Abstract

Ways of solving the issue of determining and timely implementation of early and urgent rational organizational measures to protect electronic computing equipment (ECT) objects from unauthorized access to ensure information security at the control points of the military formation were considered.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call