№ 2 (3)

cybersecurity_2014Third issue is out ! april-jule 2014

Contents of Second issue of magazine «Voprosy kiberbezopasnosti» at 2014 :

Название статьи Страницы
THE APPROACH TO IMPLEMENTING A CENTRALIZED SYSTEM FOR INFORMATION SECURITY MANAGEMENT AS MP
Yuri Borodakiy, Alexander Dobrodeyev, Pavel Nashchekin, Igor Butusov
2-9
NONMONOTONE MODELS OF RELIABILITY AND SECURITY OF SOFTWARE IN THE EARLY STAGES OF TESTING
Alexey Markov
10-17
THE INFLUENCE OF RECOVERY TIME SYNCHRONIZATION ON THE SUSTAINABILITY PERFORMANCE OF INFOTELECOMMUNICATION NETWORKS
Ivan Paramonov
18-23
THE STEGANOGRAPHIC SYSTEM INTERCONNECTION BASIC REFERENCE MODEL AND THE JUSTIFICATION OF NEW AREAS OF STEGANOGRAPHY THEORY’S DEVELOPMENT
Sergey Makarenko
24-32
ANALYSIS OF DEPENDENCE OF RISK LEVEL OF SAFETY OF COMMUNICATION NETWORKS ON EXPERT DATA DURING CALCULATIONS WITH THE USE OF A MODEL OF THE ILLEGIBLE SETS
Ruvim Belfer, Denis Kalyuzhnyy, Daria Tarasova
33-39
THE BASIC INFORMATION SECURITY THREATS IN THE VIRTUAL ENVIRONMENTS AND CLOUD PLATFORMS
Igor Zubarev, Pavel Radin
40-45
CYBERSECURITY AND INTELLECTUAL PROPERTY Part 2 Alexsandr Kartskhiya 46-50
A SYSTEMATISATION OF TYPES OF RELATIONSHIPS AND RESPONSIBILITY IN ACQUIRING ACCESS TO INFORMATION Andrey Fedichev, Sergey Artamoshin 51-59
THE NSA’S SPY CATALOG. PART 1. INFRASTRUCTURE Alexander Klyanchin 60-65
INFORMATION SECURITY MANAGEMENT: RISK MANAGEMENT Alexander Dorofeev 66-73

Be the first to comment

Leave a Reply

Your email address will not be published.


*


This site uses Akismet to reduce spam. Learn how your comment data is processed.