Cybersecurity and Protection of Accounting Data under Conditions of Modern Information Technology
Saved in:
| Date: | 2019 |
|---|---|
| Main Author: | Yu. M. Popivniak |
| Format: | Article |
| Language: | English |
| Published: |
2019
|
| Series: | Business Inform |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001046616 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Ensuring Cybersecurity in the Era of Artificial Intelligence: Analysis of Technological Approaches and Strategies for Information Protection
by: O. B. Yashchyk, et al.
Published: (2024)
by: O. B. Yashchyk, et al.
Published: (2024)
Protecting the Accounting Information in the Conditions of Outsourcing with Use of the Information-Computer Technologies
by: H. I. Liakhovych
Published: (2017)
by: H. I. Liakhovych
Published: (2017)
The principles of institutional and functional support of cybersecurity in modern conditions
by: S. V. Hurzhii
Published: (2021)
by: S. V. Hurzhii
Published: (2021)
Features of the logistics system of national cybersecurity Ukraine in modern conditions
by: V. V. Petrov, et al.
Published: (2017)
by: V. V. Petrov, et al.
Published: (2017)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Information Technology in the Computer Systems of Accounting: Issues of Organizing the Data and Data Streams
by: O. V. Adamyk
Published: (2016)
by: O. V. Adamyk
Published: (2016)
Assessment of implementation of the cybersecurity strategy of Ukraine taking into account the experience of European and world practices
by: M. V. Hutsaliuk
Published: (2019)
by: M. V. Hutsaliuk
Published: (2019)
Protection of Intellectual Property under Conditions of the Information Society Development
by: E. Kokhanovska, et al.
Published: (2021)
by: E. Kokhanovska, et al.
Published: (2021)
Informative Function of Accounting and Information Technology Systems
by: Wyslocka, E.
Published: (2007)
by: Wyslocka, E.
Published: (2007)
The cybersecurity modeling in critical infrastructures
by: H. Kravtsov, et al.
Published: (2015)
by: H. Kravtsov, et al.
Published: (2015)
The cybersecurity modeling in critical infrastructures
by: Kravtsov, H., et al.
Published: (2015)
by: Kravtsov, H., et al.
Published: (2015)
Cybersecurity in the Electric Power Systems of Ukraine
by: Yu. H. Kutsan, et al.
Published: (2019)
by: Yu. H. Kutsan, et al.
Published: (2019)
Data protection and information security of insurance companies
by: O. Y. Zhabynets
Published: (2014)
by: O. Y. Zhabynets
Published: (2014)
Information and data protection within a RDBMS
by: Khmelevsky, Y.
Published: (2008)
by: Khmelevsky, Y.
Published: (2008)
Organisational Grounds of Development of the Accounting Systems of Budget Institutions under Modern Conditions
by: N. M. Khorunzhak
Published: (2013)
by: N. M. Khorunzhak
Published: (2013)
Information Technology for Trajectory Data Mining
by: M. Sydorova, et al.
Published: (2021)
by: M. Sydorova, et al.
Published: (2021)
Location of accounting in information technology of management of trading company
by: M. M. Benko
Published: (2011)
by: M. M. Benko
Published: (2011)
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: A. I. Semenchenko, et al.
Published: (2020)
by: A. I. Semenchenko, et al.
Published: (2020)
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020)
by: Semenchenko, A.I., et al.
Published: (2020)
Accounting Policy in Managing the Activity of Enterprises under the Conditions of Harmonization of Accounting and Reporting
by: Yu. Shevtsiv, et al.
Published: (2020)
by: Yu. Shevtsiv, et al.
Published: (2020)
Technology system integration of hardware and software data protection
by: Alishоv, N.I., et al.
Published: (2025)
by: Alishоv, N.I., et al.
Published: (2025)
Fuzzing technique and its usage in cybersecurity tasks
by: O. O. Letychevskyi, et al.
