<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">The Use of Information (Distance) Technologies in the Process of Hospitality Industry Professional Training under COVID19 Pandemic Conditions in the Southern Region of Russia</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Petr</forename><surname>Chetyrbok</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">V.I</orgName>
								<orgName type="institution">.Vernadsky Federal University</orgName>
								<address>
									<postCode>295007</postCode>
									<settlement>Simferopol</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Marina</forename><surname>Shostak</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">V.I</orgName>
								<orgName type="institution">.Vernadsky Federal University</orgName>
								<address>
									<postCode>295007</postCode>
									<settlement>Simferopol</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Yulia</forename><surname>Andrusenko</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">North-Caucasian Federal University</orgName>
								<address>
									<postCode>355000</postCode>
									<settlement>Stavropol</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Tatiana</forename><surname>Gish</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">North-Caucasian Federal University</orgName>
								<address>
									<postCode>355000</postCode>
									<settlement>Stavropol</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">The Use of Information (Distance) Technologies in the Process of Hospitality Industry Professional Training under COVID19 Pandemic Conditions in the Southern Region of Russia</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">D1510C78529B6AD484ED636A44439D1F</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T13:40+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Information</term>
					<term>technology</term>
					<term>development of a video course for the discipline</term>
					<term>methodology for presenting lecture material</term>
					<term>information security</term>
					<term>distance work</term>
					<term>monitoring</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The article identifies recommendations for the use of information (distance) technologies in the process of hospitality industry professional training in the context of the Covid 19 pandemic in the southern region of the Russian Federation. Considered are the performance capabilities of the Moodle 3+ platform in the hospitality industry professional training. In the context of telecommuting in the hospitality industry, special attention is paid to specialists' efficiency and information security. Highlighted are the performance capabilities of StaffCop Enterprise in monitoring the hospitality industry specialists' distance work.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The use of information (distance) technologies in the process of hospitality industry professional training in the southern region of the Russian Federation during the Covid 19 pandemic have become particularly relevant. This situation is associated with the need to ensure distance interaction within the educational process. At the same time, it should be noted that the requirements for the level of professional training on the part of the hospitality industry enterprises in the region remain unchanged, since it is obvious that the current unfavorable situation will be over in the foreseeable future. Under the current conditions, educational institutions face the need to develop, adapt and apply informational distance educational technologies, which, on the one hand, can provide professional training at the required level in accordance with employers' requests, and on the other hand, ensure the quality of the educational process based on existing educational standards. CEUR Workshop Proceedings (CEUR-WS.org)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Purpose and objectives of the research</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Literature review</head><p>The provisions of state regulation in the area are considered in the sources <ref type="bibr">[1; 2]</ref> within the framework of the analysis of the existing requirements for the organizational aspects of information technologies used in the Russian Federation. The analysis of the use of distance technologies in the educational process has been carried out on the basis of the following sources <ref type="bibr" target="#b33">(Chetyrbok, 2019;</ref><ref type="bibr">Kazak, Chetyrbok, Oleinikov, 2020)</ref>. When studying the organization of hospitality industry professional training, the authors were guided by the following works: Bagiev, Tarasevich, 2017; Agrova, 2015; Zubova, 2020; Kutuzov, Tatarnikova, Tsekhanovsky, 2020; Olifer, N., <ref type="bibr">Olifer</ref>  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Methodology</head><p>In the context of the Covid 19 pandemic, it is most rational to use distance learning methodology on the Moodle 3+ platform in the process of hospitality industry training, since it provides for distance online courses within the framework of hospitality industry specialists' distance work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Results</head><p>Nowadays, the use of information (distance learning) technologies in the process of hospitality industry professional training is especially relevant in the context of the Covid 19 pandemic in the southern region of the Russian Federation.