MODERN VIEW ON THE INTERPRETATION OF THE CONCEPT OF CYBERSECURITY Language English Read more about MODERN VIEW ON THE INTERPRETATION OF THE CONCEPT OF CYBERSECURITYРусский
THE PRACTICE OF USING AN AUTOMATED METHOD FOR MODELING INFORMATION SECURITY THREATS Language English Read more about THE PRACTICE OF USING AN AUTOMATED METHOD FOR MODELING INFORMATION SECURITY THREATSРусский
REVIEW OF REGULATORY AND LEGAL ACTS TO ENSURE THE SECURITY OF CRITICAL INFORMATION INFRASTRUCTURE Language English Read more about REVIEW OF REGULATORY AND LEGAL ACTS TO ENSURE THE SECURITY OF CRITICAL INFORMATION INFRASTRUCTUREРусский
REVIEW OF REGULATORY AND LEGAL ACTS TO ENSURE THE SECURITY OF CRITICAL INFORMATION INFRASTRUCTURE Language English Read more about REVIEW OF REGULATORY AND LEGAL ACTS TO ENSURE THE SECURITY OF CRITICAL INFORMATION INFRASTRUCTUREРусский
BUSINESS GAME AS A CONDITION FOR THE FORMATION OF PROFESSIONAL COMPETENCIES OF FUTURE INFORMATION SECURITY SPECIALISTS Language English Read more about BUSINESS GAME AS A CONDITION FOR THE FORMATION OF PROFESSIONAL COMPETENCIES OF FUTURE INFORMATION SECURITY SPECIALISTSРусский
MODELING OF INFORMATION SECURITY THREATS BASED ON THE THREAT BANK OF THE FEDERAL SERVICE FOR TECHNICAL AND EXPORT CONTROL OF RUSSIA Language English Read more about MODELING OF INFORMATION SECURITY THREATS BASED ON THE THREAT BANK OF THE FEDERAL SERVICE FOR TECHNICAL AND EXPORT CONTROL OF RUSSIAРусский
AN OVERVIEW OF THE MODERN APPROACH OF SECURITY OF CRITICAL INFORMATION INFRASTRUCTURE Language English Read more about AN OVERVIEW OF THE MODERN APPROACH OF SECURITY OF CRITICAL INFORMATION INFRASTRUCTUREРусский
APPROACHES TO THE JUSTIFICATION OF INVESTMENTS IN INFORMATION SECURITY Language English Read more about APPROACHES TO THE JUSTIFICATION OF INVESTMENTS IN INFORMATION SECURITYРусский
FEATURES OF INFORMATION PROTECTION WITH REMOTE ACCESS Language English Read more about FEATURES OF INFORMATION PROTECTION WITH REMOTE ACCESSРусский