Partisans go cyber: the hacker ethic and partisans’ legacy

Peculiarities of hackers and hacktivists' participation in modern hybrid conflicts. Analysis of "localization" of hactivist activity on the example of the Belarusian group "Cyber Partisans". Significance of partisan themes for modern Belarusian identity.

Подобные документы

  • A computational complexity based theory of modern encryption. Generating pseudo-random bit or number sequences. Generic encryption with pseudorandom functions. Problems with deterministic encryption in general. Required properties for digital cash.

    книга, добавлен 08.03.2014

  • The development of mobile versions of official websites, creation of special programs, registration and constant support of official pages in social networks are revealed. Organization of independent work of engineers and teachers of computer profile.

    статья, добавлен 22.08.2021

  • The of information technologies were identified, the results of the poll of the respondents on the subject of cybercrime were demonstrated, the ways of combating cybercrime in the of strengthening information and security at the macro-level were proposed.

    статья, добавлен 24.10.2018

  • A review of the philosophical problems of the creation of intelligent machines in the context of modern studies of artificial intelligence and cognitive robotics. The choice of creating artificial consciousness in the machine or the cyborgization of man.

    статья, добавлен 20.07.2018

  • Secret stories, codes, and cryptogram puzzles. Historical background to the conspiracy stories. Caesar/shift ciphers. Hints to help crack the cryptograms and puzzles. Answers to all cryptograms, their assignment and application in modern practice.

    учебное пособие, добавлен 08.03.2014

  • In this article the author describes the all functions and features of SCRUM method, its roles (master, owner and team). It is observed the advantages of this methodology before others. The detailed description of SCRUM work is presented in this article.

    статья, добавлен 18.08.2018

  • The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.

    статья, добавлен 15.04.2024

  • Stages of treatment of phonology, morphology and syntax. The semantic structure of the disambiguation of ambiguous words in context. The distribution of vector representations in modern computer linguistics to simulate the semantic relationships of words.

    магистерская работа, добавлен 27.08.2016

  • The article outlines the urgent problems of the protection and preservation of cultural heritage objects. It is emphasized that of the priority areas of modern monument protection work is the transmission to future generations the historical knowledge.

    статья, добавлен 21.04.2020

  • Justification of the proposals for the creation of new areas of library service along with traditional service, using modern information and communication technologies, and assigning a special place to these areas in the training of specialists.

    статья, добавлен 09.01.2024

  • The structure of an information security program. Creation and implementation of policies and standards. Activity of federal sentencing guidelines for criminal convictions. System and network access control. Conducting a business impact analysis.

    книга, добавлен 08.03.2014

  • This history on key moments of evolution electronic digital computer: the transformation of the computer from a specialized scientific instrument to a commercial product; the beginning of personal computing and the spread of networking after 1980s.

    книга, добавлен 25.11.2013

  • The article provides guidance on choosing cloud-based ML and data science solutions that meet operational strategies and crisis management needs. Further research is encouraged to examine the long-term effects on business innovation and market dynamics.

    статья, добавлен 20.07.2024

  • The elements of computer security. Cryptography approaches and attacks. An advanced encryption standard. Key generation and distribution approaches and attacks. The qualities of workable security solutions. The trusted platform module at biometrics.

    книга, добавлен 08.03.2014

  • From the Riddles of Ancient Egypt to Cryptography in the Renaissance — 3500 Years in the Making. Three Post-Renaissance Centuries. Symmetric-Key and Public-Key Cryptography. Electronic Mail and Internet Security. Noncryptographic Security Issues.

    книга, добавлен 08.03.2014

  • Possibilities and features of artificial neural networks. Areas of practical application of artificial neural networks. Voice interface distribution and visual serach. Learning neural networks. The following visualization. Direct error propagation.

    презентация, добавлен 06.02.2019

  • Понятие и сущность стандартов оформления кода. Основные виды стилей форматирования в языке Си. Составление программы анализа исходного текста на языке C++, форматирования на основе выбранного шаблона. Описание интерфейса программы и алгоритма решения.

    дипломная работа, добавлен 18.09.2016

  • General characteristics of the comparator model of text correspondence and objective situations described by them. Acquaintance with the most important tasks of the theory of intelligence. Analysis of functional and target models of intellectual activity.

    статья, добавлен 11.10.2018

  • Review digital communication and traditional computer-based technologies. The European Telecommunications Standards Institute. Computer and network hardware and software. Features of use of information and communication technologies in modern society.

    презентация, добавлен 06.02.2017

  • The article deals with problems of a different nature that arise in any type of business activity with insufficient attention to the removal or concealment of the information contained in the metadata of various documents. Various types of documents.

    статья, добавлен 16.01.2024

  • Reveal and compare modern methods of information search in digital environment. Characterization of the features of the rapid development of information technologies, which shapes spheres of human life, as well as the process of information provision.

    статья, добавлен 22.03.2023

  • Research of aspects of information protection procedure development on the basis of software development. Characteristics of the Raspberry PI platform and the Raspbian system. Possibilities of influence of third-party means on management of object.

    статья, добавлен 29.10.2020

  • Theory and practice for integrating strong security features into modern communications and computer applications. Efficient hardware implementations and speed software for embedded systems, smart cards, microprocessors, hardware and software security.

    курс лекций, добавлен 08.03.2014

  • Research of digitalization as the leading global trend of modern economic development. Promising areas of IT application in agricultural enterprises. The place of online IT services in the innovative renewal of the crop production industry in Ukraine.

    статья, добавлен 30.08.2022

  • Methods, tools and applications of Data Mining. Basic concepts of data warehouses and the place of Data Mining in their architecture. The process of data analysis using this technology, its stages. Analytical software market, product data capabilities.

    статья, добавлен 30.10.2020

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.