BINOLARDA PORTLASHGA QARSHI HIMOYA VOSITALARINI LOYIHALASH
Keywords:
Yong‘in xavfsizligi, qurilish ashyolarining yonuvchanligi, texnologik loyihalash me’yori va qurilish qoidalari, yonuvchi gazlar, olovlarning ishlatilishi, xavfli va faqat yonish xavfli toifalar.Abstract
Ushbu maqolada atamalar, yong‘in va portlash xavfi bo‘yicha rivojlangan standartlarga rioya qilishning ahamiyatini ta’kidlaydi va bu sohasidagi muddatli yechimlarni takomillashtirish uchun kerakli usullarni o‘z ichiga oladi.Начало формы
References
Whitman, Michael E., and Herbert J. Mattord. "Principles of Information Security." Cengage Learning, 2018.
Pfleeger, Charles P., and Shari Lawrence Pfleeger. "Security in Computing." Pearson Education, 2015.
Whitman, Michael E., et al. "Management of Information Security." Cengage Learning, 2018.
Scarfone, Karen, and Murugiah Souppaya. "Guide to Computer Security Certification and Accreditation." CRC Press, 2006.
NIST Special Publication 800-37 Revision 2: "Risk Management Framework for Information Systems and Organizations." National Institute of Standards and Technology, 2018.
Anderson, James A., and Peter D. Nash. "Security Engineering: A Guide to Building Dependable Distributed Systems." Wiley, 2008.
NIST Special Publication 800-53 Revision 5: "Security and Privacy Controls for Information Systems and Organizations." National Institute of Standards and Technology, 2020.
Carroll, John M., et al. "Information Assurance Handbook: Effective Computer Security and Risk Management Strategies." McGraw-Hill, 2014.
National Security Telecommunications and Information Systems Security Policy (NSTISSP) No. 11: "National Policy Governing the Acquisition of Information Assurance (IA) and IA-Enabled Information Technology Products." Committee on National Security Systems, 2010.
Chapple, Mike, et al. "CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide." Sybex, 2018.
National Security Telecommunications and Information Systems Security Policy (NSTISSP) No. 6: "National Policy for Telecommunications and Automated Information Systems Security." Committee on National Security Systems, 2003.
Schou, Corey, and Steven Hernandez. "Information Assurance for the Enterprise: A Roadmap to Information Security." McGraw-Hill, 2007.
National Institute of Standards and Technology. "Security Standards for Federal Information Systems and Organizations." National Institute of Standards and Technology, various editions.