Axborot tizimlarida foydalanishni biometrik nazoratlash algoritmlari va vositalarini ishlab chiqish




Download 0,69 Mb.
Pdf ko'rish
bet4/4
Sana19.11.2023
Hajmi0,69 Mb.
#101335
1   2   3   4
Bog'liq
axborot-tizimlarida-foydalanishni-biometrik-nazoratlash-algoritmlari-va-vositalarini-ishlab-chiqish

www.scientificprogress.uz
 
Page 1008
3. Information Technology Security Evaluation Criteria (ITSEC), Provisional 
Harmonized Criteria (1991) Luxembourg: Office for Official Publications of the 
European Communities, 1991 ISBN 92-826-3004-8, Catalogue Number: CD-71- 91-
502-EN-C © ECSC-EEC-EAEC, Brussels Luxembourg.
4. Pfleeger, C.P. (1997) Security in Computing. Second Edition, Prentice Hall, Upper 
Saddle River.
5. Guttman, B. and Roback, E. (1995) An Introduction to Computer security: The NIST 
Handbook. DIANE Publishing. http://dx.doi.org/10.6028/NIST.SP.800- 
6. Stamp M. Information security: principles and practice // John Wiley & Sons, 2011, 
P.606.
7. Purdy G. ISO 31000: 2009-setting a new standard for risk management //Risk 
Analysis: An International Journal. – 2010. – Т. 30. – №.6.С. 881-886. 
8. ISACA C. S. X. Cybersecurity Fundamentals //Study Guide. 2014.
9. Curricula C. Curriculum guidelines for post-secondary degree programs in 
cybersecurity. 2017.

Download 0,69 Mb.
1   2   3   4




Download 0,69 Mb.
Pdf ko'rish

Bosh sahifa
Aloqalar

    Bosh sahifa



Axborot tizimlarida foydalanishni biometrik nazoratlash algoritmlari va vositalarini ishlab chiqish

Download 0,69 Mb.
Pdf ko'rish