Creation, use, and deployment of digital information
In this book - notions from three different areas: how digital information has to be designed, how artifacts or systems containing digital content should maximize usability, how context can influence the nature and efficiency of digital communication.
Подобные документы
Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.
книга, добавлен 08.03.2014Features a combination of different approaches to work with sets of objects, their classes to the design and development of artificial intelligence systems to analyze information using object-oriented programming. Determining properties of object class.
статья, добавлен 28.02.2016Problems of security of biometric authentication systems and analysis of the author's approach to increasing their reliability. Features and conditions of use of these systems for the security of information resources, their advantages and disadvantages.
статья, добавлен 06.05.2018Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.
лабораторная работа, добавлен 17.03.2016The article deals with problems of a different nature that arise in any type of business activity with insufficient attention to the removal or concealment of the information contained in the metadata of various documents. Various types of documents.
статья, добавлен 16.01.2024- 81. Modern trends of cybercrime in the context of economic security, social and humanitarian aspects
The of information technologies were identified, the results of the poll of the respondents on the subject of cybercrime were demonstrated, the ways of combating cybercrime in the of strengthening information and security at the macro-level were proposed.
статья, добавлен 24.10.2018 Design and research of mathematical model for information security system in computer network. Science intensive technology. Modeling of security and risk assessment in information and communication system. Information and computer network technologies.
статья, добавлен 27.05.2021Analyze, manage and present spatial or geographic data and provide a technological process for their collection, storage, processing, visualization, exchange, distribution and practical use. Stages of development of geographic information systems.
статья, добавлен 11.03.2019Intellectual information systems as hybrid neural networks. Using the topology of neural networks based on a fuzzy perceptron, ANFIS, TSK, Wang & Mendel’s network to solve diagnostic problems in medicine. Influence of the fuzzy rule on output signal.
статья, добавлен 22.12.2016The article pays attention to the requirements for information support for controlling the operational activities of trade enterprises: significance, completeness, reliability, timeliness, comprehensibility, relevance, comparability and efficiency.
статья, добавлен 14.09.2022Procedures for collecting information. The difference between qualitative and quantitative information. Technical characteristics of reliability and validity. Reduction or averaging of non-systematic fluctuations in appraisers, objects and tools.
статья, добавлен 23.09.2018The concept features and nature of IT piracy and effect of information society on the emergence and spread of piracy on the Internet. Problems of the spread and speed of persistent violations, commission of acts of piracy, plagiarism in the Internet.
статья, добавлен 08.05.2018Study of the activities of leading companies operating in the global information technology market in the context of the transnationalization of international business. The current trends in the development of international production are determined.
статья, добавлен 19.08.2020Система PDH (Plesiochronous Digital Hierarchy) как одна из первых систем, предназначенных для передачи информации в цифровом виде на большие расстояния. Схема мультиплексирования европейской системы, анализ и оценка ее главных преимуществ и недостатков.
реферат, добавлен 02.12.2013Пользовательская задача, решаемая при помощи продукта, оздоровительная и развлекательная функции. Целевая аудитория для разрабатываемого приложения. Сервисы и платформы с похожими развлекательными контентами. Идея программного продукта, его монетизация.
презентация, добавлен 01.12.2019A number of different techniques that people can use to hide information. The sound files and images that float about the network today. Measuring and encrypting information. Error correction and white noise. Analysis of hiding information in JPEG files.
книга, добавлен 08.03.2014История развития PDA (Personal Digital Assistant). Различия персональных помощников - платформы Palm OS, Windows CE, EPOC. Преимущества и недостатки карманных ПК в сравнении с подобными устройствами. Промышленные карманные ПК и беспроводные коммуникации.
реферат, добавлен 31.03.2014Mathematical model of transformation of stochastic and fuzzy information in quantum information in the form of multiplication of unitary operators from not commutative von Neumann group. Theoretical basis of information technologies of quantum-logic.
статья, добавлен 29.01.2016Definition of information security. Methods and means of information protection. Access Control - information protection regulation of the use of all resources of IP and IT. Protection of data and programs from unauthorized access, copying, modification.
реферат, добавлен 04.04.2016Средства разработки офисных приложений: платформы Digital, IBM, Apple, Hewlett-Packard, суперкомпьютеры. Наиболее распространенные конфигурации PC. Характеристика вариантов конфигурации контроллеров. Использование ЭВМ в различных сферах жизнедеятельности.
курсовая работа, добавлен 12.11.2017Простой алгоритм вывода линии. Положительные черты прямого вычисления. Алгоритм ЦДА - Цифрового Дифференциального Анализатора (Digital Differential Analyzer). Общие требования к изображению отрезка. Алгоритм Брезенхема. Недостатки симметричного алгоритма.
презентация, добавлен 26.07.2013The basics of cryptography: encryption and decryption, its classification, as well as explanations the terminology and technology you will encounter as you use PGP products. Understanding digital signature, passphrase, key splitting and technical details.
учебное пособие, добавлен 08.03.2014Quantum coherence and information processing. Expectation values and the von Neumann projection. Quantum relative and conditional entropies. Information and the foundations of physics. Application quantum coding, error detection, and correction.
книга, добавлен 08.03.2014История развития PDA (Personal Digital Assistant). Разница между персональными помощниками Palm OS, Windows CE и EPOC. Преимущества и недостатки карманных ПК по сравнению с другими подобными устройствами. Беспроводные коммуникации и оборудование для них.
курсовая работа, добавлен 09.04.2010Вплив NFT на цифрове мистецтво та його значення для культури загалом. Дослідження цифрових торгових майданчиків як культурного феномену та формування особливого простору комунікації між митцями. Опис творів мистецтва, які створені з використанням NFT.
статья, добавлен 26.07.2023