Zobrazeno 1 - 10
of 22
pro vyhledávání: '"computer systems and networks"'
Autor:
D. S. Melnyk
Publikováno v:
Вісник Харківського національного університету внутрішніх справ, Vol 102, Iss 3 (Part 2), Pp 144-158 (2023)
The purpose of the study is to clarify the concept of cyber terrorism, its typical features and main forms, and to develop proposals for improving the system of countermeasures. The article highlights modern approaches to defining the content of cybe
Externí odkaz:
https://doaj.org/article/7506356139f844c985586d22a7efae58
Autor:
Radilov, Dimitar
Publikováno v:
Икономика и управление / Economics and Management. 16(2):1-10
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=836480
Autor:
Svetlana Nikoloska
Publikováno v:
Bezbednosni Dijalozi, Vol 8, Iss 1-2, Pp 449-471 (2017)
This paper is aiming to analyze the conditions related to the evident shapes and forms of computer crime as they are incriminated in the Macedonian national legislation, as well as the situation related to discovering, revealing, evidencing, and prev
Externí odkaz:
https://doaj.org/article/440de31e88664ed1b081b9d42328c24b
Autor:
Koch, John R.
Publikováno v:
Freely available online.
Thesis (M.S.)--Missouri University of Science and Technology, 2008.
Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed May 27, 2008) Includes bibliographical references (p. 84-86).
Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed May 27, 2008) Includes bibliographical references (p. 84-86).
Autor:
Oukes, P. R.
Between 2016 and 2018, The Netherlands’ Cadastre, Land Registry and Mapping Agency – in short, Kadaster – successfully renewed the information system supporting its deeds registration. Inspired by action-research principles, the process and res
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::06ce2336c2eeac72c5dd8320baa96d62
Autor:
Fan, Yu.
Publikováno v:
UC access only.
Thesis (Ph. D.)--University of California, Riverside, 2009.
Includes abstract. Title from first page of PDF file (viewed March 8, 2010). Available via ProQuest Digital Dissertations. Includes bibliographical references (p. 130-133). Also issued
Includes abstract. Title from first page of PDF file (viewed March 8, 2010). Available via ProQuest Digital Dissertations. Includes bibliographical references (p. 130-133). Also issued
Autor:
Rostyslav Herasymov, Oksana Tsurkan
Publikováno v:
Collection "Information technology and security". 6:43-50
Information protection in computer systems and networks is focused on preserving its confidentiality properties of, integrity and availability from various inherently adverse impacts. Potentially possible adverse effects are interpreted as a threat.
Autor:
Ivan Kulbovskyi, Halyna Holub
Publikováno v:
Technology Transfer: Fundamental Principles and Innovative Technical Solutions, Vol 2, Pp 12-14 (2018)
The analysis of the current state of power electric equipment of traction substations of railways, power supply systems for traction and control systems based on what was shown that current trends to ensure a high level of efficiency of the power ind
Харевич, Д. Л. О правовой регламентации удаленного осмотра / Д. Л. Харевич // Проблемы оперативно-розыскного обеспечения уголовного процес
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______4240::3b6aed06f3696656dd50ca7d1594e061
Publikováno v:
Processes, Vol 8, Iss 1019, p 1019 (2020)
Processes
Volume 8
Issue 9
Processes
Volume 8
Issue 9
This paper presents the process for creating an integrated design and manufacturing environment supporting 3D printing as part of the structure of Industry 4.0. This process is based on a developed framework for the design of modern automated and com