Issue of Journal № 1, 2 part [19], 2009
List of articles
Technical methods and means of information security
|
5–7 |
|
|
8–12 |
|
|
Research of loss of confidential infirmation on food chains and grounding |
13–15 |
|
16–17 |
Cryptographic methods of information protection
|
21–23 |
|
|
24–26 |
|
|
27–29 |
Information security audit
Security of information systems
|
Development of algorithms of the protected applications for social cards |
59–61 |
|
62–64 |
|
|
65–66 |
|
|
67–70 |
|
|
71–72 |
|
|
Conception of scheme for automation of personal data processing |
73–74 |
|
75–76 |
|
|
Distributed computers protection from self-propagating network viruses |
77–78 |
|
79–80 |
|
|
81–82 |
|
|
83–85 |