Режа: Замонавий ахборот сақловчилардаги ахборотни ўчириш усуллари


Foydalaniladigan asosiy va qo’shimcha adabiyotlar ro’yxati


Download 0.51 Mb.
bet38/38
Sana07.03.2023
Hajmi0.51 Mb.
#1244206
1   ...   30   31   32   33   34   35   36   37   38
Bog'liq
amaliy mashg\'ulot

Foydalaniladigan asosiy va qo’shimcha adabiyotlar ro’yxati


  1. G’aniyev S.K., Karimov M.M., Toshev K.A. Axborot xavfsizligi. Darslik. Toshkent. - 2016.

  2. Sh.A.Abduraxmonova Axborot xavfsizligi. Oʻquv qoʻllanm. –

Toshkent, ―Navroʻz‖ nashriyoti. - 2018.

  1. S.K.G’aniev, M.M. Karimov, K.A. Toshev «Axborot xavfsizligi. Axborot -kommunikatsion tizimlari xavfsizligi», «Aloqachi» 2008 yil 4. Richard E.Smith. Elementary information security. 2nd Edition. USA, 2014.

  1. Kamilov Sh.M., Masharipov A.K., Zakirova T.A., Ermatov Sh.T., Musayeva M.A. Kompyuter tizimlarida axborotni ximoyalash. Oʻquv qoʻllanma. –T.: TDIU, 2005.

  2. Paul van Oorschot, Computer Security and the Internet: Tools and

Jewels(2020, Springer). Personal use copy freely available on author's web site.

  1. Wenliang Du, Computer Security: A Hands-on Approach (2017, self-published). Updated May 2019.

  2. Stallings and Brown, Computer Security: Principles and Practice, 3/e(2014, Prentice Hall).

  3. Gollmann, Computer Security, 3/e(2011, Wiley).

  4. Smith, Elementary Information Security(2011, Jones & Bartlett Learning).

  5. Stamp, Information Security: Principles and Practice, 2/e(2011, Wiley).

  6. Goodrich and Tamassia, Introduction to Computer Security(2010, Addison-Wesley).

  7. Smith and Marchesini, The Craft of System Security(2007, AddisonWesley).

  8. Pfleeger and Pfleeger, Security in Computing, 4/e(2007, Prentice Hall).

  9. Keith M. Martin, Everyday Cryptography (2017, 2/e; Oxford University Press).

  10. Kaufman, Perlman and Speciner, Network Security: Private Communications in a Public World, second edition(Prentice Hall, 2003). 17. Stallings, Cryptography and Network Security: Principles and Practice, 5/e(Prentice Hall, 2010).

  1. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 2/e(Wiley, 2008).

  2. Saltzer and Kaashoek, Principles of Computer System Design(2009, Morgan Kaufmann).

  3. Boyle and Panko, Corporate Computer Securityand Network

Security 3/e(2013, Prentice Hall).



Download 0.51 Mb.

Do'stlaringiz bilan baham:
1   ...   30   31   32   33   34   35   36   37   38




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling