1991-04-16 Summary of the Trusted Information Systems (TIS) Report on Intrusion Detection Systems
19413a68af48a59badc7f1c5e05b723c779be1d0727cbb7a5fbfd57fbb2899d5
1992-11-08 Potential Liabilities of Computer Security Response Centers
3e6d58efc67dd5c9663d74fc5959d67e4aed6cc8cfa31ef99181d18f704e2dad
1990-06-06 Eavesdropping on the electronic emanations of digital equipment, by C. Seline
74cecca0e78151f4c0a17e292f4c7f7c547d7cd3cbfcdeef4ac6a1c9b0f2b57b
1993-02-26 Foundations for the Harmonization ofInformation Technology Security Standards
aa716e8462f1186a03f9a42cb2ca1dad7a97dd21fb332b2b96eea0e56f5ba852
1992-12-07 "The COPS Security Checker System"
79fdf8758d6c40f680946c446e094038d670b315811e836c394ba44598e3617c
1992-12-07 "Are Cmputer Hacker Break-ins Ethical"Eugene H. Spafford, Purdue
6424ef6d0f3270fb0e8d3c4ce309f69a6932ca8adf7d95a9458b68139e7d6df7
1995-12-19 AUSCERT UNIX Computer Security Checklist (Version 1.1)
ba663874a112c5fb30101b4bcc3702f4814775109d3f52cbc6255bbad9d352e3
1992-12-08 "Limitations of the Kerberos Authentication System" Steven M. Bellovin & Michael Merrit, AT&T Bell Labs
7600aaf625d22ca09b5074a7ce5d0504da19e0122eb1c3d7b172b4475dc8adb1
1994-03-01 ID & analysis of foreign laws & regs. pertaining to the use of commercial encryption products for voice and data communications
d2d90d375988d8b174942ddfde3b2e5809cdb574e282a3e6bc5c1fe6fe3dfd8f
1994-03-01 review and analysis of U.S. Laws, reg.& case laws pertaining to the use of commercial encryption products for voice and data communications
0846e1fc4eefd4672569a8435021a68c1d213731142165ee5004dbd4c7e64a17
1993-11-10 National Computer Security Center "Endorsed Tools List"
517856156b93697a5f3a9d274273e4f59b346f831fe539c1882565750b10a981
1993-11-10 National Computer Security Center "A Guideline on Office Automation Security" 12/5/86
dc5e73209fd2a726fc7e5db195fada8c3e05d9fb5fb9449dd3264147ea3b1a7c
1992-12-08 "OARnet Security Procedures" Kannan Varadhan, OARnet
99e437342c5da869cf2326c86d76da2561d6e195fbd57ded284fe53a95df8863
1993-07-20 "Network (In)Security Through IP Packet Filtering" by Brent Chapman
05be1ac4256ef2316c39ff07e7067d5753fd39e114cf5b0a5f41e04755185659
1992-12-07 "Coping with the Threat of Computer Security Incidents-A Primer from Prevention through Recovery" Russell L. Brand"
f790806a0b8ed078cfa1b5b9379dadb0ba3769539df4f2810bb1b06e098298dc
1992-12-07 "Guidelines for the Secure Operation of the Internet" R. Pethia, CERT, S.Crocker, TIS, and B. Fraser, CERT
3beef5292eefb6fa5616290c221aaace136190d4a26b5ceb195194230af51412
1992-12-08 "Answers to Frequently Asked Questions About Today's Cryptography" Paul Fahn, RSA Laboratories
4d1e485a9433b72e688c8448519a6ee5c1f78dedeb91d236004f56468d7936f1
1993-02-10 Frequently asked questions on the USENET News groups, "comp.security.misc" and "alt.security"
15247d4b27063423c90047d85e2f0d0990afe4fe68228bdf4bfa44835882cacc
1993-03-18 Organizing a Corporate Anti-Virus Program
755ebe861aa018ae92b8327f5dc9a9fd1386e48071ec68bdc5516f6c2f8c58b0
1994-10-18 Forming an Incident Response Team - Danny Smith, Austrlian SERT
c8fff2d10900e1096fc99200510564a1a1bb4299f53b8df6679417e3acb2dbd0
1993-07-20 "Thinking About Firewalls" by Marcus Ranum
a2fbd0a3c2c6ea92d8a77701357cf5296f6ee83f39b717df3310469a23442821
1992-12-04 "The Design of a Secure Internet Gateway"
f9b5104de8210146f3c409e1a05a6a4a42b9df29e872f67f23e5bf1a8f846114
1985-12-01 Suggested Actions & Proc. for Software Maintenance
c609a91befc342ab2edc7f52c9bb0ee5533dd798c09288c67e1eb615924c579c
1990-06-04 The social organization of the computer underground, Thesis, G. Meyer, Illinois
4fd2e91cee2a52e8450fe85c8c799eea3c0ec7fc9465f1f28d881967fee92d90
1993-03-18 Legal Issues - A Site Manager's Nightmare
fc9d456a9c27d265b6fb1029880e36ebffd26aed61540379405fbffc6503cdbe