Retrieved 2020-08-07.
24. Sebag–Montefiore, H. (2011).
Enigma: The Battle for the Code.
Orion. p. 576. ISBN 9781780221236.
25. "A Brief History of the Internet" .
www.usg.edu. Retrieved 2020-08-07.
2 . DeNardis, L. (2007). "Chapter 24: A
History of Internet Security". In de
Leeuw, K.M.M.; Bergstra, J. (eds.).
The History of Information Security:
A Comprehensive Handbook .
Elsevier. pp. 681 –704.
ISBN 9780080550589.
27. Perrin, Chad. "The CIA Triad" .
Retrieved 31 May 2012.
2 . "Engineering Principles for
Information Technology Security"
(PDF)
. csrc.nist.gov.
29. A. J. Neumann, N. Statland and R. D.
Webb (1977). "Post-processing audit
tools and techniques"
(PDF)
. US
Department of Commerce, National
Bureau of Standards. pp. 11-–1-4.
30. "oecd.org"
(PDF)
. Archived from the
original
(PDF)
on May 16, 2011.
Retrieved 2014-01-17.
31. Slade, Rob. "(ICS)2 Blog" .
32. Aceituno, Vicente. "Open Information
Security Maturity Model" . Retrieved
12 February 2017.
33. http://www.dartmouth.edu/~gvc/Thr
eeTenetsSPIE.pdf
34. Hughes, Jeff; Cybenko, George (21
June 2018). "Quantitative Metrics
and Risk Assessment: The Three
Tenets Model of Cybersecurity" .
Technology Innovation Management
Review. 3 (8).
35. Teplow, Lily. "Are Your Clients Falling
for These IT Security Myths?
[CHART]" . continuum.net.
3 . Beckers, K. (2015). Pattern and
Security Requirements: Engineering-
Based Establishment of Security
Standards . Springer. p. 100.
ISBN 9783319166643.
37. Andress, J. (2014). The Basics of
Information Security: Understanding
the Fundamentals of InfoSec in
Theory and Practice . Syngress.
p. 240. ISBN 9780128008126.
3 . Boritz, J. Efrim (2005). "IS
Practitioners' Views on Core
Concepts of Information Integrity".
International Journal of Accounting
Information Systems. Elsevier. 6 (4):
260–279.
doi:10.1016/j.accinf.2005.07.001 .
39. Loukas, G.; Oke, G. (September 2010)
[August 2009]. "Protection Against
Denial of Service Attacks: A Survey"
(PDF)
. Comput. J. 53 (7): 1020–1037.
doi:10.1093/comjnl/bxp078 .
Archived from the original
(PDF)
on
2012-03-24. Retrieved 2015-08-28.
40. McCarthy, C. (2006). "Digital
Libraries: Security and Preservation
Considerations" . In Bidgoli, H. (ed.).
Handbook of Information Security,
Threats, Vulnerabilities, Prevention,
Detection, and Management. 3. John
Wiley & Sons. pp. 49–76.
ISBN 9780470051214.
41. Grama, J.L. (2014). Legal Issues in
Information Security . Jones &
Do'stlaringiz bilan baham: |