Call Number (LC) Title Results
D 1.78:C-6600-IL/984 Federal supply catalog identification list. 1
D 1.78:C-6700/9500-IL/984 Federal supply catalog, identification list. 1
D 1.78:C 8900-SL/988 Federal supply catalog stock list. 1
D 1.79/2:002-85 Personal computer security considerations. 1
D 1.79/3:003-85 Computer security requirements : guidance for applying the Department of Defense trusted computer system evaluation criteria in specific environments. 1
D 1.79/4:001-87 A Guide to understanding audit in trusted systems. 1
D 1.79/4:002/VER.1 Trusted product evaluations a guide for vendors. 1
D 1.79/4:004/ver.1 Glossary of computer security terms. 1
D 1.79/4:005 Trusted network interpretation of the Trusted computer system evaluation criteria / 1
D 1.79/4:006/ver.1 A guide to understanding configuration management in trusted systems. 1
D 1.79/4:007/ver.1 A Guide to understanding design documentation in trusted systems. 1
D 1.79/4:008/ver.1 A Guide to understanding trusted distribution in trusted systems / 1
D 1.79/4:009/ver.1 Computer security subsystem interpretation of the trusted computer system evaluation criteria / 1
D 1.79/4:010/VER.1 A Guide to understanding security modeling in trusted systems 1
D 1.79/4:011/ver.1 Trusted network interpretation environments guideline : guidance for applying the trusted network interpretation. 1
D 1.79/4:014/ver.1 Guidelines for formal verification systems. 1
D 1.79/4:015/ver.1 A Guide to understanding trusted facility management / 1
D 1.79/4:017/ver.1 A Guide to understanding identification and authentication in trusted systems. 1
D 1.79/4:019/ver.1 Trusted product evaluation questionnaire. 1
D 1.79/4:020-A/ver.1 Trusted UNIX Working Group (TRUSIX) rationale for selecting access control list features for the UNIX® system / 1