Trusted Product Evaluations
Author: DIANE Publishing Company
Publisher: DIANE Publishing
Published: 1995-02
Total Pages: 48
ISBN-13: 9780788115349
DOWNLOAD EBOOKRead and Download eBook Full
Author: DIANE Publishing Company
Publisher: DIANE Publishing
Published: 1995-02
Total Pages: 48
ISBN-13: 9780788115349
DOWNLOAD EBOOKAuthor:
Publisher:
Published: 1990
Total Pages: 64
ISBN-13:
DOWNLOAD EBOOKAuthor:
Publisher:
Published: 1988
Total Pages: 52
ISBN-13:
DOWNLOAD EBOOK"This document provides interpretations of the Department of Defense Trusted Computer System Evaluation Criteria (DoD 52O0.28-STD or TCSEC) for computer security subsystems. A computer security subsystem (subsystem) is defined, herein, as hardware, firmware and/or software which can be added to a computer system to enhance the security of the overall system. A subsystem's primary utility is to increase the security of a computer system. The computer system that the subsystem is to protect is referred to as the protected system in this Interpretation. When incorporated into a system environment, evaluated computer security subsystems may be very effective in reducing or eliminating certain types of vulnerabilities whenever entire evaluated systems are unavailable or impractical."--DTIC.
Author:
Publisher: DIANE Publishing
Published: 1993-06
Total Pages: 160
ISBN-13: 9781568064871
DOWNLOAD EBOOKProvides a standard to manufacturers for security features to build into their new and planned commercial products in order to provide widely available systems that satisfy trust requirements for sensitive applications. Also discusses a means of evaluating the degree of trust that can be placed in computer systems for the secure processing of classified and other sensitive information. Diagram.
Author:
Publisher: DIANE Publishing
Published: 1994-03
Total Pages: 304
ISBN-13: 9780788105500
DOWNLOAD EBOOKAuthor: United States. Department of Defense
Publisher:
Published: 1987
Total Pages: 132
ISBN-13:
DOWNLOAD EBOOKAuthor: DIANE Publishing Company
Publisher: DIANE Publishing
Published: 1995-08
Total Pages: 568
ISBN-13: 9780788119248
DOWNLOAD EBOOKPresentations of a conference. Covers a wide range of topics spanning the new draft Federal Criteria for Information Security, research and development activities, techniques for building secure computer systems and networks, and ethics issues. Papers and panels address harmonization of U.S. criteria for information technology security with international criteria, future techniques for integrating commercial off-the-shelf products into secure systems, access control and other networking challenges, etc. Numerous tables and figures.
Author: Susan Hansche
Publisher: CRC Press
Published: 2005-09-29
Total Pages: 814
ISBN-13: 142003135X
DOWNLOAD EBOOKThe Official (ISC)2® Guide to the CISSP®-ISSEP® CBK® provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge. The first fully comprehensive guide to the CISSP-ISSEP CBK, this book promotes understanding of the four ISSEP domains: Information Systems Security Engineering (ISSE); Certification and Accreditation; Technical Management; and an Introduction to United States Government Information Assurance Regulations. This volume explains ISSE by comparing it to a traditional Systems Engineering model, enabling you to see the correlation of how security fits into the design and development process for information systems. It also details key points of more than 50 U.S. government policies and procedures that need to be understood in order to understand the CBK and protect U.S. government information. About the Author Susan Hansche, CISSP-ISSEP is the training director for information assurance at Nortel PEC Solutions in Fairfax, Virginia. She has more than 15 years of experience in the field and since 1998 has served as the contractor program manager of the information assurance training program for the U.S. Department of State.
Author: DIANE Publishing Company
Publisher: DIANE Publishing
Published: 1996-07
Total Pages: 408
ISBN-13: 9780788128523
DOWNLOAD EBOOKHeld October 10-13, 1995. Addresses a wide range of interests from technical research and development projects to user oriented management and administration topics. Focuses on developing and implementing secure networks, technologies, applications, and policies. Papers and panel discussions address a broad spectrum of network security subjects including: security architecture, internet security, firewalls, multilevel security products and security management.