what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 48 of 48 RSS Feed

Files

NCSC-TG-026.txt
Posted Aug 17, 1999

NCSC-TG-026: A Guide to Writing the Security Features User's Guide for Trusted Systems, September 1991. (Hot Peach Book)

tags | paper
SHA-256 | 6b5ab63d7b7616768803e8531a76c42cc4929f3cf36e372ae489ce3afbbddc15
NCSC-TG-008.txt
Posted Aug 17, 1999

NCSC-TG-008: A Guide to Understanding Trusted Distribution in Trusted Systems 15 December 1988. (Dark Lavender Book)

tags | paper
SHA-256 | 02a1e0a2a49aab35adba5f616346b5a3fc0bd5620e0bd2a529673fc3d04f2da0
NCSC-TG-009.txt
Posted Aug 17, 1999

NCSC-TG-009: Computer Security Subsystem Interpretation of the TCSEC 16 September 1988. (Venice Blue Book)

tags | paper
SHA-256 | 9f06251c53039ed6453b081d61b4d11118094bd99a73e134e04503d2dd6cb880
NCSC-TG-010.txt
Posted Aug 17, 1999

NCSC-TG-010: A Guide to Understanding Security Modeling in Trusted Systems, October 1992. (Aqua Book)

tags | paper
SHA-256 | 8e6b2709c955a566bac180e5c3b3916b0e335f142f5fd4eae558f97fb09d3672
NCSC-TG-011.html
Posted Aug 17, 1999

NCSC-TG-011: Trusted Network Interpretation Environments Guideline - Guidance for Applying the TNI, 1 August 1990. (Red Book)

tags | paper
SHA-256 | 33a63ea69bb156e69e872270de314eeb4c87e757610efa59226a6efbe55b4483
NCSC-TG-013.2.txt
Posted Aug 17, 1999

NCSC-TG-013 Ver.2: RAMP Program Document, 1 March 1995, Version 2 (Pink Book)

tags | paper
SHA-256 | b1b02b1ae250743492e474a441bc7b35fea4836aec8b67d8ce3bd9be5d511288
NCSC-TG-014.txt
Posted Aug 17, 1999

NCSC-TG-014: Guidelines for Formal Verification Systems, 1 April 1989. (Purple Book)

tags | paper
SHA-256 | 6332be201ddc80d087d74e8521b04c3b3a12ba03ce4467230ed288d5a032bd37
NCSC-TG-015.txt
Posted Aug 17, 1999

NCSC-TG-015: A Guide to Understanding Trusted Facility Management, 18 October 1989 (Brown Book)

tags | paper
SHA-256 | 93313fc834cba53af675cd900191f8b0533d379ffc6a181804f98531dc4f46b5
NCSC-TG-016.html
Posted Aug 17, 1999

NCSC-TG-016: Guidelines for Writing Trusted Facility Manuals, October 1992. (Yellow-Green Book)

tags | paper
SHA-256 | c756104cc46b3bf49183240b6a1dcb27fccaefe2263c8df5e50e2594f665c7a6
NCSC-TG-017.txt
Posted Aug 17, 1999

NCSC-TG-017: A Guide to Understanding Identification and Authentication in Trusted Systems, September 1991. (Light Blue Book)

tags | paper
SHA-256 | bdc0030a1f8558d5b1b0386c6bd01e153368efd8e5fa21e5b8895b690b2dd6b1
NCSC-TG-018.html
Posted Aug 17, 1999

NCSC-TG-018: A Guide to Understanding Object Reuse in Trusted Systems, July 1992. (Light Blue Book)

tags | paper
SHA-256 | 3aa3356046b869e17c803a48ace345344fe886c21a3518a8159871efe803ba84
NCSC-TG-019.2.txt
Posted Aug 17, 1999

NCSC-TG-019 Ver. 2: Trusted Product Evaluation Questionaire, 2 May 1992, Version 2. (Blue Book)

tags | paper
SHA-256 | 6e0ab44ebb84a7328585f2ff6a3f10ab27601df1a23fdc60503f6b6321af8e01
N-C-1-87.txt
Posted Aug 17, 1999

