|
InformationSecurity,shuningdekBog'liq Ax amaliy javob 3Xorijiy tillarida
Andress, J..
The Basics of Information Security: Understanding the
Fundamentals
of
InfoSec
in
Theory
and
Practice
.
Syngress,
2014.
ISBN 9780128008126
.
Stewart, James Michael; Mike, Chapple; Darril, Gibson.
CISSP® Certified
Information Systems Security Professional Study Guide
. Canada: Seventh
Edition,John Wiley & Sons, Inc., 2015.
ISBN 978-1-119-04271-6
.
Moore, Robert.
Cybercrime Investigating High Technology Computer Crime
.
Boston: 2nd ed., 2011.
ISBN 9781437755824
.
Ramzan, Zulfikar.
Handbook of Information and Communication Security
. L.:
Springer Science & Business Media, 2010.
ISBN 978-3-642-04117-4
.
Johnson, John.
The Evolution of British Sigint 1653–1939
. Her Majesty's
Stationary Office, 1998.
Соболева, Т. А..
Введение. История шифровального дела в России
. М.:
ОЛМА-Пресс, 2002.
ISBN 5224036348
.
Spies, Wiretaps, and Secret Operations An Encyclopedia of American
Espionage
. Santa Barbara, CA, USA: ABC-CLIO, LLC, 2011.
ISBN 978-1-
85109-807-1
.
Sebag–Montefiore, Hugh. Enigma The Battle for the Code. Orion,
2011.
ISBN 9781780221236
.
Pipkin, Donald L..
Information Security Protecting the Global Enterprise
. N. Y.:
Prentice Hall PTR, 2000.
ISBN 9780130173232
.
Official (ISC)²® Guide to the CISSP® CBK® Fourth Edition
. Boca Raton, FL,
USA: CRC Press, 2015.
ISBN 978-1-4822-6275-9
.
Parker, Donn B..
Fighting Computer Crime A New Framework for Protecting
Information
. N. Y.:
John Wiley & Sons
, 1998.
ISBN 0-471-16378-3
.
Krutz, Ronald L.; Vines, Russell Dean.
The CISM Prep Guide Mastering the
Five Domains of Information Security Management
. N. Y.:
John Wiley & Sons
,
2003.
ISBN 0-471-45598-9
.
McCarthy, C..
Handbook of Information Security, Threats, Vulnerabilities,
Prevention,
Detection,
and
Management
.
John
Wiley
&
Sons,
2006.
ISBN 9780470051214
.
Schlienger, Thomas; Teufel, Stephanie.
Information security culture From
analysis to change
. Pretoria, South Africa: South African Computer Journal,
2003.
Samonas, S.; Coss, D. .
The CIA Strikes Back Redefining Confidentiality,
Integrity and Availability in Security
. Washington DC, USA: Information
Institute Publishing, 2014.
Jacques, R. J.
„The True Costs of Paper-Based Business“
(en). Fulcrum Blog.
Spatial Networks, Inc (13-yanvar 2016-yil). Qaraldi: 27-iyun 2018-yil.
Pettey, Christy
„Gartner Says Digital Disruptors Are Impacting All Industries;
Digital KPIs Are Crucial to Measuring Success“
(en). ORLANDO, FL, USA:
Gartner, Inc. (2-oktyabr 2017-yil). Qaraldi: 27-iyun 2018-yil.
Forni, Amy Ann; van der Meulen, Rob
„Gartner Survey Shows 42 Percent of
CEOs Have Begun Digital Business Transformation“
(en). Egham, U.K.:
Gartner, Inc. (24-aprel 2017-yil). Qaraldi: 27-iyun 2018-yil.
„2017 Global Information Security Workforce Study“
. Benchmarking
Workforce Capacity and Response to Cyber Risk — EMEA (en)
(PDF).
(ISC)²
. Frost
&
Sullivan
(2017). 1-avgust
2022-yilda
asl
nusxadan
arxivlandi
. Qaraldi: 31-iyul 2022-yil.
„Crime in the age of technology“
. Europol’s serious and organised crime threat
assessment 2017 (en).
Europol
(9-mart 2017-yil). Qaraldi: 27-iyun 2018-yil.
|
| |