XESHLASH FUNKSIYASI
Аннотация
Xeshlash funksiyasi, bir matndan unikal bo'lgan xesh qiymatini generatsiya qiladigan matematikiy amaldir. Uning asosiy maqsadi, kiritilgan matnning hajmi, tarkibi va tarkibiy o'zgaruvchilari bilan bog'liq bo'lgan ustun va barqaror xesh qiymatini olishdir. Xeshlash funksiyalari bir nechta xususiyatlarga ega bo'lishi mumkin, masalan, qisqa xesh qiymatlarga ega bo'lishi, unikallik, tezlik va ma'lumotlar bozilmaganligini tekshirish imkonini berish.
Библиографические ссылки
Axborot xavfsizligi tizimini qurish metodologiyasi haqida ma'lumotlarni olish uchun quyidagi adabiyotlardan foydalanishingiz mumkin:
Rossouw, R., & von Solms, R. (2016). Information Security Governance: A Practical Development and Implementation Approach. Auerbach Publications.
Whitman, M. E., & Mattord, H. J. (2016). Principles of Information Security. Cengage Learning.
Pfleeger, C. P., & Pfleeger, S. L. (2018). Security in Computing. Pearson.
Stoneburner, G., Goguen, A., & Feringa, A. (2002). Risk Management Guide for Information Technology Systems. National Institute of Standards and Technology (NIST) Special Publication.
ISO/IEC 27001:2013. Information technology — Security techniques — Information security management systems — Requirements.
ISO/IEC 27002:2013. Information technology — Security techniques — Code of practice for information security controls.
NIST Special Publication 800-53. Security and Privacy Controls for Federal Information Systems and Organizations.
Schneier, B. (2015). Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons.
Anderson, R. (2008). Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley.
«Axborot texnologiyasi. Ma’lumotlami kriptografik muho- fazasi. Elektron raqamli imzoni shakllantirish va tekshirish jarayonlari» O‘zbekiston Davlat standard. 0‘z DSt 1092:2005.
«Axborot texnologiyasi. Axborotlami kriptografik muhofazasi. Ma’lumotlami shifrlash algoritmi» 0‘zbekiston Davlat standard. 0‘zDSt 1105:2006
«Axborot texnologiyasi. Ochiq tizimlar o‘zaro bogMiqligi. Elek tron raqamli imzo ochiq kaliti sertifikati va atribut sertifikatining tuzil- masi» 0‘zbekiston Davlat standarti. 0‘zDSt 1108:2006.
С.В. Симонов. Анализ рисков в информационнмх систе- мах. Практические советь! // Конфидент. -2001. -№2.
S.S.Qosimov. Axborot texnologiyalari. 0‘quv qoMlanma. - T.: «Aloqachi», 2006.
S.K.G‘aniyev, M.M. Karimov. Hisoblash sistemalari va tar- moqlarida informatsiya himoyasi. Oliy o‘quv yurt.talab. uchun o‘quv qoMlanma. —Toshkent Davlat texnika universiteti, 2003.
Kitoblar:
"The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws" - Dafydd Stuttard va Marcus Pinto
"Metasploit: The Penetration Tester's Guide" - David Kennedy, Jim O'Gorman, Devon Kearns va Mati Aharoni
"The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy" - Patrick Engebretson
"Penetration Testing: A Hands-On Introduction to Hacking" - Georgia Weidman
"Hacking: The Art of Exploitation" - Jon Erickson
"Network Security Assessment: Know Your Network" - Chris McNab
"The Shellcoder's Handbook: Discovering and Exploiting Security Holes" - Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte
"The Mobile Application Hacker's Handbook" - Dominic Chell va Tyrone Erasmus
"Red Team Field Manual" - Ben Clark
"Web Hacking 101: How to Make Money Hacking Ethically" - Peter Yaworski
Jurnallar:
Journal of Penetration Testing and Application Security
International Journal of Network Security & Its Applications
Journal of Information Warfare
IEEE Security & Privacy
ACM Transactions on Information and System Security
Journal of Computer Security
International Journal of Information Security
Journal of Cybersecurity