Seamless and secure integration of socialmedia, e-portfolio and alumn services into university information architecture
Concept and prototype for an "assembling" IT intergration portal to be used in higher education. Solution, to use Elgg as an information portal and social media platform. The gap between the closed nature of university IT infrastructure and user-friendly.
Подобные документы
The article deals with problems of a different nature that arise in any type of business activity with insufficient attention to the removal or concealment of the information contained in the metadata of various documents. Various types of documents.
статья, добавлен 16.01.2024Choice relationship database system, a cloud platform and a software platform for implementing and deploying the relational database system, resource and service agents; software module market risk. User interface for outputting the received information.
курсовая работа, добавлен 12.08.2018- 28. Modern trends of cybercrime in the context of economic security, social and humanitarian aspects
The of information technologies were identified, the results of the poll of the respondents on the subject of cybercrime were demonstrated, the ways of combating cybercrime in the of strengthening information and security at the macro-level were proposed.
статья, добавлен 24.10.2018 Procedures for collecting information. The difference between qualitative and quantitative information. Technical characteristics of reliability and validity. Reduction or averaging of non-systematic fluctuations in appraisers, objects and tools.
статья, добавлен 23.09.2018Reveal and compare modern methods of information search in digital environment. Characterization of the features of the rapid development of information technologies, which shapes spheres of human life, as well as the process of information provision.
статья, добавлен 22.03.2023Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.
лабораторная работа, добавлен 17.03.2016Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.
статья, добавлен 14.01.2017A number of different techniques that people can use to hide information. The sound files and images that float about the network today. Measuring and encrypting information. Error correction and white noise. Analysis of hiding information in JPEG files.
книга, добавлен 08.03.2014Mathematical model of transformation of stochastic and fuzzy information in quantum information in the form of multiplication of unitary operators from not commutative von Neumann group. Theoretical basis of information technologies of quantum-logic.
статья, добавлен 29.01.2016Definition of information security. Methods and means of information protection. Access Control - information protection regulation of the use of all resources of IP and IT. Protection of data and programs from unauthorized access, copying, modification.
реферат, добавлен 04.04.2016Tools for Security and Insecurity. Unbiasing a Biased Coin. Combining Weak Sources of Entropy. Pseudorandom Number Generators. Random Permutation Generation. Sound Approach to Random Number Generation and Use. Computationally Secure Information Stealing.
книга, добавлен 08.03.2014Quantum coherence and information processing. Expectation values and the von Neumann projection. Quantum relative and conditional entropies. Information and the foundations of physics. Application quantum coding, error detection, and correction.
книга, добавлен 08.03.2014The article reviews the contemporary land information systems of land management. The current problems of information support for land management are identified. Suggestions how to improve the information systems using technologies are presented.
статья, добавлен 28.09.2016Information technology - a broad class of disciplines and areas of activity related to technology creation, preservation, management and processing of data, including the use of computer technology. The information technology industry. Search engine.
презентация, добавлен 16.02.2015Classical and quantum physics and information theory. Von Neumann entropy and relevant measures. Accessible classical and quantum information. Data processing. Real-life applications of information theory. A commercial quantum cryptographic device.
книга, добавлен 15.09.2012The main peripheral and internal devices of the personal computer. Purpose mouse, keyboard and joystick. Recording information of the disk drive to the hard drive. Sound media files. Scan and copy documents. Types of monitors, projectors and speakers.
презентация, добавлен 13.09.2015The use firewalls to create a demilitarized zone to protect the servers from unauthorized access. The versions of creation of virtual private networks that can combine some geographically distant networks in one network using global information space.
статья, добавлен 27.07.2016Изучение понятия и функциональных возможностей системы Naumen University - информационно-аналитической системы для организации управления учебным процессом в высших и средних специальных учебных заведениях. Архитектура решения Naumen Learning University.
курсовая работа, добавлен 30.05.2012The approaches to the information system construction for analyzing work complexity. Business logic and access logic to the database, as a basis of software implementation and in future presentation logic. The block diagram of the information system.
статья, добавлен 26.06.2016The concept of e-learning, its advantages, flexibility of time and place in comparison with formal learning. Creation of a hybrid information system that integrates computer vision and machine learning technologies for visual and interactive systems.
статья, добавлен 10.05.2018Design and research of mathematical model for information security system in computer network. Science intensive technology. Modeling of security and risk assessment in information and communication system. Information and computer network technologies.
статья, добавлен 27.05.2021The main features of non-traditional social engineering. Characteristics of the main non-traditional design, which involves the formation of a number of new types of activities (involvement of users in design, complex management and project expertise).
статья, добавлен 26.04.2023The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.
реферат, добавлен 20.03.2016The advantages of remote access to the information resources of the State treasury service of Ukraine with the aim of automating the process of executing budgets. The implementation of the software and technical complex "Treasury client - Treasury".
статья, добавлен 25.06.2024Using C ++ Builder to create a binary file. The development of a dynamic array structure of the binary data using the individual functions, located in the library user. The general analysis of the data. Create screensaver with information about the task.
курсовая работа, добавлен 13.07.2014