Open
Books
Keywords
information security
In articles
In books
In conferences
In pdf-articles
Search in authors
Not search in authors
For example,
Бобцов
Books
Article
METHOD AND ABSTRACT MODEL FOR CONTROL AND ACCESS RIGHTS BY REQUESTS REDIRECTION
Article
CHOICE OF OPTION FOR IMPLEMENTATION OF THE MULTILEVEL SECURE ACCESS TO THE EXTERNAL NETWORK
Article
FORENSIC LINGUISTICS: AUTOMATIC WEB AUTHOR IDENTIFICATION
Article
AVAILABILITY RESEARCH OF REMOTE DEVICES FOR WIRELESS NETWORKS
Article
GRAPH-BASED POST INCIDENT INTERNAL AUDIT METHOD OF COMPUTER EQUIPMENT
1
2
3
4
Keywords
Keywords
CONTENT © ITMO UNIVERSITY 1993-2024