Computer Security Resource Clearinghouse WWW Server  

Other Security Publications

"Computer Security at Concordia: Past Problems, Proposed Plans" by Anne Bennett and Michael Assels.
April 1998
auditool.txt [12681 bytes]
1991-04-16 Summary of the Trusted Information Systems (TIS) Report on Intrusion Detection Systems
berferd.ps [81747 bytes]
 1992-12-07 "An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied" Bill Cheswick, AT&T Bell Labs (PostScript)
certresp.ps [160110 bytes]
 1992-12-07 "Computer Emergency Response-An Int'l Problem" a description of the CERT System" Richard D. Pethia (PostScript)
cslaw.txt [14045 bytes]
 1990-07-17 "Computer Security and the Law." by Gary Morris - good doc on legal issues with regard to computer security
curry.ps [274262 bytes]
 1992-12-07 "Improving the Security of your Unix System" David A. Curry, SRI International (PostScript)
degausse.txt [7436 bytes]
 1993-11-10 National Computer Security Center "Degausser Products List" 2/27/89
dlvr1.ps [184486 bytes]
 1993-04-21 Foundation for the Harmonization of Information Technology (PostScript)
dlvr2.ps [178872 bytes]
 1993-03-18 Relating Functionality Class and Security Sub-profile Specifications (PostScript)
doc-cert.txt [32355 bytes]
 1993-11-23 Department of Commerce's Abbreviated Certification Methodology Guidelines for Sensitive and Classified IT Systems
dragon.ps [185040 bytes]
 1992-12-04 "There Be Dragons" by Steven M. Bellovin-a description of cracker assults vs. the ramparts of ATT.COM (PostScript)
faq-k.ps [1441358 bytes]
 1992-12-08 "Answers to Frequently Asked Questions About Today's Cryptography" Paul Fahn, RSA Laboratories (PostScript)
faq-sec.txt [50491 bytes]
 1993-02-10 Frequently asked questions on the USENET News groups, "comp.security.misc" and "alt.security"
fedeli.txt [26215 bytes]
 1993-03-18 Organizing a Corporate Anti-Virus Program
form-irt.ps [189704 bytes]
 1994-10-18 Forming an Incident Response Team - Danny Smith, Austrlian SERT
fwalls.ps [108975 bytes]
 1993-07-20 "Thinking About Firewalls" by Marcus Ranum (PostScript)
gateway.ps [42373 bytes]
 1992-12-04 "The Design of a Secure Internet Gateway" (PostScript Only)
guidance.txt [13249 bytes]
 1985-12-01 Suggested Actions & Proc. for Software Maintenance
hacker.txt [148104 bytes]
 1990-06-04 The social organization of the computer underground, Thesis, G. Meyer, Illinois
hansen.txt [15105 bytes]
 1993-03-18 Legal Issues - A Site Manager's Nightmare
ipext.ps [107383 bytes]
 1993-07-20 "Security Problems in the TCP/IP Protocol Suite" by Steve Bellovin" (PostScript)
itsec.txt [298257 bytes]
 1994-06-06 information technology security evaluation criteria
jscrprt.txt [440528 bytes]
 1994-04-15 Redefining Security "A Report to the Secretary of Defense and the Dir. of Central Intelligence"
kerblim.ps [149573 bytes]
 1992-12-08 "Limitations of the Kerberos Authentication System" Steven M. Bellovin & Michael Merrit, AT&T Bell Labs (PostScript)
laws-for.wp [54561 bytes]
 1994-03-01 ID & analysis of foreign laws & regs. pertaining to the use of commercial encryption products for voice and data communications (WordPerfect)
laws-us.wp [185562 bytes]
 1994-03-01 review and analysis of U.S. Laws, reg.& case laws pertaining to the use of commercial encryption products for voice and data communications (WordPerfect)
ncsc_etl.txt [14108 bytes]
 1993-11-10 National Computer Security Center "Endorsed Tools List"
ncsc_oa.txt [109919 bytes]
 1993-11-10 National Computer Security Center "A Guideline on Office Automation Security" 12/5/86
oarsec.ps [226259 bytes]
 1992-12-08 "OARnet Security Procedures" Kannan Varadhan, OARnet (PostScript)
pktfilt.ps [123151 bytes]
 1993-07-20 "Network (In)Security Through IP Packet Filtering" by Brent Chapman
primer.ps [293589 bytes]
 1992-12-07 "Coping with the Threat of Computer Security Incidents-A Primer from Prevention through Recovery" Russell L. Brand" (PostScript)
