• 7 Tips How to Avoid Cybercrimes 

      Berezhnoy, Vladyslav; Shcherbakova, Elizaveta; Mieshkov, V. I.; Zuyenok, I. І. (Видавництво НГУ, 2017)
      During last years, information technologies and social networks have gradually become an important part of human life. People send their personal information to the Internet and don’t think much about what happens to it. ...
    • Computer Viruses and Information Security 

      Kryvoi, Vladlen; Mieshkov, V. I.; Poperechna, N.V. (2014)
    • Cybersecurity Development Problems in Ukraine 

      Taranenko, Andrey; Mieshkov, V. I.; Nechai, N. M. (Видавництво НГУ, 2017)
      To date, the problem of cybersecurity is topical. Every day, each of us is faced with the need to use information technology, beginning with the placement of personal information on the Internet, to the use ...
    • Distance Learning 

      Koval, V.S.; Mieshkov, V.I.; Zuyenok, I.I. (Видавництво НГУ, 2017)
      Distance learning is the thing without which it is impossible to learn in the future. System of distance learning has to have modern studying materials and interesting resources, where student can interact with everything ...
    • Linux Security 

      Hryhorenko, Vladyslav; Mieshkov, V.I.; Gubkina, V.V. (Видавництво НГУ, 2017)
      Information age has brought a new colossal change in a person’s habitual life. The level of computer literacy has grown greatly and even a middle level specialist is able to perform the tasks intended for the programming ...
    • Methodology for Minimization of Information Risks in Case of Firing Private Companies Employees 

      Goloborodko, Vasilisa; Mieshkov, V.I.; Gubkina, V.V. (Видавництво НГУ, 2017)
      Almost each employee of the company owns such important data as confidential documents, contracts, client database etc. In the case of firing the employee is possible to take out the data being confidential for the company ...
    • Methods of Confirming the Exclusive Rights of Digital Photo and Similar Graphic Documents 

      Shitikov, Rodion; Mieshkov, V.I.; Gubkina, V.V. (Видавництво НГУ, 2017)
      Today, media content is both a way of making money and a part of the art. To protect copyright from the fraud of digital media content, it is necessary to apply various methods of digital signing and marking. Such methods ...
    • Problems of Using Digital Cryptocurrency Bitcoin 

      Bulgakov, Dmitry; Mieshkov, V.I.; Poperechna, N.V. (Видавництво НГУ, 2014)
    • Security Measures Against Hackers 

      Samoilenko, Roman; Mieshkov, V.I.; Gubkina, V.V. (Видавництво НГУ, 2017)
      The twenty-first century covered us with an invisible net. Almost all of us have smartphones, computers, even glasses and watches with Internet access. On one hand it is very comfortable because we can buy, talk, play ...
    • Single Register of Internet Shops 

      Parshkina, Daria; Mieshkov, V.I.; Gubkina, V.V. (Видавництво НГУ, 2017)
      Modern world technology has stepped incredibly far, and now it is an inseparable part of almost everyone's life. This entailed the popularization of Internetsales. And nowadays, such kind of shopping is becoming widespread ...
    • Smartphone security 

      Mamienko, Sergey; Mieshkov, V.I.; Zuyenok, I.І. (Видавництво НГУ, 2017)
      According to eMarketer researchers, the total number of smartphones in active use on the planet exceeded the 2 billion unit in 2016 and amounted up to 2.16 billion against 1.9 billion in 2015 and 1.6 billion devices in ...
    • The Tips for Social Networking Safety 

      Petukhova, Maria; Mieshkov, V.I.; Zuyenok, I. І. (Видавництво НГУ, 2017)
      The Internet is definitely not secure. Most of us have ever encountered security problems in the social networks. The most common troubles arising in the network are: the issues of confidentiality, hacking and stealing ...
    • TOR Secure Network 

      Kovraiskyi, Anton; Mieshkov, V.I.; Gubkina, V.V. (Видавництво НГУ, 2017)
      So what is TOR? TOR is an anonymity network for “silent” usage by anyone who wants to stay hidden from any other secret service etc. Does it actually work as it is supposed to do? It depends on different circumstances. ...