Hacking Textfiles: The Color Books

Somehow I missed this series of files when I was on BBSes in the 1980's, but they seem legitimate enough, so now you have them too. These are the "Color Books", books about computer security guidelines purported to be written for the Department of Defense from the 1980's to the 1990's. They are assigned arbitrary colors, and each one goes into great detail about a specific aspect of computer security or, more likely computer security administration. I've seen these files make a lot of appearences in computer security textfile archives, so I assume the combination of Department of Defense conspiracy and seemingly in-depth (if boring) recounting of principles reach out to something in the archivist's gut. Judge for yourself.


Filename
Size
Description of the Textfile
aqua.txt 67633
The Aqua Book: A Glossary of Computer Security Acronyms
b_blue.txt 52053
The Blue Book: Procedures for Interacting with the NSA's Information Security Organization (March 1, 1988)
blue.txt 60038
The Blue Book: The Trusted Product Evaluation Questionnaire (1989)
brown.txt 97701
The Brown Book: The Guide to Understanding Trusted Facility Management
burgendy.txt 66951
The Burgundy Book: A Guide to Understanding Design Documentation
greenbook.txt 60908
The Green Book: The Department of Defense Password Management Guideline (April 12, 1985)
grey.txt 141699
The Grey Book: A Rationale for Selecting Access Control List Features for the UNIX System
lavender.txt 55484
The Lavender Book: A Guide to Understanding Trusted Distribution in Trusted Systems (December 15, 1988)
lightblue.txt 53868
The Light Blue Book: A Guide to Understanding Identification and Authentication in Trusted Systems (September 1991)
n_orange.txt 86796
The Orange Book: A Guide to Understanding Discretionary Access Control in Trusted Systems (September 30, 1987)
nsaorder.txt 2676
Order Form for Computer Security Products from the NSA
nsapubs.txt 8268
List of National Security Agency Computer Security Documents
orange.book 325120
Computer Security - 1983 Orange Book (August 15, 1983)
orange.txt 247993
The Orange Book: The Guide to Trusted Computer System Evaluation Criteria (August 15, 1983)
orange2.txt 141806
The Orange Book II: A Guide to Understanding Configuration Management in Trusted Systems
peach.txt 59080
The Peach Book: A Guide to Writing the Security Features Users Guide for Trusted Systems (September 1991)
pink.txt 143547
The Pink Book: A Guide to Rating Maintenance Phase
purple.txt 57408
The Purple Book: Guidelines for Formal Verification Systems (April 1, 1991)
red.txt 819493
The Red Book: Evaluation of Trusted Network Systems and Components (July 31, 1987)
redii.txt 119791
The Red Book II: Trusted Network Interpretation Environments Guideline (August 1, 1990)
std001.txt 277123
DoD 5200.28-STD: Department of Defense Trusted Computer System Evaluation Criteria (December 26, 1985)
tan.txt 56311
The Tan Book: A Guide to Understanding Audit in Trusted Systems
tg004.txt 65376
Glossary of Computer Security Acronyms
tg006.txt 137992
National Computer Security Center: A Guide to Understanding Configuration Management in Trusted Systems
veniceblue.txt 61920
The Venice Blue Book: Computer Security Subsystems (September 1988)
yellow.txt 76867
The Yellow Book: Guideance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in SPecific Environm,ents (June 1985)
yellow_2.txt 20194
Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments (June 25, 1985)

There are 27 files for a total of 3,364,096 bytes.