Search by keyword: "information security"
Analysis of Sources of Information Security Threats to MPLS-Based VPRNs
Authors: Bel’fer R.A., Petrukhin I.S. | Published: 19.12.2013 |
Published in issue: #4(93)/2013 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: virtual private network, information security, VPN routing table, virtual private routed networks, multipleprotocol label switching, denial of service, control center |
Technique for Evaluation of Compliance of Information Security Means with Common Criteria
Authors: Barabanov A.V., Markov A.S. , Naikhanova I.V.  | Published: 17.08.2013 |
Published in issue: #2(91)/2013 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: common criteria, evaluation criteria for information technology security, evaluation assurance level, information security, certification testing |