"Computer Security Training & Awareness Course Compendium", 1994
a4b858e11173412d23a52dd7f265594113c10852430b16d710d1dcf1cc47abee
"Sample Statements of Work for Federal Computer Security Services: For use In-House or Contracting Out", December 1991
b0e14e2318cb592b85f7c8c8977232d0ab2866c9a1796cbc024453e7edc3882c
"Threat Assessment of Malicious Code and External Attacks", October 1992
e9a2c8c152d81cb7307c69371669795e2899908a8e44e516b6642b9b11896dcd
"Assessing Federal and Commercial Information Security Needs", 1995
e64f1336bb3555b3fce0a22cf7fffcd92063787dd9dc40508978b7a34846ad98
"Minimum Security Requirements for Multi-User Operating Systems", March 1993
d70b4cf5a22392bb13bf155039eff8e57a05e061eb9c572236ddd66a9e36a7e0
"General Procedures for Registering Computer Security Objects", December 1993
5bb6ef6daddb31f31cb74ad9bf1bc6c886a2ad42c881849f7b9fe097a65fa850
"A Head Start on Assurance Proceedings of an Invitational Workshop on Information Technology (IT) Assurance and Trustworthiness", August 1994
387af56b95ca7dc040d9760143fff770384c8303efb247a291d6e3b4d6105ab3