Кафедра ИСиТ УО ВГТУ
  • Специальности
    • Экономика электронного бизнеса
    • Информационные системы
    • Information Control Systems
  • Каталог
  • Сайт кафедры
  • Сервисы
    • GitLab
    • ownCloud
    • JupyterHub
    • JupyterHub 2
    • VNC
    • Soft
  1. ICS
  2. ITCS
  • ICS
    • ITCS
      • Theory
        • Computer security issues
        • Computer Security Mechanisms
        • Common Principles of Cryptography
        • Asymmetric encryption
        • Data integrity
        • Steganographic methods for information protection
      • Practice
        • Basics of Symmetric Encryption Algorithms
        • Asymmetric crypto algorithms
        • Data Integrity
    • TSTPI
      • Theory
        • Fundamentals of Data Transmission Networks
        • Fundamentals of digital data transmission
        • Network interconnection using network layer protocols
        • Trends in the development of telecommunication technologies and computer networks
        • Search Engines
        • Information security. Confidential information
      • Practice
        • Basic Network Utilities
        • Installing of Network OS
        • Linux network utilities
        • SSH Protocol
        • User Accounts Management
        • Protocol Analysis Using a Network Traffic Analyzer

On this page

  • Theory
  • Practice
  • Links
  1. ICS
  2. ITCS

ITCS

Innovative Technologies for Computer Security

Courses
Author

Andrei Biziuk

Published

December 2, 2024

Theory

Title
Computer security issues
Computer Security Mechanisms
Common Principles of Cryptography
Asymmetric encryption
Data integrity
Steganographic methods for information protection
No matching items

Practice

Title
Basics of Symmetric Encryption Algorithms
Asymmetric crypto algorithms
Data Integrity
No matching items

Links

Jupyter

VNC

Back to top
ICS
Theory