Материалов:
1 005 012

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 338244

Страница 3 из 33825

The use of electronic technologies in medicine about the patient, which is strictly confidential and which can be stolen by unauthorized access using

A model of multi-key steganographic system of confidentiality of transmitted information, as well as protecting of content from unauthorized use are expanded

Комплексная оценка функциональных свойств акустических сейфов для защиты смартфонов от несанкционированной активацииComprehensive assessment of the functional properties of acoustic safes to protect smartphones from

Анализ результатов опытной эксплуатации комплекса охраны протяженных периметров ВМ 8018 to their increasing efficiency of protection from unauthorized access by intruders to protected facilities. The high

Efficiency of Intellectual System of Secure Access in a Phased Application of Means of Protection Considering the Intersection of the Sets of Threat Detection-by-stage uses means of protection of information to detect and eliminate threats for intellectual information

Исследование уровня информационной безопасности сетевых систем видеонаблюдения attacks on information and telecommunications networks has been provided.

MONITORING OF LAND PLOTS LOCATED IN THE VICINITY OF AIRFIELDS). The tasks and the monitoring procedure, including the analysis and processing of the received information

Evalution of protect information from leaking viaEvalution of protect information from leaking via

System for protecting voice information from leakage through acoustic channelsSystem for protecting voice information from leakage through acoustic channels

There Is a Need of Protecting Children from Sexual Information Disseminated Through Information and Communication TechnologiesThere Is a Need of Protecting Children from Sexual Information Disseminated Through Information

Страница 3 из 33825