60 lines
4.4 KiB
Plaintext
60 lines
4.4 KiB
Plaintext
# COLORBOOKS
|
|
Purported Department of Defense Computer Security Guidelines
|
|
|
|
## FILES
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/aqua.txt [ 67633] The Aqua Book: A Glossary of Computer Security Acronyms
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/b_blue.txt [ 52053] The Blue Book: Procedures for Interacting with the NSA's Information Security Organization (March 1, 1988)
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/blue.txt [ 60038] The Blue Book: The Trusted Product Evaluation Questionnaire (1989)
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/brown.txt [ 97701] The Brown Book: The Guide to Understanding Trusted Facility Management
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/burgendy.txt [ 66951] The Burgundy Book: A Guide to Understanding Design Documentation
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/greenbook.txt [ 60908] The Green Book: The Department of Defense Password Management Guideline (April 12, 1985)
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/grey.txt [ 141699] The Grey Book: A Rationale for Selecting Access Control List Features for the UNIX System
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/lavender.txt [ 55484] The Lavender Book: A Guide to Understanding Trusted Distribution in Trusted Systems (December 15, 1988)
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/lightblue.txt [ 53868] The Light Blue Book: A Guide to Understanding Identification and Authentication in Trusted Systems (September 1991)
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/n_orange.txt [ 86796] The Orange Book: A Guide to Understanding Discretionary Access Control in Trusted Systems (September 30, 1987)
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/nsaorder.txt [ 2676] Order Form for Computer Security Products from the NSA
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/nsapubs.txt [ 8268] List of National Security Agency Computer Security Documents
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/orange.book [ 325120] Computer Security - 1983 Orange Book (August 15, 1983)
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/orange.txt [ 247993] The Orange Book: The Guide to Trusted Computer System Evaluation Criteria (August 15, 1983)
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/orange2.txt [ 141806] The Orange Book II: A Guide to Understanding Configuration Management in Trusted Systems
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/peach.txt [ 59080] The Peach Book: A Guide to Writing the Security Features Users Guide for Trusted Systems (September 1991)
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/pink.txt [ 143547] The Pink Book: A Guide to Rating Maintenance Phase
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/purple.txt [ 57408] The Purple Book: Guidelines for Formal Verification Systems (April 1, 1991)
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/red.txt [ 819493] The Red Book: Evaluation of Trusted Network Systems and Components (July 31, 1987)
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/redii.txt [ 119791] The Red Book II: Trusted Network Interpretation Environments Guideline (August 1, 1990)
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/std001.txt [ 277123] DoD 5200.28-STD: Department of Defense Trusted Computer System Evaluation Criteria (December 26, 1985)
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/tan.txt [ 56311] The Tan Book: A Guide to Understanding Audit in Trusted Systems
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/tg004.txt [ 65376] Glossary of Computer Security Acronyms
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/tg006.txt [ 137992] National Computer Security Center: A Guide to Understanding Configuration Management in Trusted Systems
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/veniceblue.txt [ 61920] The Venice Blue Book: Computer Security Subsystems (September 1988)
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/yellow.txt [ 76867] The Yellow Book: Guideance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in SPecific Environm,ents (June 1985)
|
|
|
|
=> gemini://informis.land/textfiles/hacking/COLORBOOKS/yellow_2.txt [ 20194] Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments (June 25, 1985)
|
|
|
|
|