Twenty Year Anniversary
Showing 1 - 25 of 48 RSS Feed

Files

5200.28-STD.txt
Posted Aug 17, 1999

5200.28-STD: DoD Trusted Computer System Evaluation Criteria, 26 December 1985 (Supercedes CSC-STD-001-83, dtd 15 Aug 83). (Orange Book)

tags | paper
MD5 | a23335e34c31fd579845c087ee060fb0
NCSC-TR-002.txt
Posted Aug 17, 1999

NCSC Technical Report 002: Use of the TCSEC for Complex, Evolving, Mulitpolicy Systems

tags | paper
MD5 | 39322e41172241c4e6ec13cfb9f59234
NCSC-TR-003.txt
Posted Aug 17, 1999

NCSC Technical Report 003: Turning Multiple Evaluated Products Into Trusted Systems

tags | paper
MD5 | 32b6b67e21647991af393817722142ef
NCSC-TR-004.txt
Posted Aug 17, 1999

NCSC Technical Report 004: A Guide to Procurement of Single Connected Systems - Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators - Includes Complex, Evolving, and Multipolicy Systems

tags | paper
MD5 | 7c9e37c40c4e73c299819cb83a737a05
NCSC-TR-005-1.txt
Posted Aug 17, 1999

NCSC Technical Report 005 Volume 1/5: Inference and Aggregation Issues In Secure Database Management Systems

tags | paper
MD5 | 722c2aa5ce3de2bfc1887f4b3374e243
NCSC-TR-005-2.txt
Posted Aug 17, 1999

NCSC Technical Report 005 Volume 2/5: Entity and Referential Integrity Issues In Multilevel Secure Database Management

tags | paper
MD5 | c70b99150e5c12cb01a7631968792cb0
NCSC-TR-005-3.txt
Posted Aug 17, 1999

NCSC Technical Report 005 Volume 3/5: Polyinstantiation Issues In Multilevel Secure Database Management Systems

tags | paper
MD5 | 06ff846f8e8aac07072e27a5145583ca
NCSC-TR-005-4.txt
Posted Aug 17, 1999

NCSC Technical Report 005 Volume 4/5: Auditing Issues In Secure Database Management Systems

tags | paper
MD5 | 58be5f859846b88fe5dbade6d39e6d92
NCSC-TR-005-5.txt
Posted Aug 17, 1999

NCSC Technical Report 005 Volume 5/5: Discretionary Access Control Issues In High Assurance Secure Database Management Systems

tags | paper
MD5 | 643c9c3b50a1878823ff794d2232e4cd
C-TR-111-91.txt
Posted Aug 17, 1999

C Technical Report 111-91: Integrity-Oriented Control Objectives: Proposed Revisions to the TCSEC, October 1991.

tags | paper
MD5 | 99855e6092543c1835984c07bf45cfb5
C-TR-32-92.txt
Posted Aug 17, 1999

C Technical Report 32-92: The Design and Evaluation of INFOSEC systems: The Computer Security Contribution to the Composition Discussion, June 1992.

tags | paper
MD5 | a3b1dc4055f7330c4232bbb145ed2097
C-TR-79-91.txt
Posted Aug 17, 1999

C Technical Report 79-91: Technical Report, Integrity in Automated Information Systems, September 1991.

tags | paper
MD5 | 6e5946252d018c11d989fc662eba1a98
C1-TR-001.txt
Posted Aug 17, 1999

C1 Technical Report 001: Technical Report, Computer Viruses: Prevention, Detection, and Treatment, 12 March 1990

tags | paper
MD5 | cdd9d2a7e4793fc1b32a0efd473dd7e2
NCSC-TG-027.txt
Posted Aug 17, 1999

NCSC-TG-027: A Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems, May 1992. (Turquiose Book)

tags | paper
MD5 | c731accf08840fcc42592edc30b73343
NCSC-TG-028.txt
Posted Aug 17, 1999

NCSC-TG-028: Assessing Controlled Access Protection, 25 May 1992. (Violet Book)

tags | paper
MD5 | de9d503a3bfd03dc17480af36d2722c2
NCSC-TG-029.txt
Posted Aug 17, 1999

