This is reportedly the document that started computer security. It discusses intrusions, physical security, threats, policy considerations, and recommendations. Quite good.