# COLORBOOKS Purported Department of Defense Computer Security Guidelines ## FILES => gemini://informis.land/textfiles/hacking/COLORBOOKS/aqua.txt [ 67633] The Aqua Book: A Glossary of Computer Security Acronyms => gemini://informis.land/textfiles/hacking/COLORBOOKS/b_blue.txt [ 52053] The Blue Book: Procedures for Interacting with the NSA's Information Security Organization (March 1, 1988) => gemini://informis.land/textfiles/hacking/COLORBOOKS/blue.txt [ 60038] The Blue Book: The Trusted Product Evaluation Questionnaire (1989) => gemini://informis.land/textfiles/hacking/COLORBOOKS/brown.txt [ 97701] The Brown Book: The Guide to Understanding Trusted Facility Management => gemini://informis.land/textfiles/hacking/COLORBOOKS/burgendy.txt [ 66951] The Burgundy Book: A Guide to Understanding Design Documentation => gemini://informis.land/textfiles/hacking/COLORBOOKS/greenbook.txt [ 60908] The Green Book: The Department of Defense Password Management Guideline (April 12, 1985) => gemini://informis.land/textfiles/hacking/COLORBOOKS/grey.txt [ 141699] The Grey Book: A Rationale for Selecting Access Control List Features for the UNIX System => gemini://informis.land/textfiles/hacking/COLORBOOKS/lavender.txt [ 55484] The Lavender Book: A Guide to Understanding Trusted Distribution in Trusted Systems (December 15, 1988) => gemini://informis.land/textfiles/hacking/COLORBOOKS/lightblue.txt [ 53868] The Light Blue Book: A Guide to Understanding Identification and Authentication in Trusted Systems (September 1991) => gemini://informis.land/textfiles/hacking/COLORBOOKS/n_orange.txt [ 86796] The Orange Book: A Guide to Understanding Discretionary Access Control in Trusted Systems (September 30, 1987) => gemini://informis.land/textfiles/hacking/COLORBOOKS/nsaorder.txt [ 2676] Order Form for Computer Security Products from the NSA => gemini://informis.land/textfiles/hacking/COLORBOOKS/nsapubs.txt [ 8268] List of National Security Agency Computer Security Documents => gemini://informis.land/textfiles/hacking/COLORBOOKS/orange.book [ 325120] Computer Security - 1983 Orange Book (August 15, 1983) => gemini://informis.land/textfiles/hacking/COLORBOOKS/orange.txt [ 247993] The Orange Book: The Guide to Trusted Computer System Evaluation Criteria (August 15, 1983) => gemini://informis.land/textfiles/hacking/COLORBOOKS/orange2.txt [ 141806] The Orange Book II: A Guide to Understanding Configuration Management in Trusted Systems => gemini://informis.land/textfiles/hacking/COLORBOOKS/peach.txt [ 59080] The Peach Book: A Guide to Writing the Security Features Users Guide for Trusted Systems (September 1991) => gemini://informis.land/textfiles/hacking/COLORBOOKS/pink.txt [ 143547] The Pink Book: A Guide to Rating Maintenance Phase => gemini://informis.land/textfiles/hacking/COLORBOOKS/purple.txt [ 57408] The Purple Book: Guidelines for Formal Verification Systems (April 1, 1991) => gemini://informis.land/textfiles/hacking/COLORBOOKS/red.txt [ 819493] The Red Book: Evaluation of Trusted Network Systems and Components (July 31, 1987) => gemini://informis.land/textfiles/hacking/COLORBOOKS/redii.txt [ 119791] The Red Book II: Trusted Network Interpretation Environments Guideline (August 1, 1990) => gemini://informis.land/textfiles/hacking/COLORBOOKS/std001.txt [ 277123] DoD 5200.28-STD: Department of Defense Trusted Computer System Evaluation Criteria (December 26, 1985) => gemini://informis.land/textfiles/hacking/COLORBOOKS/tan.txt [ 56311] The Tan Book: A Guide to Understanding Audit in Trusted Systems => gemini://informis.land/textfiles/hacking/COLORBOOKS/tg004.txt [ 65376] Glossary of Computer Security Acronyms => gemini://informis.land/textfiles/hacking/COLORBOOKS/tg006.txt [ 137992] National Computer Security Center: A Guide to Understanding Configuration Management in Trusted Systems => gemini://informis.land/textfiles/hacking/COLORBOOKS/veniceblue.txt [ 61920] The Venice Blue Book: Computer Security Subsystems (September 1988) => gemini://informis.land/textfiles/hacking/COLORBOOKS/yellow.txt [ 76867] The Yellow Book: Guideance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in SPecific Environm,ents (June 1985) => gemini://informis.land/textfiles/hacking/COLORBOOKS/yellow_2.txt [ 20194] Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments (June 25, 1985)