Author:
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 52
Book Description
Technical Rationale Behind CSC-STD-003-85, Computer Security Requirements
Technical Rationale Behind CSC-STD-003-85
Author: DIANE Publishing Company
Publisher:
ISBN: 9780788122071
Category :
Languages : en
Pages : 54
Book Description
Two documents in 1: 1. The document Computer Security Requirements establishes computer security requirements for the DoD. 2. The accompanying technical report presents the background discussion for the Computer Security Requirements. The primary focus of both documents is on technical aspects ( e.g., hardware, software, configuration control) of computer security. Also addresses relationship between computer security and personnel. Both documents are concerned with protection against both disclosure and integrity violations. Tables. Glossary.
Publisher:
ISBN: 9780788122071
Category :
Languages : en
Pages : 54
Book Description
Two documents in 1: 1. The document Computer Security Requirements establishes computer security requirements for the DoD. 2. The accompanying technical report presents the background discussion for the Computer Security Requirements. The primary focus of both documents is on technical aspects ( e.g., hardware, software, configuration control) of computer security. Also addresses relationship between computer security and personnel. Both documents are concerned with protection against both disclosure and integrity violations. Tables. Glossary.
Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements -- Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments
Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 40
Book Description
The purpose of this technical report is to present background discussion and rationale for Computer Security Requirements--Guidance for Applying the DoD Trusted Computer System Evaluation Criteria in Specific Environments (henceforth referred to as the Computer Security Requirements). The requirements were prepared in compliance with responsibilities assigned to the Department of Defense (DoD) Computer Security Center (DoDCSC) under DoD Directive 5215.1, which tasks the DoDCSC to "establish and maintain technical standards and criteria for the evaluation of trusted computer systems."
Publisher:
ISBN:
Category :
Languages : en
Pages : 40
Book Description
The purpose of this technical report is to present background discussion and rationale for Computer Security Requirements--Guidance for Applying the DoD Trusted Computer System Evaluation Criteria in Specific Environments (henceforth referred to as the Computer Security Requirements). The requirements were prepared in compliance with responsibilities assigned to the Department of Defense (DoD) Computer Security Center (DoDCSC) under DoD Directive 5215.1, which tasks the DoDCSC to "establish and maintain technical standards and criteria for the evaluation of trusted computer systems."
Data And Computer Security
Author: Dennis Longley
Publisher: Springer
ISBN: 1349111708
Category : Computers
Languages : en
Pages : 437
Book Description
Publisher: Springer
ISBN: 1349111708
Category : Computers
Languages : en
Pages : 437
Book Description
Glossary of Computer Security Terms
Author:
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 68
Book Description
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 68
Book Description
Information Security
Author: Dennis Longley
Publisher: Springer
ISBN: 1349122092
Category : Computers
Languages : en
Pages : 630
Book Description
Focuses mainly on communications and communication standards with emphasis also on risk analysis, ITSEC, EFT and EDI with numerous named viruses described. The dictionary contains extended essays on risk analysis, personal computing, key management, pin management and authentication.
Publisher: Springer
ISBN: 1349122092
Category : Computers
Languages : en
Pages : 630
Book Description
Focuses mainly on communications and communication standards with emphasis also on risk analysis, ITSEC, EFT and EDI with numerous named viruses described. The dictionary contains extended essays on risk analysis, personal computing, key management, pin management and authentication.
14th National Computer Security Conference
Author:
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 762
Book Description
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 762
Book Description
National Computer Security Conference Proceedings, 1992
Author: DIANE Publishing Company
Publisher: DIANE Publishing
ISBN: 9780788102219
Category :
Languages : en
Pages : 416
Book Description
Held October 13-16, 1992. Emphasizes information systems security criteria (& how it affects us), and the actions associated with organizational accreditation. These areas are highlighted by emphasizing how organizations are integrating information security solutions. Includes presentations from government, industry and academia and how they are cooperating to extend the state-of-the-art technology to information systems security. 72 referred papers, trusted systems tutorial and 23 executive summaries. Very valuable! Must buy!
Publisher: DIANE Publishing
ISBN: 9780788102219
Category :
Languages : en
Pages : 416
Book Description
Held October 13-16, 1992. Emphasizes information systems security criteria (& how it affects us), and the actions associated with organizational accreditation. These areas are highlighted by emphasizing how organizations are integrating information security solutions. Includes presentations from government, industry and academia and how they are cooperating to extend the state-of-the-art technology to information systems security. 72 referred papers, trusted systems tutorial and 23 executive summaries. Very valuable! Must buy!
13th National Computer Security Conference
Author:
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 472
Book Description
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 472
Book Description
Defending Secrets, Sharing Data
Author:
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 196
Book Description
Examines Federal policies directed at protecting information, particularly in electronic communications systems. Examines the vulnerability of communications and computer systems, and the trends in technology for safeguarding information in these systems. Addresses important trends taking place in the private sector. Charts and tables.
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 196
Book Description
Examines Federal policies directed at protecting information, particularly in electronic communications systems. Examines the vulnerability of communications and computer systems, and the trends in technology for safeguarding information in these systems. Addresses important trends taking place in the private sector. Charts and tables.