This site is under construction.  IT is intended to be an electronic source for many books banned in the USA and other places as well as links to repositories of Banned materials.  Like anything else, YOU and only You are responsible for how they are used, or abused while under your control.  Abuse of some of these could get you in serious trouble, so use some sense or do not go any farther until you learn to be responsible. -- Richard

  1. Banned books Electronic copies (zipped)

  2. Repository Links

  3. Banned Book List Links

  4.  



  5.              


 

Banned Classics

 

Banned Technical Texts

 

Banned Book Repositories
 

Site one

Site Two

Site three

 

 


  Banned Book Lists
 

Site one


Site Two
 

Site three

 

 Banned books Electronic copies (zipped)
  1. Computer Related
  2. Banned Classics
  3. Banned Technical Texts

Computer Related

  Aqua 22 Kb 722 3.6 16/12/2000

  Glossary of Computer Security Acronyms. 

  Blue 19 Kb 367 4.2 16/12/2000
  Trusted Product Evaluation Questionnaire. 

  Brown 30 Kb 317 4.7 16/12/2000
  Guide to Understanding Trusted Facility Management. 

  Burgundy 21 Kb 367 4.6 16/12/2000
  A Guide To Understanding Design Documentation . 

  Dark lavender 18 Kb 292 5.0 16/12/2000
  A Guide To Understanding Trusted Distribution in Trusted Systems. 

  Deep red 38 Kb 308 3.0 16/12/2000
  Trusted Network Interpretation Environments Guideline. 

  Green 19 Kb 402 3.8 16/12/2000
  DoD Password Management Guideline. 

  Grey 39 Kb 281 3.0 16/12/2000
  TRUSIX Rationale for Selecting Access Control List Features For The Unix System. 

  Light blue 19 Kb 299 4.7 16/12/2000
  A Guide To Understanding I & A. 

  More Orange 43 Kb 281 5.0 16/12/2000
  A Guide To Understanding Configuration Management in Trusted Systems. 

  Orange 64 Kb 299 3.7 16/12/2000
  DoD Trusted Computer System Evaluation Criteria. 

  Peach 17 Kb 270 5.0 16/12/2000
  Description Not Available 

  Pink 47 Kb 260 5.0 16/12/2000
  Rating Maintenance Phase Program. 

  Purple 18 Kb 272 4.0 16/12/2000
  Guidelines for Formal Verification Systems. 

  Red 247 Kb 357 2.4 16/12/2000
  Trusted Network Interpretation. 

  Venice blue 19 Kb 360 4.0 16/12/2000
  Computer Security Subsystems. 

  Yellow 22 Kb 275 5.0 16/12/2000
  Guide For Applying the DoD Trusted Computer System Evaluation Criteria In Specific environments.

 

 

 

 


  1