Information technology. Security techniques. Network security. Part 5. Securing communications across networks using Virtual Private Networks (VPNs). (ISO/IEC 27033-5:2013, MOD)
Telecommunication networks. Plesiochronous transmission systems, synchronous digital hierarchy networks and synchronous digital hierarchy management system. General technical requirements