?????????? ???????????? ????????? ?????? ????????????? ???????????????? ????????
?????? ???? ?????? ???????????????? ???????? Scopus, Web of Science, eLIBRARY.RU, Mendeley, SCImago Journal&Country Rank. ??????????? ???????????????? ??????????? ????????, ??????? ?????????? ??????, ????????? ??????? ? ??????????, ???????? ??????.
Подобные документы
The prerequisites for the emergence and formation of areas of computer science that explores the possibilities of electronic encryption devices using large-scale integrated computer circuits. The structure of cryptographic techniques to explore data.
?????, добавлен 08.03.2014One of the important functions of science is the organization of information storage for searching some data. The basic principle of the database and Relational Database Management System. The SQL Language, Web-page, Macros and Integrity Constraints.
???????????, добавлен 07.03.2018Search for opportunities to ensure the security of the state in view of the formation of a new field of confrontation - cyberspace. Consideration of factors influencing the country's cybersecurity situation and protection of information objects.
??????, добавлен 18.09.2020Cryptography is the science of using mathematics to encrypt and decrypt data. PGP data compression routines, the random numbers used as session keys, the message digest. Compromised passphrase and private key. Protecting against bogus timestamps.
????????? ??????, добавлен 08.03.2014Programming of Intel microprocessors. Studying systems on universal microprocessors and problems of its programming. The scheme and the description of laboratory installation, variants of tasks and order of the laboratory work execution are presented.
???????????? ??????, добавлен 11.10.2014?????????? ?????????????? ?????????? ? ???????. ?????? ???????????? ????????? ????? ? ?????????????? ??????????. ??????? ????????? ? ??????? ?????? ??????? ???????. ?????? ????????????? ???????? ? ???????? ?????. ??????????? ????????? ????????? ????????.
??????, добавлен 09.08.2022The purpose of the scientific work is to identify the features of the use of cloud computing in higher educational institutions for colleges and universities. The risks and benefits of cloud architecture are considered. Analysis main activities.
??????, добавлен 06.04.2022Familiarity with the basics of computer science and computer security. CompTIA Security + as an international, independent of vendor certification for information security professionals. General characteristics of the functions of the data-link layer.
?????, добавлен 08.03.2014Social network analysis as a modern theoretical approach to studying various processes of human life. Application SNA to fields of science. Application exact and approximate Shapley values in the assessment of centrality measures of nodes in networks.
????????? ??????, добавлен 02.09.2016?????????? ????? ?????????? ????????? ??????????, ?????????? ?? ??????? ?????? ???????????? ???????????? ? Computer science ?????????????. ?????????? ??????????????? ???????? ?????????? ????? ?????????. ????????? ? ?????? ???????????????? ???? ?????????.
??????, добавлен 17.11.2018Explanation of theoretical insights between Boolean logic and modern Boolean logic. An additional method of investigation is the demonstration of the role of Boolean logic in informatics through the development of a design scheme and cryptography.
??????, добавлен 17.12.2022Fake news and motives for their spread on the Internet. Fake news as one of the tools of warfare using information technology, a growing threat to the internal governance of the country or the destruction of its external and international relations.
??????, добавлен 21.01.2022Alan Mathison Turning - an English computer scientist, mathematician, cryptanalyst. He was highly influential in the development of theoretical computer science, providing a formalisation of the concepts of algorithm, computation with the Turing machine.
???????????, добавлен 29.03.2016Modifications of the method for the detection and localization of the cloned area. Digital images used in print media, medicine, science, legal proceedings. Falsification of a digital image. The difference between the source region and the counterfeit.
??????, добавлен 28.08.2016- 40. Use of Pixlr cloud graphics editor in the course of computer science teacher professional training
The introduction of new cloud technologies in the educational process is a priority for domestic education. The selection of appropriate services that can be used to improve the educational process remains the key issue in solving these problems.
??????, добавлен 23.06.2022 Disclosure as a mechanism to identify lines with Romanian chromatic words on the basis of computer technologies as a stage in the development of a dictionary of poetic meanings of colors. The collaboration of computer science specialists and linguists.
??????, добавлен 23.02.2016The main features and functions of the service Google Docs. Characteristics of the use of this service for teaching computer science to future teachers of mathematics in order to solve information problems. Analysis of the use of the student service.
??????, добавлен 05.04.2019One of the basic primitives in cryptography and of computer science is a pseudo-random generator. The number of important applications, including the construction of a private provably secure key cryptosystem. The construct a pseudo-random generator.
??????, добавлен 15.09.2012The nodes of computer facilities and microprocessor systems. Architecture and software models of Intel microprocessors. Microprocessor systems on universal microprocessors and its programming. Microprocessor systems on microcontrollers and programming.
?????????, добавлен 11.10.2014Design and research of mathematical model for information security system in computer network. Science intensive technology. Modeling of security and risk assessment in information and communication system. Information and computer network technologies.
??????, добавлен 27.05.2021