Funding Data Link References Status API Help
Page 1 of 11 results
Sort by: relevance publication year

The Choice of Strategy for the Spurious Information System on the Basis of the Game Theory Model

Journal Article published 2015 in Voprosy kiberbezopasnosti issue 5(13) on pages 36 to 40

Authors: Elena Shmatova, Bauman Moscow State Technical University

About Information Security of Email Services

Journal Article published 2015 in Voprosy kiberbezopasnosti issue 5(13) on pages 55 to 59

Authors: Georii Markov, Bauman Moscow State Technical University, Vladislav Sharunov, University of Greenwich

Cryptography Basics: Becoming a CISSP

Journal Article published 2015 in Voprosy kiberbezopasnosti issue 1(9) on pages 65 to 73

Authors: Alexey Markov, Bauman Moscow State Technical University, Valentin Tsirlov, NPO Echelon, JSC

Journal Issue published 2015 in Voprosy kiberbezopasnosti issue 2(10)

Information Security Access: Becoming a CISSP

Journal Article published 2015 in Voprosy kiberbezopasnosti issue 2(10) on pages 60 to 68

Authors: Alexey Markov, Bauman Moscow State Technical University, Valentin Tsirlov, NPO Echelon, JSC

Business Continuity Planning and Disaster Recovery Planning

Journal Article published 2015 in Voprosy kiberbezopasnosti issue 3(11) on pages 68 to 73

Authors: Aleksandr Dorofeev, UC Echelon, ANO, Alexey Markov, NPO Echelon, JSC

Journal Issue published 2015 in Voprosy kiberbezopasnosti issue 3(11)

Journal Issue published 2015 in Voprosy kiberbezopasnosti issue 1(9)

Journal Issue published 2015 in Voprosy kiberbezopasnosti issue 5(13)

The 28 Magic Practices for Secure Software Development

Journal Article published 2015 in Voprosy kiberbezopasnosti issue 5(13) on pages 2 to 10

Authors: Aleksandr Barabanov, NPO Echelon, Alexey Markov, Valentin Tsirlov, Bauman Moscow State Technical University, Bauman Moscow State Technical University