Using the Common Criteria for IT Security Evaluation

Using the Common Criteria for IT Security Evaluation
Author :
Publisher : CRC Press
Total Pages : 306
Release :
ISBN-10 : 9781420031423
ISBN-13 : 1420031422
Rating : 4/5 (23 Downloads)

Book Synopsis Using the Common Criteria for IT Security Evaluation by : Debra S. Herrmann

Download or read book Using the Common Criteria for IT Security Evaluation written by Debra S. Herrmann and published by CRC Press. This book was released on 2002-12-27 with total page 306 pages. Available in PDF, EPUB and Kindle. Book excerpt: Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their acquisition process. In fact, in July 2002 the U.S. National Information Assurance Acquisition Policy (NSTISSP #11) mandated the use of CC evaluated IT security products in critical infrastruc


Using the Common Criteria for IT Security Evaluation Related Books

Using the Common Criteria for IT Security Evaluation
Language: en
Pages: 306
Authors: Debra S. Herrmann
Categories: Computers
Type: BOOK - Published: 2002-12-27 - Publisher: CRC Press

DOWNLOAD EBOOK

Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their ac
Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations
Language: en
Pages: 1008
Authors: Hossein Bidgoli
Categories: Business & Economics
Type: BOOK - Published: 2006-03-10 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on in
Official (ISC)2® Guide to the ISSAP® CBK
Language: en
Pages: 586
Authors: (ISC)2 Corporate
Categories: Computers
Type: BOOK - Published: 2017-01-06 - Publisher: CRC Press

DOWNLOAD EBOOK

Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also ne
New Approaches for Security, Privacy and Trust in Complex Environments
Language: en
Pages: 510
Authors: Hein Venter
Categories: Computers
Type: BOOK - Published: 2007-11-10 - Publisher: Springer

DOWNLOAD EBOOK

The current IT environment deals with novel, complex approaches such as information privacy, trust, digital forensics, management, and human aspects. This volum
A Practical Guide to Security Engineering and Information Assurance
Language: en
Pages: 410
Authors: Debra S. Herrmann
Categories: Business & Economics
Type: BOOK - Published: 2001-10-18 - Publisher: CRC Press

DOWNLOAD EBOOK

Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made,