Anderson, J. M.
. Why we need a new definition of information security.
Computers &
Security, 2003 — 308–313 bet.
DOI
:
10.1016/S0167-
4048(03)00407-3
.
Venter, H. S.; Eloff, J. H. P.
. A taxonomy for information security technologies.
Computers & Security, 2003 — 299–307 bet.
DOI
:
10.1016/S0167-
4048(03)00406-1
.
The History of Information Security A Comprehensive Handbook.
Elsevier,
2007.
ISBN 9780080550589
.
Cherdantseva, Y.; Hilton, J.
. Organizational, Legal, and Technological
Dimensions of Information System Administrator. IGI Global Publishing, 2013.
Jerry Saltzer, H. Saltzer; Schroeder, Michael D.
.
The Protection of Information
in Computer Systems
. USA:
IEEE
, 1975 — 1278—1308 bet. (
Wayback
Machine
saytida 2018-09-06 sanasida
arxivlangan
)
Hughes, J.; Cybenko, G.
.
Quantitative Metrics and Risk Assessment The Three
Tenets Model of Cybersecurity
. Ottawa, Canada: Talent First Network (Carleton
University), 2013 — 15—24 bet. (
Wayback Machine
saytida 2018-09-06
sanasida
arxivlangan
)
McCullagh, Adrian; Caelli, William
.
Non-Repudiation in the Digital
Environment
(en). Chicago, USA: First Monday, 2000.
NIST Interagency or Internal Report 7298 Glossary of Key Information Security
Terms
(en). Gaithersburg, MD, USA: Revision 2, 2013.
NIST Special Publication 800-14 Generally Accepted Principles and Practices
for Securing Information Technology Systems
(en). Gaithersburg, MD, USA:
National Institute
of Standards and Technology, 1996.
NIST
Special
Publication
800-160
Systems
Security
Engineering:
Considerations for a Multidisciplinary Approach in the Engineering of
Trustworthy Secure Systems
(en). Gaithersburg, MD, USA: National Institute of
Standards and Technology, 2016.