1993-07-20 "Security Problems in the TCP/IP Protocol Suite" by Steve Bellovin"
92659f3365f8178c6bbca579bc80f1380b47a7e5c5bd0f8e50ff5dddffab1ced
1994-06-06 information technology security evaluation criteria
560bb0ecd66b95fd2bc706213b338dc0f523c61c39297d7a47bac8c06c06161b
1994-04-15 Redefining Security "A Report to the Secretary of Defense and the Dir. of Central Intelligence"
3f0747fdda7c066268ed4757ef970bf14bcce8d5632c1995bbfec49e9cc3a708
1993-03-18 Relating Functionality Class and Security Sub-profile Specifications
32934feae946346122073bfa2a294dad7cde9eacf325a6bc42aaa46075520f18
1993-11-23 Department of Commerce's Abbreviated Certification Methodology Guidelines for Sensitive and Classified IT Systems
ea0f29ee674717698c7be442a8108bf73d9a597cbb71857e61971876204fff9a
1992-12-04 "There Be Dragons" by Steven M. Bellovin-a description of cracker assults vs. the ramparts of ATT.COM
9ad48dc135e2c7a5f15789b4a48f635d698d20460c387a935970b6b9e642f159
1992-12-07 "An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied" Bill Cheswick, AT&T Bell Labs
de8f6319fb176bb435c681d6a603cd498096882447ab49eb438b5573e5b5d93c
1992-12-07 "Computer Emergency Response-An Int'l Problem" a description of the CERT System" Richard D. Pethia
09d5ae9bdc10dbb998cfe0aebdafabb8edf7533dc0e2ed31af8b545319eff50a
1990-07-17 "Computer Security and the Law." by Gary Morris - good doc on legal issues with regard to computer security
5c33f14973086fcee9e932bbdf16fa6a52dc777f027c4ed55129ae149adf5967
1992-12-07 "Improving the Security of your Unix System" David A. Curry, SRI International
3b93175fc0bd5513cf94f32b97f6c6f3a2d5d8e2ad6adfbf91396d9eb11ec0bc
1993-11-10 National Computer Security Center "Degausser Products List" 2/27/89
10351f159c71aecc2269477648a9b2050a6d3ccef99fc4c953a8cd72b9aac801
1993-04-21 Foundation for the Harmonization of Information Technology
4d627d6e0153c6b09f254340b935919b85cf9260db677c9cc3c34eb959983f9f