Security Tools within the Common Criteria Framework: Part 2
This is the second part of a two-part article. The first part discussed security tools used to protect data integrity and the related business processes within an organization:
(www.scmagazine.com/scmagazine/sc-online/2002/article/48/article.html).