2025-02-22T10:42:21-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: Query fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22oai%3Aojs2.nuclear-journal.com%3Aarticle-191%22&qt=morelikethis&rows=5
2025-02-22T10:42:21-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: => GET http://localhost:8983/solr/biblio/select?fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22oai%3Aojs2.nuclear-journal.com%3Aarticle-191%22&qt=morelikethis&rows=5
2025-02-22T10:42:21-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: <= 200 OK
2025-02-22T10:42:21-05:00 DEBUG: Deserialized SOLR response
Комп’ютерна безпека інформаційних та керуючих систем АЕС: документи, що обґрунтовують комп’ютерну безпеку
The approaches to the development and management of computer security justification documents on computer security policy, program and plan, computer incident response plan, reports related to computer security are considered in the paper. Requirements for computer security policy, program and plan...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | Ukrainian |
Published: |
State Scientific and Technical Center for Nuclear and Radiation Safety
2019
|
Online Access: | https://nuclear-journal.com/index.php/journal/article/view/191 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!