Background Image
Previous Page  10 / 11 Next Page
Information
Show Menu
Previous Page 10 / 11 Next Page
Page Background

8.

http://xgu.ru/wiki/DHCP_snooping

[Электронный ресурс].

9.

Michael H. Behringer

,

Monique J.

Morrow. MPLS VPN Security. Cisco Press, 2005.

P. 312.

10.

ITU-T Recommendation X.509.

Information technology — Open Systems

Interconnection. The Directory: Authentication framework (1993 edition — version 2,

1997 edition version 3).

11.

ETSI ETS 300 841.

Telecommunications Security; Integrated Services digital

Network (ISDN); Encryption Key management system for audio-visual services,

1998.

12.

Бельфер Р.А.

Сети и системы связи (технологии, безопасность) [Электронное

учебное издание]. М.: МГТУ им. Н.Э. Баумана, 2012. 738 с.

REFERENCES

[1] Gol’dshteyn F.B., Gol’dshteyn B.S. Tekhnologiya i protokoly MPLS [Technology

and MPLS protocols]. SPb., BKhV-Peterburg Publ., 2005. 304 p.

[2] Alwayn V. Advanced MPLS design and implementation (CCIE professional

development). Cisco Press, 2001. 496 p. (Russ. ed.: Oliveyn V. Struktura i realizatsiya

sovremennoy tekhnologii MPLS [Design and implementation of modern technology

MPLS]. Moscow, Vil’yams Publ., 2004. 480 p.).

[3] Bel’fer R.A., Petrukhin I.S. Analysis of sources of information security threats to

MPLS-based VPRNs.

Vestn. Mosk. Gos. Tekh. Univ. im. N.E. Baumana, Priborostr.

[Herald of the Bauman Moscow State Tech. Univ., Instrum. Eng.], 2013, no. 4,

pp. 79–89 (in Russ.).

[4] Bel’fer R.A. VPN MPLS security threats in the area between neighboring routers

and IPSec protection.

Elektrosvyaz’

[Telecommunications and Radio Engineering],

2013, no. 4, pp. 25–27 (in Russ.).

[5] Tanenbaum A., Wetherall D. Computer Networks. Prentice Hall, 5 Ed., 2010. 960 p.

(Russ. ed.: Tanenbaum E., Uezeroll D. Komp’yuternye seti. SPb., Piter Publ., 2012.

954 p.).

[6] IEEE 802.1d. Media Access Control Bridges. IEEE, 2011.

[7] IEEE 802.1q. Media Access Control Bridges and Virtual Bridged Local Area

Networks. IEEE, 2013.

[8] Samoylenko N.

DHCP snooping.

WIKI-site on UNIX / LINUX-

systems and systems with open source software (in Russ.). Available at:

http://xgu.ru/wiki/DHCP_snooping

(accessed 01.11.2014).

[9] Behringer Michael H., Morrow Monique J. MPLS VPN Security. Cisco Press, 2005.

312 p.

[10] ITU-T Recommendation X.509. Information technology — Open Systems

Interconnection. The Directory: Authentication framework. ITU, 1993 ed., ver. 2.

ITU, 1997 ed., ver. 3.

[11] ETSI ETS 300 841. Telecommunications Security; Integrated Services

digital Network (ISDN); Encryption Key management system for audio-

visual services. ETSI, 1998. 30 p. Available at:

http://www.etsi.org/de-

liver/etsi_i_ets/300800_300899/300841/01_30_9742/ets_300841e01v.pdf (accessed

01.11.2014).

[12] Bel’fer R.A. Seti i sistemy svyazi (tekhnologii, bezopasnost’). Elektronnoe uchebnoe

izdanie na CD-ROOM [Network and communication system (technology, security).

Electronic educational edition at CD-ROM]. Moscow, MGTU im. N.E. Baumana

Publ., 2012. 738 p.

Статья поступила в редакцию 18.06.2014

56 ISSN 0236-3933. Вестник МГТУ им. Н.Э. Баумана. Сер. “Приборостроение”. 2015. № 1