Author: DIANE Publishing Company
Publisher: DIANE Publishing
ISBN: 9780788115349
Category : Computers
Languages : en
Pages : 48
Book Description
Trusted Product Evaluations
Author: DIANE Publishing Company
Publisher: DIANE Publishing
ISBN: 9780788115349
Category : Computers
Languages : en
Pages : 48
Book Description
Publisher: DIANE Publishing
ISBN: 9780788115349
Category : Computers
Languages : en
Pages : 48
Book Description
Trusted Product Evaluation Questionnaire
Author:
Publisher:
ISBN:
Category : Electronic data processing departments
Languages : en
Pages : 64
Book Description
Publisher:
ISBN:
Category : Electronic data processing departments
Languages : en
Pages : 64
Book Description
Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria
Author:
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 52
Book Description
"This document provides interpretations of the Department of Defense Trusted Computer System Evaluation Criteria (DoD 52O0.28-STD or TCSEC) for computer security subsystems. A computer security subsystem (subsystem) is defined, herein, as hardware, firmware and/or software which can be added to a computer system to enhance the security of the overall system. A subsystem's primary utility is to increase the security of a computer system. The computer system that the subsystem is to protect is referred to as the protected system in this Interpretation. When incorporated into a system environment, evaluated computer security subsystems may be very effective in reducing or eliminating certain types of vulnerabilities whenever entire evaluated systems are unavailable or impractical."--DTIC.
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 52
Book Description
"This document provides interpretations of the Department of Defense Trusted Computer System Evaluation Criteria (DoD 52O0.28-STD or TCSEC) for computer security subsystems. A computer security subsystem (subsystem) is defined, herein, as hardware, firmware and/or software which can be added to a computer system to enhance the security of the overall system. A subsystem's primary utility is to increase the security of a computer system. The computer system that the subsystem is to protect is referred to as the protected system in this Interpretation. When incorporated into a system environment, evaluated computer security subsystems may be very effective in reducing or eliminating certain types of vulnerabilities whenever entire evaluated systems are unavailable or impractical."--DTIC.
Trusted Database Management System Interpretation of the Trusted Computer System Evaluation Criteria
Author:
Publisher: DIANE Publishing
ISBN: 9781568064871
Category :
Languages : en
Pages : 160
Book Description
Provides a standard to manufacturers for security features to build into their new and planned commercial products in order to provide widely available systems that satisfy trust requirements for sensitive applications. Also discusses a means of evaluating the degree of trust that can be placed in computer systems for the secure processing of classified and other sensitive information. Diagram.
Publisher: DIANE Publishing
ISBN: 9781568064871
Category :
Languages : en
Pages : 160
Book Description
Provides a standard to manufacturers for security features to build into their new and planned commercial products in order to provide widely available systems that satisfy trust requirements for sensitive applications. Also discusses a means of evaluating the degree of trust that can be placed in computer systems for the secure processing of classified and other sensitive information. Diagram.
Consumers Index to Product Evaluations and Information Sources
Author:
Publisher:
ISBN:
Category : Commercial products
Languages : en
Pages : 534
Book Description
Publisher:
ISBN:
Category : Commercial products
Languages : en
Pages : 534
Book Description
Federal Register
Author:
Publisher:
ISBN:
Category : Administrative law
Languages : en
Pages : 860
Book Description
Publisher:
ISBN:
Category : Administrative law
Languages : en
Pages : 860
Book Description
Computer Security Basics
Author: Deborah Russell
Publisher: "O'Reilly Media, Inc."
ISBN: 9780937175712
Category : Computers
Languages : en
Pages : 486
Book Description
Deborah Russell provides a broad introduction to the many areas of computer security and a detailed description of how the government sets standards and guidelines for security products. The book describes complicated concepts such as trusted systems, encryption and mandatory access control in simple terms, and includes an introduction to the "Orange Book".
Publisher: "O'Reilly Media, Inc."
ISBN: 9780937175712
Category : Computers
Languages : en
Pages : 486
Book Description
Deborah Russell provides a broad introduction to the many areas of computer security and a detailed description of how the government sets standards and guidelines for security products. The book describes complicated concepts such as trusted systems, encryption and mandatory access control in simple terms, and includes an introduction to the "Orange Book".
Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria
Author:
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 308
Book Description
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 308
Book Description
Information Security Management
Author: Bel G. Raggad
Publisher: CRC Press
ISBN: 1439882630
Category : Business & Economics
Languages : en
Pages : 870
Book Description
Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there are few textbooks available that
Publisher: CRC Press
ISBN: 1439882630
Category : Business & Economics
Languages : en
Pages : 870
Book Description
Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there are few textbooks available that
Department of Defense Trusted Computer System Evaluation Criteria
Author: United States. Department of Defense
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 132
Book Description
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 132
Book Description