The article describes the tools of information weapons, the analysis and classification of information attacks are conducted. Also, most common information network attacks such as Cross-site Scripting, HTTP Response Splitting, SQL Injection, Information Leakage and others are examined, comparative analysis of vulnerabilities of Web Applications is carried out.У статті перераховані кошти інформаційної зброї, здійснені аналіз і класифікація інформаційних атак. Також розглянуто найпоширеніші інформаційно-мережеві атаки, такі як CSS атака, "розщеплення" HTTP-запиту, SQL ін'єкція, витік інформації і т.д. А також здійснено порівняльний аналіз вразливостей веб- додатків.В статье перечислены средства информационного оружия, осуществлены анализ и ...
The thesis analyzes the role of victim behavior in the mechanism of committing violent crimes agains...
Data of mucolytic drugs using possibility in childhood are given in this article. There are mechanis...
The results of statistical researches of rails’ single output prognostication are adduced; the metho...
A man is an element of any form of sociality from the earliest community to the moderncivil and poli...
This article discusses some aspects of energy efficiency in wireless sensor networks (WSN). The cor...
The theses made victimological common characteristic of fraud in which victims generally are men and...
The article is dedicated to learning a problem of alienation in nowdays. This work demonstrates some...
Experimental data of temperature state and heat transfer characteristics of closed two-phase thermos...
Information about lesions of neck and thorax reflexogenous areas and their consequences are analyzed...
The estimation of a modern condition armour piercing fin stabilized discarding sabot shell for 120 m...
The author examines functions, methodological and sociological meaning of scientific communicatons, ...
The article describes a rare case of bizarre parosteal osteochondromatous proliferation (Nora’s lesi...
Technology MPLS - Multiprotocol new technology that combines the tools 1P routing , flow control mec...
An author groundsan idea that the use of air space of Ukraine is straight related to providing of po...
The problem of completeness of the set of functions from a finite set A to set of all subsets of A i...
The thesis analyzes the role of victim behavior in the mechanism of committing violent crimes agains...
Data of mucolytic drugs using possibility in childhood are given in this article. There are mechanis...
The results of statistical researches of rails’ single output prognostication are adduced; the metho...
A man is an element of any form of sociality from the earliest community to the moderncivil and poli...
This article discusses some aspects of energy efficiency in wireless sensor networks (WSN). The cor...
The theses made victimological common characteristic of fraud in which victims generally are men and...
The article is dedicated to learning a problem of alienation in nowdays. This work demonstrates some...
Experimental data of temperature state and heat transfer characteristics of closed two-phase thermos...
Information about lesions of neck and thorax reflexogenous areas and their consequences are analyzed...
The estimation of a modern condition armour piercing fin stabilized discarding sabot shell for 120 m...
The author examines functions, methodological and sociological meaning of scientific communicatons, ...
The article describes a rare case of bizarre parosteal osteochondromatous proliferation (Nora’s lesi...
Technology MPLS - Multiprotocol new technology that combines the tools 1P routing , flow control mec...
An author groundsan idea that the use of air space of Ukraine is straight related to providing of po...
The problem of completeness of the set of functions from a finite set A to set of all subsets of A i...
The thesis analyzes the role of victim behavior in the mechanism of committing violent crimes agains...
Data of mucolytic drugs using possibility in childhood are given in this article. There are mechanis...
The results of statistical researches of rails’ single output prognostication are adduced; the metho...