Home > Articles > Certification > Other IT

  • Print
  • + Share This
This chapter is from the book

This chapter is from the book

Need to Know More?

Protection rings: www.multicians.org/protection.pdf

Common Criteria: http://www.niap-ccevs.org/cc-scheme/

Smashing the stack for fun and profit: http://insecure.org/stf/smashstack.html

Covert-channel attacks: http://www.cyberguard.com/download/white_paper/en_cg_covert_channels.pdf

Java security: http://java.sun.com/javase/technologies/security/

How Windows measures up to TCSEC standards: http://technet.microsoft.com/en-us/library/cc767092.aspx

The Rainbow Series: http://csrc.nist.gov/publications/secpubs/rainbow/

The Bell-LaPadula model: http://www.computing.dcu.ie/~davids/courses/CA548/C_I_Policies.pdf

ISO 17799: http://www.iso.org/iso/home.htm

  • + Share This
  • 🔖 Save To Your Account