Department of Defense Trusted Computer System Evaluation Criteria

Department of Defense Trusted Computer System Evaluation Criteria
Author :
Publisher :
Total Pages : 136
Release :
ISBN-10 : IND:30000105057685
ISBN-13 :
Rating : 4/5 ( Downloads)

Book Synopsis Department of Defense Trusted Computer System Evaluation Criteria by : United States. Department of Defense

Download or read book Department of Defense Trusted Computer System Evaluation Criteria written by United States. Department of Defense and published by . This book was released on 1987 with total page 136 pages. Available in PDF, EPUB and Kindle. Book excerpt:


Department of Defense Trusted Computer System Evaluation Criteria Related Books

Department of Defense Trusted Computer System Evaluation Criteria
Language: en
Pages: 136
Authors: United States. Department of Defense
Categories: Computers
Type: BOOK - Published: 1987 - Publisher:

GET EBOOK

The 'Orange Book' Series
Language: en
Pages: 1072
Authors: US Department of Defense
Categories: Computers
Type: BOOK - Published: 2016-05-04 - Publisher: Springer

GET EBOOK

'...the most widely accepted set of criteria for computer security.' Financial Times The 'Orange Book' Series, produced by the American Department of Defense is
Department of Defense Trusted Computer System Evaluation Criteria
Language: en
Pages: 132
Authors: United States. Department of Defense
Categories: Computers
Type: BOOK - Published: 1987 - Publisher:

GET EBOOK

A Guide to Understanding Trusted Recovery in Trusted Systems
Language: en
Pages: 68
Authors: Virgil D. Gligor
Categories: Computers
Type: BOOK - Published: 1994-03 - Publisher: DIANE Publishing

GET EBOOK

Provides a set of good practices related to trusted recovery. Helps the vendor and evaluator community understand the requirements for trusted recovery at all a
Guide to Understanding Design Documentation in Trusted Systems
Language: en
Pages: 44
Authors: DIANE Publishing Company
Categories: Computers
Type: BOOK - Published: 1995-10 - Publisher: DIANE Publishing

GET EBOOK

A set of good practices related to design documentation in automated data processing systems employed for processing classified and other sensitive information.