Search by keyword: "information security"
Analysis of Sources of Information Security Threats to MPLS-Based VPRNs
| Authors: Bel’fer R.A., Petrukhin I.S. | Published: 19.12.2013 |
| Published in issue: #4(93)/2013 | |
| DOI: | |
| Category: Informatics & Computing Technology | |
| Keywords: virtual private network, information security, VPN routing table, virtual private routed networks, multipleprotocol label switching, denial of service, control center | |
Technique for Evaluation of Compliance of Information Security Means with Common Criteria
| Authors: Barabanov A.V., Markov A.S. , Naikhanova I.V.  | Published: 17.08.2013 |
| Published in issue: #2(91)/2013 | |
| DOI: | |
| Category: Informatics & Computing Technology | |
| Keywords: common criteria, evaluation criteria for information technology security, evaluation assurance level, information security, certification testing | |
