaluation<BR>AVA -- Vulnerability Analysis and Penetration Testing<BR>Services Contracts<BR>Schedules for New CC Standards (ISO/IEC and CCIMB)<BR>Annex A: Glossary of Acronyms and Terms<BR>Annex B: Additional Resources<BR>Standards, Regulations, and Policy (Historical and Current)<BR>Publications<BR>Online Resources<BR>Annex C: Common Criteria Recognition Agreement (CCRA) Participants<BR>Australia and New Zealand<BR>Defence Signals Directorate<BR>Canada<BR>Finland<BR>France<BR>Germany<BR>Greece<BR>Israel<BR>Italy<BR>The Netherlands<BR>Norway<BR>Spain<BR>Sweden<BR>United Kingdom<BR>United States<BR>Annex D: Accredited Common Criteria Evaluation Labs<BR>Australia and New Zealand<BR>Canada<BR>France<BR>Germany<BR>United Kingdom<BR><BR>United StatesAnnex E: Accredited Cryptographic Module Testing Laboratories<BR>Canada<BR>United States<BR>Annex F: Glossary of Classes and Families
Subject : Computer security-- Standards.
Subject : Information technology-- Standards.
Subject : Telecommunication-- Security measures-- Standards.
Subject : Computer security-- Standards.
Subject : COMPUTERS-- Internet-- Security.
Subject : COMPUTERS-- Networking-- Security.
Subject : COMPUTERS-- Security-- General.
Subject : Computersicherheit
Subject : Datensicherung
Subject : Evaluation
Subject : Information technology-- Standards.
Subject : Messung
Subject : Rechnernetz
Subject : Telekommunikationsnetz
Dewey Classification : ‭005.8‬
LC Classification : ‭TK5102.85‬‭.H47 2003eb‬
NLM classification : ‭ST 276‬rvk
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