rainbow/
Rainbow Series
rfc1281.ps [85234 bytes]
 1992-12-07 "Guidelines for the Secure Operation of the Internet" R. Pethia, CERT, S.Crocker, TIS, and B. Fraser, CERT (PostScript)
stewart.ps [146119 bytes]
 1992-11-08 Potential Liabilities of Computer Security Response Centers (PostScript only)
tempest.txt [45119 bytes]
 1990-06-06 Eavesdropping on the electronic emanations of digital equipment, by C. Seline
terms.ps [169211 bytes]
 1993-02-26 Foundations for the Harmonization ofInformation Technology Security Standards (PostScript)
tr993.ps [202735 bytes]
 1992-12-07 "The COPS Security Checker System"(PostScript)
tr994.ps [206894 bytes]
 1992-12-07 "Are Cmputer Hacker Break-ins Ethical"Eugene H. Spafford, Purdue (PostScript)
unix_security_checklist.txt [83419 bytes]
 1995-12-19 AUSCERT UNIX Computer Security Checklist (Version 1.1)
v6bkps.exe [34901 bytes]
 1994-02-01 DOD GOAL Security Architecture - PostScript format (1 of 12 files)
v6bkwp.exe [29863 bytes]
 1994-02-01 DOD GOAL Security Architecture - WordPerfect format (1 of 14 files)
v6ftps.exe [35216 bytes]
 1994-02-01 DOD GOAL Security Architecture - PostScript format (2 of 12 files)
v6ftwp.exe [25723 bytes]
 1994-02-01 DOD GOAL Security Architecture - WordPerfect format (2 of 14 files)
v6mswp.exe [24333 bytes]
 1994-02-01 DOD GOAL Security Architecture - WordPerfect format (3 of 14 files)
v6pfps.exe [56546 bytes]
 1994-02-01 DOD GOAL Security Architecture - PostScript format (3 of 12 files)
v6pfwp.exe [29803 bytes]
 1994-02-01 DOD GOAL Security Architecture - WordPerfect format (4 of 14 files)
v6readme.txt [3287 bytes]
 1994-02-01 DOD GOAL Security Architecture - ASCII format (5 of 14 files)
v6readme.wp [17871 bytes]
 1994-02-01 DOD GOAL Security Architecture - WordPerfect format (5 of 14 files)
v6s1ps.exe [33892 bytes]
 1994-02-01 DOD GOAL Security Architecture - PostScript format (4 of 12 files)
v6s1wp.exe [23606 bytes]
 1994-02-01 DOD GOAL Security Architecture - WordPerfect format (6 of 14 files)
v6s2ps.exe [63319 bytes]
 1994-02-01 DOD GOAL Security Architecture - PostScript format (5 of 12 files)
v6s2wp.exe [38544 bytes]
 1994-02-01 DOD GOAL Security Architecture - WordPerfect format (7 of 14 files)
v6s3ps.exe [77006 bytes]
 1994-02-01 DOD GOAL Security Architecture - PostScript format (6 of 12 files)
v6s3wp.exe [170188 bytes]
 1994-02-01 DOD GOAL Security Architecture - WordPerfect format (8 of 14 files)
v6s4ps.exe [95462 bytes]
 1994-02-02 DOD GOAL Security Architecture - PostScript format (7 of 12 files)
v6s4wp.exe [142286 bytes]
 1994-02-01 DOD GOAL Security Architecture - WordPerfect format (9 of 14 files)
v6s5ps.exe [124089 bytes]
 1994-02-02 DOD GOAL Security Architecture - PostScript format (8 of 12 files)
v6s5wp.exe [253959 bytes]
 1994-02-01 DOD GOAL Security Architecture - WordPerfect format (10 of 14 files)
v6s6ps.exe [101031 bytes]
 1994-02-02 DOD GOAL Security Architecture - PostScript format (9 of 12 files)
v6s6wp.exe [39412 bytes]
 1994-02-01 DOD GOAL Security Architecture - WordPerfect format (11 of 14 files)
v6s7ps.exe [75777 bytes]
 1994-02-02 DOD GOAL Security Architecture - PostScript format (10 of 12 files)
v6s7wp.exe [62294 bytes]
 1994-02-01 DOD GOAL Security Architecture - WordPerfect format (12 of 14 files)
v6s8ps.exe [40662 bytes]
 1994-02-02 DOD GOAL Security Architecture - PostScript format (11 of 12 files)
v6s8wp.exe [26184 bytes]
 1994-02-01 DOD GOAL Security Architecture - WordPerfect format (13 of 14 files)
v6s9ps.exe [349078 bytes]
 1994-02-02 DOD GOAL Security Architecture - PostScript format (12 of 12 files)
v6s9wp.exe [464790 bytes]
 1994-02-01 DOD GOAL Security Architecture - WordPerfect format (14 of 14 files)
Top of Page  Back to Previous Page
CSRC Home Page   NIST's Homepage
Please send comments or suggestions to webmaster-csrc@nist.rip.
Last Modified: September 13, 1999.