Computer security assurance using the common criteria / Mark S. Merkow and Jim Breithaupt.Material type: TextPublisher: Clifton Park, NY : Thompson Delmar Learning, 2005Description: xxi, 278 pages : illustrations ; 23 cmContent type:
- 005.8 ME.C 2005 G.C 23
- QA76.9.A25 M48 2004
|Item type||Current library||Collection||Call number||Status||Date due||Barcode|
|Books||The Knowledge Hub Library||Gift collections||005.8 ME.C 2005 G.C (Browse shelf(Opens below))||Available||191621|
Includes bibliographical references and index.
Ch. 1. Foundations of IT security assurance -- Ch. 2. The common criteria (CC) -- Ch. 3. Participants and activities within the common criteria -- Ch. 4. Developing a protection profile (PP) -- Ch. 5. Developing a security target (ST) -- Ch. 6. The CCToolBox -- Ch. 7. CC interpretations and issue resolution -- Ch. 8. Evaluating target of evaluations -- Ch. 9. Certification process -- Ch. 10. Maintenance of assurance -- Ch. 11. Common criteria "on the job" -- App. A. Sample protection profile (PP) -- App. B. Sample security target -- App. C. Common criteria certificate example -- App. D. Common criteria accredited laboratories -- App. E. Guidance documentation -- App. F. Common criteria terms and definitions.
"Computer Security Assurance Using the Common Criteria helps readers navigate through all the activities within the Common Criteria (CC) that have gained the attention of the security community and will revolutionize how people compare, select, purchase, and maintain security systems. Practical examples aimed at deciphering the contents and activities within the CC help build an understanding that places readers on a path to real-world security assurance applications. Up-to-date coverage explains IT security assurance methodologies and the activities within any of the CC-defined user roles that are necessary for high quality and proven secure IT software and hardware."--Jacket.