Огляд Елементів

Ознайомтеся з нашою колекцією елементів

39-117-PB-сторінки-1-об'єднано Стаття
Minimization of digital risks in the state's economic security

The purpose of the study is to substantiate strategies for minimizing digital risks in the Ukrain...

2025/09/24 1
Чижевська М.Б., Кузьменко О.К. Стаття
Artificial Intelligence and Blockchain Technologies as Tools for Modeling Investment Projects

The relevance of this study is due to the increasing role of artificial intelligence (AI) and blo...

2025/09/18 1
CORPORATE SECURITY_1-5_2025 Стаття
Corporate Security

Підручник охоплює програмний матеріал для підготовки студентів галузі знань 12 «Інформаційні техн...

2025/09/17 1
ETHICAL HACKING WITH KALI LINUX_1-4_2025 Стаття
Ethical Hacking with Kali Linux

The textbook covers the program material for the training of students in the field of knowledge 1...

2025/09/17 1
17 Стаття
Zero Trust : why traditional security models no longer work

In the context of escalating cyber threats and the rapid evolution of digital work environments, ...

2025/07/07 1
document-84-90 Стаття
Specifics of implementation of the asymmetric encryption algorithm on elliptic curves

The modern world is inextricably linked with information technologies. Every year, the Internet e...

2023/06/26 1
Minimization of digital risks in the state's economic security

The purpose of the study is to substantiate strategies for minimizing digital risks in the Ukrainian banking system. To this end, the study identified the risks associated with the digital transfor...

Стаття 2025/09/24
1
Artificial Intelligence and Blockchain Technologies as Tools for Modeling Investment Projects

The relevance of this study is due to the increasing role of artificial intelligence (AI) and blockchain technologies in investment project modeling. These technologies offer new opportunities for ...

Стаття 2025/09/18
1
Corporate Security

Підручник охоплює програмний матеріал для підготовки студентів галузі знань 12 «Інформаційні технології» за спеціальностями 122 – Комп’ютерні науки, 123 – Комп’ютерна інженерія та 125 – Кібербезпек...

Стаття 2025/09/17
1
Ethical Hacking with Kali Linux

The textbook covers the program material for the training of students in the field of knowledge 12 “Information Technologies” in the specialties 122 - Computer Science, 123 - Computer Engineering, ...

Стаття 2025/09/17
1
Zero Trust : why traditional security models no longer work

In the context of escalating cyber threats and the rapid evolution of digital work environments, traditional security models based on perimeter defense are increasingly proving inadequate. The Zero...

Стаття 2025/07/07
1
Specifics of implementation of the asymmetric encryption algorithm on elliptic curves

The modern world is inextricably linked with information technologies. Every year, the Internet expands, and thousands of sites that provide various services have been created. With a stable Intern...

Стаття 2023/06/26
1