Using the common criteria for IT security evaluation
Saved in:
Main Author: | Herrmann, Debra S |
---|---|
Format: | Unknown |
Published: |
Boca Raton, Fla.
Auerbach Publications
2003
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Implementing the ISO/IEC 27001 Information Security Management System Standard
by: Humphreys, Edward
Published: (2007) -
Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROI
by: Herrmann, Debra S
Published: (2007) -
Communication system security
by: Chen, Lidong
Published: (2012) -
Security without obscurity a guide to confidentiality, authentication, and integrity
by: Stapleton, Jeffrey James
Published: (2014) -
Security for telecommunications networks
by: Traynor, Patrick
Published: (2008)