This article discusses the methodology of OWASP Mobile TOP 10 for analyzing the vulnerability of mobile software applications and it demonstrates the process of analyzing using the test tools
The consequence of the fast digitalization of society is that people that don’t have technical educa...
Mobile learning is a modern trend in educational technologies, which is connected with the use of ...
In the article the features of the application game method to improve train in-service students of s...
The application testing of security, its main approaches, the most frequent types of attacks on Inte...
The present article contains the author’s method for evaluation of company’s export potentia
The article is devoted to the protection of software code from unauthorized use by the methods of cr...
The article analyzes the mobile applications and web resources, given their comparative characterist...
В статье описывается назначение подсистемы анализа данных интернет-магазинов мобильных приложений; п...
The article raises the problematic issues of studying tactics of military universities with the use ...
The article describes the hypothesis of the cyber-physical system “smart university” as an education...
A variety of personal mobile devices are firmly embedded in the life of modern man and society. Howe...
У статті розкривається зміст поняття кіберзлочинність, її схеми та способи боротьби з нею.The term c...
Статья о диссертации А. А. Потебни и отзывах о ней проф. М. С. Дринова. Professor M.S. Drinov’s art...
The article describes the concept of the risk of cybersecurity, the main stages of risk assessments ...
Дипломная работа: 54 с., 40 источников, 7 прил. Ключевые слова: ЛИЧНОСТЬ, САМООЦЕНКА, ЭГОЦЕНТРИЗМ, М...
The consequence of the fast digitalization of society is that people that don’t have technical educa...
Mobile learning is a modern trend in educational technologies, which is connected with the use of ...
In the article the features of the application game method to improve train in-service students of s...
The application testing of security, its main approaches, the most frequent types of attacks on Inte...
The present article contains the author’s method for evaluation of company’s export potentia
The article is devoted to the protection of software code from unauthorized use by the methods of cr...
The article analyzes the mobile applications and web resources, given their comparative characterist...
В статье описывается назначение подсистемы анализа данных интернет-магазинов мобильных приложений; п...
The article raises the problematic issues of studying tactics of military universities with the use ...
The article describes the hypothesis of the cyber-physical system “smart university” as an education...
A variety of personal mobile devices are firmly embedded in the life of modern man and society. Howe...
У статті розкривається зміст поняття кіберзлочинність, її схеми та способи боротьби з нею.The term c...
Статья о диссертации А. А. Потебни и отзывах о ней проф. М. С. Дринова. Professor M.S. Drinov’s art...
The article describes the concept of the risk of cybersecurity, the main stages of risk assessments ...
Дипломная работа: 54 с., 40 источников, 7 прил. Ключевые слова: ЛИЧНОСТЬ, САМООЦЕНКА, ЭГОЦЕНТРИЗМ, М...
The consequence of the fast digitalization of society is that people that don’t have technical educa...
Mobile learning is a modern trend in educational technologies, which is connected with the use of ...
In the article the features of the application game method to improve train in-service students of s...