Information technology. Security techniques. Refining software vulnerability analysis under GOST R ISO/IEC 15408 and GOST R ISO/IEC 18045. Part 2. Penetration testing
Unified system for design documentation. Graphic identifications in schemes. Inductive coils, chokes, transformers, autotransformers and magnetic amplifiers
€10
Ask a question
Message sent
Your message has been sent. Our experts will respond you shortly. Thank you!