A Guide to Understanding Audit in Trusted Systems
Author:
Publisher:
Published: 1987
Total Pages: 28
ISBN-13:
DOWNLOAD EBOOKRead and Download eBook Full
Author:
Publisher:
Published: 1987
Total Pages: 28
ISBN-13:
DOWNLOAD EBOOKAuthor:
Publisher:
Published: 1991
Total Pages: 40
ISBN-13:
DOWNLOAD EBOOKAuthor: DIANE Publishing Company
Publisher: DIANE Publishing
Published: 1994-03
Total Pages: 130
ISBN-13: 0788105701
DOWNLOAD EBOOKProvides a set of good practices related to covert channel analysis of systems employed for processing classified and other sensitive information. Written to help vendors and evaluators understand covert channel analysis requirements. Contains suggestions and recommendations. Glossary. References. Illustrations
Author: Virgil D. Gligor
Publisher:
Published: 1994
Total Pages: 136
ISBN-13:
DOWNLOAD EBOOKAuthor: Joan Fowler
Publisher: DIANE Publishing
Published: 1994-06
Total Pages: 163
ISBN-13: 0788110241
DOWNLOAD EBOOKDesigned for new or experienced automated information system developers, purchasers, or program managers who must identify and satisfy requirements associated with security-relevant acquisitions. Explains Contract Data Requirements Lists (CDRLs), and Data Item Description (DIDs), and their use in the acquisitions process. Charts and tables. References, glossary and acronyms.
Author: James N. Menendez
Publisher:
Published: 1989
Total Pages: 44
ISBN-13:
DOWNLOAD EBOOKAuthor: Virgil D. Gligor
Publisher:
Published: 1990
Total Pages: 72
ISBN-13:
DOWNLOAD EBOOKAuthor: Diana-Lynn Contesti
Publisher: CRC Press
Published: 2007-04-27
Total Pages: 610
ISBN-13: 0203331575
DOWNLOAD EBOOKThe SSCP certification is the key to unlocking the upper ranks of security implementation at the world's most prestigious organizations. If you're serious about becoming a leading tactician at the front lines, the (ISC) Systems Security Certified Practitioner (SSCP) certification is an absolute necessity-demanded by cutting-edge companies worldwid
Author:
Publisher:
Published: 1988
Total Pages: 40
ISBN-13:
DOWNLOAD EBOOKAuthor:
Publisher:
Published: 1987
Total Pages: 40
ISBN-13:
DOWNLOAD EBOOK"One of the features of the Criteria that is required of a secure system is the enforcement of discretionary access control (DAC). DAC is a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a user or process given discretionary access to information is capable of passing that information along to another subject. This guide discusses issues involved in designing, implementing and evaluating DAC mechanisms. Its primary purpose is to provide guidance to manufacturers on how to select and build effective DAC mechanisms."--DTIC