NCSC-TG-027: A Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems, May 1992. (Turquiose Book)
89272408b0c73894e32d3875015c81feda77e8259a560f5938e3e00ec14dae9a
NCSC Technical Report 002: Use of the TCSEC for Complex, Evolving, Mulitpolicy Systems
761a271ec6333f8e0b91e8e68200eb2a33a056e59e5bd180005cd01b88a2855e
NCSC Technical Report 003: Turning Multiple Evaluated Products Into Trusted Systems
557e2dc5adcb3e97bc458dc4291957a31080718ac29a7b05656168284f7e2109
NCSC Technical Report 004: A Guide to Procurement of Single Connected Systems - Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators - Includes Complex, Evolving, and Multipolicy Systems
965b2950154a83e4f2f33f91c68102327e864652a20bce003816a01660df7e0a
NCSC Technical Report 005 Volume 1/5: Inference and Aggregation Issues In Secure Database Management Systems
2323d286401cba4250f29c3da7a46929bcab5c4421fceff4eee16aeb5519d0f9
NCSC Technical Report 005 Volume 2/5: Entity and Referential Integrity Issues In Multilevel Secure Database Management
cb9b3882ec4659596a30c2d2b9731572bc9602925122930b456c30161032bf81
NCSC Technical Report 005 Volume 3/5: Polyinstantiation Issues In Multilevel Secure Database Management Systems
172efec7db5f471e9e8c192a2f6f78b1c2013210bc4e81fcc33d9a8f5adb3d97
NCSC Technical Report 005 Volume 4/5: Auditing Issues In Secure Database Management Systems
bb5309ca82a9adf5a147a6913df47df2183f42ad78bb13f61890586338b4d5aa
NCSC Technical Report 005 Volume 5/5: Discretionary Access Control Issues In High Assurance Secure Database Management Systems
8605e03c9929e1c0109fb23f92303655bd52b875c2b6f8d58999d4b99f3987e7
NCSC-TG-028: Assessing Controlled Access Protection, 25 May 1992. (Violet Book)
54a1461e2b36a8c02ca22616c1b0b7ad88d218fb38c5e86e61e867fb5ff02a42
NCSC-TG-029: Introduction to Certification and Accreditation Concepts, January 1994. (Blue Book)
1a91dd973ae273314276529292ff1594bd6d3e27919c01120d35be066a26c9d3
NCSC-TG-030: A Guide to Understanding Covert Channel Analysis of Trusted Systems, November 1993. (Light Pink Book)
22b5421bc861f8aad644439ad976be08e9dc8fd4a9a832a310c60c888f901e3b
NCSC-TG-020-A: Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX® System, 7 July 1989. (Silver Book)
34d707f375dd37af66dbcbd7c385c1648b9a5a82556684ca5e00a55f3267f306
NCSC-TG-021: Trusted Database Management System Interpretation of the TCSEC (TDI), April 1991. (Purple Book)
5c6fe9586b7a5ea5023de4bd2f3571633922fc83aa75b82ee9e9e0cbb3e0ff88
NCSC-TG-022: A Guide to Understanding Trusted Recovery in Trusted Systems, 30 December 1991. (Yellow Book)
cb8376f035c95a49e41a401e6ba45f951041cbe88d435d4d5066d31eca1a254d
NCSC-TG-023: A Guide to Understanding Security Testing and Test Documentation in Trusted Systems (Bright Orange Book)
400531ce7490964ddddf06b71f3d3c894161b20bac3bcbdda85cf8d14671aa00
NCSC-TG-024 Vol. 1/4: A Guide to Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements, December 1992. (Purple Book)
5897799f03792a31752f3a777f7ca26d79affe0ae5908e2e3dc4d18146f3137e
NCSC-TG-024 Vol. 2/4: A Guide to Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators, 30 June 1993. (Purple Book)
c6f893c8c0a8fce8734ac5e51e95321e1c532e3f4119b209a94aef4d8352ecd2
NCSC-TG-024 Vol. 3/4: A Guide to Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description Tutorial, 28 February 1994. (Purple Book)
f30a830b3bcf7343987b3df11145ff4bc1984732da0e6f79259b4646313061d9
NCSC-TG-025 Ver. 2: A Guide to Understanding Data Remanence in Automated Information Systems, September 1991, Version 2, (Supercedes CSC-STD-005-85). (Forest Green Book)
c9a863fa02050b2dd778432d961b491c07af0ebfe767c6feea79f776b49976d1
NCSC-TG-026: A Guide to Writing the Security Features User's Guide for Trusted Systems, September 1991. (Hot Peach Book)
6b5ab63d7b7616768803e8531a76c42cc4929f3cf36e372ae489ce3afbbddc15
NCSC-TG-008: A Guide to Understanding Trusted Distribution in Trusted Systems 15 December 1988. (Dark Lavender Book)
02a1e0a2a49aab35adba5f616346b5a3fc0bd5620e0bd2a529673fc3d04f2da0
NCSC-TG-009: Computer Security Subsystem Interpretation of the TCSEC 16 September 1988. (Venice Blue Book)
9f06251c53039ed6453b081d61b4d11118094bd99a73e134e04503d2dd6cb880
NCSC-TG-010: A Guide to Understanding Security Modeling in Trusted Systems, October 1992. (Aqua Book)
8e6b2709c955a566bac180e5c3b3916b0e335f142f5fd4eae558f97fb09d3672
NCSC-TG-011: Trusted Network Interpretation Environments Guideline - Guidance for Applying the TNI, 1 August 1990. (Red Book)
33a63ea69bb156e69e872270de314eeb4c87e757610efa59226a6efbe55b4483
NCSC-TG-013 Ver.2: RAMP Program Document, 1 March 1995, Version 2 (Pink Book)
b1b02b1ae250743492e474a441bc7b35fea4836aec8b67d8ce3bd9be5d511288