PEDAGOG RESPUBLIKA ILMIY JURNALI
6 – TOM 5 – SON / 2023 - YIL / 15 - MAY
www.bestpublication.org
537
FOYDALANILAGAN ADABIYOTLAR:
Axborot xavfsizligi tizimini qurish metodologiyasi haqida ma'lumotlarni olish
uchun quyidagi adabiyotlardan foydalanishingiz mumkin:
Rossouw, R., &
von Solms, R. (2016). Information Security Governance: A
Practical Development and Implementation Approach. Auerbach Publications.
Whitman, M. E., & Mattord, H. J. (2016). Principles of Information Security.
Cengage Learning.
Pfleeger, C. P., & Pfleeger, S. L. (2018). Security in Computing. Pearson.
Stoneburner, G., Goguen, A., & Feringa, A. (2002). Risk Management Guide for
Information Technology Systems. National Institute
of Standards and Technology
(NIST) Special Publication.
ISO/IEC 27001:2013. Information technology — Security techniques —
Information security management systems — Requirements.
ISO/IEC 27002:2013. Information technology — Security techniques — Code of
practice for information security controls.
NIST Special Publication 800-53. Security and Privacy
Controls for Federal
Information Systems and Organizations.
Schneier, B. (2015). Applied Cryptography: Protocols,
Algorithms, and Source
Code in C. John Wiley & Sons.
Anderson, R. (2008). Security Engineering: A Guide
to Building Dependable
Distributed Systems. Wiley.
«Axborot texnologiyasi. Ma’lumotlami kriptografik muho- fazasi. Elektron
raqamli imzoni shakllantirish va tekshirish jarayonlari» O‘zbekiston Davlat standard.
0‘z DSt 1092:2005.
«Axborot texnologiyasi. Axborotlami kriptografik muhofazasi. Ma’lumotlami
shifrlash algoritmi» 0‘zbekiston Davlat standard. 0‘zDSt 1105:2006
«Axborot texnologiyasi. Ochiq tizimlar o‘zaro bogMiqligi. Elek tron raqamli imzo
ochiq kaliti sertifikati va atribut sertifikatining tuzil- masi» 0‘zbekiston
Davlat
standarti. 0‘zDSt 1108:2006.
С
.В. Симонов. Анализ рисков в информационнмх систе- мах. Практические
советь
! // Конфидент. -2001. -№2.
S.S.Qosimov. Axborot texnologiyalari. 0‘quv qoMlanma. - T.: «Aloqachi», 2006.
S.K.G‘aniyev, M.M. Karimov. Hisoblash sistemalari
va tar- moqlarida
informatsiya himoyasi. Oliy o‘quv yurt.talab. uchun o‘quv qoMlanma. —Toshkent
Davlat texnika universiteti, 2003.
Kitoblar:
1. "The Web Application Hacker's Handbook: Finding
and Exploiting Security
Flaws" - Dafydd Stuttard va Marcus Pinto