Amazon cover image
Image from Amazon.com

Computer security assurance using the common criteria / Mark S. Merkow and Jim Breithaupt.

By: Contributor(s): Material type: TextTextPublisher: Clifton Park, NY : Thompson Delmar Learning, 2005Description: xxi, 278 pages : illustrations ; 23 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 1401862659
  • 9781401862657
Subject(s): DDC classification:
  • 005.8 ME.C 2005 G.C 23
LOC classification:
  • QA76.9.A25 M48 2004
Online resources:
Contents:
Ch. 1. Foundations of IT security assurance -- Ch. 2. The common criteria (CC) -- Ch. 3. Participants and activities within the common criteria -- Ch. 4. Developing a protection profile (PP) -- Ch. 5. Developing a security target (ST) -- Ch. 6. The CCToolBox -- Ch. 7. CC interpretations and issue resolution -- Ch. 8. Evaluating target of evaluations -- Ch. 9. Certification process -- Ch. 10. Maintenance of assurance -- Ch. 11. Common criteria "on the job" -- App. A. Sample protection profile (PP) -- App. B. Sample security target -- App. C. Common criteria certificate example -- App. D. Common criteria accredited laboratories -- App. E. Guidance documentation -- App. F. Common criteria terms and definitions.
Summary: "Computer Security Assurance Using the Common Criteria helps readers navigate through all the activities within the Common Criteria (CC) that have gained the attention of the security community and will revolutionize how people compare, select, purchase, and maintain security systems. Practical examples aimed at deciphering the contents and activities within the CC help build an understanding that places readers on a path to real-world security assurance applications. Up-to-date coverage explains IT security assurance methodologies and the activities within any of the CC-defined user roles that are necessary for high quality and proven secure IT software and hardware."--Jacket.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books The Knowledge Hub Library Gift collections 005.8 ME.C 2005 G.C (Browse shelf(Opens below)) Available 191621

Includes bibliographical references and index.

Ch. 1. Foundations of IT security assurance -- Ch. 2. The common criteria (CC) -- Ch. 3. Participants and activities within the common criteria -- Ch. 4. Developing a protection profile (PP) -- Ch. 5. Developing a security target (ST) -- Ch. 6. The CCToolBox -- Ch. 7. CC interpretations and issue resolution -- Ch. 8. Evaluating target of evaluations -- Ch. 9. Certification process -- Ch. 10. Maintenance of assurance -- Ch. 11. Common criteria "on the job" -- App. A. Sample protection profile (PP) -- App. B. Sample security target -- App. C. Common criteria certificate example -- App. D. Common criteria accredited laboratories -- App. E. Guidance documentation -- App. F. Common criteria terms and definitions.

"Computer Security Assurance Using the Common Criteria helps readers navigate through all the activities within the Common Criteria (CC) that have gained the attention of the security community and will revolutionize how people compare, select, purchase, and maintain security systems. Practical examples aimed at deciphering the contents and activities within the CC help build an understanding that places readers on a path to real-world security assurance applications. Up-to-date coverage explains IT security assurance methodologies and the activities within any of the CC-defined user roles that are necessary for high quality and proven secure IT software and hardware."--Jacket.

There are no comments on this title.

to post a comment.