ФГУП “НТЦ оборонного комплекса “Компас”
РУС
|
ENG
Forgot your password?
Enter
Register
Login As
You can log in if you are registered at one of these services:
Livejournal
Yandex
Mail.Ru
Liveinternet
Blogger
OpenID
.livejournal.com
@yandex.ru
@mail.ru
liveinternet.ru/users/
.blogspot.com
OpenID:
NEWS
SITE MAP
CONTACTS
SCIENTIFIC AND INFORMATION EDITIONS OF FSUE “The Scientific and Technical Center of the Defense Complex “Kompas”
About journal
Journal policy
Journal themes
Journal ethics
Journal history
Our authors
Editorial Board
Contacts
For readers
Private office
Search
Archive issues
Articles search according to sections
For authors
Private office
Journal sections
Right direction, review and publication scientific articles
Order of articles peer reviewing
Order of articles consideration
Subscription
FAQ
Statistics
Help Users
Helpful references
Main
Editions
“Information security questions” (ISQ) ("Voprosy zaŝity informacii")
For readers
Contents of issue
Statistics
To obtain access to full text of journal and articles you must register!
2012 / 3
№
Price
Author
Article's name
1
0.00 rub
Zheltov S. A.
The implementation of arithmetic operations with "long" numbers for devices GPGPU
2
0.00 rub
Dodokhov А. L.
Sabanov A. G.
The way to protect Oracle databases containing confidential information
3
0.00 rub
Borisova T. M.
Gadasin V. A.
The problem of testing hardware data security tools
4
0.00 rub
Bukley A. A.
Parshin I. A.
Fedorovski E. V.
Kirin V. I.
Use of X-ray systems based on roentgen transmission for detection of technical channels of information leakage
5
0.00 rub
Babanin A. V.
Gadasin V. A.
Los V. P.
EffiValue: library for dealing with arbitrary data types in C++
6
0.00 rub
Kanner A. M.
Uhlinov L. M.
Access control in GNU/Linux
7
0.00 rub
Kanner A. M.
Los V. P.
Getting access to system calls in GNU/Linux
8
0.00 rub
Golchevsky Yu. V.
Severin P. A.
About security of the internet sites managed by the CMS Joomla
9
0.00 rub
Boridko S. I.
Serov R. E.
Application of biometric user characteristics to reliable authentication in distributed automated systems
10
0.00 rub
Sabanov A. G.
The main remote authentication processes
11
0.00 rub
Konyavsky V. A.
Uhlinov L. M.
The practice of security for remote banking
12
0.00 rub
Skiba V. Yu.
Vasiliev D. A.
Matyuhin V. G.
Ensuring secure access to the resources of the International Association of Internet networks
13
0.00 rub
Svintsitskiy A. I.
Time synchronization in computer systems using covert channels
14
0.00 rub
Babanin A. V.
Uhlinov L. M.
Issues certification for information security professionals and their possible solutions to the example Institute of Information Security Professionals (UK)
15
0.00 rub
Gadasin V. A.
Matyuhin V. G.
Schastny D. Yu.
The problem of software protection
16
0.00 rub
Emelyanov G. V.
Konyavsky V. A.
Matyuhin V. G.
Uhlinov L. M.
Technical problems and challenges of information security at the present stage. Report on the anniversary conference AZI
17
0.00 rub
Sazonov А. V.
Subjects and technology rights management infrastructure in transboundary space
90
ISSUES
953
ARTICLES
2324
DOWNLOADS
Section has not been found.
CM
IE
ITDP
DIARSTP
ISQ
IIS
AP