ФГУП “НТЦ оборонного комплекса “Компас”

РУС | ENG 

SCIENTIFIC AND INFORMATION EDITIONS OF FSUE “The Scientific and Technical Center of the Defense Complex “Kompas”



To obtain access to full text of journal and articles you must register!



2014 / 4

Price Author Article's name
1
0.00 rub

Konyavsky V. A.

Remote banking participants risks minimization
2
0.00 rub

Schastny D. Yu.

Electronic signature tool WKS KC3 class realization on the "Harvard" architecture based computer
3
0.00 rub

Konyavskaya S. V.

Kravec V. V.

Batrakov A. Yu.

Protected "thin clients" for virtual or terminal access system
4
0.00 rub

Kravec V. V.

Peculiar properties of operating on the system with readonly memory
5
0.00 rub

Altukhov A. A.

The idea of protecting video surveillance systems data
6
0.00 rub

Ivanov A. V.

Unregarded features and vulnerability of Wi-Fi. Reliable and stable wireless network
7
0.00 rub

Postoev D. A.

Special aspects of using data protection tools in virtualized systems
8
0.00 rub

Prokopov V. S.

Cleaning of freed memory areas in the process of freeing pages in GNU / Linux
9
0.00 rub

Ugarov D. V.

Methods of creating memory snapshots
10
0.00 rub

Ryabov A. S.

Information security printing processes
11
0.00 rub

Kravec V. V.

Trusted computing environment solution on the Dell's tablet PCs. "MARSH!"
12
0.00 rub

Kanner T. M.

Oblomova A. I.

Choice of test automation tool for hardware and software DST
13
0.00 rub

Kanner A. M.

Linux: process life cycle and access control
14
0.00 rub

Konyavskaya S. V.

Kravec V. V.

Batrakov A. Yu.

Harmless Internet: visibility as necessary and sufficient
15
0.00 rub

Krasavin A. A.

Visual security of graphical passwords
16
0.00 rub

Kravec V. V.

Konyavskaya S. V.

Objective reality determines realization or analogue world impact on the digital one
17
0.00 rub

Kanner T. M.

Kuvaeva K. A.

Formation of the approach for testing automation of DST with flash memory that operate in OS
18
0.00 rub

Kanner T. M.

Sultanakhmedov H. S.

Features of verification of Data Security Tools
19
0.00 rub

Chadov A. Yu.

Insolvency of DLP systems
20
0.00 rub

Chepanova E. G.

Formation the comparison criteria of trusted startup hardware modules
21
0.00 rub

Altukhov A. A.

The idea of personal device to monitor integrity of computer environment
22
0.00 rub

Ablameyko S. V.

Vorotnitski Yu. I.

Listopad N. I.

A strategy of informatization and information security of the educational system under the conditions of the Information Society development
23
0.00 rub

Vecherko E. V.

Kharin Yu. S.

Identification of embeddings in Markov sequence
24
0.00 rub

Artamonov V. A.

Estimation of safety of the operating automated systems of a critical infrastructure and questions of designing protected Automated Process Control System (APCS)
25
0.00 rub

Agievich S. V.

Solovey O. V.

Kharin Yu. S.

Mikulich N. D.

New cryptography standards of the Republic of Belarus
26
0.00 rub

Baranovski O. K.

On the directions of research to improve the protection of collective information assets of Belarus and Russia
27
0.00 rub

Bochkov K. A.

Bui P. M.

Features information security microprocessor control systems for railways
28
0.00 rub

Kurbatski A. N.

Personal information security and rules of behavior in information space
29
0.00 rub

Utin L. L.

Transformation of views on the security of communications in the Union state