Sebanyak 37 item atau buku ditemukan

Human capital selected agency actions to integrate human capital approaches to attain mission results.

managers in the preliminary recruiting determinations and has human capital
professionals take over in the final, technical stages. Some agencies have
developed tools and services to help line managers assume more human capital
 ...

Nursing homes : sustained efforts are essential to realize potential of the quality initiatives : report to congressional requesters

A 1998 study by the Center for Health Systems Research and Analysis identified
significant imbalances in survey time and resource utilization among the survey
teams—imbalances that still exist. Our recent analysis of OSCAR data showed ...

Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria

Describes the security requirements that may be imposed on the DoD Trusted Computer System Evaluation Criteria for trusted computer communications network systems.

-F- Flaw — an error of commission, omission, or oversight in a system that allows
protection mechanisms to be bypassed. Flaw hypothesis methodology — a
system analysis and penetration technique where specifications and
documentation ...

Trusted Database Management System Interpretation of the Trusted Computer System Evaluation Criteria

Provides a standard to manufacturers for security features to build into their new and planned commercial products in order to provide widely available systems that satisfy trust requirements for sensitive applications. Also discusses a means of evaluating the degree of trust that can be placed in computer systems for the secure processing of classified and other sensitive information. Diagram.

although they are actually two aspects of the same problem—that of assessing a
trusted system constructed of previously evaluated parts. For the first case (i.e.,
that of “hosting”), consider an operating system which has been evaluated
against ...

Automated Tools for Testing Computer System Vulnerability

Discusses automated tools for testing computer system vulnerability. Examines basic requirements for vulnerability testing tools and describes the different functional classes of tools. Offers general recommendations about the selection and distribution of such tools.

Do not specify personal or shared directories before system-provided directories
in executable search paths. (This invites the installation of Trojan horses.) •
Default protections assigned at file creation should meet system standards.

Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria

Provides interpretation of the DoD Trusted Computer System Evaluation Criteria for computer security subsystems.

There is no general algorithm to derive a system rating from an arbitrary
collection of computer security subsystems. Any collection of individually
evaluated subsystems must be evaluated as a whole to determine the rating of
the resulting ...