Exploit the possiblities
Showing 1 - 25 of 48 RSS Feed

Files

5200.28-STD.txt
Posted Aug 17, 1999

5200.28-STD: DoD Trusted Computer System Evaluation Criteria, 26 December 1985 (Supercedes CSC-STD-001-83, dtd 15 Aug 83). (Orange Book)

tags | paper
MD5 | a23335e34c31fd579845c087ee060fb0
NCSC-TR-002.txt
Posted Aug 17, 1999

NCSC Technical Report 002: Use of the TCSEC for Complex, Evolving, Mulitpolicy Systems

tags | paper
MD5 | 39322e41172241c4e6ec13cfb9f59234
NCSC-TR-003.txt
Posted Aug 17, 1999

NCSC Technical Report 003: Turning Multiple Evaluated Products Into Trusted Systems

tags | paper
MD5 | 32b6b67e21647991af393817722142ef
NCSC-TR-004.txt
Posted Aug 17, 1999

NCSC Technical Report 004: A Guide to Procurement of Single Connected Systems - Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators - Includes Complex, Evolving, and Multipolicy Systems

tags | paper
MD5 | 7c9e37c40c4e73c299819cb83a737a05
NCSC-TR-005-1.txt
Posted Aug 17, 1999

NCSC Technical Report 005 Volume 1/5: Inference and Aggregation Issues In Secure Database Management Systems

tags | paper
MD5 | 722c2aa5ce3de2bfc1887f4b3374e243
NCSC-TR-005-2.txt
Posted Aug 17, 1999

NCSC Technical Report 005 Volume 2/5: Entity and Referential Integrity Issues In Multilevel Secure Database Management

tags | paper
MD5 | c70b99150e5c12cb01a7631968792cb0
NCSC-TR-005-3.txt
Posted Aug 17, 1999

NCSC Technical Report 005 Volume 3/5: Polyinstantiation Issues In Multilevel Secure Database Management Systems

tags | paper
MD5 | 06ff846f8e8aac07072e27a5145583ca
NCSC-TR-005-4.txt
Posted Aug 17, 1999

NCSC Technical Report 005 Volume 4/5: Auditing Issues In Secure Database Management Systems

tags | paper
MD5 | 58be5f859846b88fe5dbade6d39e6d92
NCSC-TR-005-5.txt
Posted Aug 17, 1999

NCSC Technical Report 005 Volume 5/5: Discretionary Access Control Issues In High Assurance Secure Database Management Systems

tags | paper
MD5 | 643c9c3b50a1878823ff794d2232e4cd
C-TR-111-91.txt
Posted Aug 17, 1999

C Technical Report 111-91: Integrity-Oriented Control Objectives: Proposed Revisions to the TCSEC, October 1991.

tags | paper
MD5 | 99855e6092543c1835984c07bf45cfb5
C-TR-32-92.txt
Posted Aug 17, 1999

C Technical Report 32-92: The Design and Evaluation of INFOSEC systems: The Computer Security Contribution to the Composition Discussion, June 1992.

tags | paper
MD5 | a3b1dc4055f7330c4232bbb145ed2097
C-TR-79-91.txt
Posted Aug 17, 1999

C Technical Report 79-91: Technical Report, Integrity in Automated Information Systems, September 1991.

tags | paper
MD5 | 6e5946252d018c11d989fc662eba1a98
C1-TR-001.txt
Posted Aug 17, 1999

C1 Technical Report 001: Technical Report, Computer Viruses: Prevention, Detection, and Treatment, 12 March 1990

tags | paper
MD5 | cdd9d2a7e4793fc1b32a0efd473dd7e2
NCSC-TG-027.txt
Posted Aug 17, 1999

NCSC-TG-027: A Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems, May 1992. (Turquiose Book)

tags | paper
MD5 | c731accf08840fcc42592edc30b73343
NCSC-TG-028.txt
Posted Aug 17, 1999

NCSC-TG-028: Assessing Controlled Access Protection, 25 May 1992. (Violet Book)

tags | paper
MD5 | de9d503a3bfd03dc17480af36d2722c2
NCSC-TG-029.txt
Posted Aug 17, 1999

