Fondalanilgan adabiyotlar ro`yxatini tuzish tartibi
Individual loyihada foydalanilgan adabiyotlar ro`yxati
quyidagi tartibda
kеltirilish lozim:
1.
Rasmiy matеriallar: qonunlar, hukumat qarorlari.
2.
Prеzidеnt asarlari.
3.
Monografiyalar, darsliklar (Foydalanish tartibida).
4.
Jurnal va gazеtalardagi maqolalar.
5.
Dissеrtatsiyalar va avtorеfеratlar.
6.
Statistik ma'lumotnomalar.
7.
Intеrnеt vеb-saytlari.
4-ilova
Foydalanilgan adabiyotlar ro`yxatini shakllantirish namunasi
1.
O’zbekiston Respublikasi Prezidentining farmoni. O’zbekiston
Respublikasini
yanada rivojlantirish bo’yicha Harakatlar strategiyasi to’g’risida. 2017 yil.
2.
Шаньгин В.Ф. Информационная безопасность
компьютерных систем и
сетей: Учебное пособие / В.Ф. Шаньгин. - М.: ИД ФОРУМ, НИЦ ИНФРА-М, 2013.
- 416 c.
3.
Axmedova O.P., Hasanov X.P., Nazarova M.N., Xolimtayeva I.U.,
Nuritdinov
O.D. Axborot xavfsizligi protokollari: O’quv qo’llanma Toshkent Aloqasi 2019. 168 b.
4.
Christof Paar·Jan Pelzl. Understanding Cryptography:
A Textbook for Studens
and Practitioners. Verlag Berlin Hyeidelberg 2010.
5.
Keith M. Martin. Yeveryday Cryptography
Fundamental Principles and
Applications. United Kingdom, 2017
6.
G’aniyev Salim Karimovich. Axborot xavfsizligi o’quv qo’llanma T.,
Aloqachi
2008. – 382 b.
7.
Akbarov D.Y., Xasanov P.F., Xasanov X.P., Axmedova O.P., Xolimtayeva I.U.
Kriptografiyaning matematik asoslari. O’quv qo’llanma. Toshkent Aloqasi 2019. 191 b.
8.
Schultz E. E. et al. Usability and security an appraisal
of usability issues in
information security methods //Computers & Security. – 2014. – Т. 20. – №. 7. – С. 620-
634.
9.
Baskerville R. Information systems security design methods:
implications for
information systems development //ACM Computing Surveys (CSUR). – 2013. – Т. 25.
– №. 4. – С. 375-414.
10.
Denning D. E. R. Information warfare and security. – Reading, MA :
Addison-Wesley, 2013. – Т. 4.
11.
https://en.wikipedia.org/wiki/Chinese_remainder_theorem#:~:text=In%20n
umber%20theory%2C%20the%20Chinese,the%20divisors%20are%20pairwise%20copri
me.