Written in a friendly and easy-to-understand tone, Computer Security Assurance Using the Common Criteria helps readers navigate through all the activities within the Common Criteria (CC) that have gained the attention of the security community and will revolutionize how people compare, select, purchase, and maintain security systems. Practical examples aimed at deciphering the contents and activities within the CC help build an understanding that places readers on a path to real-world security assurance applications. Up-to-date coverage explains IT security assurance methodologies and the activities within any of the CC-defined user roles that are necessary for high quality and proven secure IT software and hardware.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Mark S Merkow, CCP, CISSP, and CISM, works with his company?s CIO office to establish the IT security strategy for financial services management and infrastructure to support a broad portfolio of credit card, banking, and brokerage products and services. Mark represents his company as an FS/ISAC Site Coordinator. He is also a delegate to the ANSI X9F (Financial Services Security) committee and has worked closely with the National Institute of Standards and Technology (NIST) on the Common Criteria Security testing and evaluation methodology. Mark also teaches online courses in IT Security and E-commerce for DeVry University Online and University of Phoenix Online. He holds a Masters of Science in Decision and Information Systems and a Masters of Education in Learning Technologies from Arizona State University. Mark also holds two industry security certifications, the Certified Information Systems Security Professional (CISSP) and the Certified Information Security Manager (CISM) certificate from ISACA. Mark is also an author of seven books (five on IT Security), a columnist for Internet.com, and a contributor to several other books including the Internet Encyclopedia (Wiley, 2004). Jim Breithaupt is a project manager and IT specialist, involved with the rapidly emerging electronic brokerage and payment card technologies. Jim has more than twenty five years of experience as a systems analyst, designer, and developer, primarily in the financial services industry. Jim has also taught English for the past ten years as an adjunct faculty member in the Department of English for the Maricopa County Community College District. He is a contributing author to Building SET Applications for Secure Transactions (John Wiley & Sons, 1998) co-author of The Complete Guide To Internet Security (AMACOM Books, 2000), and co-author of The ePrivacy Imperative (AMACOM Books, 2001)
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 80,04 für den Versand von USA nach Deutschland
Versandziele, Kosten & DauerEUR 39,47 für den Versand von USA nach Deutschland
Versandziele, Kosten & DauerAnbieter: The Book Spot, Sioux Falls, MN, USA
Paperback. Zustand: New. Bestandsnummer des Verkäufers Abebooks420720
Anzahl: 1 verfügbar
Anbieter: Goodwill of Silicon Valley, SAN JOSE, CA, USA
Zustand: acceptable. Supports Goodwill of Silicon Valley job training programs. The cover and pages are in Acceptable condition! Any other included accessories are also in Acceptable condition showing use. Use can include some highlighting and writing, page and cover creases as well as other types visible wear such as cover tears discoloration, staining, marks, scuffs, etc. All pages intact. Bestandsnummer des Verkäufers GWSVV.1401862659.A
Anzahl: 1 verfügbar
Anbieter: HPB-Red, Dallas, TX, USA
Paperback. Zustand: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Bestandsnummer des Verkäufers S_276075054
Anzahl: 1 verfügbar