Материалов:
1 005 012

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 9237

Страница 2 из 924

Technique of information systems vulnerabilities management of vulnerabilities searching and analyzing in information systems. This technique is based on the use of the Open

Статический анализ исходных кодов в оценке надежности web-приложенийAn overview of the most important trends in the field of software reliability

THE SIEU RIVER VULNERABILITY ASSESSMENTThis paper examines the role of assessment vulnerability of water resources in order to detect

The Role of Cognitive-Information Technologies in Cybersecurity: Threat Detection and Adaptive Defense Systems on cybersecurity within software-oriented systems. The author thoroughly examines the modeling of cognitive

Devolopment of the vulnerability management program in bankingDevolopment of the vulnerability management program in banking

The problem of password vulnerability in our timeThe problem of password vulnerability in our time

Social risk and vulnerability assessment of hazardous hydrological phenomena in the Krasnodar region of RussiaSocial risk and vulnerability assessment of hazardous hydrological phenomena in the Krasnodar

Social vulnerability and gender inequality in professions: reflections on extension actions for specific audiencesThis article reflects on social vulnerability and gender inequality in Brazil, in general

PROTECTION OF GIRLS AS A VULNERABLE GROUP UNDER INTERNATIONAL LAW vulnerable group. Notion «vulnerability» and «vulnerable groups» are analyzed as well as the factors

Simulation of the spread of epidemics using AnyLogic in the AnyLogic software environment. The use of simulation methods in relation to the processes

Страница 2 из 924