ФГУП “НТЦ оборонного комплекса “Компас”
РУС
|
ENG
Forgot your password?
Enter
Register
Login As
You can log in if you are registered at one of these services:
Livejournal
Yandex
Mail.Ru
Liveinternet
Blogger
OpenID
.livejournal.com
@yandex.ru
@mail.ru
liveinternet.ru/users/
.blogspot.com
OpenID:
NEWS
SITE MAP
CONTACTS
SCIENTIFIC AND INFORMATION EDITIONS OF FSUE “The Scientific and Technical Center of the Defense Complex “Kompas”
The scientific and practical journal
“INFORMATION SECURITY QUESTIONS”
("Voprosy zaŝity informacii")
About journal
Journal policy
Journal themes
Journal ethics
Journal history
Our authors
Editorial Board
Contacts
For readers
Private office
Search
Archive issues
Articles search according to sections
For authors
Private office
Journal sections
Right direction, review and publication scientific articles
Order of articles peer reviewing
Order of articles consideration
Subscription
FAQ
Statistics
Help Users
Helpful references
Main
Editions
“Information security questions” (ISQ) ("Voprosy zaŝity informacii")
For readers
Contents of issue
Statistics
To obtain access to full text of journal and articles you must register!
2014 / 4
№
Price
Author
Article's name
1
0.00 rub
Konyavsky V. A.
Remote banking participants risks minimization
2
0.00 rub
Schastny D. Yu.
Electronic signature tool WKS KC3 class realization on the "Harvard" architecture based computer
3
0.00 rub
Konyavskaya S. V.
Kravec V. V.
Batrakov A. Yu.
Protected "thin clients" for virtual or terminal access system
4
0.00 rub
Kravec V. V.
Peculiar properties of operating on the system with readonly memory
5
0.00 rub
Altukhov A. A.
The idea of protecting video surveillance systems data
6
0.00 rub
Ivanov A. V.
Unregarded features and vulnerability of Wi-Fi. Reliable and stable wireless network
7
0.00 rub
Postoev D. A.
Special aspects of using data protection tools in virtualized systems
8
0.00 rub
Prokopov V. S.
Cleaning of freed memory areas in the process of freeing pages in GNU / Linux
9
0.00 rub
Ugarov D. V.
Methods of creating memory snapshots
10
0.00 rub
Ryabov A. S.
Information security printing processes
11
0.00 rub
Kravec V. V.
Trusted computing environment solution on the Dell's tablet PCs. "MARSH!"
12
0.00 rub
Kanner T. M.
Oblomova A. I.
Choice of test automation tool for hardware and software DST
13
0.00 rub
Kanner A. M.
Linux: process life cycle and access control
14
0.00 rub
Konyavskaya S. V.
Kravec V. V.
Batrakov A. Yu.
Harmless Internet: visibility as necessary and sufficient
15
0.00 rub
Krasavin A. A.
Visual security of graphical passwords
16
0.00 rub
Kravec V. V.
Konyavskaya S. V.
Objective reality determines realization or analogue world impact on the digital one
17
0.00 rub
Kanner T. M.
Kuvaeva K. A.
Formation of the approach for testing automation of DST with flash memory that operate in OS
18
0.00 rub
Kanner T. M.
Sultanakhmedov H. S.
Features of verification of Data Security Tools
19
0.00 rub
Chadov A. Yu.
Insolvency of DLP systems
20
0.00 rub
Chepanova E. G.
Formation the comparison criteria of trusted startup hardware modules
21
0.00 rub
Altukhov A. A.
The idea of personal device to monitor integrity of computer environment
22
0.00 rub
Ablameyko S. V.
Vorotnitski Yu. I.
Listopad N. I.
A strategy of informatization and information security of the educational system under the conditions of the Information Society development
23
0.00 rub
Vecherko E. V.
Kharin Yu. S.
Identification of embeddings in Markov sequence
24
0.00 rub
Artamonov V. A.
Estimation of safety of the operating automated systems of a critical infrastructure and questions of designing protected Automated Process Control System (APCS)
25
0.00 rub
Agievich S. V.
Solovey O. V.
Kharin Yu. S.
Mikulich N. D.
New cryptography standards of the Republic of Belarus
26
0.00 rub
Baranovski O. K.
On the directions of research to improve the protection of collective information assets of Belarus and Russia
27
0.00 rub
Bochkov K. A.
Bui P. M.
Features information security microprocessor control systems for railways
28
0.00 rub
Kurbatski A. N.
Personal information security and rules of behavior in information space
29
0.00 rub
Utin L. L.
Transformation of views on the security of communications in the Union state
86
ISSUES
921
ARTICLES
2289
DOWNLOADS
The scientific and practical journal
“INFORMATION SECURITY QUESTIONS”
("Voprosy zaŝity informacii")
CM
IE
ITDP
DIARSTP
ISQ
IIS
AP