Skip navigation

putin IS MURDERER

Please use this identifier to cite or link to this item: https://oldena.lpnu.ua/handle/ntb/41169
Full metadata record
DC FieldValueLanguage
dc.contributor.authorIhnatovych, Anatoliy-
dc.date.accessioned2018-05-16T07:11:44Z-
dc.date.available2018-05-16T07:11:44Z-
dc.date.issued2016-
dc.identifier.citationIhnatovych A. Efficiency evaluating of the security components of computer systems / Anatoliy Ihnatovych // Litteris et Artibus : proceedings of the 6th International youth science forum, November 24–26, 2016, Lviv, Ukraine / Lviv Polytechnic National University. – Lviv : Lviv Polytechnic Publishing House, 2016. – P. 502–503. – Bibliography: 6 titles.uk_UA
dc.identifier.urihttps://ena.lpnu.ua/handle/ntb/41169-
dc.description.abstractThis research work proposes a general theoretical model of efficiency evaluating of the security components of computer systems. Efficiency complexity is overviewed and various components of efficiency evaluation are defined and there dimensions are derived.uk_UA
dc.language.isoenuk_UA
dc.publisherLviv Polytechnic Publishing Houseuk_UA
dc.subjectsecurity componentsuk_UA
dc.subjectcryptographyuk_UA
dc.subjecteffectivenessuk_UA
dc.subjectefficiencyuk_UA
dc.titleEfficiency evaluating of the security components of computer systemsuk_UA
dc.typeConference Abstractuk_UA
dc.contributor.affiliationLviv Polytechnic National Universityuk_UA
dc.coverage.countryUAuk_UA
dc.format.pages502-503-
dc.relation.referencesen[1] Kononova V. O. Otsinka zasobiv zakhystu informatsiinykh resursiv / V. O. Kononova, O. V. Kharkianen, Hrybkov S. V. // Visnyk NU “Lvivska politekhnika” “Kompiuterni systemy ta merezhi”. – 2014. – № 806. – S. 99–105. [2] Stallings W. Computer security: principles and practice / William Stallings, Lawrie Brown. – 2nd ed. – Pearson. – 2012. – 817 p. [3] ISO/IEC 27001 – Information security management [Electronic resource], https://www.iso.org/obp/ ui/#iso:std:iso-iec:27001:ed-2:v1:en. [4] Yakymenko I. Z. Analiz efektyvnosti zakhystu informatsii na osnovi kryptohrafichnykh peretvoren z vykorystanniam maskovanoho predstavlennia danykh / Yakymenko I. Z., Bozhyk S. V. // ACIT’5. “Suchasni komp’iuterni informatsiini tekhnolohii”. TNEU. – Ternopil. 22–23 travnia 2015. – C. 182–184. [5] Sposib shyfruvannia informatsii. Patent Ukrainy na korysnu model №99073. Biul. № 9 vid 12.05.2015. Ihnatovych A. O., Ivantsiv V. R., Ivantsiv R-A. D., Pavych N. Ia. [6] Ihnatovych A., Pavych N. Modeli pidvyshchennia efektyvnosti ta nadiinosti blokovykh shyfriv// Zbirnyk naukovykh prats. Visnyk Lvivskoho derzhavnoho universytetu bezpeky zhyttiediialnosti, № 11 (2015). – S. 101–110.uk_UA
dc.citation.conferenceLitteris et Artibus-
dc.coverage.placenameLvivuk_UA
Appears in Collections:Litteris et Artibus. – 2016 р.

Files in This Item:
File Description SizeFormat 
LEA-2016-502-503.pdf597.47 kBAdobe PDFView/Open
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.