Computer security assurance using the common criteria /
Merkow, Mark S.,
Computer security assurance using the common criteria / Mark S. Merkow and Jim Breithaupt. - xxi, 278 pages : illustrations ; 23 cm.
Includes bibliographical references and index.
Ch. 1. Foundations of IT security assurance -- Ch. 2. The common criteria (CC) -- Ch. 3. Participants and activities within the common criteria -- Ch. 4. Developing a protection profile (PP) -- Ch. 5. Developing a security target (ST) -- Ch. 6. The CCToolBox -- Ch. 7. CC interpretations and issue resolution -- Ch. 8. Evaluating target of evaluations -- Ch. 9. Certification process -- Ch. 10. Maintenance of assurance -- Ch. 11. Common criteria "on the job" -- App. A. Sample protection profile (PP) -- App. B. Sample security target -- App. C. Common criteria certificate example -- App. D. Common criteria accredited laboratories -- App. E. Guidance documentation -- App. F. Common criteria terms and definitions.
"Computer Security Assurance Using the Common Criteria helps readers navigate through all the activities within the Common Criteria (CC) that have gained the attention of the security community and will revolutionize how people compare, select, purchase, and maintain security systems. Practical examples aimed at deciphering the contents and activities within the CC help build an understanding that places readers on a path to real-world security assurance applications. Up-to-date coverage explains IT security assurance methodologies and the activities within any of the CC-defined user roles that are necessary for high quality and proven secure IT software and hardware."--Jacket.
1401862659 9781401862657
2004003373
Computer security.
Computer networks--Security measures.
QA76.9.A25 / M48 2004
005.8 ME.C 2005 G.C
Computer security assurance using the common criteria / Mark S. Merkow and Jim Breithaupt. - xxi, 278 pages : illustrations ; 23 cm.
Includes bibliographical references and index.
Ch. 1. Foundations of IT security assurance -- Ch. 2. The common criteria (CC) -- Ch. 3. Participants and activities within the common criteria -- Ch. 4. Developing a protection profile (PP) -- Ch. 5. Developing a security target (ST) -- Ch. 6. The CCToolBox -- Ch. 7. CC interpretations and issue resolution -- Ch. 8. Evaluating target of evaluations -- Ch. 9. Certification process -- Ch. 10. Maintenance of assurance -- Ch. 11. Common criteria "on the job" -- App. A. Sample protection profile (PP) -- App. B. Sample security target -- App. C. Common criteria certificate example -- App. D. Common criteria accredited laboratories -- App. E. Guidance documentation -- App. F. Common criteria terms and definitions.
"Computer Security Assurance Using the Common Criteria helps readers navigate through all the activities within the Common Criteria (CC) that have gained the attention of the security community and will revolutionize how people compare, select, purchase, and maintain security systems. Practical examples aimed at deciphering the contents and activities within the CC help build an understanding that places readers on a path to real-world security assurance applications. Up-to-date coverage explains IT security assurance methodologies and the activities within any of the CC-defined user roles that are necessary for high quality and proven secure IT software and hardware."--Jacket.
1401862659 9781401862657
2004003373
Computer security.
Computer networks--Security measures.
QA76.9.A25 / M48 2004
005.8 ME.C 2005 G.C