захист

Economic and legal principles of protection of property rights in the areas of conducting united forces operation

The article is devoted to the economic and legal principles of protection of property
rights in areas of operation of the united forces in Ukraine. Particular attention is focused
on modern economic and legal challenges and threats, factors of anthropogenic influence
on the sphere of property and ways of their overcoming. The article clarifies the problems
of implementation of economic and legal measures to guarantee the citizens of Ukraine the
right to own, use and dispose of property, factors of creating an effective economic and

Using CAPTCHA technology: pros and cons. Ways to secure from spam-bots attacks.

This paper is devoted to CAPTCHA technology. Algorithms of creation and work of captcha are described. The scheme of how captcha works is also included. The means of encoding and ‘complication’ of decoded text are described. The main ways of automatic captcha’s recognition are described. Also, it is given in examples options of CAPTCHA’s tests. The programing means that do not require user’s actions are considered. By the way, pros and cons of testing captcha are analyzed. In addition, the main problems that may occur during developing captcha are analyzed.

The Protection of Wooden Constructing Materials and Structural Elements of Buildings Against Biological Damage

The methods of wooden building materials protection from biological damage were analysed. Constant technical monitoring is the main preventive measure against damage of structural elements of the wooden buildings. The most effective methods from biological damage are chemical treatment, capillary infiltration, diffusion treatment and impregnation under pressure.

Data Protection With Intellectual Support of Organizational and Technical and Operational Management

For the successful use of modern information technologies, it is necessary to effectively manage not only the network, but also information systems security (ISS), the information system on the level of the system must operate autonomously implementing the management structure of information security events, planning the composition of modular ISS and audit.

Системна, нормативна, комплексна моделі захисту інформаційних технологій

Розроблено системну, нормативну, комплексну моделі захисту інформаційних технологій на основі концепції об’єкт – загроза – захист – управління.