Using the Common Criteria for IT security evaluation / Debra S. Herrmann
Imprint
Boca Raton, Fla. : Auerbach, c2003
Descript
xvi, 288 p. : ill. ; 26 cm
CONTENT
What are the commom criteria? -- Specifying security requirements: the protection profile -- Designing a security architecture: the security target -- Verifying a security solution: security assurance activities -- Common criteria recognition agreement (CCRA) participants