MAREȘ, M.S. (2018). Solutions to Secure a Network. International Journal of Information Security and Cybercrime, 7(2), 41-51. Retrieve from https://www.ijisc.comMAREȘ, M.S., 2018. Solutions to Secure a Network. International Journal of Information Security and Cybercrime 7(2), 41-51. Available from: https://www.ijisc.comM.S. MAREȘ, "Solutions to Secure a Network," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 41-51, 2018. Available: https://www.ijisc.comMAREȘ, M.S., 'Solutions to Secure a Network', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 41-51, (2018).MAREȘ, M.S.: Solutions to Secure a Network. International Journal of Information Security and Cybercrime 7 (2018) 41-51. https://www.ijisc.comMAREȘ, M.S., (2018), Solutions to Secure a Network. International Journal of Information Security and Cybercrime, 7: 41-51. https://www.ijisc.com Citation Format :
PAULIȘ, M.A. (2017). Solutions for Network Traffic Security: VPN Through IPsec and PKI. International Journal of Information Security and Cybercrime, 6(2), 40-46. Retrieve from https://www.ijisc.comPAULIȘ, M.A., 2017. Solutions for Network Traffic Security: VPN Through IPsec and PKI. International Journal of Information Security and Cybercrime 6(2), 40-46. Available from: https://www.ijisc.comM.A. PAULIȘ, "Solutions for Network Traffic Security: VPN Through IPsec and PKI," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 40-46, 2017. Available: https://www.ijisc.comPAULIȘ, M.A., 'Solutions for Network Traffic Security: VPN Through IPsec and PKI', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 40-46, (2017).PAULIȘ, M.A.: Solutions for Network Traffic Security: VPN Through IPsec and PKI. International Journal of Information Security and Cybercrime 6 (2017) 40-46. https://www.ijisc.comPAULIȘ, M.A., (2017), Solutions for Network Traffic Security: VPN Through IPsec and PKI. International Journal of Information Security and Cybercrime, 6: 40-46. https://www.ijisc.com Citation Format :
COSTEA, I. (2012). Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime, 1(2), 40-47. Retrieve from https://www.ijisc.comCOSTEA, I., 2012. Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime 1(2), 40-47. Available from: https://www.ijisc.comI. COSTEA, "Data Privacy Assurance in Virtual Private Networks," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 40-47, 2012. Available: https://www.ijisc.comCOSTEA, I., 'Data Privacy Assurance in Virtual Private Networks', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 40-47, (2012).COSTEA, I.: Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime 1 (2012) 40-47. https://www.ijisc.comCOSTEA, I., (2012), Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime, 1: 40-47. https://www.ijisc.com Citation Format :
BĂNUȚĂ, B.A. (2012). Security Technologies Implemented in MPLS VPN Networks. International Journal of Information Security and Cybercrime, 1(2), 9-16. Retrieve from https://www.ijisc.comBĂNUȚĂ, B.A., 2012. Security Technologies Implemented in MPLS VPN Networks. International Journal of Information Security and Cybercrime 1(2), 9-16. Available from: https://www.ijisc.comB.A. BĂNUȚĂ, "Security Technologies Implemented in MPLS VPN Networks," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 9-16, 2012. Available: https://www.ijisc.comBĂNUȚĂ, B.A., 'Security Technologies Implemented in MPLS VPN Networks', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 9-16, (2012).BĂNUȚĂ, B.A.: Security Technologies Implemented in MPLS VPN Networks. International Journal of Information Security and Cybercrime 1 (2012) 9-16. https://www.ijisc.comBĂNUȚĂ, B.A., (2012), Security Technologies Implemented in MPLS VPN Networks. International Journal of Information Security and Cybercrime, 1: 9-16. https://www.ijisc.com Citation Format :