Browsing by Subject INFORMATION SECURITY

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
А Б В Г Д Е Ж З И Й К Л М Н О П Р С Т У Ф Х Ц Ч Ш Щ Ъ Ы Ь Э Ю Я
or enter first few letters:  
Showing results 1 to 20 of 52  next >
Issue DateTitleAuthor(s)
2022Analysis of information security in industrial productionBorodenko, I. N.; Gubina, D. I.; Бороденко, И. Н.; Губина, Д. И.
2021Application of wireshark for detecting information security incidentsKazenas, G. V.; Казенас, Г. В.
2021Basic methods of malware analysis by deep neural networksUlyanikhin, E. I.; Ульянихин, Е. И.
2020Carnivalization As a Way of Transmitting Socio-cultural Experience in the Era of Post-literacyVladimirova, N.; Kolmakova, Y.; Mezentsev, Y.; Mosienko, L.; Solomina, N.
2020Cryptographic methods of information protectionTsyganov, I.; Цыганов, И. А.
2021Data vulnerabilities in interactive systemsBorodashkina, E. A.; Бородашкина, Е. А.
2020Ensuring data security in enterprise networksMartynov, A. S.; Мартынов, А. С.
2021Information security from spywarePestov, M. A.; Пестов, М. А.
2021Information technology infrastructure security in cyberattacksPritchin, I. R.; Притчин, И. Р.
2018IT-технологии на службе востоковедения: Telegram-подобные мессенджеры Bale, Sorush, Eitaa как источники аутентичного информационного контента по ИрануФаткулин, Б. Г.; Fatkulin, B. G.
2020Machine learning in information security fieldUlyanikhin, E.; Ульянихин, Е. И.
2020Modern methods of protection against insider threatsBushuev, A.; Бушуев, А. О.
2020NFC technology and its information securityKhudiakova, E.; Худякова, Е. А.
2021NFC technology and its information securityKhudiakova, E.; Худякова, Е. А.
2020Organizational measures of information security from industrial espionagePestov, M.; Kovaleva, A. G.; Пестов,, М.
2012Principles of prediction of information protection in the communication networkLidskii, E. A.; Mikhaleva, U. A.
2015Providing of the information security of the schoolchildren’s thinking culturePuzikova, S. M.; Tsao Jang
2021Threats to the information security of ordinary users’ electronic devicesDyachkov, V. N.; Дьячков, В. Н.
2021The use of computer forensics methods in the investigation of money laundering crimesPermyakova, E. A.; Пермякова, Е. А.
2020Wireshark: more advantages than disadvantagesKazenas, G. V.; Казенас, Г. В.