The mathematical model of fiber-optic link protected from unauthorized accessThe mathematical model of fiber-optic link
protected from unauthorized access NoSQL databases. technology for protecting data from unauthorized accessNoSQL databases. technology for
protecting data
from unauthorized access Оценка возможности несанкционированного доступа к пассивной оптической сети. Выполнена оценка возможности такой атаки.The possibility of
unauthorized access to information transmitted
Multi-agent system of protecting information from unauthorized access and software tools for
protecting data
from unauthorized access from local area network have been analyzed
The quantitative comparison between the integer splitting cipher and the traditional gamma cipher to the
unauthorized access to the information transmission channel, were proven in this article; the first lemma
LEGAL ISSUES OF COMBATING UNAUTHORIZED DUMPS: CASE-STUDY OF THE KOSINO-UKHTOMSKY DISTRICT OF MOSCOW. Citizens can help to combat them. The article tells people how to distinguish an
unauthorized dump
from