Zobrazeno 1 - 10
of 48
pro vyhledávání: '"A. P. Durakovskiy"'
Publikováno v:
Безопасность информационных технологий, Vol 23, Iss 4, Pp 12-15 (2016)
None of the critically important facilities can operate without the engineered safety system. Functionally varied security networks or a fire alarm system can refer to this system as well as safety and reliability which are provided by secured energy
Externí odkaz:
https://doaj.org/article/34478fdf1b454fb99191b3f7e33952e5
Autor:
A. P. Durakovskiy, V. R. Petrov
Publikováno v:
Безопасность информационных технологий, Vol 19, Iss 1, Pp 95-97 (2012)
The aim is to prove the qualification system of access control systems (ACS) as an information system for personal data (ISPDn). Applications: systems of physical protection of facilities.
Externí odkaz:
https://doaj.org/article/080f95e238844bf99db2fd360fdf68da
Publikováno v:
Безопасность информационных технологий, Vol 17, Iss 2, Pp 16-18 (2010)
The theorem of system of indicators for an estimation of the security of information processes in the computer systems is formulated and proved. A number of the signs is proved, allowing to consider set of the indicators of efficiency of counteractio
Externí odkaz:
https://doaj.org/article/1b01111c73c64eb58ec4829105f6e409
Autor:
E. E. Tsitsulin, A. P. Durakovskiy
Publikováno v:
Безопасность информационных технологий, Vol 19, Iss 1, Pp 132-133 (2012)
The paper is devoted to the question of authentication of individuals by voice, its advantages and disadvantages. The development of authentication technologies on the individual voice of the contact-difference method is examined as well.
Externí odkaz:
https://doaj.org/article/86c8378fa70b4720b079a15f8ef27e95
Autor:
A. A. Machuev, A. P. Durakovskiy
Publikováno v:
Безопасность информационных технологий, Vol 18, Iss 1, Pp 112-113 (2011)
The work is devoted to the automation of the process of the analysis and verification of various formats of data presentation for what the special software is developed. Working out and testing the special software were made on an example of files wi
Externí odkaz:
https://doaj.org/article/af63c783a76a417db7baa2a5cbe8d6d4
Publikováno v:
Безопасность информационных технологий, Vol 17, Iss 1, Pp 61-62 (2010)
Projects of developed federal state educational standards of the higher vocational education of the new (third) generation from the point of view of requirements to level of knowledge, abilities and practical competence of experts (bachelors, magiste
Externí odkaz:
https://doaj.org/article/d3b1fc354c204d829f3ff49a30146551
Autor:
M. S. Chistiakov, A. P. Durakovskiy
Publikováno v:
Безопасность информационных технологий, Vol 18, Iss 1, Pp 130-130 (2011)
The object of special researches is means of manufacturing and reproduction of documents, from the point of view of possibility of interception of the information processed on them the malefactor using channels of the compromising radiations.
Externí odkaz:
https://doaj.org/article/b6cf333c4edf428dbb328b30d9425656
Publikováno v:
Безопасность информационных технологий, Vol 29, Iss 4, Pp 42-52 (2022)
When building multi-level information protection both in the public and in the private sector, it is necessary to take the measures aimed at preventing threats to information security. Cyberphysical systems, as a means of communication, are actively
Externí odkaz:
https://doaj.org/article/35dfe55111b44695adb8d2a858936809
Publikováno v:
Безопасность информационных технологий, Vol 28, Iss 3, Pp 6-27 (2021)
Today in Russia the active work is going on the implementation of a relatively new mechanism of state regulation in the field of information security, which is legally defined as ensuring the security of significant objects of critical information in
Externí odkaz:
https://doaj.org/article/d0fdab2c5bc24b9d8b1582fd1ae3d9e6
Publikováno v:
Bezopasnostʹ Informacionnyh Tehnologij, Vol 28, Iss 3, Pp 6-27 (2021)
Today in Russia the active work is going on the implementation of a relatively new mechanism of state regulation in the field of information security, which is legally defined as ensuring the security of significant objects of critical information in