D 1.78:C-6600-IL/984
|
Federal supply catalog identification list. |
1 |
D 1.78:C-6700/9500-IL/984
|
Federal supply catalog, identification list. |
1 |
D 1.78:C 8900-SL/988
|
Federal supply catalog stock list. |
1 |
D 1.79/2:002-85
|
Personal computer security considerations. |
1 |
D 1.79/3:003-85
|
Computer security requirements : guidance for applying the Department of Defense trusted computer system evaluation criteria in specific environments. |
1 |
D 1.79/4:001-87
|
A Guide to understanding audit in trusted systems. |
1 |
D 1.79/4:002/VER.1
|
Trusted product evaluations a guide for vendors. |
1 |
D 1.79/4:004/ver.1
|
Glossary of computer security terms. |
1 |
D 1.79/4:005
|
Trusted network interpretation of the Trusted computer system evaluation criteria / |
1 |
D 1.79/4:006/ver.1
|
A guide to understanding configuration management in trusted systems. |
1 |
D 1.79/4:007/ver.1
|
A Guide to understanding design documentation in trusted systems. |
1 |
D 1.79/4:008/ver.1
|
A Guide to understanding trusted distribution in trusted systems / |
1 |
D 1.79/4:009/ver.1
|
Computer security subsystem interpretation of the trusted computer system evaluation criteria / |
1 |
D 1.79/4:010/VER.1
|
A Guide to understanding security modeling in trusted systems |
1 |
D 1.79/4:011/ver.1
|
Trusted network interpretation environments guideline : guidance for applying the trusted network interpretation. |
1 |
D 1.79/4:014/ver.1
|
Guidelines for formal verification systems. |
1 |
D 1.79/4:015/ver.1
|
A Guide to understanding trusted facility management / |
1 |
D 1.79/4:017/ver.1
|
A Guide to understanding identification and authentication in trusted systems. |
1 |
D 1.79/4:019/ver.1
|
Trusted product evaluation questionnaire. |
1 |
D 1.79/4:020-A/ver.1
|
Trusted UNIX Working Group (TRUSIX) rationale for selecting access control list features for the UNIX® system / |
1 |