1992-12-07 "Coping with the Threat of Computer Security Incidents-A Primer from Prevention through Recovery" Russell L. Brand"
f790806a0b8ed078cfa1b5b9379dadb0ba3769539df4f2810bb1b06e098298dc
1992-12-07 "Guidelines for the Secure Operation of the Internet" R. Pethia, CERT, S.Crocker, TIS, and B. Fraser, CERT
3beef5292eefb6fa5616290c221aaace136190d4a26b5ceb195194230af51412
1992-12-08 "Answers to Frequently Asked Questions About Today's Cryptography" Paul Fahn, RSA Laboratories
4d1e485a9433b72e688c8448519a6ee5c1f78dedeb91d236004f56468d7936f1
1993-02-10 Frequently asked questions on the USENET News groups, "comp.security.misc" and "alt.security"
15247d4b27063423c90047d85e2f0d0990afe4fe68228bdf4bfa44835882cacc
1993-03-18 Organizing a Corporate Anti-Virus Program
755ebe861aa018ae92b8327f5dc9a9fd1386e48071ec68bdc5516f6c2f8c58b0
1994-10-18 Forming an Incident Response Team - Danny Smith, Austrlian SERT
c8fff2d10900e1096fc99200510564a1a1bb4299f53b8df6679417e3acb2dbd0
1993-07-20 "Thinking About Firewalls" by Marcus Ranum
a2fbd0a3c2c6ea92d8a77701357cf5296f6ee83f39b717df3310469a23442821
1992-12-04 "The Design of a Secure Internet Gateway"
f9b5104de8210146f3c409e1a05a6a4a42b9df29e872f67f23e5bf1a8f846114
1985-12-01 Suggested Actions & Proc. for Software Maintenance
c609a91befc342ab2edc7f52c9bb0ee5533dd798c09288c67e1eb615924c579c
1990-06-04 The social organization of the computer underground, Thesis, G. Meyer, Illinois
4fd2e91cee2a52e8450fe85c8c799eea3c0ec7fc9465f1f28d881967fee92d90
1993-03-18 Legal Issues - A Site Manager's Nightmare
fc9d456a9c27d265b6fb1029880e36ebffd26aed61540379405fbffc6503cdbe
1993-07-20 "Security Problems in the TCP/IP Protocol Suite" by Steve Bellovin"
92659f3365f8178c6bbca579bc80f1380b47a7e5c5bd0f8e50ff5dddffab1ced
1994-06-06 information technology security evaluation criteria
560bb0ecd66b95fd2bc706213b338dc0f523c61c39297d7a47bac8c06c06161b
1994-04-15 Redefining Security "A Report to the Secretary of Defense and the Dir. of Central Intelligence"
3f0747fdda7c066268ed4757ef970bf14bcce8d5632c1995bbfec49e9cc3a708
1993-03-18 Relating Functionality Class and Security Sub-profile Specifications
32934feae946346122073bfa2a294dad7cde9eacf325a6bc42aaa46075520f18
1993-11-23 Department of Commerce's Abbreviated Certification Methodology Guidelines for Sensitive and Classified IT Systems
ea0f29ee674717698c7be442a8108bf73d9a597cbb71857e61971876204fff9a
1992-12-04 "There Be Dragons" by Steven M. Bellovin-a description of cracker assults vs. the ramparts of ATT.COM
9ad48dc135e2c7a5f15789b4a48f635d698d20460c387a935970b6b9e642f159
1992-12-07 "An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied" Bill Cheswick, AT&T Bell Labs
de8f6319fb176bb435c681d6a603cd498096882447ab49eb438b5573e5b5d93c
1992-12-07 "Computer Emergency Response-An Int'l Problem" a description of the CERT System" Richard D. Pethia
09d5ae9bdc10dbb998cfe0aebdafabb8edf7533dc0e2ed31af8b545319eff50a
1990-07-17 "Computer Security and the Law." by Gary Morris - good doc on legal issues with regard to computer security
5c33f14973086fcee9e932bbdf16fa6a52dc777f027c4ed55129ae149adf5967
1992-12-07 "Improving the Security of your Unix System" David A. Curry, SRI International
3b93175fc0bd5513cf94f32b97f6c6f3a2d5d8e2ad6adfbf91396d9eb11ec0bc
1993-11-10 National Computer Security Center "Degausser Products List" 2/27/89
10351f159c71aecc2269477648a9b2050a6d3ccef99fc4c953a8cd72b9aac801
1993-04-21 Foundation for the Harmonization of Information Technology
4d627d6e0153c6b09f254340b935919b85cf9260db677c9cc3c34eb959983f9f
U.S. Customs AIS Security Policy Manual CIS HB 1400-05 (WordPerfect 6.1), June 1996
6abdafa684197800463f1c3617185be0f47721a10f8c017228842d51d1f92313
U.S. Customs Security Policy: Automated Information Systems Security Policy, Febraury 1996
e36ea3392a1be2240549286da87eb3acb57a76100159b773fbae84b1369abd62