Partisans go cyber: the hacker ethic and partisans’ legacy

Peculiarities of hackers and hacktivists' participation in modern hybrid conflicts. Analysis of "localization" of hactivist activity on the example of the Belarusian group "Cyber Partisans". Significance of partisan themes for modern Belarusian identity.

Подобные документы

  • The definition of Green-orientation of modern CAD systems to optimize FPGA-projects on energy consumption based on the activity signals of the scheme. Method of estimation of FPGA-project in the distribution of the dynamic component of power consumption.

    статья, добавлен 23.02.2016

  • To introduce digital strategic concept of modern Ukrainian society in the context of the breakthrough changes development. To form a new digital thinking taking into account the new digital culture in order to counteract the negative technologies.

    статья, добавлен 14.04.2022

  • Methods of classification of correlation extremal navigation systems, geophysical fields. The block diagram of CENS, which works in risk conditions. Dependence of posteriori probability on the quantity of key points and total error of its determination.

    статья, добавлен 26.06.2016

  • Analysis of the extended euclidean algorithm. Analysis of operations in the residue class ring. Structure of the multiplicative group of residues mod a prime number. Symmetric and asymmetric cryptosystems. Compression functions from encryption functions.

    книга, добавлен 08.03.2014

  • The possibility of forming an algorithm that allows reconstructing the lost works of easel painting by outstanding masters of the Ancient world is being investigated. The study used methods of computer modeling and analysis, which increased accuracy.

    статья, добавлен 04.09.2022

  • Analysis of the features of teaching communication technologies, directions of application of information and communication technologies in the educational process, the purpose of modern technologies, the main advantages of the introduction of ICT.

    статья, добавлен 22.07.2022

  • Conducting a comprehensive study of tools intended for modeling and digitization of business processes. Proving the importance of using infographics for better visualization and perception by specialists of individual details of the business process.

    статья, добавлен 08.01.2024

  • Reported from a basic introduction to block cipher design and analysis. The tiny encryption algorithm. The study a concepts and design principles of block ciphers. Notation some binary operations of addition. Modern block cipher cryptanalysis methods.

    статья, добавлен 08.03.2014

  • The role of analysis in enterprise management. An overview of the workflow methods used to solve cloud-based enterprise operations management tasks. Substantiation of the relevance of the introduction of cloud technologies based on serverless computing.

    статья, добавлен 22.02.2023

  • The concept of e-learning, its advantages, flexibility of time and place in comparison with formal learning. Creation of a hybrid information system that integrates computer vision and machine learning technologies for visual and interactive systems.

    статья, добавлен 10.05.2018

  • Robots as mechanical assistants of a person who are able to perform operations based on the program, embedded in them, and respond to the environment. Acquaintance with the transhumanist significance of robotics. Analysis of the scope of robots.

    презентация, добавлен 03.04.2018

  • Основные функции системы PSItms. Создание базы для стандартизации и оптимизации процессов в глобальной логистической сети с целью получения максимального дохода. Изучение программного инструмента PSIglobal. Главные преимущества и недостатки PSI Group.

    реферат, добавлен 02.11.2020

  • Major machine translation methods designed to speed up the process of multilingual text translation by using a computer software. Analysis of the performance of rule-based machine translation, statistical models, hybrid and neural machine translation.

    статья, добавлен 16.08.2022

  • Архивация и сжатие графических данных для растровой и векторной графики. Алгоритмы сжатия данных RLE, CCITT Group 3, CCITT Group 4, LZW, ZIP, JPEG, их достоинства и недостатки, а также сфера применения. Понижение и повышение разрешения растрового файла.

    реферат, добавлен 06.04.2015

  • Cryptology from the romans to world war II. Word perfect encryption as a modern example. Exchanging keys with and without a public key. Key management and authentication in GSM networks. The end of the crypto-monopoly and the role of politics today.

    книга, добавлен 08.03.2014

  • A bird's-eye view of modern cryptography. Preliminaries and Defining security in cryptography. Elementary number theory and algebra background. Approximations using partial Greatest common divisors computations. Birthday-based algorithms for functions.

    книга, добавлен 08.03.2014

  • The possibility of a revolutionary breakthrough in the field of health care and medicine when using artificial intelligence. The use of complex statistical and mathematical tools and multidimensional data, which increases the probability of errors.

    статья, добавлен 19.03.2024

  • The role of the corporate network in the modern infrastructure of the organization, identification and selection. Implementation of the communication in distributed networks, encapsulation in distributed. Packet switching technology - frame relay.

    дипломная работа, добавлен 30.06.2015

  • Criteria for desirable cryptographic systems and protocols. Security properties for authenticated key establishment. Standard notation of mathematical foundations. Classical ciphers: usefulness and security. The optimal asymmetric encryption padding.

    книга, добавлен 13.03.2014

  • The role of information technology in human life. The use of personal computers, television monitors, slide projectors, videodisc players, multimedia systems and the Internet. Office furniture. Communication in organizations. As for color harmony.

    контрольная работа, добавлен 04.03.2016

  • Arithmetic and number theory in C and C++. The fundamental operations in programs. Modular arithmetic: calculating with residue classes. Addition chains and windows. Cryptographic application of exponentiation. A modern the data encryption standard.

    книга, добавлен 08.03.2014

  • Peculiarities of the reception of the figure of M. Hrushevsky in cyberspace, the frequency of searching for information about him in the search engine Google, in the largest digital encyclopedia Wikipedia. Analysis of requests regarding M. Hrushevskyi.

    статья, добавлен 28.07.2023

  • A computational complexity based theory of modern encryption. Generating pseudo-random bit or number sequences. Generic encryption with pseudorandom functions. Problems with deterministic encryption in general. Required properties for digital cash.

    книга, добавлен 08.03.2014

  • The development of mobile versions of official websites, creation of special programs, registration and constant support of official pages in social networks are revealed. Organization of independent work of engineers and teachers of computer profile.

    статья, добавлен 22.08.2021

  • The of information technologies were identified, the results of the poll of the respondents on the subject of cybercrime were demonstrated, the ways of combating cybercrime in the of strengthening information and security at the macro-level were proposed.

    статья, добавлен 24.10.2018

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.