• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Using the common criteria for IT security evaluation /

پدید آورنده
Debra S. Herrmann.

موضوع
Computer security-- Standards.,Information technology-- Standards.,Telecommunication-- Security measures-- Standards.,Computer security-- Standards.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Computersicherheit,Datensicherung,Evaluation,Information technology-- Standards.,Messung,Rechnernetz,Telekommunikationsnetz

رده
TK5102
.
85
.
H47
2003eb

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
0203972805
(Number (ISBN
0849314046
(Number (ISBN
1420031422
(Number (ISBN
9780203972809
(Number (ISBN
9780849314049
(Number (ISBN
9781420031423

NATIONAL BIBLIOGRAPHY NUMBER

Number
b707715

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Using the common criteria for IT security evaluation /
General Material Designation
[Book]
First Statement of Responsibility
Debra S. Herrmann.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Boca Raton, Fla. :
Name of Publisher, Distributor, etc.
Auerbach Publications,
Date of Publication, Distribution, etc.
©2003.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (xvi, 288 pages)

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references (pages 253-259) and index.

CONTENTS NOTE

Text of Note
Introduction
Background
Purpose
Scope
Intended Audience
Organization
What Are the Common Criteria?
History
Purpose and Intended Use
Major Components of the Methodology and How They Work
Relationship to Other Standards
CC User Community and Stakeholders
Future of the CC
Summary
Discussion Problems
Specifying Security Requirements: The Protection Profile
Purpose
Structure
Introduction
TOE Description
TOE Security Environment
Security Objectives
Security Requirements
PP Application Notes
Rationale
Summary
Discussion Problems
Designing a Security Architecture: The Security Target
Purpose
Structure
Introduction
TOE Description
Security Environment
Security Objectives
Security Requirements
TOE Summary Specification
PP Claims
Rationale
Summary
Discussion Problems
Verifying a Security Solution: Security Assurance Activities
Purpose
ISO/IEC 15408-3
Common Evaluation Methodology (CEM)
National Evaluation Schemes
Interpretation of Results
Relation to Security Certification and Accreditation (C&A) Activities
Summary
Discussion Problems
Postscript
ASE-Security Target Evaluation
AVA -- Vulnerability Analysis and Penetration Testing
Services Contracts
Schedules for New CC Standards (ISO/IEC and CCIMB)
Annex A: Glossary of Acronyms and Terms
Annex B: Additional Resources
Standards, Regulations, and Policy (Historical and Current)
Publications
Online Resources
Annex C: Common Criteria Recognition Agreement (CCRA) Participants
Australia and New Zealand
Defence Signals Directorate
Canada
Finland
France
Germany
Greece
Israel
Italy
The Netherlands
Norway
Spain
Sweden
United Kingdom
United States
Annex D: Accredited Common Criteria Evaluation Labs
Australia and New Zealand
Canada
France
Germany
United Kingdom

United StatesAnnex E: Accredited Cryptographic Module Testing Laboratories
Canada
United States
Annex F: Glossary of Classes and Families
0

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Ingram Content Group
Stock Number
TANDF_183201

OTHER EDITION IN ANOTHER MEDIUM

Title
Using the common criteria for IT security evaluation.
International Standard Book Number
0849314046

TOPICAL NAME USED AS SUBJECT

Computer security-- Standards.
Information technology-- Standards.
Telecommunication-- Security measures-- Standards.
Computer security-- Standards.
COMPUTERS-- Internet-- Security.
COMPUTERS-- Networking-- Security.
COMPUTERS-- Security-- General.
Computersicherheit
Datensicherung
Evaluation
Information technology-- Standards.
Messung
Rechnernetz
Telekommunikationsnetz

(SUBJECT CATEGORY (Provisional

COM-- 043050
COM-- 053000
COM-- 060040

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
22

LIBRARY OF CONGRESS CLASSIFICATION

Class number
TK5102
.
85
Book number
.
H47
2003eb

OTHER CLASS NUMBERS

Class number
ST
276
System Code
rvk

PERSONAL NAME - PRIMARY RESPONSIBILITY

Herrmann, Debra S.

ORIGINATING SOURCE

Date of Transaction
20201207224900.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival