logo
Главная
Библиотека
Control access methods to the generated file objects in the information and communication systems
    image
    Уровень:
    Высшее образование
    Тип:
    Выпускная квалификационная работа
    Автор:
    Makhmudov F.F.
    Год издания:
    2015
    Дата создания:
    03.09.2023
    0
    Every organization uses information, most are dependent on it. Information is an asset that, like other important business assets, is essential to your business and consequently needs to be suitably protected. This is especially important in the increasingly interconnected business environment, where information is now exposed to a growing number and a wider variety of threats and vulnerabilities. Causes of damage such as malicious code, computer hacking, and denial of service attacks have become more common, more ambitious, and increasingly sophisticated.