-
21
Information security of the region: Approaches to consideration and economic essence
Published 2023-05-01Subjects: “…information; information resources; information security; information technologies; threat; danger…”
Get full text
Article -
22
Suggestion on establishing curriculum system for information security major
Published 2016-07-01Subjects: “…information security…”
Get full text
Article -
23
FUTURE TRENDS OF FORMATION OF THE INTERNATIONAL REGIME ON THE PROVISION OF INFORMATION SECURITY
Published 2016-08-01Subjects: “…information security…”
Get full text
Article -
24
Application of big data technology in enterprise information security management
Published 2025-01-01Subjects: Get full text
Article -
25
Training of information security undergraduate in the education mode of cyberspace security
Published 2019-06-01“…How to ensure quality of information security undergraduate training under the mode of general education was discussed.Based on the in-depth analysis of the characteristics and knowledge structure of information security specialty,some targeted solutions were put forward,such as the integration of specialized courses,the cultivation of security thinking,and the Internet + flipped classroom teaching mode.…”
Get full text
Article -
26
Analysis and Protection for Information Security Event of Communication Industry User
Published 2013-08-01Subjects: “…information security…”
Get full text
Article -
27
THE RUSSIAN’S DIGITAL SOVEREIGNTY AS A TECHNICAL BASIS OF INFORMATION SECURITY
Published 2016-12-01Get full text
Article -
28
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01Subjects: “…information security…”
Get full text
Article -
29
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01Subjects: “…information security…”
Get full text
Article -
30
Methodology and software development for auditing information security management systems
Published 2022-12-01Subjects: Get full text
Article -
31
Main threats to the state’s interests in the sphere of information security of Ukraine
Published 2024-03-01Subjects: “…information security…”
Get full text
Article -
32
Research on metrics models for cloud services information security evaluation
Published 2016-07-01Subjects: Get full text
Article -
33
The Study of Methods for Penetration Testing in Training of Information Security Specialists
Published 2016-12-01“…The article deals with issues related to the creation of modern educational virtual laboratory under cloud cluster platform OpenNebula for the training of specialists in the field of information security and computer security. The use of such laboratories allows teaching methods of penetration testing on examples of objects of different levels of difficulty, and also provides the possibility of rapid changes in infrastructure and characteristics of the objects.…”
Get full text
Article -
34
Shaping the future of commercial quantum computer and the challenge for information security
Published 2016-03-01Get full text
Article -
35
Research on Information Security Mechanism Used in Network Video Surveillance System
Published 2013-08-01“…Information security mechanism is a key part of security network video surveillance system,including service data security and multimedia data security,and there are a lot of security solutions and specifications now.Two typical specifications on the network video surveillance system were selected to analyze their information security mechanism and the encryption algorithm,and the suggestions on common data protection mechanism were given out.…”
Get full text
Article -
36
Social diagnostics of information security of digital society: methodological and regulatory aspects
Published 2020-02-01Subjects: Get full text
Article -
37
Method for Information Security Events Detection in a Cloud Signature Systems
Published 2024-06-01Subjects: Get full text
Article -
38
Discuss on cultivating mode of information security and law inter-disciplinary talents
Published 2019-06-01Subjects: Get full text
Article -
39
Perception technology of virtual threat for large enterprise's information security construction
Published 2016-12-01Subjects: “…information security…”
Get full text
Article -
40
Research on professional learning margin of university information security teachers in China
Published 2017-07-01Subjects: “…information security…”
Get full text
Article