Information technology. Security techniques. Refining software vulnerability analysis under GOST R ISO/IEC 15408 and GOST R ISO/IEC 18045. Part 2. Penetration testing
Information technology. Protection of information technology and automated systems against security threats posed by use of covert channels. Part 1. General principles