</p><p>Information technology in distance education is divided into three groups: 1. Technologies of presentation; 2. Technologies of storage and processing; 3. Technologies for the transmission of educational information. The combination of these groups forms the technology of distance learning. Let us consider the possibilities of distance learning based on the Moodle 3+ e-course management system. The main teaching unit of Moodle 3+ is the curriculum. Such a course allows for the following activities:</p><p>1. Studentstudent and studentteacher interaction. Such elements as forums and chats prove helpful. 2. Transfer of knowledge in electronic form using files, archives, web pages and lectures.</p><p>3. Testing knowledge and learning with tests and assignments. Students can send the results of the accomplished work in the form of texts or files.</p><p>4. Students' educational and research co-working on a specific topic, using built-in wiki mechanisms, seminars and forums. The Moodle 3+ system provides for the following:</p><p>-choosing time and place for training, which is convenient both for teachers and students; -strong knowledge acquisition; -teacherstudent contact when it is needed; -individualization of training. The educational process of distance learning includes all the main forms of the standard organization of the educational process: laboratory practice, lectures, tutorials and seminars, the supervision system and students' individual and research work.</p><p>Lecture is the main organizational form of training aimed at the primary knowledge acquisition.</p><p>If video lectures are used, then teachers' lectures are recorded using electronic media. It can be supplemented by various editing methods with multimedia applications illustrating the presentation of lectures. Such additions serve not only to enrich the content of lectures, but also to make its presentation more lively, understandable and attractive for students.</p><p>Students' individual work is an integral part of any form of study. Thanks to distance learning technologies, students deal with lecture materials using interactive computer training programs for multimedia lectures.</p><p>Academic performance rating conducted by teachers is one of the main forms of organizing the educational process. In the distance learning system, almost all possible organizational forms of control are used, supplemented by specially developed computer programs allowing removing part of the workload from teachers and increasing the effectiveness and timeliness of control. Thus, the use of new educational technologies makes it possible to carry out such types of control: current, thematic, midterm and final.</p><p>Students' research work in the full-time education format, as a rule, consists in conducting scientific student conferences, seminars, writing theses, term papers and projects, as well as implementing educational research assignments. The distance learning system implies the use of a variety of pedagogical technologies that will make it possible to implement game, research and creative forms of project pedagogical activity which forms the basis of students' research work. The Moodle Learning Management System is a management system specifically designed to create high-quality online courses. In terms of the provided capabilities, Moodle is comparable to well-known commercial distance learning systems. At the same time, this system has an obvious advantage over them as it is distributed in the open source code, which makes it possible to customize the system for the specific features of a certain educational project, and, if necessary, build new modules into it.</p><p>Great communication possibilities belong to Moodle's greatest strengths. The system supports exchanging files of any format (both between teachers and students and among students themselves). The mailing service allows promptly informing all course participants or individual groups about current events.</p><p>An important feature of Moodle is that the system creates and stores each student's portfolio: all the submitted assignments, all the teacher's grades and comments to the accomplished tasks and all the messages in the forum.</p><p>Teachers can create and use any grading system within their courses. All grades for each course are stored in a summary sheet. It allows controlling the "attendance", students' activity and the time they spend on their academic tasks in the network.</p><p>The modular structure of the system makes the system easy to use for students and teachers. The presence of an open community, consisting of more than 50,000 system users and more than 3,000 implemented distance learning systems around the world allows for effective experience exchange.</p><p>According to numerous studies of various software platforms' capabilities, the Moodle system turned out to be the sole leader. It should be noted that, given the continuous improvement of all systems, Moodle occupies a leading position nowadays.</p><p>One of the most important competencies managers in the hospitality industry should possess is to productively and safely use the information resources of the companies they work at.</p><p>StaffCop Enterprise is a powerful set of tools for analyzing events and information, which allows assessing and monitoring managers' efficiency when they use computers, quickly and accurately investigating information security incidents within the enterprise, and also solving a wide range of tasks related to information security analytics.