AnyBook4Less.com
Find the Best Price on the Web
Order from a Major Online Bookstore
Developed by Fintix
Home  |  Store List  |  FAQ  |  Contact Us  |  
 
Ultimate Book Price Comparison Engine
Save Your Time And Money

Using the Common Criteria for IT Security Evaluation

Please fill out form in order to compare prices
Title: Using the Common Criteria for IT Security Evaluation
by Debra S. Herrmann
ISBN: 0-8493-1404-6
Publisher: Auerbach Publications
Pub. Date: 23 December, 2002
Format: Paperback
Volumes: 1
List Price(USD): $79.95
Your Country
Currency
Delivery
Include Used Books
Are you a club member of: Barnes and Noble
Books A Million Chapters.Indigo.ca

Average Customer Rating: 5 (1 review)

Customer Reviews

Rating: 5
Summary: Augments official docs & adds realistic approach
Comment: Although you can obtain the full and most up-to-date documentation for Common Criteria from NIST's Computer Security Resource Center (see ASIN B0001O48Y4), wading through it and transforming the information into an approach is a daunting task. This book distills the Common Criteria key elements and shows how to employ it to implement a security layer that is based on protection profiles aligned to targets of evaluation.

First, a burning question - do you need this book? Or, more specifically, should you use Common Criteria as an approach? If your organization is required to conform to ISO/IEC 15408, or you are a large enterprise with a mature security program, or are planning to employ the Common Criteria as an evaluation approach then this book will prove to be helpful.

What separates this book from the publicly available documentation is the way the authors use practical and realistic examples to step you through the intricacies and complexities of the techniques. They also present the material is a logical sequence that is focused on what is essential, and do so without missing steps or key information.

The book provides a background of Common Criteria, and an overview that includes the what's and why's, and how it relates to other standards. They then systematically lead you through how to develop protection profiles, identifying targets of evaluation, developing a security architecture, and performing verification. In addition, this book covers security certification and accreditation, security target evaluation (ASE), vulnerability analysis and penetration testing (AVA), service contracts and other topics germane to Common Criteria that are scattered throughout the official documentation.

Bottom line - this book will not replace or supplant the official documentation, but nicely augments it by providing a succinct description of relevant information and key activities, and how to use them in the real world.

Similar Books:

Title: A Practical Guide to Security Engineering and Information Assurance
by Debra S. Herrmann
ISBN: 0849311632
Publisher: CRC Press
Pub. Date: 18 October, 2001
List Price(USD): $69.95
Title: Exploiting Software: How to Break Code
by Greg Hoglund, Gary McGraw
ISBN: 0201786958
Publisher: Addison-Wesley Professional
Pub. Date: 01 February, 2004
List Price(USD): $49.99
Title: Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems
by Stephen Northcutt, Lenny Zeltser, Scott Winters, Karen Fredrick, Ronald W. Ritchey
ISBN: 0735712328
Publisher: Que
Pub. Date: 28 June, 2002
List Price(USD): $49.99
Title: Beyond Fear
by Bruce Schneier
ISBN: 0387026207
Publisher: Copernicus Books
Pub. Date: 28 July, 2003
List Price(USD): $25.00
Title: Advanced CISSP Prep Guide: Exam Q&A
by Ronald L. Krutz, Russell Dean Vines
ISBN: 0471236632
Publisher: Wiley
Pub. Date: 11 October, 2002
List Price(USD): $50.00

Thank you for visiting www.AnyBook4Less.com and enjoy your savings!

Copyright� 2001-2021 Send your comments

Powered by Apache