The Orange Book
Palgrave Macmillan (Verlag)
978-0-333-53947-7 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
A guide to effective computer security for both military and commercial sectors. These 17 documents provide guidelines both for people needing to introduce computer security measures and for companies developing secure computer systems and products. This book contains details of the various security mechanisms that have been developed and the relevance of these to existing policies, how to test for an adequate implementation in a product and engineering techniques to be used as part of the assurance activities that form part of the product evaluation.
A guide to understanding configuration management in trusted systems; a guide to understanding audit in trusted systems; computer security subsystem interpretation of the trusted computer system evaluation criteria; a guide to understanding design documentation in trusted systems; glossary of computer security terms; a guide to understanding trusted distribution in trusted systems; guidelines for formal verification systems; rating maintenance phase - program document; trusted UNIX working group rationale for selecting access control list features for the UNIX system; Department of Defense trusted computer system evaluation criteria; Department of Defense password management guideline; computer security requirements - guidance for applying the DoD trusted computer system evaluation criteria in specific environments; technical rationale behind CSC STD 003 85 computer security requirements - guidance for applying the DoD trusted system evaluation in specific environments; trusted network interpretation of the trusted computer system evaluation criteria; a guide to understanding discretionary access control in trusted systems; trusted product evaluation questionnaire; a guide to understanding trusted facility management.
Verlagsort | Basingstoke |
---|---|
Sprache | englisch |
Maße | 280 x 210 mm |
Gewicht | 3000 g |
Themenwelt | Informatik ► Software Entwicklung ► User Interfaces (HCI) |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-333-53947-8 / 0333539478 |
ISBN-13 | 978-0-333-53947-7 / 9780333539477 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich