GOST PDF
Information technology. Security techniques. Network security. Part 2. Guidelines for the design and implementation of network security
Document status: Active
Information technology. Security techniques. Network security. Part 4. Securing communications between networks using security gateways
Document status: Active
Information technology. Security techniques. Network security. Part 5. Securing communications across networks using Virtual Private Networks (VPNs)
Document status: Active
Information technology. Security techniques. Application security. Part 2. Organization normative framework
Document status: Active
Information technology. Security techniques. Application security. Part 3. Application security management process
Document status: Active
Information technology. Security techniques. Application security. Part 6. Case studies
Document status: Active