Using the Common Criteria for IT Security Evaluation

USING the COMMON CRITERIA for IT SECURITY EVALUATION OTHER AUERBACH PUBLICATIONS The ABCs of IP Addressing Gilbert ...
Author:  Debra S. Herrmann

45 downloads 1250 Views 4MB Size Report

This content was uploaded by our users and we assume good faith they have the permission to share this book. If you own the copyright to this book and it is wrongfully on our website, we offer a simple DMCA procedure to remove your content from our site. Start by pressing the button below!

Report copyright / DMCA form

Recommend Documents

INTERNATIONAL STANDARD ISO/IEC 15408-2 First edition 1999-12-01 Information technology — Security techniques — Evaluat...

INTERNATIONAL STANDARD ISO/IEC 15408-1 First edition 1999-12-01 Information technology — Security techniques — Evaluat...

ISO/IEC 15408-3 INTERNATIONAL STANDARD First edition 1999-12-01 Information technology — Security techniques — Evalua...

337_NSA_IEM_FM.qxd 6/27/05 1:49 PM Page i Register for Free Membership to [email protected] Over the last few ...

Physical Security for IT Physical Security for IT Michael Erbschloe Amsterdam • Boston • Heidelberg • London • New ...

BRITISH STANDARD BS EN 197-1:2000 Incorporating Amendment No. 1 Cement — Part 1: Composition, specifications and confo...

NIH EXTRAMURAL CENTER PROGRAMS: Criteria for Initiation and Evaluation Frederick J. Manning Michael McGeary Ronald Esta...

Social Multi-Criteria Evaluation for a Sustainable Economy Giuseppe Munda Social Multi-Criteria Evaluation for a Sust...

431_Vista_TOC.qxd 2/5/07 10:30 AM Page xiii Contents Foreword. . . . . . . . . . . . . . . . . . . . . . . . . . . ...