NFC ??????
??????? ???????? NFC ?????? – ???????????? ????, ??????? ???????? ??????? ?? ??????? ???????. ???????????? NFC, ??????? ???????????????? ??? Near Field Communication, ?? ???? ????????? "???????????? ???????? ????". ???????? ??????? ???????? ?????????.
Подобные документы
Description of martial law, compliance conditions. Analysis of regulatory legal acts and judicial practice in the field of information protection under martial law. Features of ensuring information security in Ukraine as a direction of state policy.
??????, добавлен 08.08.2021The basic ways of education informatization are examined; the requirements for educational ICT and presented. The basic information technologies used in the teaching process are summarized: interactive; computer-based learning; telecommunication means.
??????, добавлен 04.10.2022A problem of binary pseudo random sequences creation of cryptographic security system for sequences of maximal length, with static characteristics. The questions of Galois and Fibonacci of creation primitive matrices random size over the simple field.
??????, добавлен 22.12.2016Theory and practice for integrating strong security features into modern communications and computer applications. Efficient hardware implementations and speed software for embedded systems, smart cards, microprocessors, hardware and software security.
???? ??????, добавлен 08.03.2014Especially the use of simulators to create a network for conducting research in the field of computer networking. Research simulators (Ns-2, O?net, PacketTracer, etc.), their comparison on the basis of performance IP networking with the security settings.
??????, добавлен 25.12.2016The basic tendencies of development of mobile marketing in Ukraine are considered. The development of Internet marketing. The advantages of hybrid mobile applications, the essence of their use, as one of the modern means of communication for business.
??????, добавлен 10.10.2018An elementary technique which leads to a linear algorithm for solving the discrete logarithm problem on elliptic curves of trace one. Using elliptic curves in cryptography to eliminate curves whose group orders are equal to the order of the finite field.
??????, добавлен 15.09.2012The problem of digital inequality, imbalance in the use of digital technologies in the public sector at central and local levels is analyzed. Features of intellectual communication of power and society in the context of global informatization in Ukraine.
??????, добавлен 19.02.2021Analysis of the prospects for using artificial intelligence technologies in the field of photo processing. Research of modern technologies and AI methods that are used in processing photo materials. Review of areas of AI use in image processing.
??????, добавлен 08.06.2024Information system research in historic perspective. Research scope on digital transformation. Depicting countries for software trade comparison analysis. Digital transformation conditions in Russia. Japanese school in information system research field.
???????????, добавлен 01.09.2018Digital technologies in the field of personnel selection - the use of automated systems, various web resources and information systems for the digitalization of personnel selection processes. ATS (Applicant Tracking System) - applicant tracking system.
??????, добавлен 21.03.2024The article deals with the notion of concept and cognitive conceptual components in the Internet users' names. The basis conceptual spheres and concrete concepts created by the Internet users in the process of communication have been identified.
??????, добавлен 09.05.2020Design and research of mathematical model for information security system in computer network. Science intensive technology. Modeling of security and risk assessment in information and communication system. Information and computer network technologies.
??????, добавлен 27.05.2021
