
All of the security requirements come from 5220.22-M, which is the standard from the Department of Defense. The specifics are that you must overwrite deleted files with (1) a character, (2) the complement of the character, and (3) a random character. This technique is not sufficient for Top Secret material. That would requires a hardware degaussing of the drive.
The source code is provided. However it is copyrighted by Mark Russinovich. The cool thing is that this secure delete works on compressed and encrypted files as well. Good apps like this are probably which Microsoft bought out SysInternals some time ago.