MARC details
000 -LEADER |
fixed length control field |
02920cam a2200421 i 4500 |
001 - CONTROL NUMBER |
control field |
13487868 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230531145119.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
040211s2005 nyua b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2004003373 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1401862659 |
Qualifying information |
paperback |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781401862657 |
Qualifying information |
paperback |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Modifying agency |
DLC |
-- |
EG-CaTKH |
Description conventions |
rda |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
M48 2004 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 ME.C 2005 G.C |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Merkow, Mark S., |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Computer security assurance using the common criteria / |
Statement of responsibility, etc. |
Mark S. Merkow and Jim Breithaupt. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Clifton Park, NY : |
Name of producer, publisher, distributor, manufacturer |
Thompson Delmar Learning, |
Date of production, publication, distribution, manufacture, or copyright notice |
2005. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxi, 278 pages : |
Other physical details |
illustrations ; |
Dimensions |
23 cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Ch. 1. Foundations of IT security assurance -- Ch. 2. The common criteria (CC) -- Ch. 3. Participants and activities within the common criteria -- Ch. 4. Developing a protection profile (PP) -- Ch. 5. Developing a security target (ST) -- Ch. 6. The CCToolBox -- Ch. 7. CC interpretations and issue resolution -- Ch. 8. Evaluating target of evaluations -- Ch. 9. Certification process -- Ch. 10. Maintenance of assurance -- Ch. 11. Common criteria "on the job" -- App. A. Sample protection profile (PP) -- App. B. Sample security target -- App. C. Common criteria certificate example -- App. D. Common criteria accredited laboratories -- App. E. Guidance documentation -- App. F. Common criteria terms and definitions. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"Computer Security Assurance Using the Common Criteria helps readers navigate through all the activities within the Common Criteria (CC) that have gained the attention of the security community and will revolutionize how people compare, select, purchase, and maintain security systems. Practical examples aimed at deciphering the contents and activities within the CC help build an understanding that places readers on a path to real-world security assurance applications. Up-to-date coverage explains IT security assurance methodologies and the activities within any of the CC-defined user roles that are necessary for high quality and proven secure IT software and hardware."--Jacket. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Breithaupt, Jim, |
Dates associated with a name |
1955- |
Relator term |
author. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
yomna.nassar |
Cataloging process |
p |
First Date, FD (RLIN) |
20230531 |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
mona.romia |
Cataloging process |
R |
First Date, FD (RLIN) |
20230531 |
856 41 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Table of contents |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Contributor biographical information |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Publisher description |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |