MAREȘ, M.S. (2018). Solutions to Secure a Network. International Journal of Information Security and Cybercrime, 7(2), 41-51. Retrieve from https://www.ijisc.comMAREȘ, M.S., 2018. Solutions to Secure a Network. International Journal of Information Security and Cybercrime 7(2), 41-51. Available from: https://www.ijisc.comM.S. MAREȘ, "Solutions to Secure a Network," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 41-51, 2018. Available: https://www.ijisc.comMAREȘ, M.S., 'Solutions to Secure a Network', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 41-51, (2018).MAREȘ, M.S.: Solutions to Secure a Network. International Journal of Information Security and Cybercrime 7 (2018) 41-51. https://www.ijisc.comMAREȘ, M.S., (2018), Solutions to Secure a Network. International Journal of Information Security and Cybercrime, 7: 41-51. https://www.ijisc.com Citation Format :
BARBU, I.D.,PASCARIU, C., (2014). Information Security Analyst Profile. International Journal of Information Security and Cybercrime, 3(1), 29-36. Retrieve from https://www.ijisc.comBARBU, I.D., PASCARIU, C., 2014. Information Security Analyst Profile. International Journal of Information Security and Cybercrime 3(1), 29-36. Available from: https://www.ijisc.comI.D. BARBU, C. PASCARIU, "Information Security Analyst Profile," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 29-36, 2014. Available: https://www.ijisc.comBARBU, I.D., PASCARIU, C., 'Information Security Analyst Profile', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 29-36, (2014).BARBU, I.D.,PASCARIU, C.,: Information Security Analyst Profile. International Journal of Information Security and Cybercrime 3 (2014) 29-36. https://www.ijisc.comBARBU, I.D., PASCARIU, C., (2014), Information Security Analyst Profile. International Journal of Information Security and Cybercrime, 3: 29-36. https://www.ijisc.com Citation Format :
BĂNUȚĂ, B.A. (2012). Security Technologies Implemented in MPLS VPN Networks. International Journal of Information Security and Cybercrime, 1(2), 9-16. Retrieve from https://www.ijisc.comBĂNUȚĂ, B.A., 2012. Security Technologies Implemented in MPLS VPN Networks. International Journal of Information Security and Cybercrime 1(2), 9-16. Available from: https://www.ijisc.comB.A. BĂNUȚĂ, "Security Technologies Implemented in MPLS VPN Networks," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 9-16, 2012. Available: https://www.ijisc.comBĂNUȚĂ, B.A., 'Security Technologies Implemented in MPLS VPN Networks', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 9-16, (2012).BĂNUȚĂ, B.A.: Security Technologies Implemented in MPLS VPN Networks. International Journal of Information Security and Cybercrime 1 (2012) 9-16. https://www.ijisc.comBĂNUȚĂ, B.A., (2012), Security Technologies Implemented in MPLS VPN Networks. International Journal of Information Security and Cybercrime, 1: 9-16. https://www.ijisc.com Citation Format :
BĂDESCU, C.M. (2012). Solutions for Securing Computer Networks. International Journal of Information Security and Cybercrime, 1(1), 26-34. Retrieve from https://www.ijisc.comBĂDESCU, C.M., 2012. Solutions for Securing Computer Networks. International Journal of Information Security and Cybercrime 1(1), 26-34. Available from: https://www.ijisc.comC.M. BĂDESCU, "Solutions for Securing Computer Networks," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 26-34, 2012. Available: https://www.ijisc.comBĂDESCU, C.M., 'Solutions for Securing Computer Networks', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 26-34, (2012).BĂDESCU, C.M.: Solutions for Securing Computer Networks. International Journal of Information Security and Cybercrime 1 (2012) 26-34. https://www.ijisc.comBĂDESCU, C.M., (2012), Solutions for Securing Computer Networks. International Journal of Information Security and Cybercrime, 1: 26-34. https://www.ijisc.com Citation Format :