TITLE

Common Criteria Certification

PUB. DATE
September 2003
SOURCE
IT Professional;Sep/Oct2003, Vol. 5 Issue 5, p60
SOURCE TYPE
Academic Journal
DOC. TYPE
Book
ABSTRACT
Presents the book 'Using the Common Criteria for IT Security Evaluation,' by Debra S. Herrmann.
ACCESSION #
11061409

 

Related Articles

  • The Art of Computer Security.  // IT Professional;Sep/Oct2003, Vol. 5 Issue 5, p60 

    Presents the book 'Computer Security: Art and Science,' by Matt Bishop.

  • Secrets of Computer Espionage.  // IT Professional;Sep/Oct2003, Vol. 5 Issue 5, p60 

    Presents the book 'Secrets of Computer Espionage: Tactics and Countermeasures,' by Joel McNamara.

  • Helpful tips to keep business computers safe from hackers. Freudenberg, Paul // Business Journal Serving Fresno & the Central San Joaquin Valley;01/19/98, Issue 322253, p23 

    Opinion. Offers insights on preventing hackers from intruding into the confidential data stored in computers of business enterprises. Use of firewalls; Use of cryptic phrases that combine uppercase and lowercase letters as passwords; Inclusion of add-on encryption schemes to computers.

  • Businesses ignore computer security.  // Internal Auditor;Jun96, Vol. 53 Issue 3, p11 

    Reports that organizations in North America and Europe are neglecting computer security. Ignorance of British finance directors about computer security issues; Computer-related theft in Great Britain; Other findings in a KPMG survey of senior-level finance executives.

  • Computer security: It's best to lock it, pocket the key. Ellingson, Dave // Las Vegas Business Press;2/27/95, Vol. 12 Issue 8, p18 

    Discusses how managers can ensure computer security. Netscape's installation of security measures to protect transmission of credit card numbers; Proposed legislation on computer security.

  • You're a what? Data security analyst. Mariani, Matthew // Occupational Outlook Quarterly;Summer94, Vol. 38 Issue 2, p39 

    Describes the job of a data security analyst using Jamie Jeffers of Fannie Mae as an example. How the data security analyst acts as a data detective; Protecting computer data systems from having information stolen or altered without permission; Jamie's background with computers.

  • Before disaster strikes: 12 steps to minimize computer losses. Storkman, Wayne D. // Outlook;Spring94, Vol. 62 Issue 1, 4th Annual Computer... p10 

    Offers steps to minimize computer system failure or data loss related to a disaster. Performing regular and complete backups; Practicing restoring from backups; Documenting backup procedures; Storing backups off-site or out of state; Prearranging alternative computer facilities and...

  • Computer system buddies. McCready, Donald C. // Ohio CPA Journal;Dec94, Vol. 53 Issue 6, p47 

    Discusses several preventive measures in using computers. Backup devices; Uninterruptible power supply; Diagnostic utilities; Virus protection software; Environmental control equipment; Complementary metal oxide semiconductor (CMOS) printout.

  • Locking up your laptop. M.M.S.; O'Malley, Chris // Popular Science;May93, Vol. 242 Issue 5, p42 

    Comments how Kensington Microware of San Mateo, Calif., aims to set a standard for portable security with its MicroSaver Security System, a plug-shaped lock that fits into a slot built into the computer and ties it to a desk or table with a six-foot steel cable. Other solutions from PC Guardian...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics