Defense The 'Orange Book' Series
Erscheinungsjahr 2016
ISBN: 978-1-349-12020-8
Verlag: Palgrave Macmillan UK
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, 1228 Seiten, Web PDF
Reihe: Computer Science
ISBN: 978-1-349-12020-8
Verlag: Palgrave Macmillan UK
Format: PDF
Kopierschutz: 1 - PDF Watermark
'...the most widely accepted set of criteria for computer security.' Financial Times The 'Orange Book' Series, produced by the American Department of Defense is as yet the only guide to effective computer security for both military and commercial sectors. These 17 documents provide a comprehensive set of guidelines both for people needing to introduce computer security measures and for companies developing secure computer systems and products. It contains details of the various security mechanisms that have been developed over time and the relevance of these to existing policies; how to test for an adequate implementation in a product and engineering techniques to be used as part of the assurance activities that form part of the product evaluation.
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
A Guide to Understanding Configuration Management in Trusted Systems - A Guide to Understanding Audit in Trusted Systems - Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria - A Guide to Understanding Design Documentation in Trusted Systems - Glossary of Computer Security Terms - A Guide to Understanding Trusted Distribution in Trusted Systems - Guidelines for Formal Verification Systems - Rating Maintenance Phase: Program Document - Trusted UNIX Working Group Rationale for Selecting Access Control List Features for the UNIX System - Dept of Defense Trusted Computer System Evaluation Criteria - Dept of Defense Password Management Guideline - Computer Security Requirements: Guidance for Applying the DoD Trusted Computer System Evaluation Criteria in Specific Environments - Technical Rationale behind CSC STD 003 85 Computer Security Requirements: Guidance for Applying the DoD Trusted System Evaluation in Specific Environments - Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria - A Guide to Understanding Discretionary Access Control in Trusted Systems - Trusted Product Evaluation Questionnaire - A Guide to Understanding Trusted Facility Management




