Results 11 to 20 of about 398,747 (301)
The legal mechanism of bringing to account in the epoch of digitalization [PDF]
An analysis of problems occurring during the application of civil liability in legal relationships using information and communication technologies is being conducted in this scientific research.
Deryugina Tatiana +3 more
doaj +1 more source
Objective. This paper considers protection against threats that occur more often in the period from the start of the operating system boot. Consideration of various configurations will allow an overview of a fairly wide range of situations that arise. To
A. O. Yefimov +4 more
doaj +1 more source
Objective. The purpose of the study is to analyze the features of the functioning of protected automated systems and develop a structural diagram of a typical ATS AS, which includes various structural elements.Method.
A. O. Yefimov +4 more
doaj +1 more source
Objective. When solving a scientific problem related to assessing the security of automated systems of internal affairs bodies, in particular, when developing a methodology for quantifying protected automated systems of internal affairs bodies, the ...
E. A. Rogozin +3 more
doaj +1 more source
In the presented case report, 36-year-old female patient, who was hospitalized in the rheumatology department, developed thrombotic microangiopathy and sepsis-related coronavirus disease 2019 (COVID-19).
E. A. Shikina +5 more
doaj +1 more source
Attention is focused on revealing the content of the new service ideology of service centers of the Ministry of Internal Affairs and law enforcement agencies, aimed at ensuring the rights and freedoms of people and citizens, as well as the interests of ...
О. V. Dzhafarova, О. V. Shatrava
doaj +1 more source
The article deals with the legal aspects of obtaining medical care by employees of internal Affairs, shows the problems of medical care for patients in this category, both in medical organizations of the Ministry of internal Affairs, and in third-party ...
Lyudmila Anatolevna Filimonova +5 more
doaj +1 more source
Aim. One of the key objectives of the theory and practice of information security is to analyse the functioning of protected automated systems, particularly those operated at computerized facilities of internal affairs bodies.
Yu. M. Barkalov +4 more
doaj +1 more source
RATIONALITY AND IRRATIONALITY IN THE ORGANIZATIONS OF THE MINISTRY OF INTERNAL AFFAIRS
The scientific paper aims to present theoretical concepts related to what is present in organizations, from the management’s perspective. The study of management validates the hypothesis that the use of positive intelligence and the avoidance of brutal errors offer the chance of forming resonant leaders who balance the tension between obeying too many ...
Petrică TERTEREANU +2 more
openaire +1 more source
Objective. Currently, access to the information resource of the ATS AS is implemented through the access control subsystem of the information security facility based on the mandatory and discretionary methods of access control developed in the 70s of the
V. A. Wolf +4 more
doaj +1 more source

