Trusted Product Evaluations
Author: DIANE Publishing Company
Publisher: DIANE Publishing
Published: 1995-02
Total Pages: 48
ISBN-13: 9780788115349
DOWNLOAD EBOOK →Author: DIANE Publishing Company
Publisher: DIANE Publishing
Published: 1995-02
Total Pages: 48
ISBN-13: 9780788115349
DOWNLOAD EBOOK →Author:
Publisher:
Published: 1988
Total Pages: 52
ISBN-13:
DOWNLOAD EBOOK →"This document provides interpretations of the Department of Defense Trusted Computer System Evaluation Criteria (DoD 52O0.28-STD or TCSEC) for computer security subsystems. A computer security subsystem (subsystem) is defined, herein, as hardware, firmware and/or software which can be added to a computer system to enhance the security of the overall system. A subsystem's primary utility is to increase the security of a computer system. The computer system that the subsystem is to protect is referred to as the protected system in this Interpretation. When incorporated into a system environment, evaluated computer security subsystems may be very effective in reducing or eliminating certain types of vulnerabilities whenever entire evaluated systems are unavailable or impractical."--DTIC.
Author:
Publisher: DIANE Publishing
Published: 1993-06
Total Pages: 160
ISBN-13: 9781568064871
DOWNLOAD EBOOK →Provides a standard to manufacturers for security features to build into their new and planned commercial products in order to provide widely available systems that satisfy trust requirements for sensitive applications. Also discusses a means of evaluating the degree of trust that can be placed in computer systems for the secure processing of classified and other sensitive information. Diagram.
Author: Deborah Russell
Publisher: "O'Reilly Media, Inc."
Published: 1991
Total Pages: 486
ISBN-13: 9780937175712
DOWNLOAD EBOOK →Deborah Russell provides a broad introduction to the many areas of computer security and a detailed description of how the government sets standards and guidelines for security products. The book describes complicated concepts such as trusted systems, encryption and mandatory access control in simple terms, and includes an introduction to the "Orange Book".
Author: Bel G. Raggad
Publisher: CRC Press
Published: 2010-01-29
Total Pages: 870
ISBN-13: 1439882630
DOWNLOAD EBOOK →Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there are few textbooks available that
Author: United States. Department of Defense
Publisher:
Published: 1987
Total Pages: 132
ISBN-13:
DOWNLOAD EBOOK →