|
|
Результат поиска |
Поиск книг, содержащих: Security, authentication
Книга | Страницы для поиска | Sobell M.G. — A Practical Guide to Red Hat Linux | | Roshan P., Leary J. — 802.11 wireless LAN fundamentals | | Graham — Building Web Services with Java: Making Sense of XML, SOAP, WSDL and UDDI | | Sobell M.G., Seebach P. — A Practical Guide to UNIX® for Mac OS® X Users | | Castelli M.J. — LAN switching first-step | | Hellberg Ch., Boyes T., Greene D. — Broadband Network Architectures: Designing and Deploying Triple Play Services | 481—483 | Cabrera l.-F., Kurt C. — Web Services Architecture and Its Specifications: Essentials for Understanding WS-* | 2nd 3rd 4th | Lane D., Williams H.E. — Web Database Application with PHP and MySQL | [See authentication] | Microsoft Corporation — Guidelines for Application Integration | See authentication | Rob P., Coronel C. — Database systems: Design, Implementation, and Management | 231, 629—630 | Hazel P. — Exim. The Mail Transfer Agent | 6, 18 |
|
|