User:Ki4gsz

Aluminum Book: "Common LISP: The Language", by Guy L. Steele Jr. Digital Press, 1st ed. June 1984,ISBN-13: 9781555580414 2nd ed. (March 21, 1990)(ISBN-10: 1555580424 / ISBN-13: 978-1555580421) Audience: Programmers working with LISP. Note that due to a technical screw up some printings of the second edition are actually of a color the author describes succinctly as "yucky green".

Blue Book: Informal name for one of the three standard references on Smalltalk: "Smalltalk-80: The Language and its Implementation", David Robson, (this book also has green and red siblings). Publisher: Addison-Wesley (May 1983) ISBN-10: 0201113716 ISBN-13: 978-0201113716

Camel Book: The definitive reference on Perl. Universally recognized nickname for the book "Programming Perl", by Larry Wall and Randal L. Schwartz, O'Reilly and Associates 3rd Edition (July 2000)ISBN 10: 0-596-00027-8 | ISBN 13: 9780596000271

Cinderella Book: So called because the cover depicts a girl (putatively Cinderella) sitting in front of a Rube Goldberg device and holding a rope coming out of it. On the back cover, the device is in shambles after she has (inevitably) pulled on the rope. Originally (1968) Formal Languages and their Relation to Automata. 1st ed.(1979) Introduction to Automata Theory, Languages, and Computation (ISBN 0-201-02988-X) 2nd ed.(2000) Introduction to Automata Theory, Languages, and Computation 3rd ed.(2006) Introduction to Automata Theory, Languages, and Computation (ISBN-10: 0321462254 ISBN-13: 978-0321462251)

daemon book: So called because the covers have a picture depicting a little devil (a visual play on daemon) in sneakers, holding a pitchfork (referring to one of the characteristic features of Unix, the `fork(2)' system call). Also known as the Devil Book. "The Design and Implementation of the 4.3BSD UNIX Operating System", by Samuel J. Leffler, Marshall Kirk McKusick, Michael J. Karels, and John S. Quarterman (Addison-Wesley Publishers, 1989, ISBN 0-201-06196-1); "The Design and Implementation of the 4.4 BSD Operating System" by Marshall Kirk McKusick, Keith Bostic, Michael J. Karels and John S. Quarterman (Addison-Wesley Longman, 1996, ISBN 0-201-54979-4) Either of the standard reference books on the internals of BSD Unix.

Dragon Book: n. The classic text "Compilers: Principles, Techniques and Tools", by Alfred V. Aho, Ravi Sethi, and Jeffrey D. Ullman (Addison-Wesley 1986; ISBN 0-201-10088-6), so called because of the cover design featuring a dragon labeled `complexity of compiler design' and a knight bearing the lance `LALR parser generator' among his other trappings. This one is more specifically known as the `Red Dragon Book' (1986); an earlier edition, sans Sethi and titled "Principles Of Compiler Design" (Alfred V. Aho and Jeffrey D. Ullman; Addison-Wesley, 1977; ISBN 0-201-00022-9), was the `Green Dragon Book' (1977). (Also `New Dragon Book', `Old Dragon Book'.) The horsed knight and the Green Dragon were warily eying each other at a distance; now the knight is typing (wearing gauntlets!) at a terminal showing a video-game representation of the Red Dragon's head while the rest of the beast extends back in normal space.

Green Book: n. 1. One of the three standard PostScript references: "PostScript Language Program Design", bylined `Adobe Systems' (Addison-Wesley, 1988; QA76.73.P67P66 ISBN 0-201-14396-8); see also Red Book, Blue Book, and the White Book (sense 2). 2. Informal name for one of the three standard references on SmallTalk: "Smalltalk-80: Bits of History, Words of Advice", by Glenn Krasner (Addison-Wesley, 1983; QA76.8.S635S58; ISBN 0-201-11669-3) (this, too, is associated with blue and red books). 3. The "X/Open Compatibility Guide", which defines an international standard Unix environment that is a proper superset of POSIX/SVID; also includes descriptions of a standard utility toolkit, systems administrations features, and the like. This grimoire is taken with particular seriousness in Europe. See Purple Book. 4. The IEEE 1003.1 POSIX Operating Systems Interface standard has been dubbed "The Ugly Green Book". 5. Any of the 1992 standards issued by the CCITT's tenth plenary assembly. These include, among other things, the X.400 email standard and the Group 1 through 4 fax standards.

Purple Book: n. 1. The "System V Interface Definition". The covers of the first editions were an amazingly nauseating shade of off-lavender. 2. Syn. Wizard Book. Donald Lewine's "POSIX Programmer's Guide" (O'Reilly, 1991, ISBN 0-937175-73-0).

Silver Book: n. Jensen and Wirth's infamous "Pascal User Manual and Report", so called because of the silver cover of the widely distributed Springer-Verlag second edition of 1978 (ISBN 0-387-90144-2).

White Book: n. 1. Syn. K&R. 2. Adobe's fourth book in the PostScript series, describing the previously-secret format of Type 1 fonts; "Adobe Type 1 Font Format, version 1.1", (Addison-Wesley, 1990, ISBN 0-201-57044-0).

