Inhaltsangabe:
Written in a friendly and easy-to-understand tone, Computer Security Assurance Using the Common Criteria helps readers navigate through all the activities within the Common Criteria (CC) that have gained the attention of the security community and will revolutionize how people compare, select, purchase, and maintain security systems. Practical examples aimed at deciphering the contents and activities within the CC help build an understanding that places readers on a path to real-world security assurance applications. Up-to-date coverage explains IT security assurance methodologies and the activities within any of the CC-defined user roles that are necessary for high quality and proven secure IT software and hardware.
Über die Autorin bzw. den Autor:
Mark S Merkow, CCP, CISSP, and CISM, works with his company?s CIO office to establish the IT security strategy for financial services management and infrastructure to support a broad portfolio of credit card, banking, and brokerage products and services. Mark represents his company as an FS/ISAC Site Coordinator. He is also a delegate to the ANSI X9F (Financial Services Security) committee and has worked closely with the National Institute of Standards and Technology (NIST) on the Common Criteria Security testing and evaluation methodology. Mark also teaches online courses in IT Security and E-commerce for DeVry University Online and University of Phoenix Online. He holds a Masters of Science in Decision and Information Systems and a Masters of Education in Learning Technologies from Arizona State University. Mark also holds two industry security certifications, the Certified Information Systems Security Professional (CISSP) and the Certified Information Security Manager (CISM) certificate from ISACA. Mark is also an author of seven books (five on IT Security), a columnist for Internet.com, and a contributor to several other books including the Internet Encyclopedia (Wiley, 2004). Jim Breithaupt is a project manager and IT specialist, involved with the rapidly emerging electronic brokerage and payment card technologies. Jim has more than twenty five years of experience as a systems analyst, designer, and developer, primarily in the financial services industry. Jim has also taught English for the past ten years as an adjunct faculty member in the Department of English for the Maricopa County Community College District. He is a contributing author to Building SET Applications for Secure Transactions (John Wiley & Sons, 1998) co-author of The Complete Guide To Internet Security (AMACOM Books, 2000), and co-author of The ePrivacy Imperative (AMACOM Books, 2001)
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.