Computer Security Resource Clearinghouse WWW Server
Other Security Publications
"Computer
Security at Concordia: Past Problems, Proposed Plans" by Anne Bennett
and Michael Assels.
April 1998
-
auditool.txt [12681
bytes]
-
1991-04-16 Summary of the Trusted Information Systems (TIS) Report on Intrusion
Detection Systems
-
berferd.ps [81747 bytes]
-
1992-12-07 "An Evening with Berferd In Which a Cracker is Lured,
Endured, and Studied" Bill Cheswick, AT&T Bell Labs (PostScript)
-
certresp.ps [160110
bytes]
-
1992-12-07 "Computer Emergency Response-An Int'l Problem" a description
of the CERT System" Richard D. Pethia (PostScript)
-
cslaw.txt [14045 bytes]
-
1990-07-17 "Computer Security and the Law." by Gary Morris - good
doc on legal issues with regard to computer security
-
curry.ps [274262 bytes]
-
1992-12-07 "Improving the Security of your Unix System" David A.
Curry, SRI International (PostScript)
-
degausse.txt [7436
bytes]
-
1993-11-10 National Computer Security Center "Degausser Products
List" 2/27/89
-
dlvr1.ps [184486 bytes]
-
1993-04-21 Foundation for the Harmonization of Information Technology
(PostScript)
-
dlvr2.ps [178872 bytes]
-
1993-03-18 Relating Functionality Class and Security Sub-profile
Specifications (PostScript)
-
doc-cert.txt [32355
bytes]
-
1993-11-23 Department of Commerce's Abbreviated Certification Methodology
Guidelines for Sensitive and Classified IT Systems
-
dragon.ps [185040 bytes]
-
1992-12-04 "There Be Dragons" by Steven M. Bellovin-a description
of cracker assults vs. the ramparts of ATT.COM (PostScript)
-
faq-k.ps [1441358 bytes]
-
1992-12-08 "Answers to Frequently Asked Questions About Today's Cryptography"
Paul Fahn, RSA Laboratories (PostScript)
-
faq-sec.txt [50491 bytes]
-
1993-02-10 Frequently asked questions on the USENET News groups,
"comp.security.misc" and "alt.security"
-
fedeli.txt [26215 bytes]
-
1993-03-18 Organizing a Corporate Anti-Virus Program
-
form-irt.ps [189704
bytes]
-
1994-10-18 Forming an Incident Response Team - Danny Smith, Austrlian
SERT
-
fwalls.ps [108975 bytes]
-
1993-07-20 "Thinking About Firewalls" by Marcus Ranum (PostScript)
-
gateway.ps [42373 bytes]
-
1992-12-04 "The Design of a Secure Internet Gateway" (PostScript
Only)
-
guidance.txt [13249
bytes]
-
1985-12-01 Suggested Actions & Proc. for Software Maintenance
-
hacker.txt [148104 bytes]
-
1990-06-04 The social organization of the computer underground, Thesis,
G. Meyer, Illinois
-
hansen.txt [15105 bytes]
-
1993-03-18 Legal Issues - A Site Manager's Nightmare
-
ipext.ps [107383 bytes]
-
1993-07-20 "Security Problems in the TCP/IP Protocol Suite" by Steve
Bellovin" (PostScript)
-
itsec.txt [298257 bytes]
-
1994-06-06 information technology security evaluation criteria
-
jscrprt.txt [440528
bytes]
-
1994-04-15 Redefining Security "A Report to the Secretary of Defense
and the Dir. of Central Intelligence"
-
kerblim.ps [149573 bytes]
-
1992-12-08 "Limitations of the Kerberos Authentication System" Steven
M. Bellovin & Michael Merrit, AT&T Bell Labs (PostScript)
-
laws-for.wp [54561 bytes]
-
1994-03-01 ID & analysis of foreign laws & regs. pertaining
to the use of commercial encryption products for voice and data communications
(WordPerfect)
-
laws-us.wp [185562 bytes]
-
1994-03-01 review and analysis of U.S. Laws, reg.& case laws
pertaining to the use of commercial encryption products for voice and data
communications (WordPerfect)
-
ncsc_etl.txt [14108
bytes]
-
1993-11-10 National Computer Security Center "Endorsed Tools List"
-
ncsc_oa.txt [109919
bytes]
-
1993-11-10 National Computer Security Center "A Guideline on Office
Automation Security" 12/5/86
-
oarsec.ps [226259 bytes]
-
1992-12-08 "OARnet Security Procedures" Kannan Varadhan, OARnet (PostScript)
-
pktfilt.ps [123151 bytes]
-
1993-07-20 "Network (In)Security Through IP Packet Filtering" by
Brent Chapman
-
primer.ps [293589 bytes]
-
1992-12-07 "Coping with the Threat of Computer Security Incidents-A
Primer from Prevention through Recovery" Russell L. Brand" (PostScript)
