# COLORBOOKS
Purported Department of Defense Computer Security Guidelines

## FILES
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/aqua.txt [   67633] The Aqua Book: A Glossary of Computer Security Acronyms

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/b_blue.txt [   52053] The Blue Book: Procedures for Interacting with the NSA's Information Security Organization (March 1, 1988)

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/blue.txt [   60038] The Blue Book: The Trusted Product Evaluation Questionnaire (1989)

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/brown.txt [   97701] The Brown Book: The Guide to Understanding Trusted Facility Management

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/burgendy.txt [   66951] The Burgundy Book: A Guide to Understanding Design Documentation

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/greenbook.txt [   60908] The Green Book: The Department of Defense Password Management Guideline (April 12, 1985)

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/grey.txt [  141699] The Grey Book: A Rationale for Selecting Access Control List Features for the UNIX System

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/lavender.txt [   55484] The Lavender Book: A Guide to Understanding Trusted Distribution in Trusted Systems (December 15, 1988)

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/lightblue.txt [   53868] The Light Blue Book: A Guide to Understanding Identification and Authentication in Trusted Systems (September 1991)

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/n_orange.txt [   86796] The Orange Book: A Guide to Understanding Discretionary Access Control in Trusted Systems (September 30, 1987)

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/nsaorder.txt [    2676] Order Form for Computer Security Products from the NSA

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/nsapubs.txt [    8268] List of National Security Agency Computer Security Documents

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/orange.book [  325120] Computer Security - 1983 Orange Book (August 15, 1983)

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/orange.txt [  247993] The Orange Book: The Guide to Trusted Computer System Evaluation Criteria (August 15, 1983)

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/orange2.txt [  141806] The Orange Book II: A Guide to Understanding Configuration Management in Trusted Systems

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/peach.txt [   59080] The Peach Book: A Guide to Writing the Security Features Users Guide for Trusted Systems (September 1991)

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/pink.txt [  143547] The Pink Book: A Guide to Rating Maintenance Phase

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/purple.txt [   57408] The Purple Book: Guidelines for Formal Verification Systems (April 1, 1991)

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/red.txt [  819493] The Red Book: Evaluation of Trusted Network Systems and Components (July 31, 1987)

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/redii.txt [  119791] The Red Book II: Trusted Network Interpretation Environments Guideline (August 1, 1990)

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/std001.txt [  277123] DoD 5200.28-STD: Department of Defense Trusted Computer System Evaluation Criteria (December 26, 1985)

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/tan.txt [   56311] The Tan Book: A Guide to Understanding Audit in Trusted Systems

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/tg004.txt [   65376] Glossary of Computer Security Acronyms

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/tg006.txt [  137992] National Computer Security Center: A Guide to Understanding Configuration Management in Trusted Systems

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/veniceblue.txt [   61920] The Venice Blue Book: Computer Security Subsystems (September 1988)

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/yellow.txt [   76867] The Yellow Book: Guideance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in SPecific Environm,ents (June 1985)

=> gemini://informis.land/textfiles/hacking/COLORBOOKS/yellow_2.txt [   20194] Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments (June 25, 1985)