1. Andrianov V.V., Zefrov S.L., Golovanov V.B., Golduev N.A. Ensuring information security of business. 2nd ed. Moscow: Alpina Publ.; 2011. (In Russ.).
2. Johnson J. R., Johnson R. W., Rodriguez D., Tolimieri R. A methodology for designing, modifying, and implementing Fourier transform algorithms on various architectures. Circuits, Systems and Signal Processing. 1990;9(4):449–500. DOI: 10.1007/BF01189337
3. Koz’minykh S.I. Methodological bases for ensuring complex security of an object, frm, business activity. Moscow: Moscow Univ. of the MIA of Russia; 2005. 432 p. (In Russ.).
4. Skiba V. Yu., Kurbatov V. A. A guide to protection against internal threats to information security. St. Petersburg: Piter Publ.; 2008. 235 p. (In Russ.).
5. Akimov V.A., Lesnykh V.V., Radaev N.N. Fundamentals of risk analysis and management in the natural and manmade spheres. Moscow: Delovoi ekspress; 2004. 352 p. (In Russ.).