NCSC-TG-029: Introduction to Certification and Accreditation Concepts, January 1994. (Blue Book)

tags | paper
MD5 | 39b7ff0a0b9dc9ad1d660e7cabe833b1
NCSC-TG-030.txt
Posted Aug 17, 1999

NCSC-TG-030: A Guide to Understanding Covert Channel Analysis of Trusted Systems, November 1993. (Light Pink Book)

tags | paper
MD5 | 1c0619045c211cbc34206d2c2fac27ce
NCSC-TG-020-A.html
Posted Aug 17, 1999

NCSC-TG-020-A: Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX® System, 7 July 1989. (Silver Book)

tags | paper
systems | unix
MD5 | 4df5f4e1036ab310bc054b75d4de2f73
NCSC-TG-021.txt
Posted Aug 17, 1999

NCSC-TG-021: Trusted Database Management System Interpretation of the TCSEC (TDI), April 1991. (Purple Book)

tags | paper
MD5 | 302496bce2c28d0c85900a565d982a51
NCSC-TG-022.txt
Posted Aug 17, 1999

NCSC-TG-022: A Guide to Understanding Trusted Recovery in Trusted Systems, 30 December 1991. (Yellow Book)

tags | paper
MD5 | b603004cefe688311fa048ff82e84b04
NCSC-TG-023.txt
Posted Aug 17, 1999

NCSC-TG-023: A Guide to Understanding Security Testing and Test Documentation in Trusted Systems (Bright Orange Book)

tags | paper
MD5 | 842832e937ecfb073f63c1b8a633eaed
NCSC-TG-024-1.html
Posted Aug 17, 1999

NCSC-TG-024 Vol. 1/4: A Guide to Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements, December 1992. (Purple Book)

tags | paper
MD5 | 0cea17c2fb232e51908e07b54873ef50
NCSC-TG-024-2.html
Posted Aug 17, 1999

NCSC-TG-024 Vol. 2/4: A Guide to Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators, 30 June 1993. (Purple Book)

tags | paper
MD5 | 488d561e2f286b9a98b114375e15cfec
NCSC-TG-024-3.html
Posted Aug 17, 1999

NCSC-TG-024 Vol. 3/4: A Guide to Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description Tutorial, 28 February 1994. (Purple Book)

tags | paper
MD5 | 2baaffc95b3a44057465a2626291dd8c
NCSC-TG-025.2.html
Posted Aug 17, 1999

NCSC-TG-025 Ver. 2: A Guide to Understanding Data Remanence in Automated Information Systems, September 1991, Version 2, (Supercedes CSC-STD-005-85). (Forest Green Book)

tags | paper
MD5 | 94f7533ba8c0bf176e50d8f14f0ee907
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Cash Converters Reveals Data Breach
Posted Nov 16, 2017

tags | headline, hacker, cybercrime, data loss, fraud, identity theft
Kaspersky Defends Its Role In NSA Breach
Posted Nov 16, 2017

tags | headline, government, malware, usa, russia, data loss, spyware, nsa
McAfee Anti-Hacking Service Exposed Users To Banking Malware
Posted Nov 16, 2017

tags | headline, malware, bank, cybercrime, fraud, flaw, identity theft, mcafee
DJI Bug Bounty NDA Is 'Not Signable', Say Irate Infosec Researchers
Posted Nov 16, 2017

tags | headline, hacker, flaw
Government Just Figures Out You Can Hack Planes Remotely Due To Poor Design
Posted Nov 15, 2017

tags | headline, government, usa, flaw, terror
UK Security Chief Blames Russia For Hacks
Posted Nov 15, 2017

tags | headline, hacker, government, britain, russia, cyberwar
Forbes 30 Under 30 Conference Site Exposed Attendee Details
Posted Nov 15, 2017

tags | headline, privacy, data loss, flaw, conference
The Motherboard Guide To Not Getting Hacked
Posted Nov 15, 2017

tags | headline, hacker, privacy, data loss, fraud, identity theft
Votes In 18 Nations 'Hacked' In Last Year
Posted Nov 14, 2017

tags | headline, government, usa, russia, fraud, cyberwar, social
Shut The Front Door: Jewson Admits To Data Breach
Posted Nov 14, 2017

tags | headline, hacker, privacy, data loss
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close