Issue |
Title |
No 36 (2020) |
ONE OF THE APPROACHES TO COMPUTER ATTACKS’ RECOGNITION WHEN IMPLEMENTING THE STATE’S INFORMATION FUNCTION ON THE INTERNAL LEVEL |
|
Volkov S.D., Tsaregorodtsev A.V. |
No 36 (2020) |
DETERMINING THE SAMPLE LENGTH OF THE ELECTRONIC LETTERS MODEL |
|
Korelov S.V., Petrov A.M., Rotkov L.Y., Gorbunov A.A. |
No 24 (2017) |
MODEL OF IDENTIFICATION OF INFORMATION LEAKS CHANNELS IN AUTOMATED SYSTEMS BASED ON THE SYMPLEX METHOD |
|
Shaburov A.S., Zhurilova E.E. |
No 3 (2014) |
PRACTICAL APPLICATION OF VMWARE VSHIELD APP FOR SAFETY VIRTUAL WEB SERVER |
|
Shaburov A.S., Rashevskiy R.B. |
No 1 (2016) |
ANALYSIS OF GUIDE TO ICS SECURITY TO IDENTIFY THE TYPICAL VULNERABILITIES |
|
Kamenskih A.N., Bortnik D.A. |
No 33 (2020) |
ANNIVERSARY OF THE «AUTOMATION AND TELEMECHANICS» DEPARTMENT: HISTORY, PEOPLE, PROGRESS, PERSPECTIVES |
|
Zanevskii E.S., Freyman V.I., Yuzhakov A.A. |
No 20 (2016) |
DEVELOPMENT OF AN AUTOMATED SECURE ENTERPRISE INFORMATION SYSTEM |
|
Grosheva E.A., Gusev I.V., Dmitriev V.N., Ilichev K.V., Kulikov S.V., Mancerov S.A., Panov A.Y. |
No 21 (2017) |
ON THE DEVELOPMENT OF THE EDUCATIONAL-LABORATORY STAND FOR THE BUILDING OF INFORMATION SECURITY SYSTEMS BASED ON THE CRYPTOGRAPHIC SECURITY DATA DEVICE «CRYPTON» |
|
Shaburov A.S., Mironova A.A. |
1 - 8 of 8 Items |
|