In the age of the information society, determined by the evolution of digital technology, information has become an essential element of the functioning of every human being. Its acquisition, processing and distribution serves to satisfy the key areas of society's life and constitutes a necessary component of every decision-making process. These days became dominated by the increasing demand for information. The problem of its protection against unwanted obtaining (disclosure) has become a challenge for many scientific communities. This state of affairs has forced us to take a number of steps to ensure the security of useful information, characterized by accuracy, unambiguity, completeness and authenticity. The problem of information securi...
In our modern information societies, we not only use and welcome computers; we are highly dependent ...
Abstract Having observed carefully the dynamics of e- activity and technology in business, finance a...
As a result of the spread of malicious information and spam in the Network, unauthorized access, dis...
That scientific research highlights specific items of modernization in the field of public society i...
That scientific research highlights specific items of modernization in the field of public society i...
Information confidentiality is the one of the cornerstones of IT security, which is defined and desc...
Tendensions of computer incidents development, evolving vulnerability of information systems, indent...
Information became the main resource of social, political, economic and scientific-technical develop...
In this age of increasing digitalisation, information security is becoming one of the most important...
Society is on the verge of a new era: the information age. Economical changes, a new way of looking ...
The article is devoted to the analysis of security problems in the modern world. The authors conside...
The digitalization of the economy and the digitalization of management in a modern state imply not o...
The security of information that is processed and stored in Information and Communications Technolog...
This paper has been written in order to provide a complete insight into computer criminal presenting...
With the rapid development of the enormous and frightening spread of information networks which turn...
In our modern information societies, we not only use and welcome computers; we are highly dependent ...
Abstract Having observed carefully the dynamics of e- activity and technology in business, finance a...
As a result of the spread of malicious information and spam in the Network, unauthorized access, dis...
That scientific research highlights specific items of modernization in the field of public society i...
That scientific research highlights specific items of modernization in the field of public society i...
Information confidentiality is the one of the cornerstones of IT security, which is defined and desc...
Tendensions of computer incidents development, evolving vulnerability of information systems, indent...
Information became the main resource of social, political, economic and scientific-technical develop...
In this age of increasing digitalisation, information security is becoming one of the most important...
Society is on the verge of a new era: the information age. Economical changes, a new way of looking ...
The article is devoted to the analysis of security problems in the modern world. The authors conside...
The digitalization of the economy and the digitalization of management in a modern state imply not o...
The security of information that is processed and stored in Information and Communications Technolog...
This paper has been written in order to provide a complete insight into computer criminal presenting...
With the rapid development of the enormous and frightening spread of information networks which turn...
In our modern information societies, we not only use and welcome computers; we are highly dependent ...
Abstract Having observed carefully the dynamics of e- activity and technology in business, finance a...
As a result of the spread of malicious information and spam in the Network, unauthorized access, dis...