Zobrazeno 1 - 10
of 34
pro vyhledávání: '"information threat"'
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 49, Iss 4, Pp 52-57 (2023)
Objective. This paper considers protection against threats that occur more often in the period from the start of the operating system boot. Consideration of various configurations will allow an overview of a fairly wide range of situations that arise
Externí odkaz:
https://doaj.org/article/45bbcbf8eeae45b7b20c0c0883a3930e
Publikováno v:
Nauka ta progres transportu, Iss 5(95), Pp 27-35 (2021)
Purpose. The research is aimed at gaining general knowledge about modern anti-virus software. Because it is one aspect of cybersecurity, and is subject to ongoing discussions about its appropriateness. Methodology. To obtain data, the authors conduct
Externí odkaz:
https://doaj.org/article/de114a5fd7dc4e74a6e993c7a7856ecf
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 47, Iss 1, Pp 72-85 (2020)
Abstract. Aim Important contemporary trends in the theory and functional practice of secure automated systems at informatisation facilities of internal affairs bodies include an increase in the number of threats realised through remote unauthorised a
Externí odkaz:
https://doaj.org/article/0d2de7a02a3c4fa7ae4a06e295946153
Publikováno v:
Безопасность информационных технологий, Vol 27, Iss 1, Pp 40-50 (2020)
The paper presents the results of the analysis of threats implemented through remote unauthorized access (UA) (network attacks) to the information resource of automated systems (AS) at the objects of Informatization of internal Affairs bodies (ATS),
Externí odkaz:
https://doaj.org/article/18326122512940338c4fdc4fde16c01e
Autor:
Wang, Chen
Publikováno v:
Journal of Consumer Marketing, 2019, Vol. 36, Issue 6, pp. 784-793.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/JCM-08-2018-2835
Publikováno v:
Вісник Національної академії керівних кадрів культури і мистецтв / National Academy of Managerial Staff of Culture and Arts Herald. (1):81-85
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=819540
Autor:
Fehler, Włodzimierz
Publikováno v:
Przegląd Strategiczny / Strategic Review. V(8):81-99
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=425815
Publikováno v:
Scientific works of National Aviation University. Series: Law Journal "Air and Space Law"; Vol. 3 No. 64 (2022); 78-86
Научные труды Национального авиационного университета. Серия: Юридический вестник "Воздушное и космическое право»; Том 3 № 64 (2022); 78-86
Наукові праці Національного авіаційного університету. Серія: Юридичний вісник «Повітряне і космічне право»; Том 3 № 64 (2022); 78-86
Научные труды Национального авиационного университета. Серия: Юридический вестник "Воздушное и космическое право»; Том 3 № 64 (2022); 78-86
Наукові праці Національного авіаційного університету. Серія: Юридичний вісник «Повітряне і космічне право»; Том 3 № 64 (2022); 78-86
The aim of the article is a comprehensive legal and information technology analysis of the concepts of «information security», «cybersecurity» to justify the approach to creating a central definition in the field of information security and impro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=aviationuniv::37d2d60505e92def0d7ff563b74f8e18
https://jrnl.nau.edu.ua/index.php/UV/article/view/16893
https://jrnl.nau.edu.ua/index.php/UV/article/view/16893
Publikováno v:
Юрислингвистика; № 24 (35) (2022): Юрислингвистика; 38-44
Legal Linguistics; No 24 (35) (2022): Legal Linguistics; 38-44
Legal Linguistics; No 24 (35) (2022): Legal Linguistics; 38-44
This article considers information threats in trash content in order to develop a system of media security in the digital environment. The methodological basis of this work was the analytical philosophical tradition along with such general scientific
Publikováno v:
Vestnik Dagestanskogo Gosudarstvennogo Tehničeskogo Universiteta: Tehničeskie Nauki, Vol 47, Iss 1, Pp 72-85 (2020)
Aim Important contemporary trends in the theory and functional practice of secure automated systems at informatisation facilities of internal affairs bodies include an increase in the number of threats realised through remote unauthorised access (net