Defense | The 'Orange Book' Series | E-Book | www.sack.de
E-Book

E-Book, Englisch, 1228 Seiten, Web PDF

Reihe: Computer Science

Defense The 'Orange Book' Series


Erscheinungsjahr 2016
ISBN: 978-1-349-12020-8
Verlag: Palgrave Macmillan UK
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, 1228 Seiten, Web PDF

Reihe: Computer Science

ISBN: 978-1-349-12020-8
Verlag: Palgrave Macmillan UK
Format: PDF
Kopierschutz: 1 - PDF Watermark



'...the most widely accepted set of criteria for computer security.' Financial Times The 'Orange Book' Series, produced by the American Department of Defense is as yet the only guide to effective computer security for both military and commercial sectors. These 17 documents provide a comprehensive set of guidelines both for people needing to introduce computer security measures and for companies developing secure computer systems and products. It contains details of the various security mechanisms that have been developed over time and the relevance of these to existing policies; how to test for an adequate implementation in a product and engineering techniques to be used as part of the assurance activities that form part of the product evaluation.

Defense The 'Orange Book' Series jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


A Guide to Understanding Configuration Management in Trusted Systems - A Guide to Understanding Audit in Trusted Systems - Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria - A Guide to Understanding Design Documentation in Trusted Systems - Glossary of Computer Security Terms - A Guide to Understanding Trusted Distribution in Trusted Systems - Guidelines for Formal Verification Systems - Rating Maintenance Phase: Program Document - Trusted UNIX Working Group Rationale for Selecting Access Control List Features for the UNIX System - Dept of Defense Trusted Computer System Evaluation Criteria - Dept of Defense Password Management Guideline - Computer Security Requirements: Guidance for Applying the DoD Trusted Computer System Evaluation Criteria in Specific Environments - Technical Rationale behind CSC STD 003 85 Computer Security Requirements: Guidance for Applying the DoD Trusted System Evaluation in Specific Environments - Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria - A Guide to Understanding Discretionary Access Control in Trusted Systems - Trusted Product Evaluation Questionnaire - A Guide to Understanding Trusted Facility Management



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.