|
Har qanday taraqqiy etgan jamiyat hayotida axborotning ahamiyati uzluksiz ortib bormoqda
|
bet | 16/18 | Sana | 12.01.2024 | Hajmi | 1,81 Mb. | | #135841 |
Bog'liq Har qanday taraqqiy etgan jamiyat hayotida axborotning ahamiyatiFOYDALAINGAN ADABIYOTLAR
1. O‘zbekiston Respublikasi Qonun hujjatlari ma’lumotlari milliy bazasi https://lex.uz/docs/-4096206
O‘zbekiston Respublikasi Prezidentining 2022-yil 28-yanvardagi 60-sonli “2022-2026-yillarda O‘zbekistonni rivojlantirishning yangi strategiyasi to‘g‘risida”gi qarori bilan tasdiqlangan “2022-2026-yillarda O‘zbekistonni rivojlantirishning yangi strategiyasi”.
S.K. Ganiyev, M.M. Karimov, K.A. Tashev. Axborot xavfsizligi. – T.: “Fan va texnologiya”, 2017.
O‘zbekiston Respublikasi Prezidentining 2022-yil 28-yanvardagi 60-sonli “2022-2026-yillarda O‘zbekistonni rivojlantirishning yangi strategiyasi to‘g‘risida”gi qarori bilan tasdiqlangan “2022-2026-yillarda O‘zbekistonni rivojlantirishning yangi strategiyasi”.
S.K. Ganiyev, A.A. Ganiyev, Z.T. Xudayqulov. Kiberxavfsizlik asoslari: O‘quv qo‘llanma. – T.: “Iqtisodiyot-Moliya”, 2021.
Paterson, Kenneth G.; Stebila, Douglas (2010). Steinfeld, Ron; Hawkes, Philip (eds.). "One-Time-Password-Authenticated Key Exchange". Information Security and Privacy. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. 6168: 264–281. doi:10.1007/978-3-642-14081-5_17. ISBN 978-3-642-14081-5.
EOTP – Static Key Transfer. Defuse.ca (July 13, 2012). Retrieved on 2012-12-21.
IETF Tools. RFC 4226 - Section 7.4: Resynchronization of the Counter
Barkan, Elad; Eli Biham; Nathan Keller (2003). "Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication": 600–16. Archived from the original on October 7, 2015. Retrieved October 6, 2015.
Barkan, Elad; Eli Biham; Nathan Keller. "Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication by Barkan and Biham of Technion (Full Version)" (PDF).
Gueneysu, Tim; Timo Kasper; Martin Novotný; Christof Paar; Andy Rupp (2008). "Cryptanalysis with COPACOBANA" (PDF). IEEE Transactions on Computers. 57 (11): 1498–1513. doi:10.1109/TC.2008.80. S2CID 8754598.
Nohl, Karsten; Chris Paget (December 27, 2009). GSM: SRSLY?. 26th Chaos Communication Congress (26C3). Retrieved December 30, 2009.
Fontana, John. "NIST blog clarifies SMS deprecation in wake of media tailspin". ZDNet. Retrieved July 14, 2017.
Meyer, David. "Time Is Running Out For SMS-Based Login Security Codes". Fortune. Retrieved July 14, 2017.
Brandom, Russell (July 10, 2017). "Two-factor authentication is a mess". The Verge. Retrieved July 14, 2017.
Brandom, Russell (August 31, 2019). "The frighteningly simple technique that hijacked Jack Dorsey's Twitter account". The Verge. Retrieved January 30, 2020.
Tims, Anna (September 26, 2015). "'Sim swap' gives fraudsters access-all-areas via your mobile phone". The Guardian. ISSN 0261-3077. Retrieved January 30, 2020.
"Yubico AB". Bloomberg Businessweek. Retrieved July 13, 2011.
Garun, Natt (June 17, 2017). "How to set up two-factor authentication on all your online accounts". The Verge. Retrieved July 14, 2017.
McWhertor, Michael (April 15, 2015). "Valve adds two-factor login authentication to Steam mobile app". Polygon. Retrieved September 8, 2015.
The Register article. The Register article (October 12, 2005). Retrieved on 2012-12-21.
Washington Post Security Blog. Blog.washingtonpost.com. Retrieved on December 21, 2012.
Ilova
|
| |