Axborot tizimlarida foydalanishni biometrik nazoratlash algoritmlari va vositalarini ishlab chiqish


Download 0.69 Mb.
Pdf ko'rish
bet4/4
Sana13.11.2023
Hajmi0.69 Mb.
#1769900
1   2   3   4
Bog'liq
axborot-tizimlarida-foydalanishni-biometrik-nazoratlash-algoritmlari-va-vositalarini-ishlab-chiqish

www.scientificprogress.uz
 
Page 1008
3. Information Technology Security Evaluation Criteria (ITSEC), Provisional 
Harmonized Criteria (1991) Luxembourg: Office for Official Publications of the 
European Communities, 1991 ISBN 92-826-3004-8, Catalogue Number: CD-71- 91-
502-EN-C © ECSC-EEC-EAEC, Brussels Luxembourg.
4. Pfleeger, C.P. (1997) Security in Computing. Second Edition, Prentice Hall, Upper 
Saddle River.
5. Guttman, B. and Roback, E. (1995) An Introduction to Computer security: The NIST 
Handbook. DIANE Publishing. http://dx.doi.org/10.6028/NIST.SP.800- 
6. Stamp M. Information security: principles and practice // John Wiley & Sons, 2011, 
P.606.
7. Purdy G. ISO 31000: 2009-setting a new standard for risk management //Risk 
Analysis: An International Journal. – 2010. – Т. 30. – №.6.С. 881-886. 
8. ISACA C. S. X. Cybersecurity Fundamentals //Study Guide. 2014.
9. Curricula C. Curriculum guidelines for post-secondary degree programs in 
cybersecurity. 2017.

Download 0.69 Mb.

Do'stlaringiz bilan baham:
1   2   3   4




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling