XuÊt B¶n

Home
Glossary
GreenBook

C

Chú ý:  Những tạp chí trên mạng được viết bằng tiếng Anh.

A, C, D, E, F , G, I, K, L, N , O, P, R, S, T , U, W

A

Top of List
AFSPC Pcs Training
AFSPC Refresher Training
Announcing the DATA ENCRYPTION STANDARD (DES)
Announcing the Standard for Automated Password Generator
Assessing Federal and Commercial Information Security Needs

C

Top of List
Capstone Chip Technology
Clipper Chip Press Release
Clipper Chip Technology
Computer and Information Security Policy
Computer Security Act of 1987
Computer Security and the Law
Computer Security Subsystems
Computer Systems Laboratory Bulletins
Computer User's Guide to the Protection of Information
Computer Viruses - Prevention, Detection, And Treatment

D

Top of List
Data Encryption Standard Fact Sheet
Department of Defense Trusted Computer System Evaluation Criteria
The Design and Evaluation of INFOSEC Systems
Digital Signature Standard (DSS)
Disposition of Sensitive Automated Information

E

Top of List
Escrowed Encryption Standard

F

Top of List
Fact Sheet on Digital Signature Standard
Financial Management Systems
Forum of Incident Response and Security Teams (FIRST) - Operational Framework
Forum on Risks

G

Top of List
The Green Book
Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments
Guide for Protecting Local Area Networks and Wide Area Networks (LANs/WANs)
Guide to Understanding Audit in Trusted Systems
Guide to Understanding Configuration Management in Trusted Systems
Guide to Understanding Data Remanence in Automated Information Systems
Guide to Understanding Design Documentation
Guide to Understanding Discretionary Access Control in Trusted Systems
Guide to Understanding I&A
Guide to Understanding Trusted Facility Management
Guide to Writing the Security Features Users Guide for Trusted Systems
Guideline on Office Automation Security
Guidelines for Formal Verification Systems

H

Top of List
History of Computer Security Project

 

I

Top of List
Identification and Authentication
Implementing an Access Control System with Smart Token Technology
Information Technology Security Workshop Proceedings
Internal Control Systems

K

Top of List
Key Management Using ANSI X9.17
Key Management Validation System National Institute of Standards and Technology

L

Top of List
Law Inapplicable to the Procurement of Automatic Data Processing Development Equipment and Services for Certain Defense Purposes
Logical Access Control

N

Top of List
National Institute of Standards and Technology Mac Validation System (Mvs) Successful Validations
NIST Computer Security Handbook Cryptography
NIST Special Publication 800-4

O

Top of List
OMB A 130

P

Top of List
Password Management Guideline
Public Encryption Management

R

Top of List
Rating Maintenance Phase Program

S

Top of List
Sample Statements of Work for Federal Computer Security Services: For Use In-House or Contracting Out
Secure Data Network System Transport Protocol
Secure Hash Standard
Secure Hash Standard Update
Security Functionality Requirements
Security Program Management
Security Requirements for Cryptographic Modules
Sensitivity of Information
Site Security Handbook
Standard Security Label for the Government Open Systems Interconnection Profile (DRAFT)

T

Top of List
Technical Rational Behind Csc-Std-003-85 Computer Security Requirements
Threat Assessment of Malicious Code and Human Computer Threats
Training Requirement for the Computer Security Act
(Trusix) Rationale for Selecting Access Control List Features for the Unix System
Trusted Database Management System Interpretation
Trusted Network Interpretation Environments Guideline
Trusted Product Evaluation Questionnaire
Trusted Product Evaluations

U

Top of List
Understanding Trusted Distribution

W

Top of List
Writing Trusted Facility Manuals