YORUG‘LIK MANBALARI VA YORITISH USKUNALARI

Authors

  • I.A Jo‘ramirzayev
  • S.O Ibodullayeva
  • S.F Mardonov
  • F.A. Oripov

Keywords:

Yorug‘lik manbalari, yoritish uskunalari, to‘lqin uzunligi, spektral tarkib, yorug‘likdan ochiqish

Abstract

Ushbu maqolada yorug‘lik manbalari va yoritish uskunalari va ushbu vositalarning avzalliklari va ulardan foydalanish yo‘llari va shu bilan birga   ulardan foydalanishda xavfsizlik qoidalari o‘ranib chiqilgan

References

Whitman, Michael E., and Herbert J. Mattord. "Principles of Information Security." Cengage Learning, 2018.

Pfleeger, Charles P., and Shari Lawrence Pfleeger. "Security in Computing." Pearson Education, 2015.

Whitman, Michael E., et al. "Management of Information Security." Cengage Learning, 2018.

Scarfone, Karen, and Murugiah Souppaya. "Guide to Computer Security Certification and Accreditation." CRC Press, 2006.

NIST Special Publication 800-37 Revision 2: "Risk Management Framework for Information Systems and Organizations." National Institute of Standards and Technology, 2018.

Anderson, James A., and Peter D. Nash. "Security Engineering: A Guide to Building Dependable Distributed Systems." Wiley, 2008.

NIST Special Publication 800-53 Revision 5: "Security and Privacy Controls for Information Systems and Organizations." National Institute of Standards and Technology, 2020.

Carroll, John M., et al. "Information Assurance Handbook: Effective Computer Security and Risk Management Strategies." McGraw-Hill, 2014.

National Security Telecommunications and Information Systems Security Policy (NSTISSP) No. 11: "National Policy Governing the Acquisition of Information Assurance (IA) and IA-Enabled Information Technology Products." Committee on National Security Systems, 2010.

Chapple, Mike, et al. "CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide." Sybex, 2018.

National Security Telecommunications and Information Systems Security Policy (NSTISSP) No. 6: "National Policy for Telecommunications and Automated Information Systems Security." Committee on National Security Systems, 2003.

Schou, Corey, and Steven Hernandez. "Information Assurance for the Enterprise: A Roadmap to Information Security." McGraw-Hill, 2007.

National Institute of Standards and Technology. "Security Standards for Federal Information Systems and Organizations." National Institute of Standards and Technology, various editions.

Downloads

Published

2024-08-05

How to Cite

Jo‘ramirzayev, I., Ibodullayeva, S., Mardonov, S., & Oripov, F. (2024). YORUG‘LIK MANBALARI VA YORITISH USKUNALARI. RESEARCH AND EDUCATION, 3(6), 9–12. Retrieved from https://researchedu.org/index.php/re/article/view/6379