Using the Common Criteria for IT Security Evaluation PDF
by Debra S. (Biological Computing Initiative, North Bethesda, Maryland, USA) Herrmann
Description
Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their acquisition process.
In fact, in July 2002 the U.S. National Information Assurance Acquisition Policy (NSTISSP #11) mandated the use of CC evaluated IT security products in critical infrastruc
Information
-
Download - Immediately Available
- Format:PDF
- Pages:304 pages
- Publisher:Taylor & Francis Ltd
- Publication Date:27/12/2002
- Category:
- ISBN:9781420031423
Information
-
Download - Immediately Available
- Format:PDF
- Pages:304 pages
- Publisher:Taylor & Francis Ltd
- Publication Date:27/12/2002
- Category:
- ISBN:9781420031423