Für diesen Artikel ist leider kein Bild verfügbar.

The Orange Book

Buch | Softcover
709 Seiten
1990
Palgrave Macmillan (Verlag)
978-0-333-53947-7 (ISBN)
109,70 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Contains details of the various security mechanisms that have been developed and the relevance of these to existing policies, how to test for an adequate implementation in a product and engineering techniques to be used as part of the assurance activities that form part of the product evaluation.
A guide to effective computer security for both military and commercial sectors. These 17 documents provide guidelines both for people needing to introduce computer security measures and for companies developing secure computer systems and products. This book contains details of the various security mechanisms that have been developed and the relevance of these to existing policies, how to test for an adequate implementation in a product and engineering techniques to be used as part of the assurance activities that form part of the product evaluation.

A guide to understanding configuration management in trusted systems; a guide to understanding audit in trusted systems; computer security subsystem interpretation of the trusted computer system evaluation criteria; a guide to understanding design documentation in trusted systems; glossary of computer security terms; a guide to understanding trusted distribution in trusted systems; guidelines for formal verification systems; rating maintenance phase - program document; trusted UNIX working group rationale for selecting access control list features for the UNIX system; Department of Defense trusted computer system evaluation criteria; Department of Defense password management guideline; computer security requirements - guidance for applying the DoD trusted computer system evaluation criteria in specific environments; technical rationale behind CSC STD 003 85 computer security requirements - guidance for applying the DoD trusted system evaluation in specific environments; trusted network interpretation of the trusted computer system evaluation criteria; a guide to understanding discretionary access control in trusted systems; trusted product evaluation questionnaire; a guide to understanding trusted facility management.

Verlagsort Basingstoke
Sprache englisch
Maße 280 x 210 mm
Gewicht 3000 g
Themenwelt Informatik Software Entwicklung User Interfaces (HCI)
Informatik Theorie / Studium Kryptologie
ISBN-10 0-333-53947-8 / 0333539478
ISBN-13 978-0-333-53947-7 / 9780333539477
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Lean UX und Design Thinking: Teambasierte Entwicklung …

von Toni Steimle; Dieter Wallach

Buch | Hardcover (2022)
dpunkt (Verlag)
34,90
Aus- und Weiterbildung nach iSAQB-Standard zum Certified Professional …

von Mahbouba Gharbi; Arne Koschel; Andreas Rausch; Gernot Starke

Buch | Hardcover (2023)
dpunkt Verlag
34,90
Wissensverarbeitung - Neuronale Netze

von Uwe Lämmel; Jürgen Cleve

Buch | Hardcover (2023)
Carl Hanser (Verlag)
34,99