Информационная безопасность. История защиты информации в России
The purpose of this article is to provide an overview of Microsoft cryptographic technologies. We review a cryptographic algorithms classification scheme along with Microsoft recommendations regarding the use of ciphers and hash functions. We show how cryptography can be used to solve problems different from encryption, including ultimate data destruction on hard drives, identity management, digital signatures etc. We conclude the article with an overview of cryptographic functions implementation in Windows and.NET Framework focusing on enterprise applications development.
In this paper are shown methods of information protection and also algorithms of embedding of additional information into digital graphics images.
The attitude of the main British political parties and groups to the problem of changes of the prerogatives and powers of the House of Lords during the introduction and discussion of the supreme legislative body of the Bill of Parliament of 1911 is discussed. The process of complicated co-ordinations, concessions and compromises during the discussions period on the text of the Bill is being examined. The Act of Parliament of 1911 characteristics and the reasons of the need for further reform of the House of Lords are given.