Материалов:
1 005 012

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 338244

Страница 4 из 33825

The role of biometric systems in manufacturing alternative to traditional password systems. These technologies prevent unauthorized access, ensure personnel

Asymptotic secrecy of the information protection by the usage of simple integer splitting method the level of security and provide the ability to control the degree of protection of information. So a lemma

APPROACH TO EVALUATING EFFECTIVENESS OF INFORMATION PROTECTION IN CONTROL SYSTEMSMethodological approach to evaluating the effectiveness of information protection

Formalization of the problem of protection against reconnaissance in conflict systems interrelation, agents’ information awareness and system transition from one state into another is formulated

Специфика сетевой модели инновационной деятельности в фармацевтике в контексте защиты интеллектуальной собственности of intellectual property from unauthorized use is still traditionally based on agreements, but can already

Rights and interests of children in the information sphere: improvement of legislation protecting children from information harmful to their health and development" does not currently meet needs

Информационно-правовая защита несовершеннолетних в России и европейских странахThe scientific article reflects the peculiarities of the development of access to information

Constitutional Protection of Public Figures’ Personal Data on the Internet that there are three types of offenses in the field of public figures’ personal data protection in information

Theoretical Model of a Multi-Key Steganography System access apart from keys that deposite information we propose to use additional cryptography keys.

Снос самовольной постройки как способ защиты гражданских прав и законных интересов при незаконном строительствеDemolition of unauthorized structures as a method of protection of civil rights and legitimate

Страница 4 из 33825