Пошук
Зараз показуються 1-6 з 6
Methods of Confirming the Exclusive Rights of Digital Photo and Similar Graphic Documents
(Видавництво НГУ, 2017)
Today, media content is both a way of making money and a part of the art. To
protect copyright from the fraud of digital media content, it is necessary to apply
various methods of digital signing and marking. Such methods ...
Single Register of Internet Shops
(Видавництво НГУ, 2017)
Modern world technology has stepped incredibly far, and now it is an
inseparable part of almost everyone's life. This entailed the popularization of Internetsales.
And nowadays, such kind of shopping is becoming widespread ...
Linux Security
(Видавництво НГУ, 2017)
Information age has brought a new colossal change in a person’s habitual life.
The level of computer literacy has grown greatly and even a middle level specialist is
able to perform the tasks intended for the programming ...
TOR Secure Network
(Видавництво НГУ, 2017)
So what is TOR? TOR is an anonymity network for “silent” usage by anyone
who wants to stay hidden from any other secret service etc. Does it actually work as it
is supposed to do? It depends on different circumstances. ...
Methodology for Minimization of Information Risks in Case of Firing Private Companies Employees
(Видавництво НГУ, 2017)
Almost each employee of the company owns such important data as
confidential documents, contracts, client database etc. In the case of firing the
employee is possible to take out the data being confidential for the company ...
Security Measures Against Hackers
(Видавництво НГУ, 2017)
The twenty-first century covered us with an invisible net. Almost all of us have
smartphones, computers, even glasses and watches with Internet access. On one hand
it is very comfortable because we can buy, talk, play ...