Тechnology of security confidential information from inside threats
The review of methods and program means of security confidential information in particular Information Protection and Control (IPC) – the technologies of security confidential information from inside threats are carried out. The methods of control of technical channels of leakeg with help of technol...
Saved in:
| Date: | 2025 |
|---|---|
| Main Authors: | Antoniuk, A.A., Portyanoy, V.S., Shylin, V.P. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
PROBLEMS IN PROGRAMMING
2025
|
| Subjects: | |
| Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/800 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Problems in programming |
| Download file: | |
Institution
Problems in programmingSimilar Items
-
Development of a spiral model of life cycle of the program systems
by: Alekseev, V.A., et al.
Published: (2015) -
Towards a possible Background for Synthesis of Programs with Reassignment of the non-monotone deductive System
by: Prihodko, P.P.
Published: (2015) -
Применение статистических моделей в инженерии качества процессов производства программных систем
by: Matveeva, L.Е., et al.
Published: (2015) -
Relations of logical consequence in composition nominative logics
by: Shkilnyak, S.S.
Published: (2025) -
Variability assurance mechanisms in Software Product Line
by: Kolesnik, A.L.
Published: (2025)