Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

HÁÒÙÌ ×ÏÔ ÞÅÇÏ. ëÌÁÓÓÉËÁ!

8 views
Skip to first unread message

John Zaicev

unread,
Aug 6, 2012, 10:57:51 AM8/6/12
to
[�] ������ _All_ !

The Aqua Book: A Glossary of Computer Security Acronyms
The Blue Book: Procedures for Interacting with the NSA's Information Security
Organization (March 1, 1988)
The Blue Book: The Trusted Product Evaluation Questionnaire (1989)
The Brown Book: The Guide to Understanding Trusted Facility Management
The Burgundy Book: A Guide to Understanding Design Documentation
The Green Book: The Department of Defense Password Management Guideline (April
12, 1985)
The Grey Book: A Rationale for Selecting Access Control List Features for the
UNIX System
The Lavender Book: A Guide to Understanding Trusted Distribution in Trusted
Systems (December 15, 1988)
The Light Blue Book: A Guide to Understanding Identification and
Authentication in Trusted Systems (September 1991)
The Orange Book: A Guide to Understanding Discretionary Access Control in
Trusted Systems (September 30, 1987)
Order Form for Computer Security Products from the NSA
List of National Security Agency Computer Security Documents
Computer Security - 1983 Orange Book (August 15, 1983)
The Orange Book: The Guide to Trusted Computer System Evaluation Criteria
(August 15, 1983)
The Orange Book II: A Guide to Understanding Configuration Management in
Trusted Systems
The Peach Book: A Guide to Writing the Security Features Users Guide for
Trusted Systems (September 1991)
The Pink Book: A Guide to Rating Maintenance Phase
The Purple Book: Guidelines for Formal Verification Systems (April 1, 1991)
The Red Book: Evaluation of Trusted Network Systems and Components (July 31,
1987)
The Red Book II: Trusted Network Interpretation Environments Guideline (August
1, 1990)
DoD 5200.28-STD: Department of Defense Trusted Computer System Evaluation
Criteria (December 26, 1985)
The Tan Book: A Guide to Understanding Audit in Trusted Systems
Glossary of Computer Security Acronyms
National Computer Security Center: A Guide to Understanding Configuration
Management in Trusted Systems
The Venice Blue Book: Computer Security Subsystems (September 1988)
The Yellow Book: Guideance for Applying the Department of Defense Trusted
Computer System Evaluation Criteria in SPecific Environm,ents (June 1985)
Guidance for Applying the Department of Defense Trusted Computer System
Evaluation Criteria in Specific Environments (June 25, 1985)


H� � ����� ��� ������... ����� ��� ��� ������� �����...
[�] ���� _All_ !

������������ DreamLand laboratory. P2Pirates<dog>Mail.ru ICQ 638-547-576
2�5080�244�0 FTP://87.224.224.182

... H� ��� ��� �������, ����� ���� �� ���.
0 new messages