Trusted Product Evaluations
Author | : DIANE Publishing Company |
Publisher | : DIANE Publishing |
Total Pages | : 48 |
Release | : 1995-02 |
Genre | : Computers |
ISBN | : 9780788115349 |
Download Trusted Product Evaluations Book in PDF, ePub and Kindle
Are you looking for read ebook online? Search for your book and save it on your Kindle device, PC, phones or tablets. Download Trusted Product Evaluations PDF full book. Access full book title Trusted Product Evaluations.
Author | : DIANE Publishing Company |
Publisher | : DIANE Publishing |
Total Pages | : 48 |
Release | : 1995-02 |
Genre | : Computers |
ISBN | : 9780788115349 |
Author | : USA. National Computer Security Center |
Publisher | : |
Total Pages | : |
Release | : 1990 |
Genre | : |
ISBN | : |
Author | : |
Publisher | : |
Total Pages | : 64 |
Release | : 1990 |
Genre | : Electronic data processing departments |
ISBN | : |
Author | : |
Publisher | : |
Total Pages | : 64 |
Release | : 1990 |
Genre | : Electronic data processing departments |
ISBN | : |
Author | : |
Publisher | : |
Total Pages | : 36 |
Release | : 1990 |
Genre | : Computer software |
ISBN | : |
"Trusted Product Evaluations: A Guide for Vendors describes procedures for conducting business with the Information Systems Security Organization within the National Security Agency using the Trusted Product Evaluation Program. The Vendors' Guide provides the information needed for the vendor to submit a computer product for information systems security evaluation of its trusted features and assurances and outlines the National Security Agency's responsibilities for timely acknowledgments. This publication specifically covers the relationship between the National Computer Security Center within the Information Systems Security Organization and the vendors of proposed trusted computer products. It covers the process from the initial contact with the vendor through the completion of the security evaluation and follow-up programs. Although other guidelines will be referenced in this publication, we provide sufficient instructions for any first-time user of the National Computer Security Center's services."--DTIC.
Author | : |
Publisher | : |
Total Pages | : |
Release | : 1998 |
Genre | : Commercial products |
ISBN | : |
Contains evaluations of trusted products.
Author | : |
Publisher | : |
Total Pages | : 0 |
Release | : 1992 |
Genre | : |
ISBN | : |
The Trusted Product Evaluation Questionnaire is a tool to assist system developers and vendors in gathering data to assist evaluators and potentially certifiers in their assessment of the system. As the Director, National Computer Security Center, I invite your recommendations for revision to this technical guideline. We plan to review and update this document periodically in response to the needs of the community.
Author | : |
Publisher | : DIANE Publishing |
Total Pages | : 160 |
Release | : 1993-06 |
Genre | : |
ISBN | : 9781568064871 |
Provides a standard to manufacturers for security features to build into their new and planned commercial products in order to provide widely available systems that satisfy trust requirements for sensitive applications. Also discusses a means of evaluating the degree of trust that can be placed in computer systems for the secure processing of classified and other sensitive information. Diagram.
Author | : |
Publisher | : |
Total Pages | : 52 |
Release | : 1988 |
Genre | : Computers |
ISBN | : |
"This document provides interpretations of the Department of Defense Trusted Computer System Evaluation Criteria (DoD 52O0.28-STD or TCSEC) for computer security subsystems. A computer security subsystem (subsystem) is defined, herein, as hardware, firmware and/or software which can be added to a computer system to enhance the security of the overall system. A subsystem's primary utility is to increase the security of a computer system. The computer system that the subsystem is to protect is referred to as the protected system in this Interpretation. When incorporated into a system environment, evaluated computer security subsystems may be very effective in reducing or eliminating certain types of vulnerabilities whenever entire evaluated systems are unavailable or impractical."--DTIC.
Author | : Ahmet M. Hattat |
Publisher | : |
Total Pages | : 170 |
Release | : 2019 |
Genre | : Brand choice |
ISBN | : |