Материалов:
1 005 012

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 338244

Страница 2 из 33825

LEGAL ISSUES OF COMBATING UNAUTHORIZED DUMPS: CASE-STUDY OF THE KOSINO-UKHTOMSKY DISTRICT OF MOSCOW. Citizens can help to combat them. The article tells people how to distinguish an unauthorized dump from

Absolute Secrecy Asymptotic for Generalized Splitting Method with respect to an unauthorized access to transmission channel. A lemma has been proved in the paper stating

One method decomposition for securing personal data in medical information systems patients and medical personnel from unlawful harmful effects on them when unauthorized access

Access Matrix as a Passive Element in the Protection of Information Resources protection. Offers a formation technique of an access matrix. Describes procedure of information

Водосодержащие вспененные комбинированные конструкции интегральных панелей для систем защиты информации от утечки по электромагнитным ,оптическим и акустическим каналам of the shielding designs developed for the systems of information protection against unauthorized access through

Satellite Infocommunications Protection against Unauthorized UseSatellite Infocommunications Protection against Unauthorized Use

CRIMES IN THE SPHERE OF SECURITY OF THE HANDLING OF COMPUTER INFORMATION are presented and analyzed. The legal concepts of unauthorized access and interception of computer information

РИСУНОК КАК СТЕГОКОНТЕЙНЕР В КОМПЬЮТЕРНОЙ КОММУНИКАЦИИCryptography and steganography deal with the protection of information against unauthorised access

Cryptographic principles in the age of artificial intelligence data from unauthorized access. This discipline employs algorithms to encrypt information, rendering

Самовольная постройка: проблемы теории и практики, the alternative order of property law for unauthorized construction recognition, apart from the court judgment

Страница 2 из 33825