Department of Defense Trusted Computer System Evaluation Criteria
Author : United States. Dept. of Defense
Publisher :
Page : 136 pages
File Size : 18,34 MB
Release : 1985
Category : Computer security
ISBN :
Author : United States. Dept. of Defense
Publisher :
Page : 136 pages
File Size : 18,34 MB
Release : 1985
Category : Computer security
ISBN :
Author : United States. Department of Defense
Publisher :
Page : 132 pages
File Size : 50,60 MB
Release : 1987
Category : Computers
ISBN :
Author :
Publisher :
Page : 117 pages
File Size : 25,81 MB
Release : 1983
Category :
ISBN :
Author :
Publisher :
Page : 24 pages
File Size : 30,33 MB
Release : 1985
Category : Computer security
ISBN :
Author : Sheila Brand
Publisher :
Page : 122 pages
File Size : 36,85 MB
Release : 1985-06-01
Category : Computers
ISBN : 9780788143250
Presents trusted computer system evaluation criteria providing a basis for the evaluation of effectiveness of security controls built into automatic data processing systems. Provides a standard to manufacturers as to what security features to build into new and planned commercial products, a metric with which to evaluate the degree of trust that can be placed in computer systems for the secure processing of classified and other sensitive information, and a basis for specifying security requirements in acquisition specifications. Includes appendices, glossary and references.
Author : United States. Department of Defense
Publisher :
Page : 122 pages
File Size : 14,13 MB
Release : 1987
Category : Computers
ISBN :
Author : United States. Department of Defense
Publisher :
Page : 122 pages
File Size : 19,16 MB
Release : 1987
Category : Computers
ISBN :
Author : USA. Department of Defense
Publisher :
Page : pages
File Size : 37,55 MB
Release : 1985
Category :
ISBN :
Author : National Research Council
Publisher : National Academies Press
Page : 320 pages
File Size : 27,35 MB
Release : 1990-02-01
Category : Computers
ISBN : 0309043883
Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.
Author : Computer Security Center (U.S.)
Publisher :
Page : 117 pages
File Size : 38,63 MB
Release : 1983
Category : Computers
ISBN :