Кафедра ИСиТ УО ВГТУ
  • Специальности
    • Экономика электронного бизнеса
    • Информационные системы
    • Information Control Systems
  • Каталог
  • Сайт кафедры
  • Сервисы
    • GitLab
    • ownCloud
    • JupyterHub
    • JupyterHub 2
    • VNC
    • Soft
  1. ICS
  2. ITCS
  • ICS
    • ITCS
      • Theory
        • Computer security issues
        • Computer Security Mechanisms
        • Common Principles of Cryptography
        • Asymmetric encryption
        • Data integrity
        • Steganographic methods for information protection
      • Practice
        • Basics of Symmetric Encryption Algorithms
        • Asymmetric crypto algorithms
        • Data Integrity
    • TSTPI
      • Theory
        • Fundamentals of Data Transmission Networks
      • Practice
        • Basic Network Utilities
        • Installing of Network OS
        • Linux network utilities
        • SSH Protocol

On this page

  • Theory
  • Practice
  • Links
  1. ICS
  2. ITCS

ITCS

Innovative Technologies for Computer Security

Courses
Author

Andrei Biziuk

Published

December 2, 2024

Theory

Title
Computer security issues
Computer Security Mechanisms
Common Principles of Cryptography
Asymmetric encryption
Data integrity
Steganographic methods for information protection
No matching items

Practice

Title
Basics of Symmetric Encryption Algorithms
Asymmetric crypto algorithms
Data Integrity
No matching items

Links

Jupyter

VNC

Back to top
ICS
Theory