A Guide to Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements
National Computer Security Association
A hard-copy of this is in the CERIAS Library
To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.