A Guide to Procurement of Trusted Systems Computer Security Contact Data Requirements List and Data Item Description Tutorial
National Computer Security Association
A hard-copy of this is in the CERIAS Library
To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.