A variety of personal mobile devices are firmly embedded in the life of modern man and society. However, the threats associated with them forced the security agencies to prohibit not only the use, but also the presence of these devices on the territory of special-purpose facilities. In turn, the capabilities of these devices, provided that the proposed model for building and managing the information security system of a special purpose object is created, can be applied to effectively solve a number of current problems
У статті розкривається зміст поняття кіберзлочинність, її схеми та способи боротьби з нею.The term c...
3 разы “Ойча наш”. / Панядзелак з аўторкам, / Серада з чацвяргом, / Пятніца з суботай, / А нядзеля а...
Источник публикации http://media.miu.by/files/store/items/iot/15/iot_15_2008_12.pd
Threats, automatic systems, Sniffing, Hijacking, Denial-of-Service, DoS, Man-in-the-Middle
Demonstrates the nature and specificity of information security, defines the concept, issues of info...
Effective implementation of the tasks of the operational-search activity, in many cases requires the...
Today, in a century of information technologies, for correct functioning of the majority of the comm...
The acceleration of technological progress has become one of the leading trends in the development o...
The major types of affected threats of information security of an enterprise-client while keeping re...
The questions of computer simulation of sanitary-protective zones and zones restrictions building up...
We propose example of building an empowerment system for the use of confidential data contained in t...
Кадук – страшная пачвара. З выгляду не то звер, не то чалавек. Галава калматая, рот шырокі, аж да ву...
Курс лекций для студентов 3-го курса специальности 1-31 03 03 Прикладная математика (производств. на...
The consequence of the fast digitalization of society is that people that don’t have technical educa...
The approaches to building distributed systems for monitoring the state of potentially dangerous obj...
У статті розкривається зміст поняття кіберзлочинність, її схеми та способи боротьби з нею.The term c...
3 разы “Ойча наш”. / Панядзелак з аўторкам, / Серада з чацвяргом, / Пятніца з суботай, / А нядзеля а...
Источник публикации http://media.miu.by/files/store/items/iot/15/iot_15_2008_12.pd
Threats, automatic systems, Sniffing, Hijacking, Denial-of-Service, DoS, Man-in-the-Middle
Demonstrates the nature and specificity of information security, defines the concept, issues of info...
Effective implementation of the tasks of the operational-search activity, in many cases requires the...
Today, in a century of information technologies, for correct functioning of the majority of the comm...
The acceleration of technological progress has become one of the leading trends in the development o...
The major types of affected threats of information security of an enterprise-client while keeping re...
The questions of computer simulation of sanitary-protective zones and zones restrictions building up...
We propose example of building an empowerment system for the use of confidential data contained in t...
Кадук – страшная пачвара. З выгляду не то звер, не то чалавек. Галава калматая, рот шырокі, аж да ву...
Курс лекций для студентов 3-го курса специальности 1-31 03 03 Прикладная математика (производств. на...
The consequence of the fast digitalization of society is that people that don’t have technical educa...
The approaches to building distributed systems for monitoring the state of potentially dangerous obj...
У статті розкривається зміст поняття кіберзлочинність, її схеми та способи боротьби з нею.The term c...
3 разы “Ойча наш”. / Панядзелак з аўторкам, / Серада з чацвяргом, / Пятніца з суботай, / А нядзеля а...
Источник публикации http://media.miu.by/files/store/items/iot/15/iot_15_2008_12.pd