Материалов:
1 005 012

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 106485

Страница 9 из 10649

Theoretical Justification and Practice of Risk Management for Economic Security of the Dealer Networks of Carmakers in the accounting. Information from accounting should be fully used for the tasks of the economic security of a

Security methods for a group of mobile robots according to the requirements of Russian and foreign legislationThis paper is devoted to the problem of creating security methods for mobile robotic systems

ALGORITHM DETERMINE TRUST VALUE TO THE DISTRIBUTED INFORMATION SYSTEMS ELEMENTS of information to a particular DIS node for calculations and cannot control the security of information during

High-Tech Means and Implements of Crime: Challenging the Security of Sustainable Urban Development research methods such as formal-legal, interpretative, statistical, etc. © 2023, The Author(s), under

Pioneering development of Italian national agroindustrial complex in the context of ensuring food security food security. In the article special methods of research were used: content analysis of scientific

Программный модуль защиты речевой информации путем создания речеподобных помех of the program module for the protection of speech information by creating speech-like interference is proposed

1.8. THE HUMANITARIAN ASPECT OF INFORMATION SECURITY to the development of the humanitarian aspect of information security.

Information Security in the Context of Pandemic: Methods for Stabilizing Society in Terms of Electronic Media and Internet April to July 2020, affecting the COVID-19 pandemic from the point of view of information security

Methodology for assessing the budgetary security of regional infrastructure provision (case study of the Komi Republic) region on their basis. In the process of research, statistical and mathematical methods were used, a

Комплексные системы защиты информации специальных объектов и методика их оценкиThe purpose of the article is to consider complex information security systems of special objects

Страница 9 из 10649