YORUG‘LIK MANBALARI VA YORITISH USKUNALARI
Keywords:
Yorug‘lik manbalari, yoritish uskunalari, to‘lqin uzunligi, spektral tarkib, yorug‘likdan ochiqishAbstract
Ushbu maqolada yorug‘lik manbalari va yoritish uskunalari va ushbu vositalarning avzalliklari va ulardan foydalanish yo‘llari va shu bilan birga ulardan foydalanishda xavfsizlik qoidalari o‘ranib chiqilgan.
References
. Whitman, Michael E., and Herbert J. Mattord. "Principles of Information Security." Cengage Learning, 2018.
Pfleeger, Charles P., and Shari Lawrence Pfleeger. "Security in Computing." Pearson Education, 2015.
Whitman, Michael E., et al. "Management of Information Security." Cengage Learning, 2018.
Scarfone, Karen, and Murugiah Souppaya. "Guide to Computer Security Certification and Accreditation." CRC Press, 2006.
NIST Special Publication 800-37 Revision 2: "Risk Management Framework for Information Systems and Organizations." National Institute of Standards and Technology, 2018.
Anderson, James A., and Peter D. Nash. "Security Engineering: A Guide to Building Dependable Distributed Systems." Wiley, 2008.
NIST Special Publication 800-53 Revision 5: "Security and Privacy Controls for Information Systems and Organizations." National Institute of Standards and Technology, 2020.
Carroll, John M., et al. "Information Assurance Handbook: Effective Computer Security and Risk Management Strategies." McGraw-Hill, 2014.
National Security Telecommunications and Information Systems Security Policy (NSTISSP) No. 11: "National Policy Governing the Acquisition of Information Assurance (IA) and IA-Enabled Information Technology Products." Committee on National Security Systems, 2010.
Chapple, Mike, et al. "CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide." Sybex, 2018.
National Security Telecommunications and Information Systems Security Policy (NSTISSP) No. 6: "National Policy for Telecommunications and Automated Information Systems Security." Committee on National Security Systems, 2003.
Schou, Corey, and Steven Hernandez. "Information Assurance for the Enterprise: A Roadmap to Information Security." McGraw-Hill, 2007.
National Institute of Standards and Technology. "Security Standards for Federal Information Systems and Organizations." National Institute of Standards and Technology, various editions.