Engineering and
technical information security |
 |
ANTYASOV I. S.,
VOYTOVICH N. I.,
SOKOLOV A. N. |
Peculiar features of
validation of alternative test sites for carrying
out advanced technical studies of technical
equipment |
Cryptographic
information security |
 |
ZHIVOTOVA А. Е.,
ZIULIARKINA N. D.,
KOSTYGINA Y. О. |
Modification of the
cryptosystem with public key on the basis of
knapsack problem |
Program and
hardware information security |
 |
SKURLAEVS. V.,
SOKOLOV A. N. |
Technical solutions used for
3a/2a class systems of unauthorized access
protection |
 |
MISHCHENKO E. Y.,
SOKOLOV A. N |
Quantitative criteria of
individual identification in the process of
depersonalization of personal data |
Organizational
information security |
 |
ASTAKHOVA L. V.,
ZEMLIANSKAYA O. О.,
EFREMOV V. A. |
Automatization of the
assessment of a candidate for a vacant position of
ensuring information security in the organization |
 |
MAKAROVA P. V. |
The introduction of
commercial secret regime |
Personnel
training for the sphere of information security |
 |
ASTAKHOVA L. V.,
TOMILOV A. A. |
Manasger’s
competency in the field of personnel security in
federal state educational standards of 3d generation |
 |
ASTAKHOVA L. V.,
IVANOV E. S. |
Requirements of
statutory acts of the russian federation for
innovation culture of the information security
specialists |
Tribune of
young scientists |
 |
NIKOLSKAYA K. Y. |
Features of information as
an object of information relations |