Bortnik, D. A, Perm National Research Polytechnic University

Issue Section Title Abstract File
No 2 (2016) Articles CONFIGURATION OF CISCO ROUTER FOR SECURE REMOTE CONTROL USING SSH PROTOCOL Abstract PDF
(Rus)
No 1 (2016) Articles ANALYSIS OF GUIDE TO ICS SECURITY TO IDENTIFY THE TYPICAL VULNERABILITIES Abstract PDF
(Rus)

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies