System solutions of actual problems of information security of computer systems is achieved by a comprehensive analysis of existing approaches to the protection of computer information. The interrelated set of methods and means of implementing these approaches is a mechanism to ensure the security of the information in these systems. The fact that computer systems are characterized by many non-trivial properties is the question of their research to the number of complex both scientifically and practically
The object of the research is the system of information security of the state. Investigated proble...
An organization that works with any information must have a security system capable of protecting th...
The structures of intelligent information protection systems are considered. The tree of tasks for p...
In modern conditions of growth of informatization, to ensure the reliability of the functioning of d...
Data protection systems in the functioning of the organization in a particular area, highlights the ...
The methodology of the comparative estimation for the quality of protection systems has been develop...
The constuction principles have been developed, and the complex of the protected speed data processi...
Nowadays, corporations and a government agencies relay on computer-based information system to manag...
Aim. One of the key objectives of the theory and practice of information security is to analyse the ...
The theorem of system of indicators for an estimation of the security of information processes in th...
In this article, legal methods of information protection and the main directions of security for ele...
The disadvantages and advantages of the risk measurement methods used in the integrated protection s...
The work considered the organization of security in distributed systems. The concepts of reliability...
This paper has been written in order to provide a complete insight into computer criminal presenting...
In computer-based information systems there is a danger or improper use or loss of information. The...
The object of the research is the system of information security of the state. Investigated proble...
An organization that works with any information must have a security system capable of protecting th...
The structures of intelligent information protection systems are considered. The tree of tasks for p...
In modern conditions of growth of informatization, to ensure the reliability of the functioning of d...
Data protection systems in the functioning of the organization in a particular area, highlights the ...
The methodology of the comparative estimation for the quality of protection systems has been develop...
The constuction principles have been developed, and the complex of the protected speed data processi...
Nowadays, corporations and a government agencies relay on computer-based information system to manag...
Aim. One of the key objectives of the theory and practice of information security is to analyse the ...
The theorem of system of indicators for an estimation of the security of information processes in th...
In this article, legal methods of information protection and the main directions of security for ele...
The disadvantages and advantages of the risk measurement methods used in the integrated protection s...
The work considered the organization of security in distributed systems. The concepts of reliability...
This paper has been written in order to provide a complete insight into computer criminal presenting...
In computer-based information systems there is a danger or improper use or loss of information. The...
The object of the research is the system of information security of the state. Investigated proble...
An organization that works with any information must have a security system capable of protecting th...
The structures of intelligent information protection systems are considered. The tree of tasks for p...