AnyBook4Less.com | Order from a Major Online Bookstore |
![]() |
Home |  Store List |  FAQ |  Contact Us |   | ||
Ultimate Book Price Comparison Engine Save Your Time And Money |
![]() |
Title: Using the Common Criteria for IT Security Evaluation by Debra S. Herrmann ISBN: 0-8493-1404-6 Publisher: Auerbach Publications Pub. Date: 23 December, 2002 Format: Paperback Volumes: 1 List Price(USD): $79.95 |
Average Customer Rating: 5 (1 review)
Rating: 5
Summary: Augments official docs & adds realistic approach
Comment: Although you can obtain the full and most up-to-date documentation for Common Criteria from NIST's Computer Security Resource Center (see ASIN B0001O48Y4), wading through it and transforming the information into an approach is a daunting task. This book distills the Common Criteria key elements and shows how to employ it to implement a security layer that is based on protection profiles aligned to targets of evaluation.
First, a burning question - do you need this book? Or, more specifically, should you use Common Criteria as an approach? If your organization is required to conform to ISO/IEC 15408, or you are a large enterprise with a mature security program, or are planning to employ the Common Criteria as an evaluation approach then this book will prove to be helpful.
What separates this book from the publicly available documentation is the way the authors use practical and realistic examples to step you through the intricacies and complexities of the techniques. They also present the material is a logical sequence that is focused on what is essential, and do so without missing steps or key information.
The book provides a background of Common Criteria, and an overview that includes the what's and why's, and how it relates to other standards. They then systematically lead you through how to develop protection profiles, identifying targets of evaluation, developing a security architecture, and performing verification. In addition, this book covers security certification and accreditation, security target evaluation (ASE), vulnerability analysis and penetration testing (AVA), service contracts and other topics germane to Common Criteria that are scattered throughout the official documentation.
Bottom line - this book will not replace or supplant the official documentation, but nicely augments it by providing a succinct description of relevant information and key activities, and how to use them in the real world.
![]() |
Title: A Practical Guide to Security Engineering and Information Assurance by Debra S. Herrmann ISBN: 0849311632 Publisher: CRC Press Pub. Date: 18 October, 2001 List Price(USD): $69.95 |
![]() |
Title: Exploiting Software: How to Break Code by Greg Hoglund, Gary McGraw ISBN: 0201786958 Publisher: Addison-Wesley Professional Pub. Date: 01 February, 2004 List Price(USD): $49.99 |
![]() |
Title: Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems by Stephen Northcutt, Lenny Zeltser, Scott Winters, Karen Fredrick, Ronald W. Ritchey ISBN: 0735712328 Publisher: Que Pub. Date: 28 June, 2002 List Price(USD): $49.99 |
![]() |
Title: Beyond Fear by Bruce Schneier ISBN: 0387026207 Publisher: Copernicus Books Pub. Date: 28 July, 2003 List Price(USD): $25.00 |
![]() |
Title: Advanced CISSP Prep Guide: Exam Q&A by Ronald L. Krutz, Russell Dean Vines ISBN: 0471236632 Publisher: Wiley Pub. Date: 11 October, 2002 List Price(USD): $50.00 |
Thank you for visiting www.AnyBook4Less.com and enjoy your savings!
Copyright� 2001-2021 Send your comments