| National Standard Training for Information Security Standards |
| Document Title | Reference # or Description |
| National Training Program for Information Security Professionals |
NSTISSD 501; 11/92 |
| New Zealand Security of Information Technology Publications |
| Document Title | Reference # or Description |
| Authentication Services and Mechanisms |
NZSIT 204 |
| Certification of Government Computer Systems |
NZSIT 102 |
| Configuration Management |
NZSIT 105 |
| Dealing with Malicious Software |
NZSIT 208 |
| Declassification of Storage Media |
NZSIT 207 |
| Information Technology Security Policy Handbook |
NZSIT 101 |
| Risk Analysis of Government Computer Systems |
NZSIT 104 |
| The Secure Use of Public Data Networks |
NZSIT 203 |
| The Security of Computer Systems |
NZSIT 100 |
| The Security of Local Area Networks |
NZSIT 202 |
| The Security of Personal Computers |
NZSIT 200 |
| US Department of Defense |
| Document Title | Reference # or Description |
| Baseline Administrative Security / Computer Security Requirements Checklist for Federal DAAs |
DoD/NSA/CSS |
| Department of Defense Trusted Computer System Evaluation Criteria |
DoD 5200.28-STD; 12/85 |
| Information Assurance Directive |
DOD 8500.1 |
| Information Assurance Instruction |
DOD 8500.2 |
| Information Systems Security - A Comprehensive Model |
John McCumber, Pentagon, 1991 |
| Information Technology Security Certification and Accreditation Process (DITSCAP) |
DoD 5200-40 |
| Information Technology Security Certification and Accreditation Process (DoD DITSCAP) |
DoD |
| Technical Rationale Behind CSC-STD-003-85 Computer Security Requirements |
DoDCSC; 06/85 |