Information protection methods. Protected networks. Tutorial
Please sign in so that we can notify you about a reply
The textbook is intended for all users seeking to protect their information. The issues of work in safe TOR, I2P and others are considered.
It is recommended that students study in the educational program of secondary vocational education in specialties included in the enlarged groups of specialties of secondary vocational education “Informatics and computing technology” and “Information security”
It is recommended that students study in the educational program of secondary vocational education in specialties included in the enlarged groups of specialties of secondary vocational education “Informatics and computing technology” and “Information security”
Author:
Author:Nikiforov Sergey Nikolaevich
Cover:
Cover:Soft
Category:
- Category:Computer & Technology
Series:
Series: Secondary Professional Education
ISBN:
ISBN:978-5-8114-7907-8
No reviews found