Article 37952 of alt.security: Archive-name: computer-security/rainbow Posting-frequency: monthly Last-modified: 1995/5/04 Version: 2.00 Rainbow Series Books ---------------------------------------------------------------------------- You can get your own free copy of any or all of the books by writing or calling: INFOSEC Awareness Division ATTN: X711/IAOC Fort George G. Meade, MD 20755-6000 Tel +1 301 766-8729 Barbara Keller ---------------------------------------------------------------------------- Orange Book DoD 5200.28-STD Department of Defense Trusted Computer System Evaluation Criteria Green Book CSC-STD-002-85 Department of Defense Password Management Guideline Yellow Book CSC-STD-003-85 Computer Security Requirements -- Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments Yellow Book CSC-STD-004-85 Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements. Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments. Tan Book NCSC-TG-001 A Guide to Understanding Audit in Trusted Systems Bright Blue Book NCSC-TG-002 Trusted Product Evaluation - A Guide for Vendors Neon Orange Book NCSC-TG-003 A Guide to Understanding Discretionary Access Control in Trusted Systems Teal Green Book NCSC-TG-004 Glossary of Computer Security Terms Red Book NCSC-TG-005 Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria Orange Book NCSC-TG-006 A Guide to Understanding Configuration Management in Trusted Systems Burgundy Book NCSC-TG-007 A Guide to Understanding Design Documentation in Trusted Systems Dark Lavender Book NCSC-TG-008 A Guide to Understanding Trusted Distribution in Trusted Systems Venice Blue Book NCSC-TG-009 Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria Aqua Book NCSC-TG-010 Department of Defense Trusted Computer System Evaluation Criteria A Guide to Understanding Security Modeling in Trusted Systems Dark Red Book NCSC-TG-011 Department of Defense Trusted Computer System Evaluation Criteria Trusted Network Interpretation Environments Guideline -- Guidance for Applying the Trusted Network Interpretation Pink Book NCSC-TG-013 Department of Defense Trusted Computer System Evaluation Criteria Rating Maintenance Phase -- Program Document Purple Book NCSC-TG-014 Department of Defense Trusted Computer System Evaluation Criteria Guidelines for Formal Verification Systems Brown Book NCSC-TG-015 Department of Defense Trusted Computer System Evaluation Criteria A Guide to Understanding Trusted Facility Management Yellow-Green Book NCSC-TG-016 Department of Defense Trusted Computer System Evaluation Criteria Guidelines for Writing Trusted Facility Manuals Light Blue NCSC-TG-017 Department of Defense Trusted Computer System Evaluation Criteria A Guide to Understanding Identification and Authentication in Trusted Systems Light Blue Book NCSC-TG-018 Department of Defense Trusted Computer System Evaluation Criteria A Guide to Understanding Object Reuse in Trusted Systems Blue Book NCSC-TG-019 Department of Defense Trusted Computer System Evaluation Criteria Trusted Product Evaluation Questionnaire Gray Book NCSC-TG-020A Department of Defense Trusted Computer System Evaluation Criteria Trusted Unix Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the Unix System Lavender Book NCSC-TG-021 Department of Defense Trusted Computer System Evaluation Criteria Trusted Data Base Management System Interpretation of the Trusted Computer System Evaluation Criteria Yellow Book NCSC-TG-022 Department of Defense Trusted Computer System Evaluation Criteria A Guide to Understanding Trusted Recovery in Trusted Systems Bright Orange Book NCSC-TG-023 Department of Defense Trusted Computer System Evaluation Criteria A Guide to Understandng Security Testing and Test Documentation in Trusted Systems Purple Book NCSC-TG-024 (Volume 1/4) Department of Defense Trusted Computer System Evaluation Criteria A Guide to Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements Purple Book NCSC-TG-024 (Volume 2/4) Department of Defense Trusted Computer System Evaluation Criteria A Guide to Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators Purple Book NCSC-TG-024 (Volume 3/4) Department of Defense Trusted Computer System Evaluation Criteria A Guide to Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description Tutorial Purple Book NCSC-TG-024 (Volume 4/4) Department of Defense Trusted Computer System Evaluation Criteria A Guide to Procurement of Trusted Systems: How to Evaluate a Bidder's Proposal Document - An Aid to Procurement Initiators and Contractors Green Book NCSC-TG-025 Department of Defense Trusted Computer System Evaluation Criteria A Guide to Understanding Data Remanence in Automated Information Systems Hot Peach Book NCSC-TG-026 Department of Defense Trusted Computer System Evaluation Criteria A Guide to Writing the Security Features User's Guide for Trusted Systems Turquiose Book NCSC-TG-027 Department of Defense Trusted Computer System Evaluation Criteria A Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems Violet Book NCSC-TG-028 Department of Defense Trusted Computer System Evaluation Criteria Assessing Controlled Access Protection Blue Book NCSC-TG-029 Department of Defense Trusted Computer System Evaluation Criteria Introduction to Certification and Accreditation Light Pink Book NCSC-TG-030 Department of Defense Trusted Computer System Evaluation Criteria A Guide to Understanding Covert Channel Analysis of Trusted Systems C1 Technical Report-001 Department of Defense Trusted Computer System Evaluation Criteria Computer Viruses: Prevention, Detection, and Treatment C Technical Report 79-91 Department of Defense Trusted Computer System Evaluation Criteria Integrity in Automated Information Systems C Technical Report 39-92 Department of Defense Trusted Computer System Evaluation Criteria The Design and Evaluation of INFOSEC systems: The Computer Security Contributions to the Composition Discussion NTISSAM COMPUSEC/1-87 NCSC-TG-010 Department of Defense Trusted Computer System Evaluation Criteria Advisory Memorandum on Office Automation Security Guideline -- Christopher William Klaus Voice: (404)252-7270. Fax: (404)252-2427 Internet Security Systems, Inc. "Internet Scanner finds Ste. 115, 5871 Glenridge Dr, Atlanta, GA 30328 your network security holes Web: http://iss.net/ Email: cklaus@iss.net before the hackers do."