Headings of the journal
"Educational Resources and Technologies"

Educational environmentMethods and technologies of training and educationInformation technologyMathematical cyberneticsMethodological researchManagement in social and economic systemsApplied GeoinformaticsEducation for sustainable developmentAll rubrics

All rubrics

Methods of analysis and risk assessment Information security

Page:73-79

Release: 2015-1 (9)

Annotation: In General, risk understand the possibility of the occurrence of certain adverse events, which leads to a different kind of loss. In accordance with GOST R 51897-2002 «Management of risk. Terms and definitions» and the international standard ISO 27001 management System information security – risk management process is a coordinated action to manage and control an organization's information security risk (IB). Risk management includes risk assessment, treatment of risk, assumption of risk and the message about the risk

Methods of estimating the benefits of information

Page:77-90

Release: 2015-4 (12)

Annotation: The article describes the characteristics of the new information – information advantage. This article describes the methods of analysis of information advantage. The article reveals the contents of the new concepts. This article contains analytical expressions that allow for evaluation under fuzzy and semistructured information. The proposed methods allow to simulate real situations of competition.

Space sphere of military action

Page:96-103

Release: 2015-3 (11)

Annotation: The paper considers the near-Earth space as a potential area of operations. The paper describes the properties of space, which are important to the war effort and military intelligence. The paper describes the scope of space warfare and space military apparatuses. The article noted close to Geoinformatics geospatial intelligence. This article describes the features of space weapons and their means of delivery. The article mentioned the nuclear tests in outer space. The article describes the characteristics of space groups in the wars of today

Development of computer science

Page:71-75

Release: 2015-2 (10)

Annotation: The article analyzes the development of the two areas of computer science. One direction is called informatics 1. The second direction is called Informatics 2. Computer 1 examines the content side information. Computer 2 explores questions of transmission and processing of information. Article shows that in each subject area computer science becomes specialized. Article shows the difference between the specialized informatics and geoinformatics.

The elements of the methodology of data Protection in automated system

Page:80-82

Release: 2015-1 (9)

Annotation: Develop and prove the elements of the methodology of data protection on the basis of «write-once» with the use of electronic signatures and the concatenation of binary vectors. The technique may be used to protect (integrity) of the data in automated systems