Current US experience in cyber security
Saved in:
| Date: | 2021 |
|---|---|
| Main Authors: | S. M. Stezhko, T. O. Shevchenko |
| Format: | Article |
| Language: | English |
| Published: |
2021
|
| Series: | Information and law |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001253595 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Cyber security as an important factor of ensuring the life of the domestic energy industry
by: S. M. Stezhko, et al.
Published: (2021)
by: S. M. Stezhko, et al.
Published: (2021)
European experience of strengthening cyber security capacities in modern conditions
by: O. M. Kuznietsov
Published: (2021)
by: O. M. Kuznietsov
Published: (2021)
Cyber security of critical infrastructure during cyber warfare
by: Ya. S. Manuilov
Published: (2023)
by: Ya. S. Manuilov
Published: (2023)
Problems of legal regulation and development of cyber security of Ukraine at the current stage
by: O. V. Kostenko
Published: (2019)
by: O. V. Kostenko
Published: (2019)
Current issues of cyber threat risk assessment: analysis of foreign experience
by: O. A. Panchenko
Published: (2021)
by: O. A. Panchenko
Published: (2021)
Features for providing of cyber security
by: M. M. Prysiazhniuk, et al.
Published: (2017)
by: M. M. Prysiazhniuk, et al.
Published: (2017)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
The relationship between information security and cyber security
by: A. V. Tarasiuk
Published: (2019)
by: A. V. Tarasiuk
Published: (2019)
Overview of novels of domestic legislation in the field of cyber security (on the example of the Cyber Security Strategy of Ukraine for 2021 – 2025)
by: Ya. S. Manuilov
Published: (2021)
by: Ya. S. Manuilov
Published: (2021)
Cyber security graph model of information resources
by: A. V. Nesterenko, et al.
Published: (2020)
by: A. V. Nesterenko, et al.
Published: (2020)
Corporate cyber security culture for scientific and research institutions
by: O. D. Dovhan, et al.
Published: (2018)
by: O. D. Dovhan, et al.
Published: (2018)
Combating cyber security threats on a global level
by: O. D. Dovhan, et al.
Published: (2020)
by: O. D. Dovhan, et al.
Published: (2020)
Improving the counter-terrorism system: the US experience
by: V. M. Bokhenko
Published: (2021)
by: V. M. Bokhenko
Published: (2021)
The US military justice system: experience for Ukraine
by: M. V. Belaniuk
Published: (2022)
by: M. V. Belaniuk
Published: (2022)
Securing Ukraine through Cyber Financial Crimes Mitigation
by: P. P. Debbins
Published: (2019)
by: P. P. Debbins
Published: (2019)
Modern Information Policy: The US Experience for Ukraine
by: N. F. Rzhevska
Published: (2024)
by: N. F. Rzhevska
Published: (2024)
Role of securities market in the state economy (US example)
by: V. L. Horbanevych, et al.
Published: (2019)
by: V. L. Horbanevych, et al.
Published: (2019)
Global culture of cyber security In the Syber Srime Rrevention System in Ukraine
by: O. D. Dovhan, et al.
Published: (2018)
by: O. D. Dovhan, et al.
Published: (2018)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Yu. Zubok
Published: (2020)
by: Yu. Zubok
Published: (2020)
Evaluation of Risks of Cyber Security of Information Systemsof Objects of Critical Infrastructure
by: V. V. Mokhor, et al.
Published: (2019)
by: V. V. Mokhor, et al.
Published: (2019)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
The essence and content of the investigation of cyber incidents and cyberattacks by the Security Service of Ukraine units
by: M. V. Kuleshov
Published: (2019)
by: M. V. Kuleshov
Published: (2019)
Advanced information technologies for the training of cyber defence specialists of the security and defence sector of Ukraine
by: O. M. Bashkyrov, et al.
Published: (2024)
by: O. M. Bashkyrov, et al.
Published: (2024)
Some issues of improving state planning in the sphere of cyber security in conditions of hybrid threats
by: S. M. Hriboiedov
Published: (2021)
by: S. M. Hriboiedov
Published: (2021)
Legal regulation of interaction between Security Service of Ukraine and a private sector in the field of providing cyber security
by: N. A. Tkachuk
Published: (2018)
by: N. A. Tkachuk
Published: (2018)
The Experience of Legal Informing in the Globalized World (Case of US Public Law Libraries)
by: O. Pestretsova
Published: (2020)
by: O. Pestretsova
Published: (2020)
Cyber-physical systems
by: A. A. Letichevskij, et al.
Published: (2017)
by: A. A. Letichevskij, et al.
Published: (2017)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: A. V. Davydiuk, et al.
Published: (2021)
by: A. V. Davydiuk, et al.
Published: (2021)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021)
by: Давидюк, А. В., et al.
Published: (2021)
Civic foundation as the factor of local community social development: the US experience as the example for Ukraine
by: O. Yeriemieiev, et al.
Published: (2024)
by: O. Yeriemieiev, et al.
Published: (2024)
Operational analytics as a data monitoring and event management tool of the cyber security management systems
by: A. B. Kachynskyi, et al.
Published: (2021)
by: A. B. Kachynskyi, et al.
Published: (2021)
A mathematical model of cyber security computer network control in power supply of traction substations
by: O. I. Stasiuk, et al.
Published: (2017)
by: O. I. Stasiuk, et al.
Published: (2017)
Ukrainian-US Relations in the Context of U.S. Foreign Policy Priorities
by: S. V. Tolstov
Published: (2019)
by: S. V. Tolstov
Published: (2019)
Legal protection of works generated by artificial intelligence systems: the experience of the EU, the UK and the US
by: M. Shvantner, et al.
Published: (2018)
by: M. Shvantner, et al.
Published: (2018)
Social phenomenology of cyber-communication
by: E. Bataeva
Published: (2011)
by: E. Bataeva
Published: (2011)
Social phenomenology of cyber-communication
by: K. Bataieva
Published: (2011)
by: K. Bataieva
Published: (2011)
Relations between the U.S. and its NATO allies in the field of European security (1958-1961)
by: V. Mikieladze
Published: (2014)
by: V. Mikieladze
Published: (2014)
Methods for assessing the cyber¬security of distributed computer networks of control of electricity consumption of power supply distances
by: A. I. Stasjuk, et al.
Published: (2017)
by: A. I. Stasjuk, et al.
Published: (2017)
The experience of electronic publication of historical sources in the US and Western Europe: overview (1971-2010)
by: H. Papakin
Published: (2015)
by: H. Papakin
Published: (2015)
Probations in US Libraries
by: T. Horbachenko
Published: (1996)
by: T. Horbachenko
Published: (1996)
Similar Items
-
Cyber security as an important factor of ensuring the life of the domestic energy industry
by: S. M. Stezhko, et al.
Published: (2021) -
European experience of strengthening cyber security capacities in modern conditions
by: O. M. Kuznietsov
Published: (2021) -
Cyber security of critical infrastructure during cyber warfare
by: Ya. S. Manuilov
Published: (2023) -
Problems of legal regulation and development of cyber security of Ukraine at the current stage
by: O. V. Kostenko
Published: (2019) -
Current issues of cyber threat risk assessment: analysis of foreign experience
by: O. A. Panchenko
Published: (2021)