Back to Results
First PageMeta Content
Computer security / Evaluation / Software bugs / Common Criteria / Reliability engineering / Bug tracking system / Vulnerability / Software development process / Usability / Software testing / Software development / Software quality


Chapter 23: System Evaluation and Assurance C H A P TE R 23 System Evaluation and
Add to Reading List

Document Date: 2006-08-25 10:25:28


Open Document

File Size: 639,27 KB

Share Result on Facebook

City

San Francisco / Belfast / /

Company

IBM / Building Dependable Distributed Systems / TIS / Microsoft / /

Country

United States / United Kingdom / /

Currency

USD / /

Facility

Carnegie-Mellon University / Asian restaurant / Software Engineering Institute / /

IndustryTerm

communications industries / bank inspection / mainframe operating systems / line encryption devices / healthcare environment / cryptographic protocols / software vendors / software engineers / bank / mass-market software / security printing technologies / insurance underwriters / defense networks / cryptographic algorithms / martial law / software components / commodity operating systems / assurance systems / crypto protocols / large and complex product / larger networks / software testing / food guides / large and complex systems / /

OperatingSystem

Microsoft Windows / /

Organization

Irish Republican Army / Software Engineering Institute / Carnegie-Mellon University / UKUSA / British Army / army / Formal Methods In Chapter / /

Person

LARS KNUDSEN / Bill Gates / JANET RENO / Joseph Schumpeter / /

Position

security engineer / evaluator / administrator / maintenance programmer / working engineer / Fisher / ATTORNEY GENERAL / head / engineer / waterfall model of system development / programmer / software engineer / /

Technology

encryption / cryptography / thermodynamics / firewall / security printing technologies / operating system / anti-virus software / operating systems / /

SocialTag