Computer security assurance using the common criteria / Mark S. Merkow and Jim Breithaupt.
Material type: TextPublisher: Clifton Park, NY : Thompson Delmar Learning, 2005Description: xxi, 278 pages : illustrations ; 23 cmContent type:- text
- unmediated
- volume
- 1401862659
- 9781401862657
- 005.8 ME.C 2005 G.C 23
- QA76.9.A25 M48 2004
Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Books | The Knowledge Hub Library | Gift collections | 005.8 ME.C 2005 G.C (Browse shelf(Opens below)) | Available | 191621 |
Browsing The Knowledge Hub Library shelves, Collection: Gift collections Close shelf browser (Hides shelf browser)
005.8 JO.R 2006 G.C Real digital forensics : computer security and incident response / | 005.8 KE.N 2009 G.C Network access control for dummies / | 005.8 MA.A 2009 G.C Applied security visualization / | 005.8 ME.C 2005 G.C Computer security assurance using the common criteria / | 005.8 MI.S 2009 G.C Security administrator street smarts : a real world guide to CompTIA Security+ skills / | 005.8 NE.C 2010 G.C Computer security : protecting digital resources / | 005.8 PA.A 2009 G.C Advances in information security and its application : third International conference, ISA 2009, Seoul, Korea, June 2009, proceedings / |
Includes bibliographical references and index.
Ch. 1. Foundations of IT security assurance -- Ch. 2. The common criteria (CC) -- Ch. 3. Participants and activities within the common criteria -- Ch. 4. Developing a protection profile (PP) -- Ch. 5. Developing a security target (ST) -- Ch. 6. The CCToolBox -- Ch. 7. CC interpretations and issue resolution -- Ch. 8. Evaluating target of evaluations -- Ch. 9. Certification process -- Ch. 10. Maintenance of assurance -- Ch. 11. Common criteria "on the job" -- App. A. Sample protection profile (PP) -- App. B. Sample security target -- App. C. Common criteria certificate example -- App. D. Common criteria accredited laboratories -- App. E. Guidance documentation -- App. F. Common criteria terms and definitions.
"Computer Security Assurance Using the Common Criteria helps readers navigate through all the activities within the Common Criteria (CC) that have gained the attention of the security community and will revolutionize how people compare, select, purchase, and maintain security systems. Practical examples aimed at deciphering the contents and activities within the CC help build an understanding that places readers on a path to real-world security assurance applications. Up-to-date coverage explains IT security assurance methodologies and the activities within any of the CC-defined user roles that are necessary for high quality and proven secure IT software and hardware."--Jacket.
There are no comments on this title.