Begishev I. R. Creation, use and distribution of malicious computer programs.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"DOI 10.24412\/2413-046\u0425-2021-10249 \u041a\u041b\u0418\u0415\u041d\u0422\u041e\u041e\u0420\u0418\u0415\u041d\u0422\u0418\u0420\u041e\u0412\u0410\u041d\u041d\u042b\u0419 \u041f\u041e\u0414\u0425\u041e\u0414 \u041f\u0420\u0418 \u041f\u0420\u041e\u0415\u041a\u0422\u0418\u0420\u041e\u0412\u0410\u041d\u0418\u0418 \u0418 \u041c\u041e\u0414\u0415\u041b\u0418\u0420\u041e\u0412\u0410\u041d\u0418\u0418 \u0417\u0414\u0410\u041d\u0418\u0419 \u0418 \u0421\u041e\u041e\u0420\u0423\u0416\u0415\u041d\u0418\u0419 CLIENT-ORIENTED APPROACH TO DESIGN AND MODELING OF BUILDINGS AND STRUCTURES \u041f\u043e\u0442\u0435\u0445\u0438\u043d\u0430 \u0421\u043e\u0444\u044c\u044f \u0410\u043b\u0435\u043a\u0441\u0430\u043d\u0434\u0440\u043e\u0432\u043d\u0430, \u0424\u0413\u0410\u041e\u0423 \u0412\u041e \u00ab\u0421\u0438\u0431\u0438\u0440\u0441\u043a\u0438\u0439 \u0444\u0435\u0434\u0435\u0440\u0430\u043b\u044c\u043d\u044b\u0439 \u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u00bb (\u0421\u0424\u0423) \u0416\u0435\u043b\u0442\u0443\u0445\u0438\u043d\u0430 \u0414\u0438\u0430\u043d\u0430 \u0412\u044f\u0447\u0435\u0441\u043b\u0430\u0432\u043e\u0432\u043d\u0430, \u0424\u0413\u0410\u041e\u0423 \u0412\u041e \u00ab\u0421\u0438\u0431\u0438\u0440\u0441\u043a\u0438\u0439 \u0444\u0435\u0434\u0435\u0440\u0430\u043b\u044c\u043d\u044b\u0439 \u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u00bb (\u0421\u0424\u0423) \u041f\u0435\u0442\u0440\u043e\u0432\u0430 \u0410\u043d\u043d\u0430 \u0412\u044f\u0447\u0435\u0441\u043b\u0430\u0432\u043e\u0432\u043d\u0430, \u0424\u0413\u0410\u041e\u0423 \u0412\u041e \u00ab\u0421\u0438\u0431\u0438\u0440\u0441\u043a\u0438\u0439 \u0444\u0435\u0434\u0435\u0440\u0430\u043b\u044c\u043d\u044b\u0439 \u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u00bb (\u0421\u0424\u0423) \u041d\u0438\u0441\u043a\u043e\u0432\u0441\u043a\u0430\u044f \u0412\u0430\u043b\u0435\u043d\u0442\u0438\u043d\u0430 \u0412\u044f\u0447\u0435\u0441\u043b\u0430\u0432\u043e\u0432\u043d\u0430, \u0424\u0413\u0410\u041e\u0423 \u0412\u041e \u00ab\u0421\u0438\u0431\u0438\u0440\u0441\u043a\u0438\u0439 \u0444\u0435\u0434\u0435\u0440\u0430\u043b\u044c\u043d\u044b\u0439 […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[145],"tags":[204],"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7IyHt-5KI","_links":{"self":[{"href":"https:\/\/qje.su\/en\/wp-json\/wp\/v2\/posts\/22116"}],"collection":[{"href":"https:\/\/qje.su\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/qje.su\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/qje.su\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/qje.su\/en\/wp-json\/wp\/v2\/comments?post=22116"}],"version-history":[{"count":2,"href":"https:\/\/qje.su\/en\/wp-json\/wp\/v2\/posts\/22116\/revisions"}],"predecessor-version":[{"id":25775,"href":"https:\/\/qje.su\/en\/wp-json\/wp\/v2\/posts\/22116\/revisions\/25775"}],"wp:attachment":[{"href":"https:\/\/qje.su\/en\/wp-json\/wp\/v2\/media?parent=22116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/qje.su\/en\/wp-json\/wp\/v2\/categories?post=22116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/qje.su\/en\/wp-json\/wp\/v2\/tags?post=22116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}