-
rainbow/
-
Rainbow Series
-
rfc1281.ps [85234 bytes]
-
1992-12-07 "Guidelines for the Secure Operation of the Internet"
R. Pethia, CERT, S.Crocker, TIS, and B. Fraser, CERT (PostScript)
-
stewart.ps [146119 bytes]
-
1992-11-08 Potential Liabilities of Computer Security Response Centers
(PostScript only)
-
tempest.txt [45119 bytes]
-
1990-06-06 Eavesdropping on the electronic emanations of digital
equipment, by C. Seline
-
terms.ps [169211 bytes]
-
1993-02-26 Foundations for the Harmonization ofInformation Technology
Security Standards (PostScript)
-
tr993.ps [202735 bytes]
-
1992-12-07 "The COPS Security Checker System"(PostScript)
-
tr994.ps [206894 bytes]
-
1992-12-07 "Are Cmputer Hacker Break-ins Ethical"Eugene H. Spafford,
Purdue (PostScript)
-
unix_security_checklist.txt
[83419 bytes]
-
1995-12-19 AUSCERT UNIX Computer Security Checklist (Version 1.1)
-
v6bkps.exe [34901 bytes]
-
1994-02-01 DOD GOAL Security Architecture - PostScript format (1
of 12 files)
-
v6bkwp.exe [29863 bytes]
-
1994-02-01 DOD GOAL Security Architecture - WordPerfect format (1
of 14 files)
-
v6ftps.exe [35216 bytes]
-
1994-02-01 DOD GOAL Security Architecture - PostScript format (2
of 12 files)
-
v6ftwp.exe [25723 bytes]
-
1994-02-01 DOD GOAL Security Architecture - WordPerfect format (2
of 14 files)
-
v6mswp.exe [24333 bytes]
-
1994-02-01 DOD GOAL Security Architecture - WordPerfect format (3
of 14 files)
-
v6pfps.exe [56546 bytes]
-
1994-02-01 DOD GOAL Security Architecture - PostScript format (3
of 12 files)
-
v6pfwp.exe [29803 bytes]
-
1994-02-01 DOD GOAL Security Architecture - WordPerfect format (4
of 14 files)
-
v6readme.txt [3287
bytes]
-
1994-02-01 DOD GOAL Security Architecture - ASCII format (5 of 14
files)
-
v6readme.wp [17871 bytes]
-
1994-02-01 DOD GOAL Security Architecture - WordPerfect format (5
of 14 files)
-
v6s1ps.exe [33892 bytes]
-
1994-02-01 DOD GOAL Security Architecture - PostScript format (4
of 12 files)
-
v6s1wp.exe [23606 bytes]
-
1994-02-01 DOD GOAL Security Architecture - WordPerfect format (6
of 14 files)
-
v6s2ps.exe [63319 bytes]
-
1994-02-01 DOD GOAL Security Architecture - PostScript format (5
of 12 files)
-
v6s2wp.exe [38544 bytes]
-
1994-02-01 DOD GOAL Security Architecture - WordPerfect format (7
of 14 files)
-
v6s3ps.exe [77006 bytes]
-
1994-02-01 DOD GOAL Security Architecture - PostScript format (6
of 12 files)
-
v6s3wp.exe [170188 bytes]
-
1994-02-01 DOD GOAL Security Architecture - WordPerfect format (8
of 14 files)
-
v6s4ps.exe [95462 bytes]
-
1994-02-02 DOD GOAL Security Architecture - PostScript format (7
of 12 files)
-
v6s4wp.exe [142286 bytes]
-
1994-02-01 DOD GOAL Security Architecture - WordPerfect format (9
of 14 files)
-
v6s5ps.exe [124089 bytes]
-
1994-02-02 DOD GOAL Security Architecture - PostScript format (8
of 12 files)
-
v6s5wp.exe [253959 bytes]
-
1994-02-01 DOD GOAL Security Architecture - WordPerfect format (10
of 14 files)
-
v6s6ps.exe [101031 bytes]
-
1994-02-02 DOD GOAL Security Architecture - PostScript format (9
of 12 files)
-
v6s6wp.exe [39412 bytes]
-
1994-02-01 DOD GOAL Security Architecture - WordPerfect format (11
of 14 files)
-
v6s7ps.exe [75777 bytes]
-
1994-02-02 DOD GOAL Security Architecture - PostScript format (10
of 12 files)
-
v6s7wp.exe [62294 bytes]
-
1994-02-01 DOD GOAL Security Architecture - WordPerfect format (12
of 14 files)
-
v6s8ps.exe [40662 bytes]
-
1994-02-02 DOD GOAL Security Architecture - PostScript format (11
of 12 files)
-
v6s8wp.exe [26184 bytes]
-
1994-02-01 DOD GOAL Security Architecture - WordPerfect format (13
of 14 files)
-
v6s9ps.exe [349078 bytes]
-
1994-02-02 DOD GOAL Security Architecture - PostScript format (12
of 12 files)
-
v6s9wp.exe [464790 bytes]
-
1994-02-01 DOD GOAL Security Architecture - WordPerfect format (14
of 14 files)
Top of Page
Back to Previous Page
CSRC Home Page
NIST's Homepage
Please send comments or suggestions to webmaster-csrc@nist.rip.
-
Last Modified: September 13, 1999.