|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocm61106843 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
050719s2003 flu ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCLCQ
|d YDXCP
|d OCLCQ
|d CEF
|d REDDC
|d VLB
|d IDEBK
|d E7B
|d MERUC
|d OCLCQ
|d TULIB
|d OCLCO
|d OCLCQ
|d CRCPR
|d OCLCQ
|d OCLCO
|d VVJ
|d OCLCQ
|d UAB
|d OCLCF
|d OCLCO
|d OCLCQ
|d OCLCA
|d UKMGB
|d OCLCO
|d TYFRS
|d LEAUB
|d UKAHL
|d OL$
|d NLW
|d OCLCO
|d OCLCA
|d SFB
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB7C6809
|2 bnb
|
016 |
7 |
|
|a 018428236
|2 Uk
|
019 |
|
|
|a 61280438
|a 70746573
|a 173240600
|a 559434737
|a 646729265
|a 666900689
|a 779907822
|
020 |
|
|
|a 0203972805
|q (electronic bk.)
|
020 |
|
|
|a 9780203972809
|q (electronic bk.)
|
020 |
|
|
|a 1420031422
|
020 |
|
|
|a 9781420031423
|
020 |
|
|
|a 0849314046
|q (alk. paper)
|
020 |
|
|
|a 9780849314049
|q (alk. paper)
|
029 |
1 |
|
|a AU@
|b 000065446647
|
029 |
1 |
|
|a NZ1
|b 11925468
|
029 |
1 |
|
|a NZ1
|b 13337659
|
029 |
1 |
|
|a UKMGB
|b 018428236
|
035 |
|
|
|a (OCoLC)61106843
|z (OCoLC)61280438
|z (OCoLC)70746573
|z (OCoLC)173240600
|z (OCoLC)559434737
|z (OCoLC)646729265
|z (OCoLC)666900689
|z (OCoLC)779907822
|
037 |
|
|
|a TANDF_183201
|b Ingram Content Group
|
050 |
|
4 |
|a TK5102.85
|b .H47 2003eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
084 |
|
|
|a ST 276
|2 rvk
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Herrmann, Debra S.
|
245 |
1 |
0 |
|a Using the common criteria for IT security evaluation /
|c Debra S. Herrmann.
|
260 |
|
|
|a Boca Raton, Fla. :
|b Auerbach Publications,
|c ©2003.
|
300 |
|
|
|a 1 online resource (xvi, 288 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references (pages 253-259) and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Introduction<BR>Background<BR>Purpose<BR>Scope<BR>Intended Audience<BR>Organization<BR>What Are the Common Criteria?<BR>History<BR>Purpose and Intended Use<BR>Major Components of the Methodology and How They Work<BR>Relationship to Other Standards<BR>CC User Community and Stakeholders<BR>Future of the CC<BR>Summary<BR>Discussion Problems<BR>Specifying Security Requirements: The Protection Profile<BR>Purpose<BR>Structure<BR>Introduction<BR>TOE Description<BR>TOE Security Environment<BR>Security Objectives<BR>Security Requirements<BR>PP Application Notes<BR>Rationale<BR>Summary<BR>Discussion Problems<BR>Designing a Security Architecture: The Security Target<BR>Purpose<BR>Structure<BR>Introduction<BR>TOE Description<BR>Security Environment<BR>Security Objectives<BR>Security Requirements<BR>TOE Summary Specification<BR>PP Claims<BR>Rationale<BR>Summary<BR>Discussion Problems<BR>Verifying a Security Solution: Security Assurance Activities<BR>Purpose<BR>ISO/IEC 15408-3<BR>Common Evaluation Methodology (CEM)<BR>National Evaluation Schemes<BR>Interpretation of Results<BR>Relation to Security Certification and Accreditation (C & A) Activities<BR>Summary<BR>Discussion Problems<BR>Postscript<BR>ASE-Security Target Evaluation<BR>AVA -- Vulnerability Analysis and Penetration Testing<BR>Services Contracts<BR>Schedules for New CC Standards (ISO/IEC and CCIMB)<BR>Annex A: Glossary of Acronyms and Terms<BR>Annex B: Additional Resources<BR>Standards, Regulations, and Policy (Historical and Current)<BR>Publications<BR>Online Resources<BR>Annex C: Common Criteria Recognition Agreement (CCRA) Participants<BR>Australia and New Zealand<BR>Defence Signals Directorate<BR>Canada<BR>Finland<BR>France<BR>Germany<BR>Greece<BR>Israel<BR>Italy<BR>The Netherlands<BR>Norway<BR>Spain<BR>Sweden<BR>United Kingdom<BR>United States<BR>Annex D: Accredited Common Criteria Evaluation Labs<BR>Australia and New Zealand<BR>Canada<BR>France<BR>Germany<BR>United Kingdom<BR><BR>United StatesAnnex E: Accredited Cryptographic Module Testing Laboratories<BR>Canada<BR>United States<BR>Annex F: Glossary of Classes and Families
|
520 |
|
|
|a This book "explains how and why to use the 'common criteria' during the acquisition, implementation or evaluation of an IT product, system, network or services contract. The text describes the 'common criteria' methodology ; the major processes, steps, activities, concepts, terminology, and how the CC methodology is used throughout the life of a system."--Back cover
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Telecommunication
|x Security measures
|x Standards.
|
650 |
|
0 |
|a Computer security
|x Standards.
|
650 |
|
0 |
|a Information technology
|x Standards.
|
650 |
|
6 |
|a Télécommunications
|x Sécurité
|x Mesures
|x Normes.
|
650 |
|
6 |
|a Sécurité informatique
|x Normes.
|
650 |
|
6 |
|a Technologie de l'information
|x Normes.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|x Standards
|2 fast
|
650 |
|
7 |
|a Information technology
|x Standards
|2 fast
|
650 |
|
7 |
|a Datensicherung
|2 gnd
|
650 |
|
7 |
|a Messung
|2 gnd
|
650 |
|
7 |
|a Evaluation
|2 gnd
|
650 |
|
7 |
|a Telekommunikationsnetz
|2 gnd
|
650 |
|
7 |
|a Rechnernetz
|2 gnd
|
650 |
|
7 |
|a Computersicherheit
|2 gnd
|
776 |
0 |
8 |
|i Print version:
|a Herrmann, Debra S.
|t Using the common criteria for IT security evaluation.
|d Boca Raton, Fla. : Auerbach Publications, ©2003
|z 0849314046
|w (DLC) 2002033250
|w (OCoLC)50561866
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781420031423/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH19671437
|
938 |
|
|
|a CRC Press
|b CRCP
|n AUP0AUE1404PDF
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10075410
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 135511
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 112723
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n 9780429134098
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2288651
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2643155
|
994 |
|
|
|a 92
|b IZTAP
|