Related Books

Using the Common Criteria for IT Security Evaluation
Language: en
Pages: 250
Authors: Debra S. Herrmann
Categories: Computers
Type: BOOK - Published: 2002-12-27 - Publisher: CRC Press

DOWNLOAD EBOOK

Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their ac
Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®
Language: en
Pages: 922
Authors: Susan Hansche
Categories: Computers
Type: BOOK - Published: 2005-09-29 - Publisher: CRC Press

DOWNLOAD EBOOK

The Official (ISC)2 Guide to the CISSP-ISSEP CBK provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Kno
Encyclopedia of Cryptography and Security
Language: en
Pages: 1457
Authors: Henk C.A. van Tilborg
Categories: Computers
Type: BOOK - Published: 2014-07-08 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the
Department of Defense Trusted Computer System Evaluation Criteria
Language: en
Pages: 136
Authors: United States. Department of Defense
Categories: Computers
Type: BOOK - Published: 1987 - Publisher:

DOWNLOAD EBOOK

Essential Cybersecurity Science
Language: en
Pages: 190
Authors: Josiah Dykstra
Categories: Computers
Type: BOOK - Published: 2015-12-08 - Publisher: "O'Reilly Media, Inc."

DOWNLOAD EBOOK

If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the