İngilis dilində
Abbasov A.M., Gasumov V.A. Construction princip- les of the security Service in the Computer systems. // Proceeding of JENC-7. Budapest. 1996. pp.1771- 1775.
Bender W., Gruhl D., Morimoto N., Lu A. Tech- niques for data hiding. U IBM Systems Journal, Vol 35, N: 3&4, 1996. pp.313-336.
Brassard J. Modern Cryptology. Springer-Verlag, Berlin - Heidelberg, 1988. - 107 p.
Building Internet Firewalls, by Brent Chapman. U http://www.greatcircle.com/gca/tutorial/wwwsite.html.
Cachin C. An Information-Theoretic Model for Ste-ganography. U In Proceedings of 2nd Workshop on Information Hiding (D. Aucsmith, ed.), Lecture Notes in Computer Science, Springer, 1998.
Cheswick W., Bellovin S., Addison W. Firewalls and Internet security. // http://www.anatomy.su.oz.au/ danny/book-review/h/Firewals_and_Intemet_ Security.html.
Data Integrity. U LLC. http://www.dintegra.com/.
Diffıe W., Hellman M.E. New directions in crypto- graphy // IEEE Trans. on Information Theory. 1976. Vol. 22. Ns 6. P. 644-654.
Landwehr C.E. Computer security. // International Journal of Information Security, 2001. Nsl. pp.3-13.
Ramım M., Avolio F. A toolkit and Methods for Internet Firewalls. Trusted Information Systems Inc. // http: //www. tis. com/doc s/pr oduc ts/gauntlet/U senix .ht ml/.
RSA Data Security. //http://www.rsa.com/.
Dostları ilə paylaş: |