Most Significant Rainbow Series Books
| Document | Title | Date | Color | |
|---|---|---|---|---|
| 5200.28-STD | DoD Trusted Computer System Evaluation Criteria | 01983-08-15August 15, 1983 | Orange Book | |
| CSC-STD-002-85 | DoD Password Management Guideline | 01985-04-12April 12, 1985 | Green Book | |
| CSC-STS-003-85 | Guidance for applying TCSEC in Specific Environments | 01985-06-25June 25, 1985 | Light Yellow Book | |
| CSC-STS-004-85 | Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements | 01985-06-25June 25, 1985 | Yellow Book | |
| NCSC-TG-001 | A Guide to Understanding Audit in Trusted Systems | 01988-06-01June 1, 1988 | Tan Book | |
| NCSC-TG-002 | Trusted Product Security Evaluation Program | 01990-06-22June 22, 1990 | Bright Blue Book | |
| NCSC-TG-003 | Discretionary Access Control in Trusted Systems | 01987-09-30September 30, 1987 | Neon Orange Book | |
| NCSC-TG-004 | Glossary of Computer Security Terms | 01988-10-21October 21, 1988 | Teal Green | |
| NCSC-TG-005 | Trusted Network Interpretation | 01987-07-31July 31, 1987 | Red Book | |
| NCSC-TG-006 | Configuration Management in Trusted Systems | 01988-03-28March 28, 1988 | Amber Book | |
| NCSC-TG-007 | A Guide to Understanding Design Documentation in Trusted Systems | 01988-10-06October 6, 1988 | Burgundy Book | |
| NCSC-TG-008 | A Guide to Understanding Trusted Distribution in Trusted Systems | 01988-12-15December 15, 1988 | Dark Lavender Book | |
| NCSC-TG-009 | Computer Security Subsystem Interpretation of the TCSEC | 01988-09-16September 16, 1988 | Venice Blue Book | |
| NCSC-TG-010 | A Guide to Understanding Security Modeling in Trusted Systems | 01992-10-01October 1992 | Aqua Book | |
| NCSC-TG-011 | Trusted Network Interpretation Environments Guideline (TNI) | 01990-08-01August 1, 1990 | Red Book | |
| NCSC-TG-013 | RAMP Program Document | 01989-01-011989 | Pink Book | |
| NCSC-TG-013 V2 | RAMP Program Document version 2 | 01995-03-01March 1, 1995 | Pink Book | |
| NCSC-TG-014 | Guidelines for Formal Verification Systems | 01989-04-01April 1, 1989 | Purple Book | |
| NCSC-TG-015 | Guide to Understanding Trusted Facility Management | 01989-10-18October 18, 1989 | Brown Book | |
| NCSC-TG-016 | Guidelines for Writing Trusted Facility Manuals | 01992-10-01October 1992 | Yellow-Green Book | |
| NCSC-TG-017 | Identification and Authentication in Trusted Systems | 01991-09-01September 1991 | Light Blue Book | |
| NCSC-TG-018 | Object Reuse in Trusted Systems | 01992-07-01July 1992 | Light Blue Book | |
| NCSC-TG-019 | Trusted Product Evaluation Questionnaire | 01992-05-02May 2, 1992 | Blue Book | |
| NCSC-TG-020 | Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX System | 01989-07-07July 7, 1989 | Silver Book | |
| NCSC-TG-021 | Trusted Database Management System Interpretation of the TCSEC (TDI) | 01991-04-01April 1991 | Purple Book | |
| NCSC-TG-022 | Trusted Recovery in Trusted Systems | 01991-12-30December 30, 1991 | Yellow Book | |
| NCSC-TG-023 | Security Testing and Test Documentation in Trusted Systems | 01993-07-01July 1993 | Bright Orange Book | |
| NCSC-TG-024 Vol. 1/4 | Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements | 01992-12-01December 1992 | Purple Book | |
| NCSC-TG-024 Vol. 2/4 | Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work | 01993-06-30June 30, 1993 | Purple Book | |
| NCSC-TG-024 Vol. 3/4 | Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description | 01994-02-28February 28, 1994 | Purple Book | |
| NCSC-TG-024 Vol. 4/4 | Procurement of Trusted Systems: How to Evaluate a Bidder's Proposal Document | Publication TBA | Purple Book | |
| NCSC-TG-025 | Guide to Understanding Data Remanence in Automated Information Systems. | 01991-09-01September 1991 | Forest Green Book | |
| NCSC-TG-026 | Writing the Security Features User's Guide for Trusted Systems | 01991-09-01September 1991 | Hot Peach Book | |
| NCSC-TG-027 | Information System Security Officer Responsibilities for Automated Information Systems | 01992-05-01May 1992 | Turquoise Book | |
| NCSC-TG-028 | Assessing Controlled Access Protection | 01992-05-25May 25, 1992 | Violet Book | |
| NCSC-TG-029 | Certification and Accreditation Concepts | 01994-01-01January 1994 | Blue Book | |
| NCSC-TG-030 | Covert Channel Analysis of Trusted Systems | 01993-11-01November 1993 | Light Pink Book | |
Read more about this topic: Rainbow Series
Famous quotes containing the words significant, rainbow, series and/or books:
“Grandparents can be role models about areas that may not be significant to young children directly but that can teach them about patience and courage when we are ill, or handicapped by problems of aging. Our attitudes toward retirement, marriage, recreation, even our feelings about death and dying may make much more of an impression than we realize.”
—Eda Le Shan (20th century)
“The true harvest of my daily life is somewhat as intangible and indescribable as the tints of morning or evening. It is a little star-dust caught, a segment of the rainbow which I have clutched.”
—Henry David Thoreau (18171862)
“As Cuvier could correctly describe a whole animal by the contemplation of a single bone, so the observer who has thoroughly understood one link in a series of incidents should be able to accurately state all the other ones, both before and after.”
—Sir Arthur Conan Doyle (18591930)
“... a phallocentric culture is more likely to begin its censorship purges with books on pelvic self-examination for women or books containing lyrical paeans to lesbianism than with See Him Tear and Kill Her or similar Mickey-Spillanesque titles.”
—Robin Morgan (b. 1941)