Огляд Елементів
Ознайомтеся з нашою колекцією елементів
Minimization of digital risks in the state's economic security
The purpose of the study is to substantiate strategies for minimizing digital risks in the Ukrain...
Artificial Intelligence and Blockchain Technologies as Tools for Modeling Investment Projects
The relevance of this study is due to the increasing role of artificial intelligence (AI) and blo...
Corporate Security
Підручник охоплює програмний матеріал для підготовки студентів галузі знань 12 «Інформаційні техн...
Ethical Hacking with Kali Linux
The textbook covers the program material for the training of students in the field of knowledge 1...
Zero Trust : why traditional security models no longer work
In the context of escalating cyber threats and the rapid evolution of digital work environments, ...
Specifics of implementation of the asymmetric encryption algorithm on elliptic curves
The modern world is inextricably linked with information technologies. Every year, the Internet e...
Minimization of digital risks in the state's economic security
The purpose of the study is to substantiate strategies for minimizing digital risks in the Ukrainian banking system. To this end, the study identified the risks associated with the digital transfor...
Стаття 2025/09/24Artificial Intelligence and Blockchain Technologies as Tools for Modeling Investment Projects
The relevance of this study is due to the increasing role of artificial intelligence (AI) and blockchain technologies in investment project modeling. These technologies offer new opportunities for ...
Стаття 2025/09/18Corporate Security
Підручник охоплює програмний матеріал для підготовки студентів галузі знань 12 «Інформаційні технології» за спеціальностями 122 – Комп’ютерні науки, 123 – Комп’ютерна інженерія та 125 – Кібербезпек...
Стаття 2025/09/17Ethical Hacking with Kali Linux
The textbook covers the program material for the training of students in the field of knowledge 12 “Information Technologies” in the specialties 122 - Computer Science, 123 - Computer Engineering, ...
Стаття 2025/09/17Zero Trust : why traditional security models no longer work
In the context of escalating cyber threats and the rapid evolution of digital work environments, traditional security models based on perimeter defense are increasingly proving inadequate. The Zero...
Стаття 2025/07/07Cybersecurity as a key element of the state's economic security
Стаття 2025/06/20Specifics of implementation of the asymmetric encryption algorithm on elliptic curves
The modern world is inextricably linked with information technologies. Every year, the Internet expands, and thousands of sites that provide various services have been created. With a stable Intern...
Стаття 2023/06/26