Page 226 - CISSO_Workbookv18
P. 226

Chapter 5 – Security Models and Evaluation Criteria




















































               Section 1 – Trusted Computing Base


























               Certified Information Systems Security Officer P a g e  | 226
               ©Mile2 – All Rights Reserved - v18
   221   222   223   224   225   226   227   228   229   230   231