Information security, sometimes shortened to infosec



Download 0,67 Mb.
Pdf ko'rish
bet31/35
Sana07.08.2021
Hajmi0,67 Mb.
#140828
1   ...   27   28   29   30   31   32   33   34   35
Bog'liq
Information security - Wikipedia

Retrieved 2020-08-07.


24. Sebag–Montefiore, H. (2011).
Enigma: The Battle for the Code.
Orion. p. 576. ISBN 9781780221236.
25. "A Brief History of the Internet" .
www.usg.edu. Retrieved 2020-08-07.
2 . DeNardis, L. (2007). "Chapter 24: A
History of Internet Security". In de
Leeuw, K.M.M.; Bergstra, J. (eds.).
The History of Information Security:
A Comprehensive Handbook .
Elsevier. pp. 681 –704.
ISBN 9780080550589.
27. Perrin, Chad. "The CIA Triad" .
Retrieved 31 May 2012.


2 . "Engineering Principles for
Information Technology Security"
(PDF)
. csrc.nist.gov.
29. A. J. Neumann, N. Statland and R. D.
Webb (1977). "Post-processing audit
tools and techniques"  
(PDF)
. US
Department of Commerce, National
Bureau of Standards. pp. 11-–1-4.
30. "oecd.org"  
(PDF)
. Archived from the
original  
(PDF)
 on May 16, 2011.
Retrieved 2014-01-17.
31. Slade, Rob. "(ICS)2 Blog" .
32. Aceituno, Vicente. "Open Information
Security Maturity Model" . Retrieved
12 February 2017.


33. http://www.dartmouth.edu/~gvc/Thr
eeTenetsSPIE.pdf
34. Hughes, Jeff; Cybenko, George (21
June 2018). "Quantitative Metrics
and Risk Assessment: The Three
Tenets Model of Cybersecurity" .
Technology Innovation Management
Review. 3 (8).
35. Teplow, Lily. "Are Your Clients Falling
for These IT Security Myths?
[CHART]" . continuum.net.
3 . Beckers, K. (2015). Pattern and
Security Requirements: Engineering-
Based Establishment of Security
Standards . Springer. p. 100.
ISBN 9783319166643.


37. Andress, J. (2014). The Basics of
Information Security: Understanding
the Fundamentals of InfoSec in
Theory and Practice . Syngress.
p. 240. ISBN 9780128008126.
3 . Boritz, J. Efrim (2005). "IS
Practitioners' Views on Core
Concepts of Information Integrity".
International Journal of Accounting
Information Systems. Elsevier. 6 (4):
260–279.
doi:10.1016/j.accinf.2005.07.001 .


39. Loukas, G.; Oke, G. (September 2010)
[August 2009]. "Protection Against
Denial of Service Attacks: A Survey"
(PDF)
. Comput. J. 53 (7): 1020–1037.
doi:10.1093/comjnl/bxp078 .
Archived from the original  
(PDF)
 on
2012-03-24. Retrieved 2015-08-28.
40. McCarthy, C. (2006). "Digital
Libraries: Security and Preservation
Considerations" . In Bidgoli, H. (ed.).
Handbook of Information Security,
Threats, Vulnerabilities, Prevention,
Detection, and Management. 3. John
Wiley & Sons. pp. 49–76.
ISBN 9780470051214.


41. Grama, J.L. (2014). Legal Issues in
Information Security . Jones &

Download 0,67 Mb.

Do'stlaringiz bilan baham:
1   ...   27   28   29   30   31   32   33   34   35




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2025
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish