Main / Information Technology and Artificial Intelligence / Cybersecurity and сryptology / Азанбай Құралай Талғатқызы
First higher education
Academic degree
| File name | Headline | Description |
|---|---|---|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
Изложены вопросы теории и практики защиты информации
техническими средствами. Значительное внимание уделено физической
природе возникновения информационных сигналов в
электромагнитных, электрических, акустических и виброакустических
каналах утечки информации, методам расчета параметров.
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
Изложены вопросы теории и практики защиты информации
техническими средствами. Значительное внимание уделено физической
природе возникновения информационных сигналов в
электромагнитных, электрических, акустических и виброакустических
каналах утечки информации, методам расчета параметров.
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Programming Technologies |
|
|
Data Mining |
ПЗ1. Введение в интеллектуальный анализ данных.
|
|
Data Mining |
СИЛЛАБУС 2020-2021.doc по дисц.ИАД
|
|
Data Mining |
|
|
Data Mining |
Силлабус Интеллектуальный Анализ Данных 4 курс,русс
|
|
Data Mining |
|
|
Data Mining |
|
|
Data Mining |
|
|
Data Mining |
|
|
Data Mining |
|
|
Data Mining |
|
|
Data Mining |
Силлабус Интеллектуальный Анализ Данных 4 курс, каз
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
Единая система S-20 Руководство администратора
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Access Control |
Силлабус Контроль доступа
|
|
Access Control |
Контроль доступа в VPN
|
|
Access Control |
|
|
Access Control |
|
|
Access Control |
Силлабус по ИАД
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
Атака, защита и анализ
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
Эта книга фактически представляет собой научно-практическую энциклопедию по
современной кибербезопасности. Здесь анализируются предпосылки, история, методы
и особенности киберпреступности, кибертерроризма, киберразведки и киберконтрраз-
ведки, этапы развития кибероружия, теория и практика его применения, технологиче-
ская платформа кибероружия (вирусы, программные и аппаратные трояны), методы
защиты (антивирусные программы, проактивная антивирусная защита, кибериммунные
операционные системы).
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
СИЛЛАБУС Киберқауіпсіздік 4 курс СИБ
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
1
2
3
4
5
6
Innovative Technologies as a Factor of Information Security of the Republic of Kazakhstan
Azanbay, K.
Ingenierie Des Systemes D Information
29, с. 523-532
1
ЦитированийDEVELOPMENT OF AN ERROR CORRECTION ALGORITHM FOR KAZAKH LANGUAGE
Mussiraliyeva, S.Z., Bolatbek, M.A., Yeltay, Z., Azanbay, K.
Kaznu Bulletin Mathematics Mechanics Computer Science Series
123, с. 81-97