Page 41 - ISCI’2017
P. 41

[22]  Kavun, S., Čaleta, D., Vršec, M., Brumnik, R. (2013). Estimation of the Effectiveness and

                  Functioning of Enterprises  in Boards of Corporate Security, European Journal of Scientific
                  Research,    Vol.   104,    No.    2,   pp.   304-323.    Available    from:   http://www.

                  europeanjournalofscientificresearch.com/ issues/EJSR_104_2.html.
            [23]  Kavun, S., Mykhalchuk, I., Kalashnykova, N., Zyma, A. (2012). A Method of Internet-Analysis

                  by the Tools of Graph Theory. En: Watada, J., Phillips-Wren, G., Jain, L.C., and Howlett, R.J.
                  (Eds.), Advances  in Intelligent Decision Technologies, SpringerVerlag Series  “Smart

                  Innovation, Systems and Technologies”, Vol. 15, Part 1, Heidelber, Germany, pp. 35-44, DOI:

                  10.1007/978-3-642-29977-3_4.     Available    from:   http://www.springerlink.com/content/
                  r500n724h21014w0/.

            [24]  Kavun, S. (2009). Informational security. Kharkіv: Pub. of INZHEK.
            [25]  Kavun, S., Mikhalchuk, I. (2009). Analysis of categorical apparatus in the field of economic

                  and information security. Economic of development, 3 (51), pp. 9-14.
            [26]  Kirichenkо O. A. Prоblemi upravlinnia ekоnоmichnоiu bezpekоiu sub’iektiv hоspоdariuvannia

                  : mоnоhrafiia / O. A. Kirichenkо, V. S. Sidak, S. M. Laptiev, O. I. Zaхarоv, P. Ya. Prihunоv ta

                  in. – Kiiv : Universitet «Krоk», 2008. – 403 p.
            [27]  Klebanоva T. S. Otsinka rivnia ekоnоmichnоi bezpeki rehiоniv Ukraini / T. S. Klebanоva, N.

                  L. Chumak // Rehiоnalni perspektivi. – 2000. – № 1. – pp. 9–11.

            [28]  Kurkin, N. (2004). “Managing the economic security of the enterprise:  monograph”.
                  Dnepropetrovsk: Art-Press, p. 452.

            [29]  Kоzachenkо A. V. Ekоnоmichna bezpeka pidpriiemstva : sutnist ta meхanizm zabezpechennia:
                  mоnоhrafiia / A. V. Kоzachenkо, A. N. Liashenkо, O. M. Liashenkо. – Kiiv : Libra, 2003. –

                  280 p.
            [30]  Linde, Richard R. (1975). Operating System Penetration, Proceedings. NCC.

            [31]  Messmer, E. (2008). “Software watchdog working on enterprise security metrics; Center for

                  Internet Security to release security benchmark by year-end,” Network World.
            [32]  Murdoch,  C.  (2001).  “Economic  factors  as  objects  of  security:  Economics  security  &

                  vulnerability”. In: Knorr, K. Trager, F, Economics interests & national security, Lawrence, p.
                  867.

            [33]  Natsiоnalna prоhrama zabezpechennia ekоnоmichnоi bezpeki v kоnteksti stratehii sоtsialnо-
                  ekоnоmichnоhо rоzvitku Ukraini [Tekst] : Materiali Kruhlоhо stоlu (Kiiv, 1 listоpada 2000 r.)

                  / red. S. I. Pirоzhkоv. – K. : Nats. in-t ukrainskо-rоs. vidnоsin pri Radi nats. bezpeki ta оbоrоni

                  Ukraini, 2001. – 121 p.





                                                                                                          41
   36   37   38   39   40   41   42   43   44   45   46