Rabu, 01 Oktober 2014

[D260.Ebook] Free Ebook Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann

Free Ebook Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann

Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann How can you alter your mind to be a lot more open? There numerous sources that could aid you to improve your thoughts. It can be from the various other encounters and also tale from some individuals. Schedule Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann is one of the relied on sources to get. You can locate many books that we discuss here in this web site. As well as currently, we reveal you one of the most effective, the Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann

Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann

Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann



Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann

Free Ebook Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann

Reserve Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann is among the precious worth that will make you consistently abundant. It will not indicate as abundant as the money offer you. When some individuals have lack to deal with the life, people with several e-books occasionally will certainly be smarter in doing the life. Why need to be publication Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann It is in fact not indicated that book Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann will provide you power to get to every little thing. Guide is to check out and what we suggested is guide that is checked out. You can likewise view exactly how the book entitles Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann and also varieties of book collections are providing here.

This book Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann is anticipated to be among the best seller publication that will make you feel pleased to purchase and also read it for finished. As known could common, every book will have certain points that will make an individual interested a lot. Even it originates from the author, type, material, and even the publisher. However, many individuals also take the book Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann based on the style and also title that make them surprised in. as well as here, this Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann is extremely suggested for you due to the fact that it has appealing title as well as style to read.

Are you really a follower of this Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann If that's so, why don't you take this book currently? Be the initial person who such as as well as lead this publication Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann, so you could obtain the factor as well as messages from this book. Never mind to be confused where to obtain it. As the other, we share the connect to check out and also download and install the soft documents ebook Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann So, you may not bring the published book Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann almost everywhere.

The existence of the on the internet publication or soft documents of the Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann will alleviate individuals to get guide. It will certainly additionally save more time to just look the title or writer or author to get up until your publication Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann is disclosed. After that, you can visit the web link download to see that is provided by this internet site. So, this will be a great time to begin enjoying this publication Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann to review. Consistently good time with publication Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann, constantly great time with money to invest!

Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann

Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their acquisition process. In fact, in July 2002 the U.S. National Information Assurance Acquisition Policy (NSTISSP #11) mandated the use of CC evaluated IT security products in critical infrastructure systems. This standard provides a comprehensive methodology for specifying, implementing, and evaluating the security of IT products, systems, and networks. Because the Common Criteria (CC) for IT Security Evaluation is a relatively new international standard, little written material exists which explains this how-to knowledge, and it's not exactly easy to interpret.

Designed to be used by acquiring organizations, system integrators, manufacturers, and Common Criteria testing/certification labs, Using the Common Criteria for IT Security Evaluation explains how and why to use the Common Criteria during the acquisition, implementation or evaluation of an IT product, system, network, or services contract. The text describes the Common Criteria methodology; the major processes, steps, activities, concepts, terminology, and how the CC methodology is used throughout the life of a system. It illustrates how each category of user should employ the methodology as well as their different roles and responsibilities.

This text is an essential resource for all those involved in critical infrastructure systems, like those operated by the FAA, the Federal Reserve Bank, DoD, NATO, NASA, and the intelligence agencies. Organized to follow the Common Criteria lifecycle, Using the Common Criteria for IT Security Evaluation provides examples in each chapter to illustrate how the methodology can be applied in three different scenarios: a COTS product, a system or network, and a services contract. The discussion problems at the end of each chapter ensure the text's effectiveness in an educational setting and ensure that those government officials required to comply with Presidential Decision Directive 63 (PDD-63) will be able to do so with confidence.

  • Sales Rank: #3947644 in Books
  • Brand: Brand: Auerbach Publications
  • Published on: 2002-12-27
  • Ingredients: Example Ingredients
  • Original language: English
  • Number of items: 1
  • Dimensions: 9.96" h x .65" w x 7.12" l, 1.18 pounds
  • Binding: Paperback
  • 304 pages
Features
  • Used Book in Good Condition

Review
"Herrmann knows her stuff. The book lacks nothing in rigor and erudition. Multiple tables and flowcharts, which abound throughout the text, yield insights into the technical aspects of the Common Criteria. [The book's] richness of detail offers a good reference for security system evaluation." - Security Management, Nov. 2004

Most helpful customer reviews

2 of 2 people found the following review helpful.
just a rehash of the official CC documentation
By Alex F Stop
If you are looking for a book that will help you get started on the tortuous painful path to a CC certificate, save your money. This is just a rehash, in Potomac bureaucratese, of the extremely unenlightening and totally unhelpful documentation that's available for free on the CC website. And of course it's WAY out of date.

8 of 8 people found the following review helpful.
Augments official docs & adds realistic approach
By Mike Tarrani
Although you can obtain the full and most up-to-date documentation for Common Criteria from NIST's Computer Security Resource Center (see ASIN B0001O48Y4), wading through it and transforming the information into an approach is a daunting task. This book distills the Common Criteria key elements and shows how to employ it to implement a security layer that is based on protection profiles aligned to targets of evaluation.
First, a burning question - do you need this book? Or, more specifically, should you use Common Criteria as an approach? If your organization is required to conform to ISO/IEC 15408, or you are a large enterprise with a mature security program, or are planning to employ the Common Criteria as an evaluation approach then this book will prove to be helpful.
What separates this book from the publicly available documentation is the way the authors use practical and realistic examples to step you through the intricacies and complexities of the techniques. They also present the material is a logical sequence that is focused on what is essential, and do so without missing steps or key information.
The book provides a background of Common Criteria, and an overview that includes the what's and why's, and how it relates to other standards. They then systematically lead you through how to develop protection profiles, identifying targets of evaluation, developing a security architecture, and performing verification. In addition, this book covers security certification and accreditation, security target evaluation (ASE), vulnerability analysis and penetration testing (AVA), service contracts and other topics germane to Common Criteria that are scattered throughout the official documentation.
Bottom line - this book will not replace or supplant the official documentation, but nicely augments it by providing a succinct description of relevant information and key activities, and how to use them in the real world.

See all 2 customer reviews...

Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann PDF
Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann EPub
Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann Doc
Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann iBooks
Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann rtf
Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann Mobipocket
Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann Kindle

[D260.Ebook] Free Ebook Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann Doc

[D260.Ebook] Free Ebook Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann Doc

[D260.Ebook] Free Ebook Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann Doc
[D260.Ebook] Free Ebook Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann Doc

Tidak ada komentar:

Posting Komentar