Online Books by
National Computer Security Center (U.S.)
Help with reading books -- Report a bad link -- Suggest a new listing
Additional books from the extended shelves:
National Computer Security Center (U.S.): 10th National Computer Security Conference : proceedings : 21-24 September, 1987. ([Washington, D.C.] : National Bureau of Standards, National Computer Security Center : U.S. G.P.O., [1987?]), also by Md.) National Computer Security Conference (10th : 1987 : Baltimore and United States. National Bureau of Standards (page images at HathiTrust)
National Computer Security Center (U.S.): 11th National Computer Security Conference : proceedings, 17-20 October, 1988. ([Washington, D.C.] : National Bureau of Standards, National Computer Security Center, [1988?]), also by Md.) National Computer Security Conference (11th : 1988 : Baltimore and United States. National Bureau of Standards (page images at HathiTrust)
National Computer Security Center (U.S.): 18th National Information Systems Security Conference : October 10-13, 1995, Baltimore Convention Center, Baltimore, Maryland, proceedings, making security real / ([Gaithersburg, Md : National Institute of Standards and Technology? ; Washington, D.C. : For sale by the Supt. of Docs., U.S. G.P.O.], 1995), also by Md.) National Information Systems Security Conference (18th : 1995 : Baltimore and National Institute of Standards and Technology (U.S.) (page images at HathiTrust)
National Computer Security Center (U.S.): 21st National Information Systems Security Conference : building the information security bridge to the 21st century : October 5-8, 1998, Hyatt Regency Crystal City, Arlington, Va. ([Gaithersburg, Md.] : National Institute of Standards and Technology ; [Fort Meade, Md.] : National Computer Security Center, [1998]), also by Va.) National Information Systems Security Conference (21st : 1998 : Arlington and National Institute of Standards and Technology (U.S.) (page images at HathiTrust)
National Computer Security Center (U.S.): Computer security requirements : guidance for applying the Department of Defense trusted computer system evaluation criteria in specific environments. ([Ft. Meade, Md.? : DOD Computer Security Center, 1985, i.e. 1989]) (page images at HathiTrust)
National Computer Security Center (U.S.): Computer security subsystem interpretation of the trusted computer system evaluation criteria / ([Fort George G. Meade, MD] : The Center ; [Washington, D.C.? : Supt. of Docs., U.S. G.P.O., distributor, 1988]) (page images at HathiTrust)
National Computer Security Center (U.S.): Glossary of computer security terms. ([Fort George G. Meade, MD] : National Computer Security Center ; [Washington, DC : For sale by the Supt. of Docs., U.S. G.P.O., 1989]) (page images at HathiTrust)
National Computer Security Center (U.S.): A Guide to understanding audit in trusted systems. ([Fort George F. Meade, Md.] : National Computer Security Center, [1987]) (page images at HathiTrust)
National Computer Security Center (U.S.): A guide to understanding configuration management in trusted systems. ([Fort George G. Meade, MD] : National Computer Security Center ; [Washington, D.C. : For sale by the Supt. of Docs., U.S. G.P.O., 1989]), also by James N. Menendez (page images at HathiTrust)
National Computer Security Center (U.S.): A guide to understanding covert channel analysis of trusted systems. ([Fort George G. Meade, MD] : National Computer Security Center, [1994]), also by Virgil D. Gligor (page images at HathiTrust)
National Computer Security Center (U.S.): A Guide to understanding design documentation in trusted systems. ([Fort George G. Meade, MD] : National Computer Security Center ; [Washington, D.C. : For sale by the Supt. of Docs., U.S. G.P.O., 1988]) (page images at HathiTrust)
National Computer Security Center (U.S.): A Guide to understanding discretionary access control in trusted systems. ([Fort George G. Meade, Md.] : National Computer Security Center, [1989]) (page images at HathiTrust)
National Computer Security Center (U.S.): A guide to understanding identification and authentication in trusted systems. ([Ft. George G. Meade, MD] : National Computer Security Center, 1991), also by James Anderson and Rayford Vaughn (page images at HathiTrust)
National Computer Security Center (U.S.): A guide to understanding security testing and test documentation in trusted systems. ([Fort George G. Meade, MD] : National Computer Security Center, [1994]), also by Virgil D. Gligor (page images at HathiTrust)
National Computer Security Center (U.S.): A Guide to understanding trusted distribution in trusted systems / ([Fort George G. Meade, MD] : The Center ; [Washington, D.C.? : Supt. of Docs., U.S. G.P.O., distributor, 1988]) (page images at HathiTrust)
National Computer Security Center (U.S.): A guide to understanding trusted facility management. ([Fort George G. Meade, MD] : National Computer Security Center ; [Washington, D.C. : U.S. G.P.O.], [1990]), also by Virgil D. Gligor (page images at HathiTrust)
National Computer Security Center (U.S.): Guidelines for formal verification systems. ([Fort George G. Meade, MD] : National Computer Security Center ; [Washington, D.C. : For sale by the Supt. of Docs., U.S. G.P.O., 1989]) (page images at HathiTrust)
National Computer Security Center (U.S.): Rating maintenance phase program document. ([Ft. Meade, Md.] : National Computer Security Center, [1989]), also by Tommy Hammer (page images at HathiTrust; US access only)
National Computer Security Center (U.S.): Technical rationale behind CSC-STD-003-85, computer security requirements : guidance for applying the Department of Defense trusted computer system evaluation criteria in specfic environments. ([Fort George G. Meade, Md. : Deptartment of Defense, Computer Security Center., 1985, i.e.1988]), also by United States Department of Defense (page images at HathiTrust)
National Computer Security Center (U.S.): Trusted database management system interpretation of the trusted computer system evaluation criteria. ([Fort Meade, Md.?] : National Computer Security Center ; [Washington, D.C. : For sale by the Supt. of Docs., U.S. G.P.O., 1991]) (page images at HathiTrust)
National Computer Security Center (U.S.): Trusted network interpretation environments guideline : guidance for applying the trusted network interpretation. ([Ft. George G. Meade, Md.?] : National Computer Security Center ; [Washington, DC : For sale by the Supt. of Docs., U.S. G.P.O., 1990]) (page images at HathiTrust)
National Computer Security Center (U.S.): Trusted network interpretation of the trusted computer system evaluation criteria. ([Ft. Meade, Md.] : National Computer Security Center, [1987]) (page images at HathiTrust)
National Computer Security Center (U.S.): Trusted network interpretation of the Trusted computer system evaluation criteria / ([Ft. George G. Meade, MD] : National Computer Security Center, 1987) (page images at HathiTrust)
National Computer Security Center (U.S.): Trusted product evaluation questionnaire. ([Fort George G. Meade, MD] : National Computer Security Center , 1990]) (page images at HathiTrust)
National Computer Security Center (U.S.): Trusted UNIX Working Group (TRUSIX) rationale for selecting access control list features for the UNIX® system / ([Fort George G. Meade, MD] : The Center, [1990]) (page images at HathiTrust)
See also what's at your library, or elsewhere.
Help with reading books -- Report a bad link -- Suggest a new listing
Home -- Search -- New Listings -- Authors -- Titles -- Subjects -- Serials
Books -- News -- Features -- Archives -- The Inside Story
Edited by John Mark Ockerbloom (onlinebooks@pobox.upenn.edu)
OBP copyrights and licenses.