,,,
.. , , ..
. . , , . . , . , , , - [1].
: , . . , ?. . , - ?. . , - , , , ? [2].
. , [3].
:
1 ?
2 , ?
3 ?
.
:
1 . , . , .
2 . , . , , .
3 . , . - .
4 . . . - 58 . , .
A. , [4].
:
?
?
?
?
?
, , . , , .
B. ? , - .
:
, .
, , .
.
.
.
.
.
, . . . , , .
C. , , . . . , , .
D. ?
:
.
59 .
.
[5]. , , , , , . , .
. , ?
. , , . , . , , , .
1. Geer D., Hoo K., Jaquith A. Information Security: Why the Future Belongs to the Quants / IEEE Security & Privacy Vol. 1, No. 4; July/August 2003, pp. 24-32.
2. Bishop M. What Is Computer Security? / IEEE Security & Privacy Vol. 1, No. 1; January/February 2003, pp. 67-69.
3. Boehm B., Turner R. Using Risk to Balance Agile and Plan-Driven Methods / IEEE Computer Vol. 36, No. 6; June 2003, pp. 57-66.
4. Geer D. Risk Management Is Still Where the Money Is / IEEE Computer Vol. 36, No. 12; December 2003, pp. 129-131.
5. Gliedman C. Managing IT Risk with Portfolio Management Thinking / CIO (Analyst Corner),www.cio.com/analyst/012502_giga.html.
http://www.contrterror.tsure.ru/
Copyright (c) 2024 Stud-Baza.ru , , , .