SELECTION OF RADIO-ABSORBING COATING
ACCORDING TO THE SPECIFIED CRITERIA
Vladislav G. Yarikov
Candidate of Sciences (Pedagogy), Associate Professor,
Department of Information Security,
Volgograd State University
This email address is being protected from spambots. You need JavaScript enabled to view it.
Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation
Maxim V. Pashkov
Student, Department of Information Security,
Volgograd State University
This email address is being protected from spambots. You need JavaScript enabled to view it.
Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation
Abstract. This article is devoted to the issue of software protection based on the use of modern security methods. One of these methods is the introduction of procedures into the software system that should reduce the level of errors and the risks of vulnerability to the system and software. The key goal of the stage-by-stage implementation of the developed program is gradual detection of previously undetected errors and code defects. During this stage of software development both the customer and the executor may encounter a rather narrow range of errors related to partial data inconsistency when loading them into databases, as well as failures of program procedure execution due to the use of multi-user access. It is at this stage that the final picture of user interaction with the program is crystallized, and the degree of loyalty of the latter to the developed interface is also determined. If the output of the system to the design capacity after a number of modifications and improvements has occurred without any special complications, it means that the preliminary work on the project and the implementation of the previous stages of development were carried out correctly.
Key words: software, protection, data, methods, development, implementation.
This work is licensed under a Creative Commons Attribution 4.0 International License.