Main / Information technology / Cybersecurity and сryptology / Азанбай Құралай Талғатқызы
First higher education
Academic degree
| File name | Headline | Description |
|---|---|---|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
Изложены вопросы теории и практики защиты информации
техническими средствами. Значительное внимание уделено физической
природе возникновения информационных сигналов в
электромагнитных, электрических, акустических и виброакустических
каналах утечки информации, методам расчета параметров.
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
Изложены вопросы теории и практики защиты информации
техническими средствами. Значительное внимание уделено физической
природе возникновения информационных сигналов в
электромагнитных, электрических, акустических и виброакустических
каналах утечки информации, методам расчета параметров.
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Technical Means and Methods of Information Protection |
|
|
Programming Technologies |
|
|
Data Mining |
ПЗ1. Введение в интеллектуальный анализ данных.
|
|
Data Mining |
СИЛЛАБУС 2020-2021.doc по дисц.ИАД
|
|
Data Mining |
|
|
Data Mining |
Силлабус Интеллектуальный Анализ Данных 4 курс,русс
|
|
Data Mining |
|
|
Data Mining |
|
|
Data Mining |
|
|
Data Mining |
|
|
Data Mining |
|
|
Data Mining |
|
|
Data Mining |
Силлабус Интеллектуальный Анализ Данных 4 курс, каз
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
Единая система S-20 Руководство администратора
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Security Control Systems |
|
|
Access Control |
Силлабус Контроль доступа
|
|
Access Control |
Контроль доступа в VPN
|
|
Access Control |
|
|
Access Control |
|
|
Access Control |
Силлабус по ИАД
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
Атака, защита и анализ
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
Эта книга фактически представляет собой научно-практическую энциклопедию по
современной кибербезопасности. Здесь анализируются предпосылки, история, методы
и особенности киберпреступности, кибертерроризма, киберразведки и киберконтрраз-
ведки, этапы развития кибероружия, теория и практика его применения, технологиче-
ская платформа кибероружия (вирусы, программные и аппаратные трояны), методы
защиты (антивирусные программы, проактивная антивирусная защита, кибериммунные
операционные системы).
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
СИЛЛАБУС Киберқауіпсіздік 4 курс СИБ
|
|
Cybersecurity |
|
|
Cybersecurity |
|
|
Cybersecurity |
|
1
Азанбай Құралай Талғатқызы
2022 - г.
80 - стр.
1
2
Азанбай Құралай ТалғатқызыАлгожаева Н.С.
2023 - г.
86 - стр.
0
3
Азанбай Құралай Талғатқызы
ӘЛЕУМЕТТІК ЖЕЛІЛЕРДЕГІ САЯСИ ЭКСТРЕМИЗМДІ ОНЛАЙН
ТАНУ ЖҮЙЕЛЕРІН ТАЛДАУ
2024 - г.
12 - стр.
4
4
Азанбай Құралай Талғатқызы
Қазақ тiлi үшiн қателердi түзету алгоритмiн әзiрлеу
2024 - г.
16 - стр.
123
5
Азанбай Құралай Талғатқызы
ОНЛАЙН ӘЛЕУМЕТТІК ЖЕЛІЛЕРІ БЕЙНЕЛЕРІН ӨҢДЕУ
АРҚЫЛЫ САЯСИ ЭКСТРЕМИЗМДІ АНЫҚТАУ МОДЕЛІ
2024 - г.
23 - стр.
1
6
Азанбай Құралай Талғатқызы
ӘЛЕУМЕТТІК ЖЕЛІЛЕРДЕ САЯСИ ЭКСТРЕМИЗМДІ
АНЫҚТАУ ПРОЦЕСТЕРІН МОДЕЛЬДЕУ
2025 - г.
11 - стр.
2
Google Scholar
Профиль автора
Web of Science
Профиль ResearcherID
Author Documents
0
Citations
0 по 0
documents
h-index
0