Author: United States. Department of Defense
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 132
Book Description
Department of Defense Trusted Computer System Evaluation Criteria
Author: United States. Department of Defense
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 132
Book Description
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 132
Book Description
Department of Defense Trusted Computer System Evaluation Criteria
Computer Security Requirements
Author:
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 24
Book Description
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 24
Book Description
Department of Defense Trusted Computer System Evaluation Criteria
Author: United States. Dept. of Defense
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 136
Book Description
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 136
Book Description
Department of Defense Trusted Computer System Evaluation Criteria
Author: United States. Department of Defense
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 122
Book Description
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 122
Book Description
Department of Defense Trusted Computer System Evaluation Criteria
Author: United States. Department of Defense
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 122
Book Description
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 122
Book Description
Department of Defense Trusted Computer System Evaluation Criteria
Author: Sheila Brand
Publisher:
ISBN: 9780788143250
Category : Computers
Languages : en
Pages : 122
Book Description
Presents trusted computer system evaluation criteria providing a basis for the evaluation of effectiveness of security controls built into automatic data processing systems. Provides a standard to manufacturers as to what security features to build into new and planned commercial products, a metric with which to evaluate the degree of trust that can be placed in computer systems for the secure processing of classified and other sensitive information, and a basis for specifying security requirements in acquisition specifications. Includes appendices, glossary and references.
Publisher:
ISBN: 9780788143250
Category : Computers
Languages : en
Pages : 122
Book Description
Presents trusted computer system evaluation criteria providing a basis for the evaluation of effectiveness of security controls built into automatic data processing systems. Provides a standard to manufacturers as to what security features to build into new and planned commercial products, a metric with which to evaluate the degree of trust that can be placed in computer systems for the secure processing of classified and other sensitive information, and a basis for specifying security requirements in acquisition specifications. Includes appendices, glossary and references.
Computers at Risk
Author: National Research Council
Publisher: National Academies Press
ISBN: 0309043883
Category : Computers
Languages : en
Pages : 320
Book Description
Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.
Publisher: National Academies Press
ISBN: 0309043883
Category : Computers
Languages : en
Pages : 320
Book Description
Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.
The 'Orange Book' Series
Author: US Department of Defense
Publisher: Springer
ISBN: 1349120200
Category : Computers
Languages : en
Pages : 1228
Book Description
'...the most widely accepted set of criteria for computer security.' Financial Times The 'Orange Book' Series, produced by the American Department of Defense is as yet the only guide to effective computer security for both military and commercial sectors. These 17 documents provide a comprehensive set of guidelines both for people needing to introduce computer security measures and for companies developing secure computer systems and products. It contains details of the various security mechanisms that have been developed over time and the relevance of these to existing policies; how to test for an adequate implementation in a product and engineering techniques to be used as part of the assurance activities that form part of the product evaluation.
Publisher: Springer
ISBN: 1349120200
Category : Computers
Languages : en
Pages : 1228
Book Description
'...the most widely accepted set of criteria for computer security.' Financial Times The 'Orange Book' Series, produced by the American Department of Defense is as yet the only guide to effective computer security for both military and commercial sectors. These 17 documents provide a comprehensive set of guidelines both for people needing to introduce computer security measures and for companies developing secure computer systems and products. It contains details of the various security mechanisms that have been developed over time and the relevance of these to existing policies; how to test for an adequate implementation in a product and engineering techniques to be used as part of the assurance activities that form part of the product evaluation.