</p><p>The StaffCop monitoring agent, like its service, disguises itself as system processes and services, which names do not give a hint that these elements are responsible for monitoring.</p><p>The information collected by the monitoring agent is stored on the computers where the monitoring agent is installed. It is encrypted and not available for free viewing.</p><p>With the help of StaffCop information security tools, the network administrator and the head of the enterprise will be able to control events in their managers' computers (both in the local and distance networks), as well as all data transmission channels:</p><p>-Web mail services and social networks (mail.ru, yandex.ru, gmail.com, VK, FB, Odnoklassniki, LinkedIn, etc.).</p><p>-Mail protocols (SMTP / SMTPs, IMAP, POP3 / POP3s, MS Exchange).</p><p>-Internet messengers (Skype, ICQ, QIP, Jabber (XMPP), Mail.ru Agent, Yahoo and others).</p><p>-Transfer of hypertext information and files (HTTP / HTTPs, FTP / FTPs).</p><p>-Shadow file copying (from e-mails and removable media transmitted via the Internet and sent to print).</p><p>-USB ports (control and blocking).</p><p>The reports also provide information on USB usage in the form of a "USBCachedFiles" folder. The subdirectories contain copies of files copied to and from USB devices.</p><p>Data graphs help visualize anomalies in managers' behavioral analysis.</p><p>StaffCop Enterprise is based on the OLAP complex multidimensional data analysis technology allowing creating multidimensional reports on-the-fly and processing huge amounts of data within seconds.</p><p>The applied technology makes it possible to establish a correlation between the data collected by agents on endpoints in a few clicks.</p><p>The most illustrative example of plotting a graph is a line graph of the number of events for copying files to removable media. It is very easy to do (specify the time interval and limit the data set by the dimensions "copy operation", "disk type: Removable" and select the "Linear graph" display type in the report designer (figure <ref type="figure">1</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 1: Line graph of the number of file copy events</head><p>To an unaided eye, it is obvious that the facts of copying files significantly exceed the average on one of the days. By clicking on the top of the chart, one can go to the list of all copy operations of that day. To study the data in close-up, one can simply click on the correspondent graph node. Figure <ref type="figure" target="#fig_1">2</ref> shows the obtained data about every manager in the form of a bar graph. In order to simplify security officers' analyzing managers' actions and identifying any deviations, an automatic anomaly detector is implemented in StaffCop. It analyzes managers' behavior over a selected period of time and shows deviations from the regular behavior format (figure <ref type="figure">3</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 3: Automatic anomaly detector in StaffCop Enterprise</head><p>For instance, every manager uses the same applications approximately the same number of times every day. If the number of operations is in large excess over the standard value, then StaffCop Enterprise considers such an event as abnormal behavior, which may be a potential threat. It is also possible to connect to the manager's desktop. This can be done directly from the administrator's console in the browser and, if necessary, one can take control over the manager's computer (figure <ref type="figure" target="#fig_2">4</ref>). Thus, the agent program is launched on workstations or terminal servers with the Windows operating system. It monitors managers' actions and events on their computers, transfers them to the server and also implements blocking and access denials. StaffCop Enterprise agent can run on a remote computer which is not in the enterprise's local network. Using this tool, one can quickly and efficiently find atypical activity of managers or programs. Such actions apply to almost any kind of event. Dangerous actions most often occur during spontaneous activation: addressing personal mail; network activity of applications; connection of removable USB-devices: flash drives, phones, etc.; using a printer; activity outside the normal working hours.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Discussion</head><p>The use of distance technologies in the educational process was discussed at the 4th All-Russian Scientific and Practical Conference (with international participation) on Distance Educational Technologies -2019 <ref type="bibr" target="#b33">(Chetyrbok, 2019)</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Conclusion</head><p>Nowadays, the use of information technologies in the process of hospitality industry professional training in the context of the Covid 19 pandemic in the Southern region of the Russian Federation is especially relevant. In the article, the authors have discussed the possibilities of distance learning based on the Moodle 3+ e-course management system and developed recommendations for its use in the process of hospitality industry professional training under the Covid 19 pandemic conditions.</p><p>Under the conditions of distance work in the hospitality industry, particular attention is paid to specialists' productivity and information security. StaffCop Enterprise is a powerful set of tools for analyzing events and information, which allows evaluating and monitoring managers' productivity while using computers, quickly and accurately investigating information security incidents within the enterprise, and also solving a wide range of tasks related to information security analytics.