METHODS OF LIMITING AUTHORIZED ACCESS AND EXIT OF INFORMATION IN COMPUTER NETWORKS
Keywords:
LAN, WAN, information systems, computer networks, unauthorized access, computer viruses.Abstract
With the widespread use of computer networks and the internet, information security issues are becoming increasingly relevant. This topic is aimed at studying the methods of restricting unauthorized access and leakage of information in computer networks. Information security is especially important in corporate networks, government organizations, and personal computers. Effective application of these methods helps prevent cases of information theft, damage, or misuse in networks.
References
Karl A. Astrom, Bjom Wittenmark. Computer-Controlled Systems: Theory and Design, Third Edition. - USA: Dover Publications, 2011. 576 p.
Fritz Klocke. Modeling and Planning of Manufacturing Processes. - Тошкент, 2016. -658p.
Olifer V.G., Olifer N.A. Computer Networks. Principles, technologies, protocols. Textbook. - 3rd edition. St. Petersburg. Peter. 2006.
Broydo V.L. Computing Systems, Networks, and Telecommunications. St. Petersburg: Piter. 2003.
Botirov T.V., Sattorov O.U., Kadirov Yo'.B., Boboyev A.A Computer Systems and Networks. Textbook.- Navoi-2019. - 443 pages.






Azerbaijan
Türkiye
Uzbekistan
Kazakhstan
Turkmenistan
Kyrgyzstan
Republic of Korea
Japan
India
United States of America
Kosovo