284
ADABIYOTLAR RO‘YXATI
1.
Information Technology Security Evaluation Criteria (ITSEC),
Provisional Harmonized Criteria (1991) Luxembourg:
Office for Official
Publications of the European Communities, 1991 ISBN 92-826-3004-8, Catalogue
Number: CD-71- 91-502-EN-C © ECSC-EEC-EAEC, Brussels • Luxembourg.
2.
National Information Systems Security (InfoSec) Glossary (2000)
National Security Telecommunications and Information Systems
Security
Committee. National Security Agency US.
3.
Pfleeger, C.P. (1997) Security in Computing. Second Edition, Prentice
Hall, Upper Saddle River.
4.
Guttman, B. and Roback, E. (1995) An Introduction to Computer
security: The NIST Handbook. DIANE Publishing.
http://dx.doi.org/10.6028/NIST.SP.800-12
5.
Stamp M. Information security: principles and practice // John Wiley &
Sons, 2011, -P. – 606.
6.
Purdy G. ISO 31000: 2009—setting a new standard
for risk
management //Risk Analysis: An International Journal. – 2010. –
Т
. 30. –
№.
6. –
С.
881-886.
7.
ISACA C. S. X. Cybersecurity Fundamentals //Study Guide. – 2014.
8.
Curricula C. Curriculum guidelines for post-secondary degree
programs in cybersecurity. – 2017.
9.
Акбаров Д.Е. Ахборот хавфсизлигини таъминлашнинг
криптографик усуллари ва уларнинг қўлланилиши // Тошкент, 2008,
-
Б.
- 394.
10.
Ганиев С.К., Каримов М.М., Худойқулов З.Т., Кадиров М.М.
Ахборот хавфсизлиги бўйича атама ва тушунчаларнинг рус, ўзбек ва инлиз
тилларидаги изоҳли луғати // Тошкент 2017,
-
Б.
- 480.
11.
Ferguson N., Schneier B. Practical cryptography // New York: Wiley,
2003. – P. - 432.
12.
Bruce S. Applied cryptography:
protocols, algorithms, and source code
in C //New York: Wiley. – 1996, - P. - 1027.
13.
Smart N. P. et al. Cryptography: an introduction. – New York :
McGraw-Hill, 2003. –
Т. 3.
14.
Шаньгин, В. Ф. Информационная безопасность компьютерных
систем и сетей : учеб. пособие / В.Ф. Шаньгин.
—
Москва : ИД «ФОРУМ» :
ИНФРА
-
М, 2017.
—
416 с.
15.
Хасанов П.Ф., Хасанов Х.П., Ахмедова О.П., Давлатов А.Б.
“Криптотаҳлил ва унинг махсус усуллари” электрон ўқув қўлланма. 2010 й.
16.
Акбаров Д.Е., Хасанов П.Ф., Хасанов Х.П., Ахмедова О.П.
“Криптографиянинг математик асослари” электрон ўқув қўлланма. 2010 й.
285
17.
Zlatanov, Nikola. (2015). Hard Disk Drive and Disk Encryption.
10.13140/RG.2.1.1228.9681.
18.
Healy, Michael & Newe, Thomas & Lewis, Elfed. (2008). Analysis of
Hardware Encryption Versus Software Encryption
on Wireless Sensor Network
Motes. 10.1007/978-3-540-79590-2_1.
19.
Scarfone K. et al. Guide to storage encryption technologies for end user
devices //NIST Special Publication. – 2007. –
Т. 800.
–
С. 111.
20.
Chuvakin A., Williams B. R. PCI Compliance. – Syngress, 2011.
21.
Shinder D. L., Cross M. Scene of the Cybercrime. – Elsevier, 2008.
22.
Введение в информационную безопасность автоматизированных
систем: учебное пособие / В. В. Бондарев.
—
Москва : Издательство МГТУ им.
Н. Э. Баумана, 2016.
— 250,
с.
23.
Regulations O., Guidance R. Code of Federal Regulations //Respiratory
Protection. – 1910.
24.
Frields J. National Industrial Security Program. Operating
Manual
Supplement. – DEPARTMENT OF DEFENSE WASHINGTON DC, 1995. –
№.
DOD-5220.22-M-SUP-1.
25.
Ganiev S.K., Khudoykulov Z.T., Islomov Sh.Z., Selection
suitable
biometrics for cryptographic key generators // TUIT BULLETIN, Тashkent, 2016,
№4 (40),
– P. 80-92.
26.
Rathgeb C., Uhl A. A survey on biometric cryptosystems and
cancelable biometrics //EURASIP Journal on Information Security, 2011, №1,
– P.
1-25.
27.
Report to Congress on Breaches of Unsecured Protected Health
Information For Calendar Years 2015, 2016, and 2017. U.S. Department of Health
and
Human Services
Office for Civil Rights.
https://www.hhs.gov/sites/default/files/breach-report-to-congress-2015-2016-
2017.pdf
28.
http://smartkardtechnologies.com/productdetails/acr39u-smart-card-
rader
29.
https://www.turbosquid.com/3d-models/3d-airport-x-ray-machine-
security-1405223
30.
https://www.ptsecurity.com/ww-en/analytics/web-vulnerabilities-
2020/
31.
https://www.nuigalway.ie/itsecurity/howtospotphishingemails/
32.
https://techjaws.com/beware-of-fake-microsoft-security-essentials/
33.
https://www.pcmag.com/roundup/256703/the-best-antivirus-
protection
34.
https://www.us-cert.gov/ncas/tips/ST05-003
35.
https://blog.layershift.com/why-high-availability-for-your-business/
36.
https://en.wikipedia.org/wiki/Zimmermann_Telegram