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>The purpose of the research is to work out recommendations on the use of information (distance) technologies in the process of hospitality industry professional training in the context of the Covid 19 pandemic. Research objectives are as follows: -analyzing the use of distance learning technologies in hospitality industry professional training in the context of the Covid 19 pandemic; -using tools for analyzing StaffCop Enterprise events and information in the hospitality industry. _______________________________ SLET-2020: International Scientific Conference on Innovative Approaches to the Application of Digital Technologies in Education, November 12-13, 2020, Stavropol, Russia EMAIL: petrchetyrbok@gmail.com (Petr Chetyrbok); marinashostak2010@gmail.com (Marina Shostak); zik@ncfu.ru (Yulia Andrusenko); gtanya09@mail.ru (Tatiana Gish) ORCID: 0000-0002-0115-9158 (Petr Chetyrbok); 0000-0002-3834-0559 (Marina Shostak); 0000-0002-3392-7270 (YYulia Andrusenko); 0000-0003-2761-7847 (Tatiana Gish) ©️ 2020 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Data drilldown: a bar graph</figDesc><graphic coords="4,85.05,503.35,444.00,228.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Remote connection to a company manager's desktop</figDesc><graphic coords="5,86.55,487.68,467.71,256.15" type="bitmap" /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m">educational process has been carried out on the basis of the following sources</title>
				<imprint>
			<publisher>Chetyrbok</publisher>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
	<note>References The provisions of state regulation in the area are considered in the sources [1; 2] within the framework of the analysis of the existing requirements for the organizational aspects of information technologies used in the Russian Federation. The analysis of the use of distance technologies in the</note>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m" type="main">When studying the organization of hospitality industry professional training, the authors were guided by the following works: Bagiev</title>
		<author>
			<persName><forename type="first">Chetyrbok</forename><surname>Kazak</surname></persName>
		</author>
		<author>
			<persName><surname>Oleinikov</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2017">2020. 2017</date>
			<publisher>Tarasevich</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title/>
		<author>
			<persName><surname>Agrova</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title/>
		<author>
			<persName><surname>Zubova</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Tatarnikova</forename><surname>Kutuzov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Tsekhanovsky</forename></persName>
		</author>
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">N</forename><surname>Olifer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Olifer</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Golubkova</forename><surname>Yurchik</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Lukyanova</forename><surname>Kazak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Chetyrbok</forename></persName>
		</author>
		<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Dzhulay</forename><surname>Chetyrbok</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<author>
			<persName><surname>Shostak</surname></persName>
		</author>
		<title level="m">of hospitality industry professional training is controlled and how information security is ensured, the following sources were considered</title>
				<editor>
			<persName><forename type="first">Davydov</forename><surname>Voronin</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2016">2020. 2016</date>
		</imprint>
	</monogr>
	<note>In order to analyze how the distance mode</note>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title/>
		<author>
			<persName><surname>Kertov</surname></persName>
		</author>
		<author>
			<persName><surname>Boliev</surname></persName>
		</author>
		<author>
			<persName><surname>Shogenov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Kucherova</forename><surname>Zhilokov</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Kondratenko</forename><surname>Novikov</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title/>
		<author>
			<persName><surname>Tarasov</surname></persName>
		</author>
		<author>
			<persName><surname>Bakhareva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ushakov</forename><surname>Malakhov</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title/>
		<author>
			<persName><surname>Sergeev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Tengaykin</title>
		<imprint>
			<date type="published" when="2016">2016. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Petrovsky</forename><surname>Tumbinskaya</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<title level="m">Мoscow: Committee of the Russian Federation for Standardization, Metrology and Certification</title>
				<imprint>
			<publisher>Military Register</publisher>
			<date type="published" when="2002">2002. 2002</date>
			<biblScope unit="page">51987</biblScope>
		</imprint>
		<respStmt>
			<orgName>Information Technology. Set of Standards at Nuclear Power Plants</orgName>
		</respStmt>
	</monogr>
