Talk:Flaw hypothesis methodology

From Wikipedia, the free encyclopedia
Jump to: navigation, search
WikiProject Computer Security / Computing   
WikiProject icon This article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
 ???  This article has not yet received a rating on the project's quality scale.
 ???  This article has not yet received a rating on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing.
 
WikiProject Computing / Software  
WikiProject icon This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
 ???  This article has not yet received a rating on the project's quality scale.
 ???  This article has not yet received a rating on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Software.
 

Article source[edit]

The text in this article is taken almost verbatim (aside from a grammatical error) from the glossary of TCSEC. I assume this isn't a {{copyvio}} because that document was issued by the U.S. Government; can someone verify this? Slicing 03:37, 10 November 2005 (UTC)

added a See also to TCSEC just in case, can't verify yet J\/\/estbrook       15:18, 14 November 2005 (UTC)
here's a link [1]. RJFJR 16:39, 10 August 2007 (UTC)