zedz.net

Rainbow Series Library:

The PDF files are quite large so unless you have the bandwidth, we'd suggest that you use one of the other formats.


Document Format Information


5200.28-STD Text PostScript Adobe PDF PostScript gzip archive
DoD Trusted Computer System Evaluation Criteria, 26 December 1985 (Supercedes CSC-STD-001-83, dtd 15 Aug 83). (Orange Book)
CSC-STD-002-85 Text PostScript Adobe PDF PostScript gzip archive
DoD Password Management Guideline, 12 April 1985. (Green Book)
CSC-STD-003-85 Text PostScript Adobe PDF PostScript gzip archive
Computer Security Requirements -- Guidance for Applying the DoD TCSEC in Specific Environments, 25 June 1985 (Light Yellow Book)
CSC-STD-004-85 Text PostScript Adobe PDF PostScript gzip archive
Technical Rational Behind CSC-STD-003-85: Computer Security Requirements -- Guidance for Applying the DoD TCSEC in Specific Environments, 25 June 1985. (Yellow Book)
NTISSAM COMPUSEC/1-87 Text PostScript Adobe PDF PostScript gzip archive
Advisory Memorandum on Office Automation Security Guidelines
NCSC-TG-001 Ver. 2 PostScript Adobe PDF PostScript gzip archive
A Guide to Understanding Audit in Trusted Systems 1 June 1988, Version 2. (Tan Book)
NCSC-TG-002 Text PostScript Adobe PDF PostScript gzip archive
Trusted Product Evaluations - A Guide for Vendors, 22 June 1990. (Bright Blue Book)
see also TPEP Procedures which superceedes parts of this document.
NCSC-TG-003 Text PostScript Adobe PDF PostScript gzip archive
A Guide to Understanding Discretionary Access Control in Trusted Systems, 30 September 1987. (Neon Orange Book)
NCSC-TG-004 Text PostScript Adobe PDF PostScript gzip archive
Glossary of Computer Security Terms, 21 October 1988. (Teal Green Book) (NCSC-WA-001-85 is obsolete)
NCSC-TG-005 Text PostScript Adobe PDF PostScript gzip archive
Trusted Network Interpretation of the TCSEC (TNI), 31 July 1987. (Red Book)
NCSC-TG-006 Text PostScript Adobe PDF PostScript gzip archive
A Guide to Understanding Configuration Management in Trusted Systems, 28 March 1988. (Amber Book)
NCSC-TG-007 Text PostScript Adobe PDF PostScript gzip archive
A Guide to Understanding Design Documentation in Trusted Systems, 6 October 1988. (Burgundy Book)
see also Process Guidelines for Design Documentation which may supercede parts of this document.
NCSC-TG-008 Text PostScript Adobe PDF PostScript gzip archive
A Guide to Understanding Trusted Distribution in Trusted Systems 15 December 1988. (Dark Lavender Book)
NCSC-TG-009 Text PostScript Adobe PDF PostScript gzip archive
Computer Security Subsystem Interpretation of the TCSEC 16 September 1988. (Venice Blue Book)
NCSC-TG-010 Text PostScript Adobe PDF PostScript gzip archive
A Guide to Understanding Security Modeling in Trusted Systems, October 1992. (Aqua Book)
NCSC-TG-011 Text PostScript Adobe PDF PostScript gzip archive
Trusted Network Interpretation Environments Guideline - Guidance for Applying the TNI, 1 August 1990. (Red Book)
NCSC-TG-013 Ver.2 Text PostScript Adobe PDF PostScript gzip archive
RAMP Program Document, 1 March 1995, Version 2 (Pink Book)
NCSC-TG-014 Text PostScript Adobe PDF PostScript gzip archive
Guidelines for Formal Verification Systems, 1 April 1989. (Purple Book)
NCSC-TG-015 Text PostScript Adobe PDF PostScript gzip archive
A Guide to Understanding Trusted Facility Management, 18 October 1989 (Brown Book)
NCSC-TG-016 Text PostScript Adobe PDF PostScript gzip archive
Guidelines for Writing Trusted Facility Manuals, October 1992. (Yellow-Green Book)
NCSC-TG-017 Text PostScript Adobe PDF PostScript gzip archive
A Guide to Understanding Identification and Authentication in Trusted Systems, September 1991. (Light Blue Book)
NCSC-TG-018 Text PostScript Adobe PDF PostScript gzip archive
A Guide to Understanding Object Reuse in Trusted Systems, July 1992. (Light Blue Book)
NCSC-TG-019 Ver. 2 PostScript Adobe PDF
Trusted Product Evaluation Questionaire, 2 May 1992, Version 2. (Blue Book)
NCSC-TG-020-A Text PostScript Adobe PDF PostScript gzip archive
Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX® System, 7 July 1989. (Silver Book)
NCSC-TG-021 Text PostScript PostScript gzip archive
Trusted Database Management System Interpretation of the TCSEC (TDI), April 1991. (Purple Book)
NCSC-TG-022 Text PostScript Adobe PDF PostScript gzip archive
A Guide to Understanding Trusted Recovery in Trusted Systems, 30 December 1991. (Yellow Book)
NCSC-TG-023 Text PostScript Adobe PDF PostScript gzip archive
A Guide to Understanding Security Testing and Test Documentation in Trusted Systems (Bright Orange Book)
see also Process Guidelines for Test Documentation which may supercede parts of this document.
NCSC-TG-024 Vol. 1/4 Text PostScript Adobe PDF PostScript gzip archive
A Guide to Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements, December 1992. (Purple Book)
NCSC-TG-024 Vol. 2/4 Text PostScript Adobe PDF PostScript gzip archive
A Guide to Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators, 30 June 1993. (Purple Book)
NCSC-TG-024 Vol. 3/4 Text PostScript Adobe PDF PostScript gzip archive
A Guide to Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description Tutorial, 28 February 1994. (Purple Book)
NCSC-TG-024 Vol. 4/4
A Guide to Procurement of Trusted Systems: How to Evaluate a Bidder's Proposal Document - An Aid to Procurement Initiators and Contractors (Purple Book) (publication TBA)
NCSC-TG-025 Ver. 2 Text PostScript Adobe PDF PostScript gzip archive
A Guide to Understanding Data Remanence in Automated Information Systems, September 1991, Version 2, (Supercedes CSC-STD-005-85). (Forest Green Book)
NCSC-TG-026 Text PostScript Adobe PDF PostScript gzip archive
A Guide to Writing the Security Features User's Guide for Trusted Systems, September 1991. (Hot Peach Book)
NCSC-TG-027 Text PostScript Adobe PDF PostScript gzip archive
A Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems, May 1992. (Turquoise Book)
NCSC-TG-028 Text PostScript Adobe PDF PostScript gzip archive
Assessing Controlled Access Protection, 25 May 1992. (Violet Book)
NCSC-TG-029 Text PostScript Adobe PDF PostScript gzip archive
Introduction to Certification and Accreditation Concepts, January 1994. (Blue Book)
NCSC-TG-030 Text PostScript Adobe PDF PostScript gzip archive
A Guide to Understanding Covert Channel Analysis of Trusted Systems, November 1993. (Light Pink Book)