	<note>Typical Requirements and Performance Indicators of Information Systems</note>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Federal Law of the Russian Federation on Information</title>
		<idno>149-FL. 27</idno>
	</analytic>
	<monogr>
		<title level="m">Information Technologies and Information Security</title>
				<imprint>
			<date type="published" when="2006-07">July, 2006. 2006</date>
		</imprint>
	</monogr>
	<note>Article 2</note>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">L</forename><surname>Bagiev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">M</forename><surname>Tarasevich</surname></persName>
		</author>
		<title level="m">Marketing. St. Petersburg</title>
				<imprint>
			<publisher>Piter Publ</publisher>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">O</forename><surname>Agrova</surname></persName>
		</author>
		<ptr target="http://sci-article.ru/stat.php?i=1443528790_" />
		<title level="m">Studies into Modern WEB-design Tendencies</title>
				<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
	<note type="report_type">SCI-ARTICLE</note>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Technology for Monitoring Equipment&apos;s Technical Condition in Local Networks</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">V</forename><surname>Voronin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">A</forename><surname>Davydov</surname></persName>
		</author>
		<ptr target="https://e.lanbook.com/journal/issue/300657" />
	</analytic>
	<monogr>
		<title level="j">Computer Science and Control Systems [Informatika i sistemy upravleniya</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="79" to="91" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title level="m" type="main">Computer Studies and Information and Computer Technology</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">D</forename><surname>Zubova</surname></persName>
		</author>
		<ptr target="https://e.lanbook.com/book/140773" />
		<imprint>
			<date type="published" when="2020">2020</date>
			<publisher>Lan&apos; Publ</publisher>
			<pubPlace>St. Petersburg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Modeling Organizations&apos; Secure Local Networks in the CISCO PACKET TRACER 6.2</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">V</forename><surname>Kertov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><forename type="middle">V</forename><surname>Boliev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Shogenov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">H</forename><surname>Zhilokov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kucherova</surname></persName>
		</author>
		<author>
			<persName><surname>Yu</surname></persName>
		</author>
		<ptr target="http://top-technologies.ru/ru/article/view?id=36773" />
	</analytic>
	<monogr>
		<title level="m">Simulation Environment. Modern Knowledge Intensive Technologies [Sovremennye naukoemkie tekhnologii</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="19" to="24" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<title level="m" type="main">Infocommunication Systems and Networks</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">I</forename><surname>Kutuzov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">M</forename><surname>Tatarnikova</surname></persName>
		</author>
		<author>
			<persName><forename type="middle">V V</forename><surname>Cekhanovskij</surname></persName>
		</author>
		<ptr target="https://e.lanbook.com/book/136177" />
		<imprint>
			<date type="published" when="2020">2020</date>
			<publisher>Lan&apos; Publ</publisher>
			<pubPlace>St. Petersburg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Essentials of Local Networks</title>
		<author>
			<persName><forename type="first">Yu</forename><forename type="middle">V</forename><surname>Novikov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Kondratenko</surname></persName>
		</author>
		<ptr target="https://e.lanbook.com/book/100303" />
	</analytic>
	<monogr>
		<title level="m">Nacional&apos;nyj Otkrytyj Universitet «INTUIT</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<title level="m" type="main">Computer Networks. Principles, Technologies, Protocols</title>
		<author>
			<persName><forename type="first">V</forename><surname>Olifer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Olifer</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2016">2016</date>
			<publisher>Piter Publ</publisher>
			<pubPlace>St. Petersburg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Designing and Modeling of Communication Networks</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">N</forename><surname>Tarasov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">F</forename><surname>Bahareva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Malahov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yu</forename><forename type="middle">A</forename><surname>Ushakov</surname></persName>
		</author>
		<ptr target="https://e.lanbook.com/book/111917" />
	</analytic>
	<monogr>
		<title level="m">Laboratory Workshop</title>
				<meeting><address><addrLine>St. Petersburg</addrLine></address></meeting>
		<imprint>
			<publisher>Lan&apos; Publ</publisher>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<title level="m" type="main">Essentials of Local Computer Networks</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">N</forename><surname>Sergeev</surname></persName>
		</author>
		<ptr target="https://e.lanbook.com/book/87591" />
		<imprint>
			<date type="published" when="2016">2016</date>
