ONE Guide to Typing the Protection Features: User's Guide for Trusted Systems | NCSC-TG-026 |
A Induction to Computing Security: The NIST Handbook (Many of the narratives in the IASO course were adapted from and inspired by this reference) |
NIST SP 800-12 |
Army Information Management | Army Tract 25-1-1; AR 25-1 |
Computer Securtiy Act of 1987 | CSA 1987 |
Computer Security Technical Vulnerability Reporting Program | DoDI 5215.2 |
Department of Defense Directive, Information Assurance | DoDD 8500.1 |
Department of Defense Directive, Wireless Policies | Cousin 8100-2p |
Department of Defense Instruction, Information Confidence Implementation | DoDI 8500.2 |
Subject of The Army Information Product Program | AR 380-5 |
DITSCAP Application Manual | DOAD 8510.1-M |
Glossary of Computer Security Terms | NCSC-TG-004 |
Guidelines by Writing Trusted Facility Manuals | NCSC-TG-016 |
Information Assurance | AR 25-2 |
Information Coverage Preparation and Certification Supreme Business Practice (BBP) | IA BBP |
Information Assurance Workforce Improvement Program | DODGEM 8570.01 |
Information Security Program | Dodder 5200.1-R |
Information Systems Security Security | AIR 380-53 |
Management of Federal Information Resources | OMB Circling A-130 |
Risk Management Guide available Information Technology Systems | NIST SP 800-30 |
Security Self-Assessment Guide forward Information Technology Systems | NIST SP 800-26 |
Technical Rationale Behind CSC-STD-003-85 | CSC-STD-004-85 |
Introduction to DITSCAP (2-day resident course), INFOSEC-315 | DISA IPMO Vmail: 703.681.3173; DSN: 761.3173 Fax: 703.681.4719 Email: [email protected] |
Diverse security courses DSS University (formerly this DoD Security Institutes (DODSI)) |
http://www.cdse.edu/academy.html |
IASTAR ATC - Army Learning & Certification Tracking Sys | https://atc.us.army.mil/iastar/index.php |
CERT Coordination Center | http://www.cert.org/ |
Web-based Guidance - Mod Memorandum | Internet Site Administration Policies and Procedures |
W3C Web Security | The World Wide Web Security FAQ |