Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Victor Sergeevich Gorbatov"'
Publikováno v:
Безопасность информационных технологий, Vol 20, Iss 1, Pp 43-48 (2013)
The paper is devoted to the analysis of the problem of comparison of security scanners computer network. A common comprehensive assessment of security control is developed on the base of comparative analysis of data security controls. We have tested
Externí odkaz:
https://doaj.org/article/5cafd3aa31a9403ebc64af4b67acdf4e
Publikováno v:
Безопасность информационных технологий, Vol 20, Iss 4, Pp 27-29 (2013)
This paper is devoted to research special materials transportation control effectiveness in real time by using data exchange optimization in mobile communication complexes.
Externí odkaz:
https://doaj.org/article/a51e2e9739734d21b3af85f8ceeaa9a2
Autor:
Victor Sergeevich Gorbatov, Tatiana Aleksandrovna Kondratieva, Alexey Alexandrovich Meshcheriakov
Publikováno v:
Безопасность информационных технологий, Vol 22, Iss 2 (2015)
The paper considers the problem of application virtualization technology for test automation software and hardware protection of information.
Externí odkaz:
https://doaj.org/article/1096f09549484158b84a2feee5ae8031
Autor:
Victor Sergeevich Gorbatov, Tatiana Aleksandrovna Kondratieva, Alexey Aleksandrovich Meshcheriakov
Publikováno v:
Безопасность информационных технологий, Vol 22, Iss 1 (2015)
In practice when designing complex IT-systems the known challenge is to solve the problem of multi-criteria analysis analysis of alternatives in order to select the most preferred choices of specific hardware and software for protection of large sets
Externí odkaz:
https://doaj.org/article/ab04b86f382b451a94d7a49a716f30ca
Publikováno v:
Безопасность информационных технологий, Vol 22, Iss 1 (2015)
The paper considers the problem of application virtualization technology for test automation software and hardware protection of information.
Externí odkaz:
https://doaj.org/article/4d09aca5d0ed4ac998841c0a4814d49d
Autor:
Victor Sergeevich Gorbatov, Sergey Vladimirovich Dvoryankin, Anatoly Petrovich Durakovskiy, Vladislav Romanovich Petrov
Publikováno v:
Безопасность информационных технологий, Vol 20, Iss 3, Pp 104-105 (2013)
The aim of this paper is to research ways to use a trusted communications session in E-learning systems for the objective confidence in the results of training.
Externí odkaz:
https://doaj.org/article/dc1203f9fed543af9e4d3b8959935dc7
Publikováno v:
Безопасность информационных технологий, Vol 20, Iss 1, Pp 94-95 (2013)
The aim of this paper is to research the characteristics of the recognition of the users in E-learning systems and to explain the use of the combined method on basis of the known means of identification and authentication.
Externí odkaz:
https://doaj.org/article/db16110f6e544960a93f6b2729551adb
Publikováno v:
Bezopasnostʹ Informacionnyh Tehnologij, Vol 26, Iss 1, Pp 77-86 (2019)
In accordance with the legislation on transport security, a number of vehicles must be equipped with on-Board control devices containing a cryptographic means of authentication, registration and storage of control data, including key information of t
Publikováno v:
Automatic Control and Computer Sciences. 52:1065-1070
This paper describes the protocol for generating a master key for a system for exchanging fiscal features, generating a fiscal feature key with authentication of the means for generating and verifying fiscal features that are installed on the fiscal
Publikováno v:
Bezopasnostʹ Informacionnyh Tehnologij, Vol 25, Iss 2, Pp 86-105 (2018)
This article addresses the problem of security threats while working with web portals built on the Open Journal Systems platform. The Open Journal Systems (OJS) platform was originally developed as part of the Public Knowledge Project and it is one o