Problems of developing the customs and logistics infrastructure of the East-West International Transport Corridor

The aim of this work is to identify key aspects of the impact of customs and logistics infrastructure on patterns of change in trade between the countries participating in the East-West International Transport Corridor.Author identifies factors that have the greatest impact on the volume kids overalls of freight traffic and highlights the prospects

read more


When stack protection does not protect the stack?

The majority of software vulnerabilities originate from buffer overflow.Techniques to eliminate buffer overflows and limit their damage include secure programming, source code CINNAMON EXTRACT audit, binary code audit, static and dynamic code generation features.Modern compilers implement compile-time and execution time protection schemes, that inc

read more