Practical cryptography
The study and practice information Illustration of simple cipher. Cryptography as to encryption, the process of converting ordinary information into unintelligible gibberish. Decryption is the reverse, moving from unintelligible ciphertext to plaintext.
Подобные документы
Justification of the proposals for the creation of new areas of library service along with traditional service, using modern information and communication technologies, and assigning a special place to these areas in the training of specialists.
статья, добавлен 09.01.2024An integrated approach to the study of different kinds of virus attacks that are launched against wireless networks and computer systems. Characteristics of certificate programs provide protective mechanisms and practical tools for information security.
книга, добавлен 08.03.2014Трудоемкость создания модели Building information modeling, потеря существующих рабочих практик при переходе на новую технологию. Характеристика прямых и косвенных недостатков Building information modeling, направленность на архитектурные проблемы.
статья, добавлен 29.07.2017The study of the sequence of stages of reconstruction of graphical images on a computer using decoding dual vectors of the tuple. Decoding code values in software components. Ways of coding information. Methods of the decrypting computer codes cost.
статья, добавлен 25.03.2016Universal device for the processing, transmission, exchange and storage of information. Role of computer in modern life. The spread of the Internet and its using in common life. Embodiment of achievements of modern information technologies in real life.
презентация, добавлен 21.06.2015The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.
статья, добавлен 01.11.2021Characteristics of information and communication technologies. History of the creation of a computer system. Classification operating system: DOS, Windows, Unix, Linux, Mac OS. Databases management systems: the concept, characteristics, architecture.
курс лекций, добавлен 20.10.2016The article pays attention to the requirements for information support for controlling the operational activities of trade enterprises: significance, completeness, reliability, timeliness, comprehensibility, relevance, comparability and efficiency.
статья, добавлен 14.09.2022Suggestion information model of environment of computer-aided design, consisting of a сontrol processor, thematic coprocessors and executing processors. The scheme of processors control in the information model. Interaction of thematic coprocessors.
статья, добавлен 22.12.2016Text description of the main processes running in the dealer. Overview of Incadea enterprise software solutions at the global automotive retail market. Analysis of the information system correspondence to existed business-processes in the company.
реферат, добавлен 20.03.2016The article analyzes the application of information technologies to the analysis of the stock market, namely to the study of the dynamics of the Ukrainian currency exchange rate, which will allow us to draw a conclusion about the market as a whole.
статья, добавлен 25.11.2023The current state of application and development of cloud computing, the main advantages and disadvantages of their use in the states, enterprises and in scientific activity. Guidance documents in the field of cloud computing information security.
статья, добавлен 23.10.2020Question classification extracts useful information. Mathematical Machinery and Document Processing. State of the Art Query-based Summarization and Question Answering Systems. Answering Simple and Complex Questions, their experimental evaluation.
дипломная работа, добавлен 22.07.2016The questions of energy efficiency of information systems. The study of existing methods to reduce energy consumption at the program level. A new approach to the development of energy-efficient software that passes through its entire life cycle.
статья, добавлен 30.01.2016Information technologies for working with knowledge bases are considered, and a description of the concepts of Knowledge Management and "Business Intelligence" is given. The classification of knowledge is given. according to different categories of signs.
статья, добавлен 04.09.2022The concept features and nature of IT piracy and effect of information society on the emergence and spread of piracy on the Internet. Problems of the spread and speed of persistent violations, commission of acts of piracy, plagiarism in the Internet.
статья, добавлен 08.05.2018The development of the knowledge society, digital technologies, digital society, all that is called the "digital era" of civilization. In the modern world, a new interpretation of the information society, namely smart-society and technologies, has spread.
статья, добавлен 09.04.2022Consideration of various information security standards in the Russian commercial organizations. Methods of data protection. Potential application of international standards in information security activities of the Russian commercial organization.
статья, добавлен 13.02.2016Designing technological processes for information support for decision-making in integrated modular avionics for modern aircraft is a complex multi-stage procedure. The implementation of which involves the cooperation of aviation industry enterprises.
статья, добавлен 11.07.2022Actions of the world governments and world organizations for identifying the current state of modern trends in the cybersecurity field. Structured information about the status of modern trends in the field of cybersecurity and information protection.
статья, добавлен 27.05.2021Various aspects of multimedia content encryption. His general performance and the fundamental techniques. The common encryption techniques, including complete, partial and compression-combined encryption, will be investigated, analyzed and evaluated.
книга, добавлен 08.03.2014Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.
статья, добавлен 29.09.2016Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.
статья, добавлен 14.01.2017- 124. Amorphic encryption
Proposed a new concept of keyless encryption, "Amorphic scheme", which is semantically secured and has "Perfect Secrecy" level. Briefly run on well-known cryptographic attacks in order to clearly show how strong the amorphic encryption concept is.
статья, добавлен 18.02.2021 Search for opportunities to ensure the security of the state in view of the formation of a new field of confrontation - cyberspace. Consideration of factors influencing the country's cybersecurity situation and protection of information objects.
статья, добавлен 18.09.2020