{"id":633651,"date":"2024-11-06T00:43:49","date_gmt":"2024-11-06T00:43:49","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/iso-iec-18028-32005\/"},"modified":"2024-11-06T00:43:49","modified_gmt":"2024-11-06T00:43:49","slug":"iso-iec-18028-32005","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/iso\/iso-iec-18028-32005\/","title":{"rendered":"ISO\/IEC 18028-3:2005"},"content":{"rendered":"

ISO\/IEC 18028-3:2005 provides an overview of security gateways through a description of different architectures.<\/p>\n

It outlines the techniques for security gateways to analyse network traffic. The techniques discussed are as follows:<\/p>\n