[CONTACT]

[ABOUT]

[POLICY]

BBS Dump THE FILES txt The

Found at: 0x1bi.net:70/textfiles?hacking/COLORBOOKS


        ##### ###### #    # ##### ###### # #      ######  ####
          #   #       #  #    #   #      # #      #      #
          #   #####    ##     #   #####  # #      #####   ####
          #   #        ##     #   #      # #      #           #
          #   #       #  #    #   #      # #      #      #    #
          #   ###### #    #   #   #      # ###### ######  ####
                                A BBS Dump
-------- THE FILES ------------------------------------------------------

aqua.txt The Aqua Book: A Glossary of Computer Security Acronyms

b_blue.txt The Blue Book: Procedures for Interacting with the NSA's Information Security Organization (March 1, 1988)

blue.txt The Blue Book: The Trusted Product Evaluation Questionnaire (1989)

brown.txt The Brown Book: The Guide to Understanding Trusted Facility Management

burgendy.txt The Burgundy Book: A Guide to Understanding Design Documentation

greenbook.txt The Green Book: The Department of Defense Password Management Guideline (April 12, 1985)

grey.txt The Grey Book: A Rationale for Selecting Access Control List Features for the UNIX System

lavender.txt The Lavender Book: A Guide to Understanding Trusted Distribution in Trusted Systems (December 15, 1988)

lightblue.txt The Light Blue Book: A Guide to Understanding Identification and Authentication in Trusted Systems (September 1991)

n_orange.txt The Orange Book: A Guide to Understanding Discretionary Access Control in Trusted Systems (September 30, 1987)

nsaorder.txt Order Form for Computer Security Products from the NSA

nsapubs.txt List of National Security Agency Computer Security Documents

orange.book Computer Security - 1983 Orange Book (August 15, 1983)

orange.txt The Orange Book: The Guide to Trusted Computer System Evaluation Criteria (August 15, 1983)

orange2.txt The Orange Book II: A Guide to Understanding Configuration Management in Trusted Systems

peach.txt The Peach Book: A Guide to Writing the Security Features Users Guide for Trusted Systems (September 1991)

pink.txt The Pink Book: A Guide to Rating Maintenance Phase

purple.txt The Purple Book: Guidelines for Formal Verification Systems (April 1, 1991)

red.txt The Red Book: Evaluation of Trusted Network Systems and Components (July 31, 1987)

redii.txt The Red Book II: Trusted Network Interpretation Environments Guideline (August 1, 1990)

std001.txt DoD 5200.28-STD: Department of Defense Trusted Computer System Evaluation Criteria (December 26, 1985)

tan.txt The Tan Book: A Guide to Understanding Audit in Trusted Systems

tg004.txt Glossary of Computer Security Acronyms

tg006.txt National Computer Security Center: A Guide to Understanding Configuration Management in Trusted Systems

veniceblue.txt The Venice Blue Book: Computer Security Subsystems (September 1988)

yellow.txt The Yellow Book: Guideance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in SPecific Environm,ents (June 1985)

yellow_2.txt Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments (June 25, 1985)

.


AD: