| 000 | 03334nam a22005175i 4500 | ||
|---|---|---|---|
| 001 | 978-0-387-77324-7 | ||
| 003 | DE-He213 | ||
| 005 | 20251006084413.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 110402s2009 xxu| s |||| 0|eng d | ||
| 020 | _a9780387773247 | ||
| 020 | _a99780387773247 | ||
| 024 | 7 |
_a10.1007/978-0-387-77324-7 _2doi |
|
| 100 | 1 |
_aDamiani, Ernesto. _eauthor. |
|
| 245 | 1 | 0 |
_aOpen Source Systems Security Certification _h[electronic resource] / _cby Ernesto Damiani, Claudio Agostino Ardagna, Nabil El Ioini. |
| 264 | 1 |
_aBoston, MA : _bSpringer US, _c2009. |
|
| 300 |
_aXX, 204p. 40 illus. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 505 | 0 | _aBasic Notions on Access Control -- Test based security certifications -- Formal methods for software verification -- OSS security certification -- Case Study 1: Linux certification -- Case Study 2: ICSA and CCHIT Certifications -- The role of virtual testing labs -- Long-term OSS security certifications: An Outlook. | |
| 520 | _aOpen Source Systems Security Certification provides an introduction to the notion of the Security Certification, including test-based and model-based approaches to the certification of software products. Several Security Certification standards are presented, including the international standard for the certification of IT products Common Criteria (ISO/IEC 15408) (CC 2006), a certification officially adopted by the governments of 18 nations. This book discusses Security Certification as a way to foster adoption and deployment of Open Source Software (OSS) in security-sensible markets, such as telecommunications, government and the military. Scientific and technical issues of OSS security certification are highlighted through case studies. This volume is designed for professionals and companies trying to implement an Open Source Systems (OSS) aware IT governance strategy, and SMEs looking for ways to use OSS in order to enter new security-conscious markets traditionally held by proprietary products. This book is also suitable for researchers and advanced-level students interested in OSS development, deployment and adoption issues. | ||
| 650 | 0 | _aCOMPUTER SCIENCE. | |
| 650 | 0 | _aSOFTWARE ENGINEERING. | |
| 650 | 0 | _aDATA PROTECTION. | |
| 650 | 0 | _aDATA STRUCTURES (COMPUTER SCIENCE). | |
| 650 | 0 | _aDATA ENCRYPTION (COMPUTER SCIENCE). | |
| 650 | 0 | _aINFORMATION SYSTEMS. | |
| 650 | 1 | 4 | _aCOMPUTER SCIENCE. |
| 650 | 2 | 4 | _aSYSTEMS AND DATA SECURITY. |
| 650 | 2 | 4 | _aDATA ENCRYPTION. |
| 650 | 2 | 4 | _aINFORMATION SYSTEMS APPLICATIONS (INCL.INTERNET). |
| 650 | 2 | 4 | _aPROGRAMMING LANGUAGES, COMPILERS, INTERPRETERS. |
| 650 | 2 | 4 | _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY. |
| 650 | 2 | 4 | _aSOFTWARE ENGINEERING/PROGRAMMING AND OPERATING SYSTEMS. |
| 700 | 1 |
_aArdagna, Claudio Agostino. _eauthor. |
|
| 700 | 1 |
_aEl Ioini, Nabil. _eauthor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9780387773230 |
| 856 | 4 | 0 |
_uhttp://dx.doi.org/10.1007/978-0-387-77324-7 _zVer el texto completo en las instalaciones del CICY |
| 912 | _aZDB-2-SCS | ||
| 942 |
_2ddc _cER |
||
| 999 |
_c58955 _d58955 |
||