Online Books by
National Computer Security Center (U.S.)
Help with reading books -- Report a bad link -- Suggest a new listing
Additional books from the extended shelves:
National Computer Security Center (U.S.): 10th National Computer Security Conference : proceedings : 21-24 September, 1987. (National Bureau of Standards, National Computer Security Center :, 1987), also by Md.) National Computer Security Conference (10th : 1987 : Baltimore and United States. National Bureau of Standards (page images at HathiTrust)
National Computer Security Center (U.S.): 11th National Computer Security Conference : proceedings, 17-20 October, 1988. (National Bureau of Standards, National Computer Security Center, 1988), also by Md.) National Computer Security Conference (11th : 1988 : Baltimore and United States. National Bureau of Standards (page images at HathiTrust)
National Computer Security Center (U.S.): 13th National Computer Security Conference, Omni Shoreham Hotel, Washington, D.C., 1-4 October, 1990 : proceedings : information systems security, standards, the key to the future (The Institute?, 1990), also by D.C.) National Computer Security Conference (13th : 1990 : Washington and National Institute of Standards and Technology (U.S.) (page images at HathiTrust)
National Computer Security Center (U.S.): 14th National Computer Security Conference : Omni Shoreham Hotel, Washington, D.C., 1-4 October 1991 : proceedings. (National Institute of Standards and Technology, National Computer Security Center :, 1991), also by D.C.) National Computer Security Conference (14th : 1991 : Washington and National Institute of Standards and Technology (U.S.) (page images at HathiTrust)
National Computer Security Center (U.S.): 15th National Computer Security Conference : October 13-16, 1992, Baltimore Convention Center, Baltimore, MD : proceedings. (National Institute of Standards and Technology, National Computer Security Center :, 1992), also by Md.) National Computer Security Conference (15th : 1992 : Baltimore and National Institute of Standards and Technology (U.S.) (page images at HathiTrust)
National Computer Security Center (U.S.): Building the information security bridge to the 21st century (National Institute of Standards and Technology ;, 1998), also by Va.) National Information Systems Security Conference (21st : 1998 : Arlington and National Institute of Standards and Technology (U.S.) (page images at HathiTrust)
National Computer Security Center (U.S.): Computer security requirements : guidance for applying the Department of Defense trusted computer system evaluation criteria in specific environments. ([DOD Computer Security Center], 1989) (page images at HathiTrust)
National Computer Security Center (U.S.): Computer security subsystem interpretation of the trusted computer system evaluation criteria (The Center ;, 1988) (page images at HathiTrust)
National Computer Security Center (U.S.): Glossary of computer security terms. (National Computer Security Center ;, 1989) (page images at HathiTrust)
National Computer Security Center (U.S.): A Guide to understanding audit in trusted systems. (National Computer Security Center, 1987) (page images at HathiTrust)
National Computer Security Center (U.S.): A guide to understanding configuration management in trusted systems. (National Computer Security Center ;, 1989), also by James N. Menendez (page images at HathiTrust)
National Computer Security Center (U.S.): A guide to understanding covert channel analysis of trusted systems. (National Computer Security Center, 1994), also by Virgil D. Gligor (page images at HathiTrust)
National Computer Security Center (U.S.): A Guide to understanding design documentation in trusted systems. (National Computer Security Center ;, 1988) (page images at HathiTrust)
National Computer Security Center (U.S.): A Guide to understanding discretionary access control in trusted systems. (National Computer Security Center, 1989) (page images at HathiTrust)
National Computer Security Center (U.S.): A guide to understanding identification and authentication in trusted systems. (National Computer Security Center, 1991), also by James Anderson and Rayford Vaughn (page images at HathiTrust)
National Computer Security Center (U.S.): A Guide to understanding security modeling in trusted systems. (National Computer Security Center, 1993) (page images at HathiTrust)
National Computer Security Center (U.S.): A guide to understanding security testing and test documentation in trusted systems. (National Computer Security Center, 1994), also by Virgil D. Gligor (page images at HathiTrust)
National Computer Security Center (U.S.): A Guide to understanding trusted distribution in trusted systems (The Center ;, 1988) (page images at HathiTrust)
National Computer Security Center (U.S.): A guide to understanding trusted facility management. (National Computer Security Center ;, 1990), also by Virgil D. Gligor (page images at HathiTrust)
National Computer Security Center (U.S.): Guidelines for formal verification systems. (National Computer Security Center ;, 1989) (page images at HathiTrust)
National Computer Security Center (U.S.): Proceedings (National Institute of Standards and Technology? ;, 1995), also by Md.) National Information Systems Security Conference (18th : 1995 : Baltimore and National Institute of Standards and Technology (U.S.) (page images at HathiTrust)
National Computer Security Center (U.S.): Rating maintenance phase program document. (National Computer Security Center, 1989), also by Tommy Hammer (page images at HathiTrust; US access only)
National Computer Security Center (U.S.): Technical rationale behind CSC-STD-003-85, computer security requirements : guidance for applying the Department of Defense trusted computer system evaluation criteria in specfic environments. ([Deptartment of Defense, Computer Security Center], 1988), also by United States Department of Defense (page images at HathiTrust)
National Computer Security Center (U.S.): Trusted database management system interpretation of the trusted computer system evaluation criteria. (National Computer Security Center ;, 1991) (page images at HathiTrust)
National Computer Security Center (U.S.): Trusted network interpretation environments guideline : guidance for applying the trusted network interpretation. (National Computer Security Center ;, 1990) (page images at HathiTrust)
National Computer Security Center (U.S.): Trusted network interpretation of the Trusted computer system evaluation criteria (National Computer Security Center, 1987) (page images at HathiTrust)
National Computer Security Center (U.S.): Trusted product evaluation questionnaire. (National Computer Security Center , 1990) (page images at HathiTrust)
National Computer Security Center (U.S.): Trusted UNIX Working Group (TRUSIX) rationale for selecting access control list features for the UNIX® system (The Center, 1990) (page images at HathiTrust)
See also what's at your library, or elsewhere.
Help with reading books -- Report a bad link -- Suggest a new listing
Home -- Search -- New Listings -- Authors -- Titles -- Subjects -- Serials
Books -- News -- Features -- Archives -- The Inside Story
Edited by John Mark Ockerbloom (onlinebooks@pobox.upenn.edu)
OBP copyrights and licenses.