FOYDALANILGAN ADABIYOTLAR RO‘YXATI 1. Varlataya, S. K. Hardware and software tools and methods of information protection. // Vladivostok: Publishing House of DVSTU, 2007. - 318 p.
2. Kornyushin, P.N., Kosterin A. S. Information security. / P.N. Kornyushin, A. S. Kosterin // Vladivostok: TIDOT DVSU, 2003. - 154 p.
3. Samonas, S. Redefining Confidentiality, Integrity and Availability in Security: // Journal of Information System Security. — Washington DC, USA: Information Institute Publishing, 2014. — Vol. 10, no. 3.
4. Open Information Security Management Maturity Model (O-ISM3), Version 2.0:— Reading, Berkshire, United Kingdom: The Open Group, 2017. — 130 p. — ISBN 1-937218-98-0.
5. Yuldasheva, Gulbahor Ibragimovna. Axborot xavfsizligida shifrlash haqida umumiy tushuncha. “O’zbekiston ilmiy-amaliy tadqiqotlar” mavzusidagi Respublika 28-ko’p tarmoqli ilmiy masofaviy onlayn konferentsiya materiallari. 10-qism.Toshkent.May 2021 yil .209-210 betlar