Cargando…

Using the common criteria for IT security evaluation /

This book "explains how and why to use the 'common criteria' during the acquisition, implementation or evaluation of an IT product, system, network or services contract. The text describes the 'common criteria' methodology ; the major processes, steps, activities, concepts,...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Herrmann, Debra S.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton, Fla. : Auerbach Publications, ©2003.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocm61106843
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 050719s2003 flu ob 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d YDXCP  |d OCLCQ  |d CEF  |d REDDC  |d VLB  |d IDEBK  |d E7B  |d MERUC  |d OCLCQ  |d TULIB  |d OCLCO  |d OCLCQ  |d CRCPR  |d OCLCQ  |d OCLCO  |d VVJ  |d OCLCQ  |d UAB  |d OCLCF  |d OCLCO  |d OCLCQ  |d OCLCA  |d UKMGB  |d OCLCO  |d TYFRS  |d LEAUB  |d UKAHL  |d OL$  |d NLW  |d OCLCO  |d OCLCA  |d SFB  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB7C6809  |2 bnb 
016 7 |a 018428236  |2 Uk 
019 |a 61280438  |a 70746573  |a 173240600  |a 559434737  |a 646729265  |a 666900689  |a 779907822 
020 |a 0203972805  |q (electronic bk.) 
020 |a 9780203972809  |q (electronic bk.) 
020 |a 1420031422 
020 |a 9781420031423 
020 |a 0849314046  |q (alk. paper) 
020 |a 9780849314049  |q (alk. paper) 
029 1 |a AU@  |b 000065446647 
029 1 |a NZ1  |b 11925468 
029 1 |a NZ1  |b 13337659 
029 1 |a UKMGB  |b 018428236 
035 |a (OCoLC)61106843  |z (OCoLC)61280438  |z (OCoLC)70746573  |z (OCoLC)173240600  |z (OCoLC)559434737  |z (OCoLC)646729265  |z (OCoLC)666900689  |z (OCoLC)779907822 
037 |a TANDF_183201  |b Ingram Content Group 
050 4 |a TK5102.85  |b .H47 2003eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
084 |a ST 276  |2 rvk 
049 |a UAMI 
100 1 |a Herrmann, Debra S. 
245 1 0 |a Using the common criteria for IT security evaluation /  |c Debra S. Herrmann. 
260 |a Boca Raton, Fla. :  |b Auerbach Publications,  |c ©2003. 
300 |a 1 online resource (xvi, 288 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references (pages 253-259) and index. 
588 0 |a Print version record. 
505 0 |a Introduction<BR>Background<BR>Purpose<BR>Scope<BR>Intended Audience<BR>Organization<BR>What Are the Common Criteria?<BR>History<BR>Purpose and Intended Use<BR>Major Components of the Methodology and How They Work<BR>Relationship to Other Standards<BR>CC User Community and Stakeholders<BR>Future of the CC<BR>Summary<BR>Discussion Problems<BR>Specifying Security Requirements: The Protection Profile<BR>Purpose<BR>Structure<BR>Introduction<BR>TOE Description<BR>TOE Security Environment<BR>Security Objectives<BR>Security Requirements<BR>PP Application Notes<BR>Rationale<BR>Summary<BR>Discussion Problems<BR>Designing a Security Architecture: The Security Target<BR>Purpose<BR>Structure<BR>Introduction<BR>TOE Description<BR>Security Environment<BR>Security Objectives<BR>Security Requirements<BR>TOE Summary Specification<BR>PP Claims<BR>Rationale<BR>Summary<BR>Discussion Problems<BR>Verifying a Security Solution: Security Assurance Activities<BR>Purpose<BR>ISO/IEC 15408-3<BR>Common Evaluation Methodology (CEM)<BR>National Evaluation Schemes<BR>Interpretation of Results<BR>Relation to Security Certification and Accreditation (C & A) Activities<BR>Summary<BR>Discussion Problems<BR>Postscript<BR>ASE-Security Target Evaluation<BR>AVA -- Vulnerability Analysis and Penetration Testing<BR>Services Contracts<BR>Schedules for New CC Standards (ISO/IEC and CCIMB)<BR>Annex A: Glossary of Acronyms and Terms<BR>Annex B: Additional Resources<BR>Standards, Regulations, and Policy (Historical and Current)<BR>Publications<BR>Online Resources<BR>Annex C: Common Criteria Recognition Agreement (CCRA) Participants<BR>Australia and New Zealand<BR>Defence Signals Directorate<BR>Canada<BR>Finland<BR>France<BR>Germany<BR>Greece<BR>Israel<BR>Italy<BR>The Netherlands<BR>Norway<BR>Spain<BR>Sweden<BR>United Kingdom<BR>United States<BR>Annex D: Accredited Common Criteria Evaluation Labs<BR>Australia and New Zealand<BR>Canada<BR>France<BR>Germany<BR>United Kingdom<BR><BR>United StatesAnnex E: Accredited Cryptographic Module Testing Laboratories<BR>Canada<BR>United States<BR>Annex F: Glossary of Classes and Families 
520 |a This book "explains how and why to use the 'common criteria' during the acquisition, implementation or evaluation of an IT product, system, network or services contract. The text describes the 'common criteria' methodology ; the major processes, steps, activities, concepts, terminology, and how the CC methodology is used throughout the life of a system."--Back cover 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Telecommunication  |x Security measures  |x Standards. 
650 0 |a Computer security  |x Standards. 
650 0 |a Information technology  |x Standards. 
650 6 |a Télécommunications  |x Sécurité  |x Mesures  |x Normes. 
650 6 |a Sécurité informatique  |x Normes. 
650 6 |a Technologie de l'information  |x Normes. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |x Standards  |2 fast 
650 7 |a Information technology  |x Standards  |2 fast 
650 7 |a Datensicherung  |2 gnd 
650 7 |a Messung  |2 gnd 
650 7 |a Evaluation  |2 gnd 
650 7 |a Telekommunikationsnetz  |2 gnd 
650 7 |a Rechnernetz  |2 gnd 
650 7 |a Computersicherheit  |2 gnd 
776 0 8 |i Print version:  |a Herrmann, Debra S.  |t Using the common criteria for IT security evaluation.  |d Boca Raton, Fla. : Auerbach Publications, ©2003  |z 0849314046  |w (DLC) 2002033250  |w (OCoLC)50561866 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781420031423/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH19671437 
938 |a CRC Press  |b CRCP  |n AUP0AUE1404PDF 
938 |a ebrary  |b EBRY  |n ebr10075410 
938 |a EBSCOhost  |b EBSC  |n 135511 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 112723 
938 |a Taylor & Francis  |b TAFR  |n 9780429134098 
938 |a YBP Library Services  |b YANK  |n 2288651 
938 |a YBP Library Services  |b YANK  |n 2643155 
994 |a 92  |b IZTAP