Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Herrmann, Debra S.

Title Using the common criteria for IT security evaluation / Debra S. Herrmann. [O'Reilly electronic resource]

Imprint Boca Raton, Fla. : Auerbach Publications, ©2003.
QR Code
Description 1 online resource (xvi, 288 pages)
Bibliography Includes bibliographical references (pages 253-259) and index.
Contents Introduction<BR>Background<BR>Purpose<BR>Scope<BR>Intended Audience<BR>Organization<BR>What Are the Common Criteria?<BR>History<BR>Purpose and Intended Use<BR>Major Components of the Methodology and How They Work<BR>Relationship to Other Standards<BR>CC User Community and Stakeholders<BR>Future of the CC<BR>Summary<BR>Discussion Problems<BR>Specifying Security Requirements: The Protection Profile<BR>Purpose<BR>Structure<BR>Introduction<BR>TOE Description<BR>TOE Security Environment<BR>Security Objectives<BR>Security Requirements<BR>PP Application Notes<BR>Rationale<BR>Summary<BR>Discussion Problems<BR>Designing a Security Architecture: The Security Target<BR>Purpose<BR>Structure<BR>Introduction<BR>TOE Description<BR>Security Environment<BR>Security Objectives<BR>Security Requirements<BR>TOE Summary Specification<BR>PP Claims<BR>Rationale<BR>Summary<BR>Discussion Problems<BR>Verifying a Security Solution: Security Assurance Activities<BR>Purpose<BR>ISO/IEC 15408-3<BR>Common Evaluation Methodology (CEM)<BR>National Evaluation Schemes<BR>Interpretation of Results<BR>Relation to Security Certification and Accreditation (C & A) Activities<BR>Summary<BR>Discussion Problems<BR>Postscript<BR>ASE-Security Target Evaluation<BR>AVA -- Vulnerability Analysis and Penetration Testing<BR>Services Contracts<BR>Schedules for New CC Standards (ISO/IEC and CCIMB)<BR>Annex A: Glossary of Acronyms and Terms<BR>Annex B: Additional Resources<BR>Standards, Regulations, and Policy (Historical and Current)<BR>Publications<BR>Online Resources<BR>Annex C: Common Criteria Recognition Agreement (CCRA) Participants<BR>Australia and New Zealand<BR>Defence Signals Directorate<BR>Canada<BR>Finland<BR>France<BR>Germany<BR>Greece<BR>Israel<BR>Italy<BR>The Netherlands<BR>Norway<BR>Spain<BR>Sweden<BR>United Kingdom<BR>United States<BR>Annex D: Accredited Common Criteria Evaluation Labs<BR>Australia and New Zealand<BR>Canada<BR>France<BR>Germany<BR>United Kingdom<BR><BR>United StatesAnnex E: Accredited Cryptographic Module Testing Laboratories<BR>Canada<BR>United States<BR>Annex F: Glossary of Classes and Families
Summary This book "explains how and why to use the 'common criteria' during the acquisition, implementation or evaluation of an IT product, system, network or services contract. The text describes the 'common criteria' methodology ; the major processes, steps, activities, concepts, terminology, and how the CC methodology is used throughout the life of a system."--Back cover
Subject Telecommunication -- Security measures -- Standards.
Computer security -- Standards.
Information technology -- Standards.
Télécommunications -- Sécurité -- Mesures -- Normes.
Sécurité informatique -- Normes.
Technologie de l'information -- Normes.
Computer security -- Standards
Information technology -- Standards
Datensicherung
Messung
Evaluation
Telekommunikationsnetz
Rechnernetz
Computersicherheit
Other Form: Print version: Herrmann, Debra S. Using the common criteria for IT security evaluation. Boca Raton, Fla. : Auerbach Publications, ©2003 0849314046 (DLC) 2002033250 (OCoLC)50561866
ISBN 0203972805 (electronic bk.)
9780203972809 (electronic bk.)
1420031422
9781420031423
0849314046 (alk. paper)
9780849314049 (alk. paper)
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information