MODERN VIEW ON THE INTERPRETATION OF THE CONCEPT OF CYBERSECURITY Язык Английский Подробнее о MODERN VIEW ON THE INTERPRETATION OF THE CONCEPT OF CYBERSECURITYРусский
THE PRACTICE OF USING AN AUTOMATED METHOD FOR MODELING INFORMATION SECURITY THREATS Язык Английский Подробнее о THE PRACTICE OF USING AN AUTOMATED METHOD FOR MODELING INFORMATION SECURITY THREATSРусский
REVIEW OF REGULATORY AND LEGAL ACTS TO ENSURE THE SECURITY OF CRITICAL INFORMATION INFRASTRUCTURE Язык Английский Подробнее о REVIEW OF REGULATORY AND LEGAL ACTS TO ENSURE THE SECURITY OF CRITICAL INFORMATION INFRASTRUCTUREРусский
REVIEW OF REGULATORY AND LEGAL ACTS TO ENSURE THE SECURITY OF CRITICAL INFORMATION INFRASTRUCTURE Язык Английский Подробнее о REVIEW OF REGULATORY AND LEGAL ACTS TO ENSURE THE SECURITY OF CRITICAL INFORMATION INFRASTRUCTUREРусский
BUSINESS GAME AS A CONDITION FOR THE FORMATION OF PROFESSIONAL COMPETENCIES OF FUTURE INFORMATION SECURITY SPECIALISTS Язык Английский Подробнее о BUSINESS GAME AS A CONDITION FOR THE FORMATION OF PROFESSIONAL COMPETENCIES OF FUTURE INFORMATION SECURITY SPECIALISTSРусский
MODELING OF INFORMATION SECURITY THREATS BASED ON THE THREAT BANK OF THE FEDERAL SERVICE FOR TECHNICAL AND EXPORT CONTROL OF RUSSIA Язык Английский Подробнее о MODELING OF INFORMATION SECURITY THREATS BASED ON THE THREAT BANK OF THE FEDERAL SERVICE FOR TECHNICAL AND EXPORT CONTROL OF RUSSIAРусский
AN OVERVIEW OF THE MODERN APPROACH OF SECURITY OF CRITICAL INFORMATION INFRASTRUCTURE Язык Английский Подробнее о AN OVERVIEW OF THE MODERN APPROACH OF SECURITY OF CRITICAL INFORMATION INFRASTRUCTUREРусский
APPROACHES TO THE JUSTIFICATION OF INVESTMENTS IN INFORMATION SECURITY Язык Английский Подробнее о APPROACHES TO THE JUSTIFICATION OF INVESTMENTS IN INFORMATION SECURITYРусский
FEATURES OF INFORMATION PROTECTION WITH REMOTE ACCESS Язык Английский Подробнее о FEATURES OF INFORMATION PROTECTION WITH REMOTE ACCESSРусский