• Предпосылки появления, обзор и успешное внедрение Case-средств. Автоматическая генерация схем и средств концептуального моделирования баз данных. Визуальное моделирование в Rational Rose, а также типы процессов разработки программного обеспечения.

    курсовая работа (317,6 K)
  • Изучение рабочего интерфейса программы IBM Rational Rose 2003, назначение операций главного меню. Добавление актера на диаграмму вариантов использования и редактирование его свойств. Особенности разработки диаграмм вариантов использования в данной среде.

    реферат (377,7 K)
  • Рассмотрение сущности CASE-технологий, моделей жизненных циклов программного продукта и этапов анализа и проектирования. Изучение тенденций развития современных информационных технологий. Характеристика и классификация CASE-средств, условия их внедрения.

    лекция (28,7 K)
  • CASE-средство: сущность, назначение, составляющие. Преимущества и недостатки применения CASE-технологий. Характеристика CASE-средств, предназначенных для проектирования информационных систем бизнес-класса, моделирования баз данных, создания документации.

    реферат (21,1 K)
  • Researching network attacks, security audit tools. Securing the router for administrative Access. Configuring a site-to-site VPN using cisco IOS and SDM. Configuring a remote Access VPN server and client. Security policy development and implementation.

    учебное пособие (15,3 M)
  • Структура записываемых компакт-дисков, процесс их изготовления. Комплексная характеристика четырех основных слоев, наносимых поэтапно на поверхность CD-R носителей. Покрытия, которые делают CD более устойчивым к царапинам и химическим воздействиям.

    презентация (329,2 K)
  • Control the computer's resources, the hardware, software as one of the operating systems main tasks. The use of a graphical user interface that eliminates the need to learn complex commands - a feature of the operating systems of the Windows family.

    презентация (470,6 K)
  • Information security and risk management. Business continuity and disaster recovery. Legal, regulations, compliance and investigations. Operating system architecture. Information technology security evaluation criteria. LAN media access technologies.

    учебное пособие (18,1 M)
  • Creating a classification of methods and ranking of commercial sites of the coal-energy and mining-metallurgical complexes with regard to their marketing. Development of the system criteria local commercial sites, their formalization and the digitized.

    статья (97,4 K)
  • Methods for graphic and text image region classification. Construction of the narrative function characterizing areas of the image sub-elements is proposed. This function can be used for training and classification using support vector machines.

    статья (423,3 K)
  • Features of the design method of classification of text and graphic image area. Building descriptive functions that characterize the sizes of the objects in the image, which can be used for learning and classification using support vector machine.

    статья (427,0 K)
  • Image as the object image, the phenomenon, in varying degrees, such a depicted or the process of their creation. Development of a method for classification of text and graphic image area. Training and classification using machine reference Vectors.

    статья (427,0 K)
  • Replacing symbolic information, such as a sequence of bits or a message written in a natural language, by another message using different symbols. The properties of arithmetic coding. The problem of reliable communication. Coding natural languages.

    книга (2,2 M)
  • From the Riddles of Ancient Egypt to Cryptography in the Renaissance — 3500 Years in the Making. Three Post-Renaissance Centuries. Symmetric-Key and Public-Key Cryptography. Electronic Mail and Internet Security. Noncryptographic Security Issues.

    книга (4,7 M)
  • Characterization of the foundations of modern cryptography for practitioners. Description of codes for error detection. Definition of advance in coding theory and cryptography. The main advances in algebraic geometry codes and coding in cryptology.

    книга (8,4 M)
  • Goal and task hierarchies. The model aspects of users: understanding, knowledge, intentions, processing. The study of complexity theory. Use rules of production. Device generalized transition networks. Four rules to model problem architectural spaces.

    лекция (250,1 K)
  • Theory and tools communication. Effect of employees at computer system. The importance of accurate pronunciation and eye contact. Gestures and body language programs. Back channels and turn-taking. Multiplexing – several topics in one utterance.

    лекция (348,3 K)
  • Instructional design model is approaching creating rules to address into learning. The model was designed for simulation and that may easy to utilize by adept and beginner. The Ausubel’s Assimilation Theory is theory focus on "meaningful learning".

    реферат (613,9 K)
  • An integrated approach to the study of different kinds of virus attacks that are launched against wireless networks and computer systems. Characteristics of certificate programs provide protective mechanisms and practical tools for information security.

    книга (8,8 M)
  • Stages of development and analysis of the effectiveness of the mechanism, which will help identify the line with Romanian chromatic words on the basis of computer technology as the first phase of development of the dictionary meanings of poetic colors.

    статья (192,7 K)