Published: (2022)
by: O. O. Letychevskyi, et al.
Published: (2022)
Cybersecurity and means of preventing and combating to cybercrime and cyberterorrism
by: P. D. Bilenchuk, et al.
Published: (2018)
by: P. D. Bilenchuk, et al.
Published: (2018)
Semantic Indexing and Cluster Analysis of Cybersecurity Documents
by: Ланде, Д. В., et al.
Published: (2024)
by: Ланде, Д. В., et al.
Published: (2024)
Network and economic component of financial cybersecurity indices
by: Turchynov, Oleksandr, et al.
Published: (2025)
by: Turchynov, Oleksandr, et al.
Published: (2025)
Methods of Assessment of Variants of Technical and Technological Renovation under Modern Conditions
by: L. M. Shevchuk
Published: (2013)
by: L. M. Shevchuk
Published: (2013)
Information technologies assets: identification, integration and reflection in accounting
by: H. V. Nashkerska
Published: (2023)
by: H. V. Nashkerska
Published: (2023)
Priority principles of state cybersecurity policy: organizational and legal aspect
by: Yu. Horun
Published: (2021)
by: Yu. Horun
Published: (2021)
Increase of data protection level for visual information in control systems
by: A. V. Bushma
Published: (2010)
by: A. V. Bushma
Published: (2010)
Increase of data protection level for visual information in control systems
by: Bushma, A.V.
Published: (2010)
by: Bushma, A.V.
Published: (2010)
China's national cybersecurity policy: institutional pressures
by: Yu. H. Shevchenko
Published: (2022)
by: Yu. H. Shevchenko
Published: (2022)
Administrative and legal protection of critical information infrastructure in cyberspace modern
by: Yu. P. Lisovska
Published: (2019)
by: Yu. P. Lisovska
Published: (2019)
The Features of the Use of Innovative Technologies under Modern Conditions in the Hotel and Restaurant Business
by: Yu. V. Kovtunenko, et al.
Published: (2020)
by: Yu. V. Kovtunenko, et al.
Published: (2020)
Cybersecurity of NPP Instrumentation and Control Systems: Risks Assessment
by: A. A. Symonov, et al.
Published: (2022)
by: A. A. Symonov, et al.
Published: (2022)
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025)
by: Yevdokymov, S.O.
Published: (2025)
Features of use of information systems and technologies in system of the account and control
by: T. D. Markova, et al.
Published: (2016)
by: T. D. Markova, et al.
Published: (2016)
Methods for the total risk assessment of cybersecurity of critical infrastructure facilities
by: V. V. Mokhor, et al.
Published: (2019)
by: V. V. Mokhor, et al.
Published: (2019)
Information Smartphone Technology for Prediction of Human Health State Under Extreme Environmental Conditions
by: I. I. Ermakova, et al.
Published: (2018)
by: I. I. Ermakova, et al.
Published: (2018)
Formalization of Technological Processes for Accounting and Storage of Information in a Healthcare Institution
by: Kovalenko, O.S., et al.
Published: (2020)
by: Kovalenko, O.S., et al.
Published: (2020)
Noise Immunity Transfer of Protected Data Packets in Informative-efficient Radio Networks
by: B. M. Shevchuk
Published: (2017)
by: B. M. Shevchuk
Published: (2017)
Similar Items
-
Ensuring Cybersecurity in the Era of Artificial Intelligence: Analysis of Technological Approaches and Strategies for Information Protection
by: O. B. Yashchyk, et al.
Published: (2024) -
Protecting the Accounting Information in the Conditions of Outsourcing with Use of the Information-Computer Technologies
by: H. I. Liakhovych
Published: (2017) -
The principles of institutional and functional support of cybersecurity in modern conditions
by: S. V. Hurzhii
Published: (2021) -
Features of the logistics system of national cybersecurity Ukraine in modern conditions
by: V. V. Petrov, et al.
Published: (2017) -
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)