A Guide to Understanding Audit in Trusted Systems
Author | : |
Publisher | : |
Total Pages | : 28 |
Release | : 1987 |
Genre | : Auditing |
ISBN | : |
Download A Guide to Understanding Audit in Trusted Systems Book in PDF, ePub and Kindle
Are you looking for read ebook online? Search for your book and save it on your Kindle device, PC, phones or tablets. Download A Guide To Understanding Audit In Trusted Systems PDF full book. Access full book title A Guide To Understanding Audit In Trusted Systems.
Author | : |
Publisher | : |
Total Pages | : 28 |
Release | : 1987 |
Genre | : Auditing |
ISBN | : |
Author | : James N. Menendez |
Publisher | : |
Total Pages | : 25 |
Release | : 1988-06-01 |
Genre | : Computers |
ISBN | : 9780788122330 |
A set of good practices related to the use of auditing in computer systems employed for processing classified and other sensitive information. Provides guidance to manufactures on how to design and incorporate an effective audit mechanism in their system. Provides guidance to implementors on how to make effective use of the audit capabilities provided by trusted systems. Gives suggestions as to what information should be recorded on an audit trail, how an audit should be conducted, and what protective measures should be accorded to audit resources.
Author | : National Computer Security Center (U.S.) |
Publisher | : |
Total Pages | : 0 |
Release | : 1987 |
Genre | : Auditing |
ISBN | : |
Author | : |
Publisher | : |
Total Pages | : 25 |
Release | : 1988 |
Genre | : Auditing |
ISBN | : |
"This publication, "A Guide to Understanding Audit in Trusted Systems, " is being issued by the National Computer Security Center (NCSC) under the authority of and in accordance with Department of Defense (DoD) Directive 5215. 1. The guidelines described in this document provide a set of good practices related to the use of auditing in automatic data processing systems employed for processing classified and other sensitive information."--DTIC.
Author | : |
Publisher | : |
Total Pages | : |
Release | : 1987 |
Genre | : |
ISBN | : 9789999615266 |
Author | : |
Publisher | : |
Total Pages | : 40 |
Release | : 1991 |
Genre | : Computer security |
ISBN | : |
Author | : James N. Menendez |
Publisher | : |
Total Pages | : 46 |
Release | : 1989 |
Genre | : Configuration management |
ISBN | : |
Author | : James N. Menendez |
Publisher | : DIANE Publishing |
Total Pages | : 46 |
Release | : 1989 |
Genre | : Computers |
ISBN | : 9780788122286 |
A set of good practices related to configuration management in Automated Data Processing systems employed for processing classified and other information. Provides guidance to developers of trusted systems on what configuration management is and how it may be implemented in the development and life-cycle of a trusted system.
Author | : DIANE Publishing Company |
Publisher | : DIANE Publishing |
Total Pages | : 130 |
Release | : 1994-03 |
Genre | : |
ISBN | : 0788105701 |
Provides a set of good practices related to covert channel analysis of systems employed for processing classified and other sensitive information. Written to help vendors and evaluators understand covert channel analysis requirements. Contains suggestions and recommendations. Glossary. References. Illustrations
Author | : Virgil D. Gligor |
Publisher | : |
Total Pages | : 136 |
Release | : 1994 |
Genre | : Computer security |
ISBN | : |