March 28, 2016 between the State University of Telecommunications and State Enterprise Ukrainian Special Systems signed. The initiator of this cooperation was the Department of Information and cyber security.
Combining educational, scientific ..
March 28, 2016 between the State University of Telecommunications and State Enterprise Ukrainian Special Systems signed. The initiator of this cooperation was the Department of Information and cyber security.
Combining educational, scientific ..
Lecturer Information and cyber security Teaching and Research Institute of information security of the State University of Telecommunications issued a manual (laboratory practice) Information and cyberspace, security issues, methods and means of stru..
Teachers of the chair of the Department of Information and cyber securityЯкорь is developed and published methodical manual for execution of diploma thesis Methodical recommendations to implementation of the graduation works of Bachelor students majo..
March 24, 2016 the Department of Information and cyber security was held another contest on the security of information and communication systems.
Similar competitions are held annually chair. They allow students to assess the ability of the State..
March 17, 2015 at the session of the Specialized Academic Council K26.861.06 at the State University of Telecommunications defended thesis Berestova Denis Sergeyevich entitled Method of selection of project alternatives protection systems in automate..
On the SDS the Department of the state University of telecommunications, scientific and educational purposes, expanded program-technical complex of key certification center CryptoKDC, provided by the AUTHOR.
The open company AUTHOR is one of the l..
By Order of Ukraine from 25.02.2016 number 160 Head of the Department of Information and cyber security Burachki Vladimir Leonidovich was awarded the title of professor and assistant professor of Kozachok Valery Anatolyevich was awarded the rank of a..
Experts of the company Veracode submitted a report, on which work took them one and a half years. During this time, experts have studied more than 200 000 different applications trying to determine how the situation with security in the sphere of..