logo
Асосий
Кутубхона
Control access methods to the generated file objects in the information and communication systems
    image
    Даража:
    Олий таълим
    Тури:
    Битирув малакавий иши
    Муаллиф:
    Makhmudov F.F.
    Нашр этилган йили:
    2015
    Яратилган вақти:
    03.09.2023
    0
    Every organization uses information, most are dependent on it. Information is an asset that, like other important business assets, is essential to your business and consequently needs to be suitably protected. This is especially important in the increasingly interconnected business environment, where information is now exposed to a growing number and a wider variety of threats and vulnerabilities. Causes of damage such as malicious code, computer hacking, and denial of service attacks have become more common, more ambitious, and increasingly sophisticated.