Articolul precedent |
Articolul urmator |
619 0 |
SM ISO690:2012 БРЕДИНСКИЙ, Анатолий. Носители информации и утечка данных: анализ международного опыта. In: Securitatea informaţională, Ed. 10, 19 aprilie 2013, Chișinău. Chisinau, Moldova: Departamentul Editorial-Poligrafic al ASEM, 2013, Ediția 10, pp. 33-36. ISBN 978-9975-75-640-2. |
EXPORT metadate: Google Scholar Crossref CERIF DataCite Dublin Core |
Securitatea informaţională Ediția 10, 2013 |
||||||
Conferința "Securitatea informaţională" 10, Chișinău, Moldova, 19 aprilie 2013 | ||||||
|
||||||
Pag. 33-36 | ||||||
|
||||||
Descarcă PDF | ||||||
Rezumat | ||||||
One of the key problems of information protection is protection of devices with confidential data. The process must be based on the complexity principle: protection of devices has to be performed as a unified system of measures. Such an approach aims to prevent and neutralize possible threats by means of all resources available as an integrated whole. |
||||||
|
Dublin Core Export
<?xml version='1.0' encoding='utf-8'?> <oai_dc:dc xmlns:dc='http://purl.org/dc/elements/1.1/' xmlns:oai_dc='http://www.openarchives.org/OAI/2.0/oai_dc/' xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd'> <dc:creator>Bredinschi, A.G.</dc:creator> <dc:date>2013</dc:date> <dc:description xml:lang='en'><p>One of the key problems of information protection is protection of devices with confidential data. The process must be based on the complexity principle: protection of devices has to be performed as a unified system of measures. Such an approach aims to prevent and neutralize possible threats by means of all resources available as an integrated whole.</p></dc:description> <dc:source>Securitatea informaţională (Ediția 10) 33-36</dc:source> <dc:title>Носители информации и утечка данных: анализ международного опыта</dc:title> <dc:type>info:eu-repo/semantics/article</dc:type> </oai_dc:dc>