Results 161 to 163 of about 1,054 (163)
Some of the next articles are maybe not open access.
2003
ÐеÑаÑаеÑÑÑ Ð¿Ð¾ ÑеÑÐµÐ½Ð¸Ñ ÑедакÑионно-издаÑелÑÑкого ÑовеÑа СанкÑ-ÐеÑеÑбÑÑгÑкого гоÑÑдаÑÑÑвенного полиÑÐµÑ Ð½Ð¸ÑеÑкого ÑнивеÑÑиÑеÑа.
openaire +1 more source
ÐеÑаÑаеÑÑÑ Ð¿Ð¾ ÑеÑÐµÐ½Ð¸Ñ ÑедакÑионно-издаÑелÑÑкого ÑовеÑа СанкÑ-ÐеÑеÑбÑÑгÑкого гоÑÑдаÑÑÑвенного полиÑÐµÑ Ð½Ð¸ÑеÑкого ÑнивеÑÑиÑеÑа.
openaire +1 more source
Тема вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ: «ÐвÑомаÑизаÑÐ¸Ñ Ð¿Ð¾Ð¸Ñка аÑÑеÑакÑа на ÑлекÑÑоÑнÑеÑалогÑамме». ÐÐ°Ð½Ð½Ð°Ñ ÑабоÑа поÑвÑÑена пÑоекÑиÑÐ¾Ð²Ð°Ð½Ð¸Ñ Ð¸ ÑазÑабоÑки модели нейÑоннÑÑ
ÑеÑей Ð´Ð»Ñ Ð¿Ð¾Ð¸Ñка аÑÑ ...
openaire +1 more source
openaire +1 more source
The aim of the work is to develop a methodology for analyzing the security of container infrastructure by simulating computer attacks using the MTKPI utility. The subject of the study is a methodology for analyzing the security of container infrastructure based on the analysis of computer attacks. Problems solved during the study: 1.
openaire +1 more source
openaire +1 more source

