Creation, use, and deployment of digital information

In this book - notions from three different areas: how digital information has to be designed, how artifacts or systems containing digital content should maximize usability, how context can influence the nature and efficiency of digital communication.

Подобные документы

  • Usage of the term Anonymous on imagebords, particularly the board of chan, dedicated to random content. Idea of exposing corruption within the system. Limiting information and enlarging author rights. Hacked many oil companies servers in order.

    ???????????, добавлен 19.12.2014

  • The possibility of forming an algorithm that allows reconstructing the lost works of easel painting by outstanding masters of the Ancient world is being investigated. The study used methods of computer modeling and analysis, which increased accuracy.

    ??????, добавлен 04.09.2022

  • Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.

    ?????, добавлен 08.03.2014

  • Features a combination of different approaches to work with sets of objects, their classes to the design and development of artificial intelligence systems to analyze information using object-oriented programming. Determining properties of object class.

    ??????, добавлен 28.02.2016

  • Problems of security of biometric authentication systems and analysis of the author's approach to increasing their reliability. Features and conditions of use of these systems for the security of information resources, their advantages and disadvantages.

    ??????, добавлен 06.05.2018

  • Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.

    ???????????? ??????, добавлен 17.03.2016

  • The article deals with problems of a different nature that arise in any type of business activity with insufficient attention to the removal or concealment of the information contained in the metadata of various documents. Various types of documents.

    ??????, добавлен 16.01.2024

  • The of information technologies were identified, the results of the poll of the respondents on the subject of cybercrime were demonstrated, the ways of combating cybercrime in the of strengthening information and security at the macro-level were proposed.

    ??????, добавлен 24.10.2018

  • Design and research of mathematical model for information security system in computer network. Science intensive technology. Modeling of security and risk assessment in information and communication system. Information and computer network technologies.

    ??????, добавлен 27.05.2021

  • Theoretical and methodological research based on big data. Social consequences caused by inequality in access to data. Ethical issues arising from the collection and analysis of large data sets. Application of big data analytics in various research areas.

    ??????, добавлен 11.03.2025

  • Analyze, manage and present spatial or geographic data and provide a technological process for their collection, storage, processing, visualization, exchange, distribution and practical use. Stages of development of geographic information systems.

    ??????, добавлен 11.03.2019

  • Intellectual information systems as hybrid neural networks. Using the topology of neural networks based on a fuzzy perceptron, ANFIS, TSK, Wang & Mendel’s network to solve diagnostic problems in medicine. Influence of the fuzzy rule on output signal.

    ??????, добавлен 22.12.2016

  • The article pays attention to the requirements for information support for controlling the operational activities of trade enterprises: significance, completeness, reliability, timeliness, comprehensibility, relevance, comparability and efficiency.

    ??????, добавлен 14.09.2022

  • Procedures for collecting information. The difference between qualitative and quantitative information. Technical characteristics of reliability and validity. Reduction or averaging of non-systematic fluctuations in appraisers, objects and tools.

    ??????, добавлен 23.09.2018

  • The concept features and nature of IT piracy and effect of information society on the emergence and spread of piracy on the Internet. Problems of the spread and speed of persistent violations, commission of acts of piracy, plagiarism in the Internet.

    ??????, добавлен 08.05.2018

  • Study of the activities of leading companies operating in the global information technology market in the context of the transnationalization of international business. The current trends in the development of international production are determined.

    ??????, добавлен 19.08.2020

  • ??????? PDH (Plesiochronous Digital Hierarchy) ??? ???? ?? ?????? ??????, ??????????????? ??? ???????? ?????????? ? ???????? ???? ?? ??????? ??????????. ????? ??????????????????? ??????????? ???????, ?????? ? ?????? ?? ??????? ??????????? ? ???????????.

    ???????, добавлен 02.12.2013

  • ???????????????? ??????, ???????? ??? ?????? ????????, ??????????????? ? ??????????????? ???????. ??????? ????????? ??? ???????????????? ??????????. ??????? ? ????????? ? ???????? ???????????????? ??????????. ???? ???????????? ????????, ??? ???????????.

    ???????????, добавлен 01.12.2019

  • A number of different techniques that people can use to hide information. The sound files and images that float about the network today. Measuring and encrypting information. Error correction and white noise. Analysis of hiding information in JPEG files.

    ?????, добавлен 08.03.2014

  • Mathematical model of transformation of stochastic and fuzzy information in quantum information in the form of multiplication of unitary operators from not commutative von Neumann group. Theoretical basis of information technologies of quantum-logic.

    ??????, добавлен 29.01.2016

  • ??????? ???????? PDA (Personal Digital Assistant). ???????? ???????????? ?????????? - ????????? Palm OS, Windows CE, EPOC. ???????????? ? ?????????? ????????? ?? ? ????????? ? ????????? ????????????. ???????????? ????????? ?? ? ???????????? ????????????.

    ???????, добавлен 31.03.2014

  • Definition of information security. Methods and means of information protection. Access Control - information protection regulation of the use of all resources of IP and IT. Protection of data and programs from unauthorized access, copying, modification.

    ???????, добавлен 04.04.2016

  • ???????? ?????????? ??????? ??????????: ????????? Digital, IBM, Apple, Hewlett-Packard, ???????????????. ???????? ???????????????? ???????????? PC. ?????????????? ????????? ???????????? ????????????. ????????????? ??? ? ????????? ?????? ?????????????????.

    ???????? ??????, добавлен 12.11.2017

  • ??????? ???????? ?????? ?????. ????????????? ????? ??????? ??????????. ???????? ??? - ????????? ????????????????? ??????????? (Digital Differential Analyzer). ????? ?????????? ? ??????????? ???????. ???????? ??????????. ?????????? ????????????? ?????????.

    ???????????, добавлен 26.07.2013

  • The basics of cryptography: encryption and decryption, its classification, as well as explanations the terminology and technology you will encounter as you use PGP products. Understanding digital signature, passphrase, key splitting and technical details.

    ??????? ???????, добавлен 08.03.2014

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.