Материалов:
1 081 645

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 329631

Страница 1 из 32964

The mathematical model of fiber-optic link protected from unauthorized accessThe mathematical model of fiber-optic link protected from unauthorized access

NoSQL databases. technology for protecting data from unauthorized accessNoSQL databases. technology for protecting data from unauthorized access

PROBABILISTIC ANALYSIS OF THE SECRECY OF INFORMATION PROTECTION BY USING SPLITTING METHOD hacker's point of view with unauthorized access to the transmission channel.

Оценка возможности несанкционированного доступа к пассивной оптической сети. Выполнена оценка возможности такой атаки.The possibility of unauthorized access to information transmitted

Multi-agent system of protecting information from unauthorized access and software tools for protecting data from unauthorized access from local area network have been analyzed

Software-hardware data protection from unauthorized accessSoftware-hardware data protection from unauthorized access

Some results of the probabilistic analysis of the secrecy of information protection by numeric symbol splitting metho protection by the method of integer splitting from a hacker’s point of view with unauthorized access

The quantitative comparison between the integer splitting cipher and the traditional gamma cipher to the unauthorized access to the information transmission channel, were proven in this article; the first lemma

LEGAL ISSUES OF COMBATING UNAUTHORIZED DUMPS: CASE-STUDY OF THE KOSINO-UKHTOMSKY DISTRICT OF MOSCOW. Citizens can help to combat them. The article tells people how to distinguish an unauthorized dump from

The Modeling Procedure of Illegal Entry into the Information System Based on the Logical Function of Disseminating Information on the Paths within the System, the numerical estimates for the probabilities of unauthorized access through these channels to the IMS are got

Страница 1 из 32964