Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
15.7 References
Gollmann, Dieter. Computer Security. Chichester, UK: John Wiley & Sons, 1999.
“Computer Security Evaluation FAQ, Version 2.1.” http://www.faqs.org/faqs/computer-security/evaluations/
Department of Defense Standards. “Trusted Computer System Evaluation Criteria”. http://www.radium.ncsc.mil/tpep/library/rainbow/5200.28-STD.html
Mercuri, Rebecca. “Standards Insecurity.” Communications of the ACM, December 2003, Vol. 46, No.12.
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
(2005). Security Evaluation of Computer Products. In: Computer Network Security. Springer, Boston, MA. https://doi.org/10.1007/0-387-25228-2_15
Download citation
DOI: https://doi.org/10.1007/0-387-25228-2_15
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-20473-4
Online ISBN: 978-0-387-25228-5
eBook Packages: Computer ScienceComputer Science (R0)