Anonymous
Usage of the term Anonymous on imagebords, particularly the board of chan, dedicated to random content. Idea of exposing corruption within the system. Limiting information and enlarging author rights. Hacked many oil companies servers in order.
Подобные документы
Procedures for collecting information. The difference between qualitative and quantitative information. Technical characteristics of reliability and validity. Reduction or averaging of non-systematic fluctuations in appraisers, objects and tools.
статья, добавлен 23.09.2018The Random Oracle Model and the Ideal Cipher Model Are Equivalent. Programmable Hash Functions and Their Applications. Adaptive One-Way Functions and Applications. Bits Security of the Elliptic Curve Diffie–Hellman Secret Keys. Cryptanalysis of MinRank.
книга, добавлен 08.03.2014Assessment of fire threat in Ukraine. Creation of an information database of classes of fire protection of buildings and premises. Prediction of the spread of fire in time and space. Modeling the behavior and movement of people in an emergency situation.
статья, добавлен 22.12.2016Reducing the amount of required memory, reducing the time for data processing and reducing the number of copies of documents when updating information in the automation process. Analysis of the choice of technologies for application development.
статья, добавлен 31.08.2022Factors influencing the use of Internet. Question about adoption of the learning management system in schools. The possibility for using computers and Internet for educational purposes. Software application for delivery of learning content to students.
статья, добавлен 25.10.2016The description of the mechanisms of learning and assessment of the quality of the classifier of the developed system of the automated processing of large amounts of information. The classifier based on the LibSVM library and the support vector machine.
статья, добавлен 25.12.2016Reveal and compare modern methods of information search in digital environment. Characterization of the features of the rapid development of information technologies, which shapes spheres of human life, as well as the process of information provision.
статья, добавлен 22.03.2023Finding Small Solutions to Univariate and Bivariate Polynomial Congruences. The RSA Public Key Cryptosystem. Coppersmith Attack on Short Random Pads. Cryptanalysis via the Defining Equation. The Lattice Factoring Method. Improved Determinant Bounds.
диссертация, добавлен 08.03.2014A random access memory. Examples of peripheral devices: expansion card, video card, image scanners, tape drives, microphones, speakers, web and digital cameras. Network or shared printers. Print three-dimensional objects. Printing 3D models from STL file.
реферат, добавлен 09.12.2014Research of aspects of information protection procedure development on the basis of software development. Characteristics of the Raspberry PI platform and the Raspbian system. Possibilities of influence of third-party means on management of object.
статья, добавлен 29.10.2020Distance learning using spreadsheets. The introduction of Excel-documents in electronic educational resources. Access to information resources of various types using the "cloud" services. Design and implementation of the "ExcelReader" software module.
статья, добавлен 05.04.2019A number of different techniques that people can use to hide information. The sound files and images that float about the network today. Measuring and encrypting information. Error correction and white noise. Analysis of hiding information in JPEG files.
книга, добавлен 08.03.2014Mathematical model of transformation of stochastic and fuzzy information in quantum information in the form of multiplication of unitary operators from not commutative von Neumann group. Theoretical basis of information technologies of quantum-logic.
статья, добавлен 29.01.2016Exploring different ways of assessing the value of hard currency. Calculating the hard currency exchange rate using a stack of technologies already used in the company. Distribution of income for game content. Improved dashboards for game producers.
курсовая работа, добавлен 17.07.2020Definition of information security. Methods and means of information protection. Access Control - information protection regulation of the use of all resources of IP and IT. Protection of data and programs from unauthorized access, copying, modification.
реферат, добавлен 04.04.2016Quantum coherence and information processing. Expectation values and the von Neumann projection. Quantum relative and conditional entropies. Information and the foundations of physics. Application quantum coding, error detection, and correction.
книга, добавлен 08.03.2014Crypto applications of combinatorial group theory. Generating rooted trees of nodes uniformly at random. Designs, strongly regular graphs and codes constructed from some primitive groups. Quantum jump codes and some related combinatorial designs.
учебное пособие, добавлен 08.03.2014Information technology - a broad class of disciplines and areas of activity related to technology creation, preservation, management and processing of data, including the use of computer technology. The information technology industry. Search engine.
презентация, добавлен 16.02.2015Digital signatures: background and definitions. Cryptographic hardness assumptions and constructions based on general assumptions, signature schemes based on the (strong) RSA assumption. The random oracle model and full-domain hash (related) schemes.
книга, добавлен 08.03.2014The inverse Box-Muller transform, which allows you to transform a random sequence of Gaussian type into the corresponding sequence with a uniform distribution law. A two-stage scheme for testing statistically independent random variables using π-Test
статья, добавлен 07.11.2018Information Retrieval as finding material of an unstructured nature that satisfies an information need from within large collections. Unstructured (text) and structured (database) data in 1996 and 2006. Basic assumptions of Information Retrieval.
презентация, добавлен 19.02.2014Classical and quantum physics and information theory. Von Neumann entropy and relevant measures. Accessible classical and quantum information. Data processing. Real-life applications of information theory. A commercial quantum cryptographic device.
книга, добавлен 15.09.2012Choice relationship database system, a cloud platform and a software platform for implementing and deploying the relational database system, resource and service agents; software module market risk. User interface for outputting the received information.
курсовая работа, добавлен 12.08.2018The goal of the paper is to obtain a system of target operation indicators, which provide unique identification of the system process with the ability to solve structural and parametric optimization problems in the framework of the controlled system.
статья, добавлен 30.10.2016Studying the possibility of using the Greenstone system to create an integrated digital tourist library for the city of Petra. A survey of students' opinions about the materials and information that should be included in the digital tourism library.
статья, добавлен 15.03.2023