Skip to Main Content
Idaho State University home

[1] [2] [3] [4] [5] [6]

Government Documents

National Computer Security Center (NSA)
Document Title Reference # or Description
Guide to Understanding Trusted Facility Management NCSC TG-015 06/89
Guide to Writing the Security Features Users Guide for Trusted Systems NCSC-TG 026; 09/91
Guidelines for Formal Verification Systems NCSC TG-014; 04/89
Rating Maintenance Phase Program NCSC TG-013; 06/89
Trusted Database Management System Interpretation NCSC-TG 021; 04/91
Trusted Network Interpretation NCSC TG-005; 11/87
Trusted Network Interpretation Environments Guideline NCSC-TG 008; 12/88
Trusted Product Evaluation Questionnaire NCSC-TG 019; 05/92
Trusted Product Evaluations NCSC-TG 002; 03/88
Understanding Trusted Distribution NCSC-TG 011; 08/90
Writing Trusted Facility Manuals NCSC-TG 016; 10/92
National Insitute of Standards and Training
Document Title Reference # or Description
Assessing Federal and Commercial Information Security Needs NISTIR 4976; 11/92
Computer and Information Security Policy - Draft NIST 1993
Computer Security Considerations in Federal Procurements NIST SP 800-04; 03/92
Computer User's Guide to the Protection of Information NIST 1989
Contingency Planning Guide for Information Technology Systems NIST SP 800-34 2001
Data Encryption Standards (DES) Fact Sheet NIST 1990
Fact Sheet of Digital Encryption Standard NIST; 05/94
Identification and Authorization Draft NIST 1991
Implementing and Access Control Strategy with Smart Token Technology NIST 04/89
Key Management Validation Systems (KMVS) NIST 01/92
Logical Access Control Draft NIST 1991
NIST Computer Security Handbook Cryptography Draft NIST 1991
NIST Mac Validation System (MVS) Successful Validations NIST; 03/93
Sample Statements of Work for Federal Computer Security Services: For Use In-House or Contracting Out NIST 06/92
Secure Data Network System Transport Protocol NISTIR 90-4228
Security Functionality Standards NIST; 01/92
Security Program Management Draft NIST 1991
Threat Assessment of Malicious Code and Human Computer Threats NISTIR 4939; 10/92
Document Title Reference # or Description

[1] [2] [3] [4] [5] [6]