?????? ITITSM ? ITIL ??? ?????????????? ? ????????? ??????? ?????? Help Desk
????? ?????????? ITIL (Information Technology Infrastructure Library), ??????? ???????? ????????? ?????? ?????????????? ??????????. ???????????? ????????? ?????????? ??????? ??????????? ?????????. ???????? ??????????? ?????????? ??????????? ? ??????????.
Подобные документы
Development of digital technologies in the protection of applications and information. A comparative analysis of the influence of the choice of the direction of the development of cybersecurity. Recommendations for implementing technology development.
??????, добавлен 09.12.2024The advantages of remote access to the information resources of the State treasury service of Ukraine with the aim of automating the process of executing budgets. The implementation of the software and technical complex "Treasury client - Treasury".
??????, добавлен 25.06.2024The structure of an information security program. Creation and implementation of policies and standards. Activity of federal sentencing guidelines for criminal convictions. System and network access control. Conducting a business impact analysis.
?????, добавлен 08.03.2014Peculiarities of implementing methods of cognitive intelligence. Recommendations on the hardware, mathematical and software parts of the approach to the implementation of such systems, indicating the strengths and weaknesses of the chosen methods.
??????, добавлен 16.06.2024A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.
?????, добавлен 08.03.2014Study of the influence of communication technologies on the emotional and mental state of a person. Regularities of the relationship between the sender and the recipient of information. The role of language, text and virtual figures in intercourse.
??????, добавлен 08.01.2024Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.
?????, добавлен 08.03.2014The formation of a common information space. The describing of a new generation of information systems, which are provided the grow and further development of the enterprises and corporate decision-making effectiveness in current economical situation.
??????, добавлен 26.06.2018Information system research in historic perspective. Research scope on digital transformation. Depicting countries for software trade comparison analysis. Digital transformation conditions in Russia. Japanese school in information system research field.
???????????, добавлен 01.09.2018Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.
??????, добавлен 27.10.2020In this book - notions from three different areas: how digital information has to be designed, how artifacts or systems containing digital content should maximize usability, how context can influence the nature and efficiency of digital communication.
?????, добавлен 09.04.2013In this article the author describes the all functions and features of SCRUM method, its roles (master, owner and team). It is observed the advantages of this methodology before others. The detailed description of SCRUM work is presented in this article.
??????, добавлен 18.08.2018- 88. The computer technology of expert rules constraction for the technical objects diagnosis systems
Description of the methods of organizing expert rules for the diagnosis of electrical machines using and without expert information. Correction of rules according to the results of causal observations. Using the intellectual potential of an expert.
??????, добавлен 18.11.2018 Steganographic communication with quantum information. Software integrity checking expressions for robust tamper detection. Exposing digital forgeries through specular highlights on the eye. Imaging sensor noise as digital X-ray for revealing forgeries.
???? ??????, добавлен 08.03.2014The article deals with problems of a different nature that arise in any type of business activity with insufficient attention to the removal or concealment of the information contained in the metadata of various documents. Various types of documents.
??????, добавлен 16.01.2024Disclosure mechanisms that will help to identify lines with Romanian chromatic words on the basis of computer technology, as the first stage in developing the dictionary of poetic meanings of colors. Cooperation of linguists and computer specialists.
??????, добавлен 23.02.2016Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.
??????, добавлен 28.05.2021???????????? ???????? ?????? Building information modeling, ?????? ???????????? ??????? ??????? ??? ???????? ?? ????? ??????????. ?????????????? ?????? ? ????????? ??????????? Building information modeling, ?????????????? ?? ????????????? ????????.
??????, добавлен 29.07.2017Problems of creation and application of the original mechanism of cataloging of digital information resources ISO 15836: 2003. Initiation of multiple metadata Dublin core, which is used for system-wide description of electronic information resources.
??????, добавлен 05.03.2023Analyze, manage and present spatial or geographic data and provide a technological process for their collection, storage, processing, visualization, exchange, distribution and practical use. Stages of development of geographic information systems.
??????, добавлен 11.03.2019????????????? ?????????? Enterprise Library Integration Pack for Windows Azure ??? ??????????? ????????? ???? ???????? ??????????. ???????? ????????? ?????????? ???????? ? ???????? ??????? ? ??????? Aspect.NET, ??????? ?? ????????? ?????? ???????? ???.
??????, добавлен 15.01.2019Extracting meaningful features from speech signals and classifying them into male or female categories. Implementation of gender recognition system using Python programming. Potential of using machine learning techniques for gender recognition of voice.
??????, добавлен 24.02.2024Replacing symbolic information, such as a sequence of bits or a message written in a natural language, by another message using different symbols. The properties of arithmetic coding. The problem of reliable communication. Coding natural languages.
?????, добавлен 08.03.2014The possibilities of the MS Excel spreadsheet processing system for visualization of large data sets in an easy-to-understand form. Development of tools for practical implementation for visualization of large data arrays by selecting the required range.
??????, добавлен 29.09.2023Characteristics of information and communication technologies. History of the creation of a computer system. Classification operating system: DOS, Windows, Unix, Linux, Mac OS. Databases management systems: the concept, characteristics, architecture.
???? ??????, добавлен 20.10.2016
