All Stories

  1. Selection of an Alternative Method for Establishing Security Levels
  2. Security Levels of CI
  3. The Role of Business Continuity Management in the Business Management System
  4. Integrated Model for Security and Protection of Critical Infrastructure
  5. Conditions for Increasing the Viability of Critical Infrastructure Objects