The protection of commodified data in e-platforms
Find and analysis a way for data protection when a person uses e-platforms. Based on the General Data Protection Regulation, the measure for the data protection is assumed to comply when data systems go along with technical and organizational safeguards.
Подобные документы
Технология Token Ring. Доступ путем передачи токена. Форматы кадров и приоритеты. Физический уровень технологии Token Ring, коллизии. Технология FDDI (Fiber Distributed Data Interface). Основные характеристики технологии и ее отказоустойчивость.
реферат, добавлен 17.11.2011Basic security skills on the World Wide Web. Cryptology, Web site protection and attacks. One-way encryptions and message digests. Some strong symmetric-key ciphers. Practical software-based stream ciphers. Block ciphers with variable key lengths.
учебное пособие, добавлен 04.12.2012Разработка модели бизнес-процессов верхнего уровня для предприятия. Разработка модели бизнес-процесса: A3.3 Заключение договоров с клиентами. Использование информационной модели, реализованной с применением программного продукта Erwin Data Modeler.
курсовая работа, добавлен 07.10.2014The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.
статья, добавлен 01.11.2021- 105. Разработка моделей для прогнозирования и анализа данных с применением пакета программ STATISTICA
Анализ методов и технологий Data Mining. Применение искусственных нейронных сетей. Освоение среды Data Miner и разработка моделей анализа данных с применением программ STATISTICA. Анализ результатов применения моделей прогнозирования и анализа данных.
дипломная работа, добавлен 14.12.2019 Consideration of various information security standards in the Russian commercial organizations. Methods of data protection. Potential application of international standards in information security activities of the Russian commercial organization.
статья, добавлен 13.02.2016Сomputer facilities and microprocessor systems, data manipulation. The general principles of programming. The branched and cyclic programs organization using Assembler-86 language. X-bit Motorola microprocessors. Communication networks designing.
методичка, добавлен 11.10.2014Высокая готовность, устойчивость системы. Требования начальной установки. Журнализация файловой системы. Мониторы обработки транзакций. Обзор кластеров: vax-кластер, Alpha/OSF компании DEC, Sequent Computer Systems. Отказоустойчивые решения Data General.
курсовая работа, добавлен 15.06.2013Анализ наиболее успешных IT решений в области мониторинга больших данных (big data) и осуществление выбора IT решения, его обоснование. Рассмотрение и анализ продуктов Microsoft Azure HDInsight, IBM InfoSphere Streams, платформы Amazon Kinesis Streams.
статья, добавлен 17.08.2018This publication explores the benefits of adopting an event-driven architecture in microservices and delves into how events can be effectively used for inter-process communication and data synchronization. By leveraging events as a means of communication.
статья, добавлен 08.12.2024Actions of the world governments and world organizations for identifying the current state of modern trends in the cybersecurity field. Structured information about the status of modern trends in the field of cybersecurity and information protection.
статья, добавлен 27.05.2021The article outlines the urgent problems of the protection and preservation of cultural heritage objects. It is emphasized that of the priority areas of modern monument protection work is the transmission to future generations the historical knowledge.
статья, добавлен 21.04.2020Assessment of fire threat in Ukraine. Creation of an information database of classes of fire protection of buildings and premises. Prediction of the spread of fire in time and space. Modeling the behavior and movement of people in an emergency situation.
статья, добавлен 22.12.2016The analises widespread adoption of data-driven business intelligence techniques at the operational, tactical, and strategic levels in the mobile industry, coupled with the integration of user-centric metrics, has brought about a paradigm shift.
статья, добавлен 25.06.2024The key problems of the use of digital technologies in the financing of social protection mechanisms for military personnel. Special software for automatization of the processes of financing the mechanisms of social protection of military personnel.
статья, добавлен 04.12.2023The article considers classification of decision support systems by the way of interaction with the user, by the method of support, by the level of data processed by the system. Types of DSS architecture are presented. Intelligent DSS are analyzed.
статья, добавлен 14.02.2022Intellectual information systems as hybrid neural networks. Using the topology of neural networks based on a fuzzy perceptron, ANFIS, TSK, Wang & Mendel’s network to solve diagnostic problems in medicine. Influence of the fuzzy rule on output signal.
статья, добавлен 22.12.2016- 118. Database
Characteristics and purpose of computer databases. Database features for web e-Commerce site. Application storage archive them to external sources. The process of loading and managing data. To determine the basis for access to online registration systems.
контрольная работа, добавлен 14.05.2017 Feature models for the study of cyber-physical systems in the field of industrial production. Description of the installation of equipment and software environment. Analysis of the current approach for modeling of distributed software and semantic data.
статья, добавлен 23.02.2016The concept and structure of telecommunications, their latest achievements and prospects. Trends in the field of telecommunications, networking model, the interaction of the client and the server. The types of operating systems, external utilities.
учебное пособие, добавлен 11.10.2014- 121. Index Construction
Dictionary data structures. Tolerant retrieval: Wildcards, Spell correction, Soundex. Sort-based index construction. Blocked sort-based Indexing (Sorting with fewer disk seeks). Remaining problem with sort-based algorithm. Single-pass in-memory indexing.
презентация, добавлен 19.02.2014 Development and implementation of new technologies in banking services. The ability to improve the existing anti-fraud model used in real banking practice. Clusters and their impact on the assessment of the existing anti-fraud model. Data Chart Analysis.
дипломная работа, добавлен 10.12.2019Structure and functions of the computer. General characteristics and capabilities of the operating system Windows XP, its member programs and functional features. Structure and principles of programming in C ++ Builder IDE, evaluation of results.
курс лекций, добавлен 11.10.2014Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.
книга, добавлен 08.03.2014Изучение задачи оценки функционирования сложных структурированных объектов с использованием непараметрического метода анализа среды функционирования (Data Envelopment Analysis). Оценка экономической эффективности внедрения автоматизированной CRM-системы.
статья, добавлен 31.08.2018