Other NCSC Publications

C1 Technical Report 001 Text PostScript Adobe PDF PostScript gzip archive
Technical Report, Computer Viruses: Prevention, Detection, and Treatment, 12 March 1990
C Technical Report 79-91 Text PostScript Adobe PDF PostScript gzip archive
Technical Report, Integrity in Automated Information Systems, September 1991.
C Technical Report 32-92 Text PostScript Adobe PDF PostScript gzip archive
The Design and Evaluation of INFOSEC systems: The Computer Security Contribution to the Composition Discussion, June 1992.
C Technical Report 111-91 Text PostScript Adobe PDF PostScript gzip archive
Integrity-Oriented Control Objectives: Proposed Revisions to the TCSEC, October 1991.
NCSC Technical Report 002 Text PostScript Adobe PDF PostScript gzip archive
Use of the TCSEC for Complex, Evolving, Mulitpolicy Systems
NCSC Technical Report 003 Text PostScript Adobe PDF PostScript gzip archive
Turning Multiple Evaluated Products Into Trusted Systems
NCSC Technical Report 004 Text PostScript Adobe PDF PostScript gzip archive
A Guide to Procurement of Single Connected Systems - Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators - Includes Complex, Evolving, and Multipolicy Systems
NCSC Technical Report 005 Volume 1/5 Text PostScript Adobe PDF PostScript gzip archive
Inference and Aggregation Issues In Secure Database Management Systems
NCSC Technical Report 005 Volume 2/5 Text PostScript Adobe PDF PostScript gzip archive
Entity and Referential Integrity Issues In Multilevel Secure Database Management
NCSC Technical Report 005 Volume 3/5 Text PostScript Adobe PDF PostScript gzip archive
Polyinstantiation Issues In Multilevel Secure Database Management Systems
NCSC Technical Report 005 Volume 4/5 Text PostScript Adobe PDF PostScript gzip archive
Auditing Issues In Secure Database Management Systems
NCSC Technical Report 005 Volume 5/5 Text PostScript Adobe PDF PostScript gzip archive
Discretionary Access Control Issues In High Assurance Secure Database Management Systems

Document Format Information

The document ID is a hyperlink to the on-line version of the document.

ASCII Text version.

Postscript version - Please note that the fonts used in this document may not be correctly displayed with all Postscript viewers. We are not aware of any Postscript printers that are unable to print this document.

Adobe Portable Document Format - Please note that the fonts used in this document may not display well at low resolution (i.e., on a computer screen). Also note that some Acrobat reader functions (e.g., search) may not be fully functional.

Gzipped Postscript version.