Please use this identifier to cite or link to this item:
https://sci.ldubgd.edu.ua/jspui/handle/123456789/5996
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Головатий, Роман Русланович | - |
dc.contributor.author | Hrynyk, Yuliya | - |
dc.contributor.author | Vysochanska, Bozhena | - |
dc.date.accessioned | 2019-11-20T09:37:19Z | - |
dc.date.available | 2019-11-20T09:37:19Z | - |
dc.date.issued | 2019 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/5996 | - |
dc.description.abstract | Recently, the problem of information security has become increasingly relevant. The more computerized different areas of our lives, the more areas of possible intrusion of intruders, competitors, and just computer bullies. To counteract external attacks, it is necessary not only to have information security tools, but also to understand the principles of their functioning, to be able to configure them correctly, to understand the weaknesses of operating systems. | uk |
dc.language.iso | other | uk |
dc.publisher | Lviv State University of Life Safety | uk |
dc.subject | protection of information in networks | uk |
dc.title | Protection of information in networks | uk |
dc.type | Thesis | uk |
Appears in Collections: | 2019 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Гриник Юлія, Височанська Божена.pdf | Thesis | 157.63 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.