			<publisher>Lan&apos; Publ</publisher>
			<pubPlace>St. Petersburg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Organization of Network Administration</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">A</forename><surname>Tengajkin</surname></persName>
		</author>
		<ptr target="https://e.lanbook.com/book/136178" />
	</analytic>
	<monogr>
		<title level="m">Network Operating Systems, Servers, Services and Protocols. Laboratory Sessions</title>
				<meeting><address><addrLine>St. Petersburg</addrLine></address></meeting>
		<imprint>
			<publisher>Lan&apos; Publ</publisher>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<monogr>
		<title level="m" type="main">Information Security at Enterprises</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">V</forename><surname>Tumbinskaya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">V</forename><surname>Petrovskij</surname></persName>
		</author>
		<ptr target="https://e.lanbook.com/book/130184" />
		<imprint>
			<date type="published" when="2020">2020</date>
			<publisher>Lan&apos; Publ</publisher>
			<pubPlace>St. Petersburg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<monogr>
		<title level="m" type="main">Network Infrastructure Design. Organization, Principles of Construction and Functioning of Computer Networks</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">A</forename><surname>Tengajkin</surname></persName>
		</author>
		<ptr target="https://e.lanbook.com/book/139281" />
		<imprint>
			<date type="published" when="2020">2020</date>
			<publisher>Lan&apos; Publ</publisher>
			<pubPlace>St. Petersburg</pubPlace>
		</imprint>
		<respStmt>
			<orgName>Laboratory Sessions</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<monogr>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">F</forename><surname>Yurchik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">B</forename><surname>Golubkova</surname></persName>
		</author>
		<title level="m">IPSC Design and Operation</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<publisher>MADI</publisher>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Analysis of the Development Dynamics in the Tourist and Recreational Sphere of the Crimean Region. Problems and Prospects of Tourism Evolution in the Southern Federal District</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">N</forename><surname>Kazak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">Yu</forename><surname>Luk'yanova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">V</forename><surname>Chetyrbok</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Collection of Research Papers</title>
		<imprint>
			<biblScope unit="page" from="114" to="120" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Development of an Information Management System for a Hotel Industry Enterprise as Exemplified by a Guesthouse</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">V</forename><surname>Chetyrbok</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Dzhulaj</surname></persName>
		</author>
		<ptr target="https://elibrary.ru/item.asp?id=41205880" />
	</analytic>
	<monogr>
		<title level="m">Science Days at V. I. Vernadsky Crimean Federal University</title>
		<title level="s">Dni nauki Krymskogo federal&apos;nogo universiteta</title>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="61" to="62" />
		</imprint>
	</monogr>
	<note>im. V. I. Vernadskogo</note>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Distance Technologies&apos; Employment in the Educational Process. Distance Learning Technologies</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">V</forename><surname>Chetyrbok</surname></persName>
		</author>
		<ptr target="https://elibrary.ru/item.asp?id=41205880" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 4th All-Russian Scientific and Practical Conference (with International Participation)</title>
				<meeting>the 4th All-Russian Scientific and Practical Conference (with International Participation)</meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="129" to="134" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Requirements for Future Managers&apos; Professional Training in the Hospitality Industry in the Digital Economy</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Shostak</surname></persName>
		</author>
		<ptr target="https://elibrary.ru/item.asp?id=42791594" />
	</analytic>
	<monogr>
		<title level="m">State Youth Policy: National Projects 2019-2024 in the Social Development of Youth [Gosudarstvennaya molodezhnaya politika: nacional&apos;nye proekty 2019-2024 gg. v social&apos;nom razvitii molodezhi</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="503" to="510" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Artificial Intelligence in the Tourism Sphere</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">N</forename><surname>Kazak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">V</forename><surname>Chetyrbok</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">N</forename><surname>Oleinikov</surname></persName>
		</author>
		<ptr target="https://elibrary.ru/item.asp?id=42632703" />
	</analytic>
	<monogr>
		<title level="m">IOP Conference Series: Earth and Environmental Science. Conference proceedings. Krasnoyarsk Science and Technology City</title>
				<imprint>
			<publisher>Hall of the Russian Union of Scientific and Engineering Associations</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page">42020</biblScope>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
