TY - BOOK AU - Merkow,Mark S. AU - Breithaupt,Jim TI - Computer security assurance using the common criteria / SN - 1401862659 AV - QA76.9.A25 M48 2004 U1 - 005.8 ME.C 2005 G.C 23 PY - 2005/// CY - Clifton Park, NY : PB - Thompson Delmar Learning KW - Computer security KW - Computer networks KW - Security measures N1 - Includes bibliographical references and index; Ch. 1. Foundations of IT security assurance -- Ch. 2. The common criteria (CC) -- Ch. 3. Participants and activities within the common criteria -- Ch. 4. Developing a protection profile (PP) -- Ch. 5. Developing a security target (ST) -- Ch. 6. The CCToolBox -- Ch. 7. CC interpretations and issue resolution -- Ch. 8. Evaluating target of evaluations -- Ch. 9. Certification process -- Ch. 10. Maintenance of assurance -- Ch. 11. Common criteria "on the job" -- App. A. Sample protection profile (PP) -- App. B. Sample security target -- App. C. Common criteria certificate example -- App. D. Common criteria accredited laboratories -- App. E. Guidance documentation -- App. F. Common criteria terms and definitions N2 - "Computer Security Assurance Using the Common Criteria helps readers navigate through all the activities within the Common Criteria (CC) that have gained the attention of the security community and will revolutionize how people compare, select, purchase, and maintain security systems. Practical examples aimed at deciphering the contents and activities within the CC help build an understanding that places readers on a path to real-world security assurance applications. Up-to-date coverage explains IT security assurance methodologies and the activities within any of the CC-defined user roles that are necessary for high quality and proven secure IT software and hardware."--Jacket ER -