Data Protection and Security |
||||||
VI |
Operating System Security and Secure Programming |
|||||
VI.III |
Security Evaluation |
|||||
Red Book: Red Book attempts to address network security with the concepts and terminology of Orange Book. Question: Are computer networks simply a specific example for computer systems?
|
||||||
|
||||||
|
chapter index | |||||