|
O‘ZBEKISTON RESPUBLIKASI RAQAMLI TEXNOLOGIYALAR VAZIRLIGI
|
bet | 20/20 | Sana | 20.12.2023 | Hajmi | 418,9 Kb. | | #124487 |
O‘ZBEKISTON RESPUBLIKASI RAQAMLI TEXNOLOGIYALAR VAZIRLIGI
MUHAMMAD AL-XORAZMIY NOMIDAGI TОSHKЕNT AХBОRОT TЕХNОLОGIYALARI UNIVЕRSITЕTI
« Axborot xavfsizligi » kafеdrasi
INDIVIDUAL LOYIHA
Mavzu: Biometrik shifrlash algoritmlarining qiyosiy tahlili.
60610300 – “Axborot xavfsizligi” yo`nalishi
Bajardi: _______________________________.
Ilmiy rahbar: Chunayev N.E.
Toshkеnt – 2023
2-ilova
TASDIQLAYMAN
Axborot xavfsizligi kafеdra mudiri
Ganiyev A.A.__________
«___»____________2023-yil
INDIVIDUAL LOYIHA
Talaba: ___________________________________________________________.
Rahbar: ___________________________________________________________
TOPSHIRIQ
1. Mavzu: ________________________________________________________
_________________________________________________________________
2. Mavzuning dolzarbligi, maqsadi va vazifalari: _______________________
_________________________________________________________________
3. Manbalar: _____________________________________________________
_________________________________________________________________
4. Individual loyihaning tuzilishi: ____________________________________
_________________________________________________________________
5. Qo`shimcha vazifa va ko`rsatmalar:________________________________
_________________________________________________________________
6. Individual loyihani bajarish rеjasi: _________________________________
Sana Ishning bajarilish darajasi Talaba imzosi
Himoya natijasi ____________ball Rahbar______________________________________ (imzo) Mazkur hujjat 3 yil davomida kafеdrada saqlanadi
3-ilova Fondalanilgan adabiyotlar ro`yxatini tuzish tartibi
Individual loyihada foydalanilgan adabiyotlar ro`yxati quyidagi tartibda kеltirilish lozim:
1. Rasmiy matеriallar: qonunlar, hukumat qarorlari. 2. Prеzidеnt asarlari.
3. Monografiyalar, darsliklar (Foydalanish tartibida). 4. Jurnal va gazеtalardagi maqolalar.
5. Dissеrtatsiyalar va avtorеfеratlar. 6. Statistik ma'lumotnomalar.
7. Intеrnеt vеb-saytlari.
4-ilova Foydalanilgan adabiyotlar ro`yxatini shakllantirish namunasi
1. O’zbekiston Respublikasi Prezidentining farmoni. O’zbekiston Respublikasini yanada rivojlantirish bo’yicha Harakatlar strategiyasi to’g’risida. 2017 yil.
2. Шаньгин В.Ф. Информационная безопасность компьютерных систем и сетей: Учебное пособие / В.Ф. Шаньгин. - М.: ИД ФОРУМ, НИЦ ИНФРА-М, 2013. - 416 c.
3. Axmedova O.P., Hasanov X.P., Nazarova M.N., Xolimtayeva I.U., Nuritdinov O.D. Axborot xavfsizligi protokollari: O’quv qo’llanma Toshkent Aloqasi 2019. 168 b.
4. Christof Paar·Jan Pelzl. Understanding Cryptography: A Textbook for Studens and Practitioners. Verlag Berlin Hyeidelberg 2010.
5. Keith M. Martin. Yeveryday Cryptography Fundamental Principles and Applications. United Kingdom, 2017
6. G’aniyev Salim Karimovich. Axborot xavfsizligi o’quv qo’llanma T., Aloqachi 2008. – 382 b.
7. Akbarov D.Y., Xasanov P.F., Xasanov X.P., Axmedova O.P., Xolimtayeva I.U. Kriptografiyaning matematik asoslari. O’quv qo’llanma. Toshkent Aloqasi 2019. 191 b.
8. Schultz E. E. et al. Usability and security an appraisal of usability issues in information security methods //Computers & Security. – 2014. – Т. 20. – №. 7. – С. 620-634.
9. Baskerville R. Information systems security design methods: implications for information systems development //ACM Computing Surveys (CSUR). – 2013. – Т. 25. – №. 4. – С. 375-414.
10. Denning D. E. R. Information warfare and security. – Reading, MA : Addison-Wesley, 2013. – Т. 4.
11. https://en.wikipedia.org/wiki/Chinese_remainder_theorem#:~:text=In%20n umber%20theory%2C%20the%20Chinese,the%20divisors%20are%20pairwise%20copri me.
5-ilova Individual loyihaning namunaviy mavzulari
1. Xavfsiz katalog ilovasi.
1-2 bet Loyiha ishi mavzulari
3-23-betlar Loyiha ish namunasi
24-betdan oxirigacha loyiha ishini bajarish yo’riqnomasi
|
| |