Tech-invite   World Map
3GPP     Specs     Glossaries     UICC       IETF     RFCs     Groups     SIP     ABNFs       T+       Search     Home


Here        Top        Up        Prev        None
part:    1     2



8   Conclusions   Word-p. 72
A   Application of the methodologies   Word-p. 77
B   Common criteria overview   Word-p. 91
C   Self-evaluation and Self-evaluation with Third-party Certification Analysis   Word-p. 94
D   Threat modelling frameworks   Word-p. 96
E   Vendor network product development and network product lifecycle management process assurance requirements   Word-p. 104
F   Change history   Word-p. 106

Up        Top