NCSC-TG-029: Introduction to Certification and Accreditation Concepts, January 1994. (Blue Book)

tags | paper
MD5 | 39b7ff0a0b9dc9ad1d660e7cabe833b1
NCSC-TG-030.txt
Posted Aug 17, 1999

NCSC-TG-030: A Guide to Understanding Covert Channel Analysis of Trusted Systems, November 1993. (Light Pink Book)

tags | paper
MD5 | 1c0619045c211cbc34206d2c2fac27ce
NCSC-TG-020-A.html
Posted Aug 17, 1999

NCSC-TG-020-A: Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX® System, 7 July 1989. (Silver Book)

tags | paper
systems | unix
MD5 | 4df5f4e1036ab310bc054b75d4de2f73
NCSC-TG-021.txt
Posted Aug 17, 1999

NCSC-TG-021: Trusted Database Management System Interpretation of the TCSEC (TDI), April 1991. (Purple Book)

tags | paper
MD5 | 302496bce2c28d0c85900a565d982a51
NCSC-TG-022.txt
Posted Aug 17, 1999

NCSC-TG-022: A Guide to Understanding Trusted Recovery in Trusted Systems, 30 December 1991. (Yellow Book)

tags | paper
MD5 | b603004cefe688311fa048ff82e84b04
NCSC-TG-023.txt
Posted Aug 17, 1999

NCSC-TG-023: A Guide to Understanding Security Testing and Test Documentation in Trusted Systems (Bright Orange Book)

tags | paper
MD5 | 842832e937ecfb073f63c1b8a633eaed
NCSC-TG-024-1.html
Posted Aug 17, 1999

NCSC-TG-024 Vol. 1/4: A Guide to Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements, December 1992. (Purple Book)

tags | paper
MD5 | 0cea17c2fb232e51908e07b54873ef50
NCSC-TG-024-2.html
Posted Aug 17, 1999

NCSC-TG-024 Vol. 2/4: A Guide to Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators, 30 June 1993. (Purple Book)

tags | paper
MD5 | 488d561e2f286b9a98b114375e15cfec
NCSC-TG-024-3.html
Posted Aug 17, 1999

NCSC-TG-024 Vol. 3/4: A Guide to Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description Tutorial, 28 February 1994. (Purple Book)

tags | paper
MD5 | 2baaffc95b3a44057465a2626291dd8c
NCSC-TG-025.2.html
Posted Aug 17, 1999

NCSC-TG-025 Ver. 2: A Guide to Understanding Data Remanence in Automated Information Systems, September 1991, Version 2, (Supercedes CSC-STD-005-85). (Forest Green Book)

tags | paper
MD5 | 94f7533ba8c0bf176e50d8f14f0ee907
Page 1 of 2
Back12Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Hackers Who Sabotaged The Olympic Games Return For More Mischief
Posted Jun 19, 2018

tags | headline, hacker, cyberwar
Alleged Leaker Of Vault7 Cache Busted By Poor OpSec
Posted Jun 19, 2018

tags | headline, government, usa, data loss, cyberwar, password, fbi, cia
7 Time Jeopardy! Winner Pleads Guilty To Hacking
Posted Jun 19, 2018

tags | headline, hacker, privacy, email
FBI Recovers WhatsApp, Signal Data Stored On Michael Cohen's BlackBerry
Posted Jun 18, 2018

tags | headline, government, usa, phone, russia, fraud, fbi
US Exposes North Korea Government's Typeframe Malware
Posted Jun 18, 2018

tags | headline, government, malware, usa, cyberwar, korea
PageUp Confirms Some Data Compromised In Breach
Posted Jun 18, 2018

tags | headline, hacker, data loss
Huawei Rejects Australia Security Concerns
Posted Jun 18, 2018

tags | headline, government, australia, china, flaw, cyberwar, backdoor
Ex-Fitbit Employees Indicted For Allegedly Stealing Secrets
Posted Jun 15, 2018

tags | headline, data loss, fraud
This New Android Malware Delivers Banking Trojan, Keylogger And Ransomware
Posted Jun 15, 2018

tags | headline, malware, phone, google
Xen Project Patches Intel's Lazy FPU Flaw
Posted Jun 15, 2018

tags | headline, flaw, patch, intel
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close