Ebook Free Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann
What sort of book Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann you will favor to? Currently, you will not take the printed book. It is your time to get soft data publication Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann instead the published files. You can enjoy this soft data Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann in whenever you expect. Even it remains in anticipated area as the other do, you can read the book Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann in your device. Or if you desire much more, you can keep reading your computer or laptop to obtain complete screen leading. Juts find it right here by downloading and install the soft documents Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann in link page.
Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann
Ebook Free Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann
Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann How can you change your mind to be more open? There several resources that can aid you to boost your ideas. It can be from the other encounters and tale from some people. Schedule Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann is one of the relied on sources to get. You can find so many books that we discuss here in this internet site. And now, we reveal you among the very best, the Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann
Why need to be book Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann Book is among the very easy resources to try to find. By obtaining the author and also style to get, you could find numerous titles that offer their data to acquire. As this Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann, the motivating publication Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann will certainly offer you exactly what you should cover the work target date. And also why should be in this website? We will ask first, have you more times to go with going shopping the books and also look for the referred publication Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann in publication store? Lots of people might not have adequate time to discover it.
Thus, this site offers for you to cover your trouble. We show you some referred books Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann in all kinds and motifs. From usual author to the popular one, they are all covered to offer in this website. This Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann is you're looked for book; you simply should go to the link page to display in this web site and afterwards go with downloading and install. It will not take many times to obtain one book Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann It will rely on your net connection. Just purchase as well as download and install the soft data of this book Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann
It is so very easy, right? Why don't you try it? In this website, you can also locate various other titles of the Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann book collections that may have the ability to assist you finding the best solution of your work. Reading this book Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann in soft data will certainly likewise reduce you to get the source easily. You may not bring for those publications to someplace you go. Only with the device that consistently be with your anywhere, you can read this publication Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann So, it will certainly be so quickly to finish reading this Using The Common Criteria For IT Security Evaluation, By Debra S. Herrmann
Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their acquisition process. In fact, in July 2002 the U.S. National Information Assurance Acquisition Policy (NSTISSP #11) mandated the use of CC evaluated IT security products in critical infrastructure systems. This standard provides a comprehensive methodology for specifying, implementing, and evaluating the security of IT products, systems, and networks. Because the Common Criteria (CC) for IT Security Evaluation is a relatively new international standard, little written material exists which explains this how-to knowledge, and it's not exactly easy to interpret.
Designed to be used by acquiring organizations, system integrators, manufacturers, and Common Criteria testing/certification labs, Using the Common Criteria for IT Security Evaluation explains how and why to use the Common Criteria during the acquisition, implementation or evaluation of an IT product, system, network, or services contract. The text describes the Common Criteria methodology; the major processes, steps, activities, concepts, terminology, and how the CC methodology is used throughout the life of a system. It illustrates how each category of user should employ the methodology as well as their different roles and responsibilities.
This text is an essential resource for all those involved in critical infrastructure systems, like those operated by the FAA, the Federal Reserve Bank, DoD, NATO, NASA, and the intelligence agencies. Organized to follow the Common Criteria lifecycle, Using the Common Criteria for IT Security Evaluation provides examples in each chapter to illustrate how the methodology can be applied in three different scenarios: a COTS product, a system or network, and a services contract. The discussion problems at the end of each chapter ensure the text's effectiveness in an educational setting and ensure that those government officials required to comply with Presidential Decision Directive 63 (PDD-63) will be able to do so with confidence.
- Sales Rank: #3947644 in Books
- Brand: Brand: Auerbach Publications
- Published on: 2002-12-27
- Ingredients: Example Ingredients
- Original language: English
- Number of items: 1
- Dimensions: 9.96" h x .65" w x 7.12" l, 1.18 pounds
- Binding: Paperback
- 304 pages
- Used Book in Good Condition
Review
"Herrmann knows her stuff. The book lacks nothing in rigor and erudition. Multiple tables and flowcharts, which abound throughout the text, yield insights into the technical aspects of the Common Criteria. [The book's] richness of detail offers a good reference for security system evaluation." - Security Management, Nov. 2004
Most helpful customer reviews
2 of 2 people found the following review helpful.
just a rehash of the official CC documentation
By Alex F Stop
If you are looking for a book that will help you get started on the tortuous painful path to a CC certificate, save your money. This is just a rehash, in Potomac bureaucratese, of the extremely unenlightening and totally unhelpful documentation that's available for free on the CC website. And of course it's WAY out of date.
8 of 8 people found the following review helpful.
Augments official docs & adds realistic approach
By Mike Tarrani
Although you can obtain the full and most up-to-date documentation for Common Criteria from NIST's Computer Security Resource Center (see ASIN B0001O48Y4), wading through it and transforming the information into an approach is a daunting task. This book distills the Common Criteria key elements and shows how to employ it to implement a security layer that is based on protection profiles aligned to targets of evaluation.
First, a burning question - do you need this book? Or, more specifically, should you use Common Criteria as an approach? If your organization is required to conform to ISO/IEC 15408, or you are a large enterprise with a mature security program, or are planning to employ the Common Criteria as an evaluation approach then this book will prove to be helpful.
What separates this book from the publicly available documentation is the way the authors use practical and realistic examples to step you through the intricacies and complexities of the techniques. They also present the material is a logical sequence that is focused on what is essential, and do so without missing steps or key information.
The book provides a background of Common Criteria, and an overview that includes the what's and why's, and how it relates to other standards. They then systematically lead you through how to develop protection profiles, identifying targets of evaluation, developing a security architecture, and performing verification. In addition, this book covers security certification and accreditation, security target evaluation (ASE), vulnerability analysis and penetration testing (AVA), service contracts and other topics germane to Common Criteria that are scattered throughout the official documentation.
Bottom line - this book will not replace or supplant the official documentation, but nicely augments it by providing a succinct description of relevant information and key activities, and how to use them in the real world.
Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann PDF
Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann EPub
Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann Doc
Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann iBooks
Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann rtf
Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann Mobipocket
Using the Common Criteria for IT Security Evaluation, by Debra S. Herrmann Kindle