rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781420031423

Using the Common Criteria for IT Security Evaluation

by
  • ISBN13:

    9781420031423

  • ISBN10:

    1420031422

  • Format: Nonspecific Binding
  • Copyright: 2002-12-27
  • Publisher: Taylor & Francis

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $160.00 Save up to $54.40
  • Rent Book $108.00
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-5 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

How To: Textbook Rental

Looking to rent a book? Rent Using the Common Criteria for IT Security Evaluation [ISBN: 9781420031423] for the semester, quarter, and short term or search our site for other textbooks by Debra S. Herrmann. Renting a textbook can save you up to 90% from the cost of buying.

Table of Contents

Introduction
Background
Purpose
Scope
Intended Audience
Organization
What Are the Common Criteria?
History
Purpose and Intended Use
Major Components of the Methodology and How They Work
Relationship to Other Standards
CC User Community and Stakeholders
Future of the CC
Summary
Discussion Problems
Specifying Security Requirements: The Protection Profile
Purpose
Structure
Introduction
TOE Description
TOE Security Environment
Security Objectives
Security Requirements
PP Application Notes
Rationale
Summary
Discussion Problems
Designing a Security Architecture: The Security Target
Purpose
Structure
Introduction
TOE Description
Security Environment
Security Objectives
Security Requirements
TOE Summary Specification
PP Claims
Rationale
Summary
Discussion Problems
Verifying a Security Solution: Security Assurance Activities
Purpose
ISO/IEC 15408-3
Common Evaluation Methodology (CEM)
National Evaluation Schemes
Interpretation of Results
Relation to Security Certification and Accreditation (C&A) Activities
Summary
Discussion Problems
Postscript
ASE-Security Target Evaluation
AVA - Vulnerability Analysis and Penetration Testing
Services Contracts
Schedules for New CC Standards (ISO/IEC and CCIMB)
Annex A Glossary of Acronyms and Terms
Annex B Additional Resources
Standards, Regulations, and Policy (Historical and Current)
Publications
Online Resources
Annex C Common Criteria Recognition Agreement (CCRA) Participants
Australia and New Zealand
Defence Signals Directorate
Canada
Finland
France
Germany
Greece
Israel
Italy
The Netherlands
Norway
Spain
Sweden
United Kingdom
United States
Annex D Accredited Common Criteria Evaluation Labs
Australia and New Zealand
Canada
France
Germany
United Kingdom
United States
Annex E Accredited Cryptographic Module Testing Laboratories
Canada
United States
Annex F Glossary of Classes and Families
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program