Provides a set of good practices related to security testing and the development of test documentation. Written to help the vendor and evaluator community understand what deliverables are required for test documentation, as well as the level of detail required of security testing. Glossary. Diagrams and charts.The effects of the processor protection mechanisms become visible to the system users through the execution of processor instructions and l/O commands that produce transformations of processor and memory registers. Transformationsanbsp;...
|Title||:||A Guide to Understanding Security Testing and Test Documentation in Trusted Systems|
|Author||:||DIANE Publishing Company|
|Publisher||:||DIANE Publishing - 1994-04-01|