Issue of Journal № 1, 2 part [19], 2009
List of articles
Technical methods and means of information security
5–7 |
|
8–12 |
|
Research of loss of confidential infirmation on food chains and grounding |
13–15 |
16–17 |
Cryptographic methods of information protection
21–23 |
|
24–26 |
|
27–29 |
Information security audit
Security of information systems
Development of algorithms of the protected applications for social cards |
59–61 |
62–64 |
|
65–66 |
|
67–70 |
|
71–72 |
|
Conception of scheme for automation of personal data processing |
73–74 |
75–76 |
|
Distributed computers protection from self-propagating network viruses |
77–78 |
79–80 |
|
81–82 |
|
83–85 |