Wizard Book: n. "Structure and Interpretation of Computer Programs" (Hal Abelson, Jerry Sussman and Julie Sussman; MIT Press, 1984, 1996; ISBN 0-262-01153-0), an excellent computer science text used in introductory courses at MIT. So called because of the wizard on the jacket. One of the bibles of the LISP/Scheme world. Also, less commonly, known as the Purple Book.

Yellow Book: n. The print version of this Jargon File; "The New Hacker's Dictionary" from MIT Press; The book includes essentially all the material the File, plus a Foreword by Guy L. Steele Jr. and a Preface by Eric S. Raymond. Most importantly, the book version is nicely typeset and includes almost all of the infamous Crunchly cartoons by the Great Quux, each attached to an appropriate entry. The first edition (1991, ISBN 0-262-68069-6) corresponded to the Jargon File version 2.9.6. The second edition (1993, ISBN 0-262-68079-3) corresponded to the Jargon File 3.0.0. The third (1996, ISBN 0-262-68092-0) corresponded to 4.0.0.

The Pink Shirt Book, "The Peter Norton Programmer's Guide to the IBM PC".

GOVERNMENT BOOKS (Rainbow Series - No ISBN Available) Orange Book. 5200.28-STD 	DoD Trusted Computer System Evaluation Criteria 	15 Aug 1983 Green Book. CSC-STD-002-85 	DoD Password Management Guideline 	12 Apr 1985 Yellow Book. CSC-STS-003-85 	Guidance for applying TCSEC in Specific Environments 	25 Jun 1985 Tan Book. NCSC-TG-001 	A Guide to Understanding Audit in Trusted Systems 	1 Jun 1988 Bright Blue Book. NCSC-TG-002 	Trusted Product Security Evaluation Program 	22 Jun 1990 Neon Orange Book NCSC-TG-003 	Discretionary Access Control in Trusted Systems 	30 Sep 1987 Aqua Book      NCSC-TG-004 	Glossary of Computer Security Terms 	21 Oct 1988 Red Book       NCSC-TG-005 	Trusted Network Interpretation 	31 Jul 1987 Amber Book     NCSC-TG-006 	Configuration Management in Trusted Systems 	28 Mar 1988 Burgundy Book  NCSC-TG-007 	A Guide to Understanding Design Documentation in Trusted Systems 	6 Oct 1988 Dark Lavender Book NCSC-TG-008 	A Guide to Understanding Trusted Distribution in Trusted Systems 	15 Dec 1988 Venice Blue Book  NCSC-TG-009 	Computer Security Subsystem Interpretation of the TCSEC 	16 Sep 1988 Aqua Book      NCSC-TG-010 	A Guide to Understanding Security Modeling in Trusted Systems 	October 1992 Red Book       NCSC-TG-011 	Trusted Network Interpretation Environments Guideline (TNI) 	1 August 1990 Pink Book      NCSC-TG-013 V2 	RAMP Program Document 	1 March 1995 Purple Book    NCSC-TG-014 	Guidelines for Formal Verification Systems 	1 Apr 1989 Brown Book     NCSC-TG-015 	Guide to Understanding Trusted Facility Management 	18 Oct 1989 Yellow-Green Book NCSC-TG-016 	Guidelines for Writing Trusted Facility Manuals 	October 1992 Light Blue Book NCSC-TG-017 	Identification and Authentication in Trusted Systems 	September 1991 Light Blue Book NCSC-TG-018 	Object Reuse in Trusted Systems 	July 1992 Blue Book      NCSC-TG-019 	Trusted Product Evaluation Questionnaire 	2 May 1992 Silver Book    NCSC-TG-020 	Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX System 	7 July 1989 Purple Book   NCSC-TG-021 	Trusted Database Management System Interpretation of the TCSEC (TDI) 	April 1991 Yellow Book   NCSC-TG-022 	Trusted Recovery in Trusted Systems 	30 December 1991 Bright Orange Book NCSC-TG-023 	Security Testing and Test Documentation in Trusted Systems Purple Book   NCSC-TG-024 Vol. 1/4 	Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements 	December 1992 Purple Book    NCSC-TG-024 Vol. 2/4 	Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work 	30 June 1993 Purple Book    NCSC-TG-024 Vol. 3/4 	Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description 	28 February 1994 Purple Book    NCSC-TG-024 Vol. 4/4 	Procurement of Trusted Systems: How to Evaluate a Bidder's Proposal Document 	Publication TBA Forest Green Book NCSC-TG-025 	Guide to Understanding Data Remanence in Automated Information Systems. September 1991 Hot Peach Book NCSC-TG-026 	Writing the Security Features User's Guide for Trusted Systems 	September 1991 Turquoise Book NCSC-TG-027 	Information System Security Officer Responsibilities for Automated Information Systems 	May 1992 Violet Book    NCSC-TG-028 	Assessing Controlled Access Protection 	25 May 1992 Blue Book      NCSC-TG-029 	Certification and Accreditation Concepts 	January 1994 Light Pink Book NCSC-TG-030 	Covert Channel Analysis of Trusted Systems 	November 1993