A Guide to Writing the Security Features User's Guide for Trusted Systems

A Guide to Writing the Security Features User's Guide for Trusted Systems

Author:

Publisher: DIANE Publishing

Published: 1995-09

Total Pages: 50

ISBN-13: 9780788122316

DOWNLOAD EBOOK

Designed for authors of the Security Features User's Guide (SFUG) for a specific trusted system undergoing evaluation as a trusted product. Discusses the intent behind the requirement for a Security Features User's Guide and the relationship to other requirements in Trusted Computer System Evaluation Criteria. Describes the various approaches to writing a SFUG. Extensive bibliography.


A Guide to Procurement of Trusted Systems

A Guide to Procurement of Trusted Systems

Author: Joan Fowler

Publisher: DIANE Publishing

Published: 1994-06

Total Pages: 163

ISBN-13: 0788110241

DOWNLOAD EBOOK

Designed for new or experienced automated information system developers, purchasers, or program managers who must identify and satisfy requirements associated with security-relevant acquisitions. Explains Contract Data Requirements Lists (CDRLs), and Data Item Description (DIDs), and their use in the acquisitions process. Charts and tables. References, glossary and acronyms.


A Practical Guide to Security Engineering and Information Assurance

A Practical Guide to Security Engineering and Information Assurance

Author: Debra S. Herrmann

Publisher: CRC Press

Published: 2001-10-18

Total Pages: 410

ISBN-13: 142003149X

DOWNLOAD EBOOK

Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged s


VM/ESA Systems Handbook

VM/ESA Systems Handbook

Author: Gabriel Goldberg

Publisher: McGraw-Hill Companies

Published: 1993

Total Pages: 842

ISBN-13:

DOWNLOAD EBOOK

This encyclopedic reference shows how to exploit VM/ESA with step-by-step guidance through evaluation, planning, installation and operation. Provides essential information for system programmers, data center managers, application developers, system analysts, and anyone else evaluating or involved with any VM version.


Official (ISC)2 Guide to the SSCP CBK

Official (ISC)2 Guide to the SSCP CBK

Author: Diana-Lynn Contesti

Publisher: CRC Press

Published: 2007-04-27

Total Pages: 610

ISBN-13: 0203331575

DOWNLOAD EBOOK

The SSCP certification is the key to unlocking the upper ranks of security implementation at the world's most prestigious organizations. If you're serious about becoming a leading tactician at the front lines, the (ISC) Systems Security Certified Practitioner (SSCP) certification is an absolute necessity-demanded by cutting-edge companies worldwid


Secure Computing

Secure Computing

Author: Rita C. Summers

Publisher: McGraw-Hill Companies

Published: 1997

Total Pages: 730

ISBN-13:

DOWNLOAD EBOOK

The breadth of coverage and the attention to real-world context make this authoritative book unique in its treatment of an extremely hot topic--the security of computers, computer networks, and the information that they handle. Summers presents security principles and techniques in a coherent framework, using case histories and examples to drive home important points.