Using the Common Criteria for IT Security Evaluation

Using the Common Criteria for IT Security Evaluation
Author :
Publisher : CRC Press
Total Pages : 306
Release :
ISBN-10 : 9781420031423
ISBN-13 : 1420031422
Rating : 4/5 (23 Downloads)

Book Synopsis Using the Common Criteria for IT Security Evaluation by : Debra S. Herrmann

Download or read book Using the Common Criteria for IT Security Evaluation written by Debra S. Herrmann and published by CRC Press. This book was released on 2002-12-27 with total page 306 pages. Available in PDF, EPUB and Kindle. Book excerpt: Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their acquisition process. In fact, in July 2002 the U.S. National Information Assurance Acquisition Policy (NSTISSP #11) mandated the use of CC evaluated IT security products in critical infrastruc


Using the Common Criteria for IT Security Evaluation Related Books

Using the Common Criteria for IT Security Evaluation
Language: en
Pages: 306
Authors: Debra S. Herrmann
Categories: Computers
Type: BOOK - Published: 2002-12-27 - Publisher: CRC Press

DOWNLOAD EBOOK

Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their ac
Common Criteria for IT Security Evaluation
Language: en
Pages:
Authors:
Categories: Computer security
Type: BOOK - Published: 2002 - Publisher:

DOWNLOAD EBOOK

Defines criteria to be used as the basis for evaluation of the security properties of information technology and systems.
Common Criteria for Information Technology Security Evaluation
Language: en
Pages: 218
Authors:
Categories:
Type: BOOK - Published: 2002 - Publisher:

DOWNLOAD EBOOK

Common Criteria for Information Technology Security Evaluation. Part 2, Security Functional Requirements [electronic Resource]
Language: en
Pages:
Encyclopedia of Cryptography and Security
Language: en
Pages: 1457
Authors: Henk C.A. van Tilborg
Categories: Computers
Type: BOOK - Published: 2014-07-08 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the