

Bibliography
Bibliography
The following publications may be required to install and configure an CA Top Secret MLS system:
- IBM z/OS Version 1 Release 5 Assembler Guides
- IBM z/OS Version 1 Release 5 CICS Guides
- IBM z/OS Version 1 Release 5 Communications Server Guides
- IBM z/OS Version 1 Release 5 DB2 Version 8 Guides
- IBM z/OS Version 1 Release 5 DFP Guides
- IBM z/OS Version 1 Release 5 DFSMS Guides
- IBM z/OS Version 1 Release 5 DFSORT Guides
- IBM z/OS Version 1 Release 5 Distributed File Service Guides
- IBM z/OS Version 1 Release 5 IMS Guides
- IBM z/OS Hardware Guides
- IBM z/OS Version 1 Release 5 ISPF Guides
- IBM z/OS Version 1 Release 5 JES2 Guides
- IBM z/OS Version 1 Release 5 JES3 Guides
- IBM z/OS Version 1 Release 5 MQSeries Guides
- IBM z/OS Version 1 Release 5 MVS Guides
- IBM z/OS Version 1 Release 5 Printer Services Facility (PSF) Guides
- IBM z/OS Version 1 Release 5 RMF Guides
- IBM z/OS Version 1 Release 5 SDSF Guides
- IBM z/OS Version 1 Release 5 Security Server RACROUTE Macro Reference
- IBM z/OS Version 1 Release 5 SMP/E Guides
- IBM z/OS Version 1 Release 5 TSO/E Guides
- IBM z/OS Version 1 Release 5 UNIX System Services (USS) Guides
- IBM z/OS Version 1 Release 5 VTAM Guides
The following guides are not required to install and configure an CA Top Secret MLS system, but provide important information on the National Computer Security Center (NCSC) evaluation criteria and trusted systems:
- Computer Security Requirements: Guidance for Applying the Department of Defense Trusted Computer Systems Evaluation Criteria in Specific Environments (CSC-STD-003-85)
- Department of Defense Trusted Computer System Evaluation Criteria (DOD 5200.28-STD)
- Department of Defense Password Management Guideline (CSC-STD-002-85)
- Introduction to Certification and Accreditation (NCSC-TG-029)
- Ratings Maintenance Phase Program Document (NCSC-TG-013)
- Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements: Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments (CSC-STD-004-85)
- Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria (NCSC-TG-005)
- Turning Multiple Evaluated Products into Trusted Systems (NCSC Tech. Report-003)
- Use of the Trusted Computer Systems Evaluation Criteria (TCSEC) for Complex, Evolving, Multipolicy Systems (NCSC Tech. Report-002)
These publications can be ordered from the U.S. Government Printing Office at:
Superintendent of Documents
U.S. Government Printing Office
Washington, DC 20402
(202) 783-3238
Copyright © 2010 CA Technologies.
All rights reserved.
 
|
|