Author:
Publisher:
ISBN:
Category : Auditing
Languages : en
Pages : 28
Book Description
A Guide to Understanding Audit in Trusted Systems
Author:
Publisher:
ISBN:
Category : Auditing
Languages : en
Pages : 28
Book Description
Publisher:
ISBN:
Category : Auditing
Languages : en
Pages : 28
Book Description
A Guide to Understanding Identification and Authentication in Trusted Systems
Author:
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 40
Book Description
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 40
Book Description
A Guide to Understanding Covert Channel Analysis of Trusted Systems
Author: DIANE Publishing Company
Publisher: DIANE Publishing
ISBN: 0788105701
Category :
Languages : en
Pages : 130
Book Description
Provides a set of good practices related to covert channel analysis of systems employed for processing classified and other sensitive information. Written to help vendors and evaluators understand covert channel analysis requirements. Contains suggestions and recommendations. Glossary. References. Illustrations
Publisher: DIANE Publishing
ISBN: 0788105701
Category :
Languages : en
Pages : 130
Book Description
Provides a set of good practices related to covert channel analysis of systems employed for processing classified and other sensitive information. Written to help vendors and evaluators understand covert channel analysis requirements. Contains suggestions and recommendations. Glossary. References. Illustrations
A Guide to Understanding Covert Channel Analysis of Trusted Systems
Author: Virgil D. Gligor
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 136
Book Description
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 136
Book Description
A Guide to Procurement of Trusted Systems
Author: Joan Fowler
Publisher: DIANE Publishing
ISBN: 0788110241
Category :
Languages : en
Pages : 163
Book Description
Designed for new or experienced automated information system developers, purchasers, or program managers who must identify and satisfy requirements associated with security-relevant acquisitions. Explains Contract Data Requirements Lists (CDRLs), and Data Item Description (DIDs), and their use in the acquisitions process. Charts and tables. References, glossary and acronyms.
Publisher: DIANE Publishing
ISBN: 0788110241
Category :
Languages : en
Pages : 163
Book Description
Designed for new or experienced automated information system developers, purchasers, or program managers who must identify and satisfy requirements associated with security-relevant acquisitions. Explains Contract Data Requirements Lists (CDRLs), and Data Item Description (DIDs), and their use in the acquisitions process. Charts and tables. References, glossary and acronyms.
A Guide to Understanding Trusted Facility Management
Author: Virgil D. Gligor
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 72
Book Description
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 72
Book Description
A Guide to Understanding Configuration Management in Trusted Systems
Author: James N. Menendez
Publisher:
ISBN:
Category : Configuration management
Languages : en
Pages : 44
Book Description
Publisher:
ISBN:
Category : Configuration management
Languages : en
Pages : 44
Book Description
Official (ISC)2 Guide to the SSCP CBK
Author: Diana-Lynn Contesti
Publisher: CRC Press
ISBN: 0203331575
Category : Computers
Languages : en
Pages : 610
Book Description
The SSCP certification is the key to unlocking the upper ranks of security implementation at the world's most prestigious organizations. If you're serious about becoming a leading tactician at the front lines, the (ISC) Systems Security Certified Practitioner (SSCP) certification is an absolute necessity-demanded by cutting-edge companies worldwid
Publisher: CRC Press
ISBN: 0203331575
Category : Computers
Languages : en
Pages : 610
Book Description
The SSCP certification is the key to unlocking the upper ranks of security implementation at the world's most prestigious organizations. If you're serious about becoming a leading tactician at the front lines, the (ISC) Systems Security Certified Practitioner (SSCP) certification is an absolute necessity-demanded by cutting-edge companies worldwid
A Guide to Understanding Trusted Distribution in Trusted Systems
Author:
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 40
Book Description
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 40
Book Description
A Guide to Understanding Discretionary Access Control in Trusted Systems
Author:
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 40
Book Description
"One of the features of the Criteria that is required of a secure system is the enforcement of discretionary access control (DAC). DAC is a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a user or process given discretionary access to information is capable of passing that information along to another subject. This guide discusses issues involved in designing, implementing and evaluating DAC mechanisms. Its primary purpose is to provide guidance to manufacturers on how to select and build effective DAC mechanisms."--DTIC
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 40
Book Description
"One of the features of the Criteria that is required of a secure system is the enforcement of discretionary access control (DAC). DAC is a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a user or process given discretionary access to information is capable of passing that information along to another subject. This guide discusses issues involved in designing, implementing and evaluating DAC mechanisms. Its primary purpose is to provide guidance to manufacturers on how to select and build effective DAC mechanisms."--DTIC