NTISSAM COMPUSEC/1-87: Advisory Memorandum on Office Automation Security Guidelines

tags | paper
SHA-256 | 10e4d64cdc8babc15f060a5c090e854ad8d47ea0e4e76225f5222648e420be82
NCSC-TG-001-2.html
Posted Aug 17, 1999

NCSC-TG-001 Ver. 2: A Guide to Understanding Audit in Trusted Systems 1 June 1988, Version 2. (Tan Book)

tags | paper
SHA-256 | 000bf5d78f8292da4483549b54a9bfe0ba06315a9ccf9b4bfe6c13d77c2bd04e
NCSC-TG-002.txt
Posted Aug 17, 1999

NCSC-TG-002: Trusted Product Evaluations - A Guide for Vendors, 22 June 1990. (Bright Blue Book)

tags | paper
SHA-256 | d8e5b7ff5149b7d8b1a36671d2a27af488cc7704814380fabed0f9c71191c42f
NCSC-TG-003.txt
Posted Aug 17, 1999

NCSC-TG-003: A Guide to Understanding Discretionary Access Control in Trusted Systems, 30 September 1987. (Neon Orange Book)

tags | paper
SHA-256 | a63295cd371a3fbc4195134f68916312bfd28a06930aa147450b8f39e01460fa
NCSC-TG-004.txt
Posted Aug 17, 1999

NCSC-TG-004: Glossary of Computer Security Terms, 21 October 1988. (Teal Green Book) (NCSC-WA-001-85 is obsolete)

tags | paper
SHA-256 | 96082dfc40a9254f4946343018db86617230633d6dbb7e3fc60883a5e380518c
NCSC-TG-005.txt
Posted Aug 17, 1999

NCSC-TG-005: Trusted Network Interpretation of the TCSEC (TNI), 31 July 1987. (Red Book)

tags | paper
SHA-256 | 467498381e9add1b83295ac0d882df70d3d0b42a2bba535df8e70ea7032d47aa
NCSC-TG-006.txt
Posted Aug 17, 1999

NCSC-TG-006: A Guide to Understanding Configuration Management in Trusted Systems, 28 March 1988. (Amber Book)

tags | paper
SHA-256 | 094964545c41ea46042e12e263975b3c7ee61bc0b52615abbd9021b1cf331083
NCSC-TG-007.txt
Posted Aug 17, 1999

NCSC-TG-007: A Guide to Understanding Design Documentation in Trusted Systems, 6 October 1988. (Burgundy Book)

tags | paper
SHA-256 | 085c596b0a813603d66c22d0c68814f84831671a780cf7e77357a0fe7b086d0c
CSC-STD-002-85.txt
Posted Aug 17, 1999

CSC-STD-002-85: DoD Password Management Guideline, 12 April 1985. (Green Book)

tags | paper
SHA-256 | 3cadb682b89e50ea368068ad9c6c4607b9229cbb6456b7521530df6dae19db04
CSC-STD-003-85.txt
Posted Aug 17, 1999

CSC-STD-003-85: Computer Security Requirements -- Guidance for Applying the DoD TCSEC in Specific Environments, 25 June 1985 (Light Yellow Book)

tags | paper
SHA-256 | 81815035b5fc78d04b5d9f922787742301588c1a074a0dfb6ce1a3ae9d3a8ac6
CSC-STD-004-85.txt
Posted Aug 17, 1999

CSC-STD-004-85 Technical Rational Behind CSC-STD-003-85: Computer Security Requirements -- Guidance for Applying the DoD TCSEC in Specific Environments, 25 June 1985. (Yellow Book)

tags | paper
SHA-256 | 09cf5b55462aac624ecdcbbf92c05f7fdc09eab563ed1cd9cbff178f0973994b
Page 2 of 2
Back12Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close