2025-02-22T17:12:57-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: Query fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22oai%3Aojs2.nuclear-journal.com%3Aarticle-59%22&qt=morelikethis&rows=5
2025-02-22T17:12:57-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: => GET http://localhost:8983/solr/biblio/select?fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22oai%3Aojs2.nuclear-journal.com%3Aarticle-59%22&qt=morelikethis&rows=5
2025-02-22T17:12:57-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: <= 200 OK
2025-02-22T17:12:57-05:00 DEBUG: Deserialized SOLR response
Комп’ютерна безпека інформаційних та керуючих систем АЕС: заходи захисту від комп’ютерних загроз
The main principles and methods of protection against computer threats, methodology used for computer security, policy, plan and computer security program are considered in the paper. The recommendations on the application of protective measures against computer threats in Ukraine depending on a com...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
State Scientific and Technical Center for Nuclear and Radiation Safety
2017
|
Online Access: | https://nuclear-journal.com/index.php/journal/article/view/59 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The main principles and methods of protection against computer threats, methodology used for computer security, policy, plan and computer security program are considered in the paper. The recommendations on the application of protective measures against computer threats in Ukraine depending on a computer security degree are made. The paper presents the analysis of different approaches to computer security assurance described in documents of the International Atomic Energy Agency, U.S. Nuclear Regulatory Commission and International Electrotechnical Commission. |
---|