???????????? ?????????
???????????? ?????????, ??????????? ? ???? ??????? ?????????? ? ????????: Aidstest, Doctor Web, AVSP (Anti-Virus Software Protection). ???????????? ??????? ?? ??????? ????????? ??????? ? ??????? ?????????????? ??????????? ?????????? ? ?? ????????.
Подобные документы
Simulation modeling for solving problems of mathematical physics. Usage cellular neural networks as means of modeling. Usage locally asynchronous methods as algorithmic software and tool optimization of neural network. The block diagram of the software.
??????, добавлен 26.06.2016Research of the effectiveness of using the Blender 3D software for independent and individual work of students. Creating videos, creating and editing videos with video resources. Organization of video conferencing during online classes and seminars.
??????, добавлен 01.04.2022Rapid application development - a software approach of construction of end-user products in conditions of changing user requirements and limited time resources. Specific features of high-level description of Framework for domain data organization.
????????? ??????, добавлен 13.07.2020Development of a new complex oscillator for effective algorithmic trading in the stock market. Technical indicators on which the oscillator is based and the rule base for its construction. Oscillator calculation algorithm using QuantOffice software.
??????, добавлен 09.08.2022The impact of the used modeling language for the result of the synthesis models. Generating artificial logs events according to the BPMN 2.0, their implementation in the form of a program that extends the software platform Process Mining Framework (ProM).
???????? ??????, добавлен 30.08.2016The improving the network traffic analysis systems, including deep analysis systems, taking into account existing threats and vulnerabilities of network equipment and software of computer networks based on methods and algorithms of machine learning.
??????, добавлен 12.12.2024Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.
?????, добавлен 08.03.2014- 83. Computer-aided software engineering - ???????? Designer/2000 + Developer/2000 ? ????????? ????????
????????? ? ??????? ????????? ??????????? ? ?????????????? ?? ??????????? ?????????. ??????????????, ????????? ???????????? ??? ????? ?????????? ????? ?????????????? ??????. ????????? ???????? ??? ERwin, S-Designor, Computer-aided software engineering.
????????? ??????, добавлен 19.12.2016 ??????? ?????????? ???????. ?? ?????. ?????? ????????? ???. ?????? ??????? ?????????? ??? ??? (?????????, ????????, ????????, ????????, ???????). ?????????????? ???????????? ??????? ??? "???????????" ?? Eugene Kaspersky: Aidstest, DrWeb, Adinf, AVP.
???????, добавлен 07.07.2014???????? ???????? ?????????, ?????? ?????? ? ???. ???????? ???????? ?????????? ???????, ??????????? ?????????? ?? ??????. ????????? ???? (?????????? ?????). ????????????? ???????????? ????????. ?????????? ?????????? Aidstest. ????????? ???????????.
???????? ??????, добавлен 04.06.2014The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.
?????, добавлен 18.09.2012Information system research in historic perspective. Research scope on digital transformation. Depicting countries for software trade comparison analysis. Digital transformation conditions in Russia. Japanese school in information system research field.
???????????, добавлен 01.09.2018A concept of a decision support system (DSS) for modeling and forecasting of economic and financial processes is proposed as well as its software implementation. The main functions of the DSS are in modeling of nonstationary nonlinear time series.
??????, добавлен 29.07.2016The nodes of computer facilities and microprocessor systems. Architecture and software models of Intel microprocessors. Microprocessor systems on universal microprocessors and its programming. Microprocessor systems on microcontrollers and programming.
?????????, добавлен 11.10.2014The article outlines the urgent problems of the protection and preservation of cultural heritage objects. It is emphasized that of the priority areas of modern monument protection work is the transmission to future generations the historical knowledge.
??????, добавлен 21.04.2020Assessment of fire threat in Ukraine. Creation of an information database of classes of fire protection of buildings and premises. Prediction of the spread of fire in time and space. Modeling the behavior and movement of people in an emergency situation.
??????, добавлен 22.12.2016Statistics increase in the total amount of information. Creating a storage cloud. Key features of its use. Consideration of the main advantages and disadvantages. Characteristic encryption and data protection. Recommendations file protection in the cloud.
???????????? ??????, добавлен 29.11.2014???????? ??????? "???????????? ?????". ?????? ????? ???????: ???????, ???????????????, ????????. ??????????? ??????????????? ???????????? ???????, ???????? ?????? ?????? ? ????. ?????? ???????????? ????????: Aidstest, Doctorweb, Microsoft antivirus.
??????????? ??????, добавлен 07.05.2012Android operating system security. Analysis and processing of personal data. Ways to overcome security protection. Analysis of existing systems determines the level of danger. Encryption with a public-key. Structure, components of Android applications.
???????????, добавлен 27.01.2015??????? ??? ????’??????? ?????, ?? ???? ?? ???????? ????????? ?? ????????? ???. ?????????????? ???????? ?? ??????? ???????. ??????????? ????????????? ??????? - ??????????, ?????, ?????????, ???????? ?? ??????. ???????? ???????????? ???????? Aidstest.
???????, добавлен 07.07.2014Consideration of four major requirements when a biometric template protection algorithm is designed. The definition of a secure authentication model, based on fingerprint template protection by using the approaches of cryptography and watermarking.
??????, добавлен 26.01.2018The accuracy and noise immunity of the interpolation method of nonlinear dynamical systems identification based on the Volterra model in the frequency domain. The algorithmic and software toolkit in Matlab is developed for the identification procedure.
??????, добавлен 23.06.2016Actions of the world governments and world organizations for identifying the current state of modern trends in the cybersecurity field. Structured information about the status of modern trends in the field of cybersecurity and information protection.
??????, добавлен 27.05.2021Research Background, Objectives and Significance. Research on Concept and Connotation of Smart City. Characteristics of Smart City. Importance of Personal Data Classification. A Classified Personal Data Protection Architecture. Services in Smart City.
????????? ??????, добавлен 23.09.2018An integrated approach to the study of different kinds of virus attacks that are launched against wireless networks and computer systems. Characteristics of certificate programs provide protective mechanisms and practical tools for information security.
?????, добавлен 08.03.2014