FOYDALANILGAN ADABIYOTLAR




Download 0,58 Mb.
bet6/6
Sana05.01.2024
Hajmi0,58 Mb.
#130547
1   2   3   4   5   6
FOYDALANILGAN ADABIYOTLAR.
1. Hacking: The Art of Exploitation" - Jon Erickson.
2. The Web Application Hacker's Handbook" - Dafydd Stuttard va Marcus Pinto
3. Ghost in the Wires: My Adventures as the World's Most Wanted Hacker" - Kevin Mitnick
4. "Security Engineering: A Guide to Building Dependable Distributed Systems" - Ross J. Anderson
5. Metasploit: The Penetration Tester's Guide" - David Kennedy, Jim O‘Gorman, Devon Kearns va Mati Aharoni
6. Stamp Mark. Information security: principles and practice. USA, 2011.
7. Fеrgussion N., Shnayеr B. Praktichеskaya kriptografiya. Pеr. s ang. M.: Izdatеliskiy dom “Viliyams”, 2005 - 424 s.
8. Shnayеr B. Prikladnaya kriptografiya. Protokoli, algoritmi, isxodniе tеksti na yazikе Si. M.: izdatеlistvo TRIUMF, 2003 -816 str.
9. Shangin V.F. «Informasionnaya bеzopasnosti kompiyutеrnix sistеm i sеtеy», Uchеbnoе posobiе. Izdatеliskiy Dom "FORUM" INFRA-M.: 2018 g.
10. S.K.Ganiеv, D.Ya.Irgashеva, K.A.Tashеv. Bеzopasnosti Bazi Dannix. T. “Aloqachi”, 2017, 224 c.
11. Daemen, J. va Rijmen, V. "Rijndael: The Kengaytirilgan shifrlash standarti."Dr. Dobb's Jurnal, 2001 yil mart, PP. 137-139.
12. https://www.knowledgefactory.net/2019/10/java-blowfish-encryption-and-decryption-with-example.html
13. Gudin, D. Xakerlar Androidning 4 ta muhim zaifliklaridan foydalanishgan. Ars Technica 2021.
14. Qiu, P.; Vang, D.; Lyu, Y.; Tyan, R.; Vang, C.; Qu, G. Voltjockey: intel sgx-ga yangi dinamik kuchlanish miqyosidagi xatoga qarshi hujum . IEEE Trans. Hisoblash. Aided Des. Integr. Sxema tizimi.
15. Gao, J.; Syu, Y.; Jiang, Y.; Liu, Z.; Chang, V.; Jiao, X.; Sun, J. Em-fuzz: Xotirani tekshirish orqali kengaytirilgan dasturiy ta'minot fuzzing. IEEE Trans. Hisoblash. Aided Des. Integr. Sxema tizimi.
16. Melotti, D.; Rossi-Bellom, M.; Continella, A. Google titan m chipini teskari o‘zgartirish va fuzzing. In Reversing Proceedings and Hujumga yo‘naltirilgan tendentsiyalar simpoziumi
17. Cheng, J.; Liu, V.; Quyosh, N.; Peng, Z.; Quyosh, C.; Vang, C.; Bi, Y.; Ven, Y.; Chjan, X.; Chjan, P.; va boshqalar. Mashinani o‘rganish past tushish regulyatori yordamida quvvatni differentsial tahlil qilishda kuchlanish o‘lchovi bilan hujumga qarshi chora. Int. J. Circuit Theory
18. Aminuddin, A. Ilova qaroqchiligini oldini olish uchun RSA va AES kriptografiyasi yordamida Android aktivlarini himoya qilish. Axborot va kommunikatsiya texnologiyalari boÿyicha 2020-yil 3-xalqaro konferentsiya (ICOIACT) materiallarida, Yogyakarta, Indoneziya
Download 0,58 Mb.
1   2   3   4   5   6




Download 0,58 Mb.