Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Vasyl P. Oleksiuk"'
Autor:
Bohdan M. Oliinyk, Vasyl P. Oleksiuk
Publikováno v:
Освітній вимір (2024)
The article considers the actual problem of information security - social engineering. The authors investigate what social engineering is and its main methods, including phishing, vishing, baiting, and pretexting, and analyze the educational programs
Externí odkaz:
https://doaj.org/article/39f02c399c6d455d81622d0c97bd5a59
Autor:
Nadiia R. Balyk, Yaroslav Ph. Vasylenko, Vasyl P. Oleksiuk, Olesia R. Oleksiuk, Galina P. Shmyger
Publikováno v:
CTE Workshop Proceedings, Vol 11 (2024)
This paper explores using the university’s corporate cloud to teach some Cisco Network Academy courses, a common feature of many universities. The paper presents two cloud labs based on the open-source platforms Apache CloudStack and EVE-NG Communi
Externí odkaz:
https://doaj.org/article/4be45b8c58eb420dbf3c91a7eaf10ece
Publikováno v:
CTE Workshop Proceedings, Vol 10 (2023)
This article delves into the contemporary tendencies shaping the development of digital educational environments in universities and proposes a model for their implementation in pedagogical institutions. The study analyzes the concept of educational
Externí odkaz:
https://doaj.org/article/7f2b07be1f564fba9dde6c6b2f444392
Autor:
Vasyl P. Oleksiuk, Olesia R. Oleksiuk
Publikováno v:
Educational Technology Quarterly, Vol 2022, Iss 4 (2022)
The phenomenon of augmented reality (AR) in education is examined in the article. The use of computer data in augmented reality (AR) enhances the physical world. Such content is associated with particular places or things to do. Applications for augm
Externí odkaz:
https://doaj.org/article/b02ee4c194874ae6aca6bef39d79ec96
Autor:
Olena S. Holovnia, Vasyl P. Oleksiuk
Publikováno v:
CTE Workshop Proceedings, Vol 9 (2022)
The article provides a survey on cloud platforms suitable for a virtual online laboratory, which contains Linux online environments and is intended to support the Operating Systems course. The study justifies the choice of utilizing private cloud as
Externí odkaz:
https://doaj.org/article/c2851d88549949a78c5684b3a02ae116
Publikováno v:
Освітній вимір, Vol 4 (2021)
The article is devoted to the analysis of foreign experience in determining the criteria for assessing the effectiveness of scientific and pedagogical research. Thus, the problems of qualified analysis of the source base and reproducibility of resear
Externí odkaz:
https://doaj.org/article/f3857ccf4ef34be0b609398d8c7922da
Autor:
Vasyl P. Oleksiuk, Olesia R. Oleksiuk, Oleg M. Spirin, Nadiia R. Balyk, Yaroslav P. Vasylenko
Publikováno v:
CTE Workshop Proceedings, Vol 8 (2021)
The article is devoted to the systematization of experience in the deployment, maintenance and servicing of the private academic cloud. The article contains model of the authors’ cloud infrastructure. It was developed at Ternopil Volodymyr Hnatiuk
Externí odkaz:
https://doaj.org/article/c30fac31326e47acabab74ecdac3c73f
Autor:
Vasyl P. Oleksiuk, Olesia R. Oleksiuk
Publikováno v:
CTE Workshop Proceedings, Vol 7 (2020)
The article deals with the problem of training future computer science teachers for the use of cloud technologies. The authors analyzed courses from leading universities to study cloud technologies. On this basis the model of application and studying
Externí odkaz:
https://doaj.org/article/3b1d9909afff469d9294f11f4c81173d
Autor:
Vasyl P. Oleksiuk, Olesia R. Oleksiuk
Publikováno v:
Інформаційні технології і засоби навчання, Vol 62, Iss 6, Pp 277-291 (2017)
In the article there are explored the concepts of cybersecurity and information security. It is proved that cybersecurity can’t be fully ensured without teaching to principles and rules of information security. The authors have analyzed the specifi
Externí odkaz:
https://doaj.org/article/2f7acd269b7340d9a5925db2c66ca8d3
Autor:
Vasyl P. Oleksiuk, Olesia R. Oleksiuk
Publikováno v:
ResearcherID
Інформаційні технології і засоби навчання, Vol 62, Iss 6, Pp 277-291 (2017)
Інформаційні технології і засоби навчання, Vol 62, Iss 6, Pp 277-291 (2017)
In the article there are explored the concepts of cybersecurity and information security. It is proved that cybersecurity can’t be fully ensured without teaching to principles and rules of information security. The authors have analyzed the specifi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::59ad058ffdd15503e0aa3d8a8d637c76
http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcAuth=ORCID&SrcApp=OrcidOrg&DestLinkType=FullRecord&DestApp=WOS_CPL&KeyUT=WOS:000419751900021&KeyUID=WOS:000419751900021
http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcAuth=ORCID&SrcApp=OrcidOrg&DestLinkType=FullRecord&DestApp=WOS_CPL&KeyUT=WOS:000419751900021&KeyUID=WOS:000419751900021