|
|
Результат поиска |
Поиск книг, содержащих: PAM (pluggable authentication modules)
Книга | Страницы для поиска | Duncan J., Deraleau J. — Running Mac OS X Tiger | | Barrett D.J., Silverman R., Byrnes R.G. — SSH, The Secure Shell: The Definitive Guide | 2nd | Jang M. — Linux Annoyances for Geeks | | Smith R. — Linux in a Windows World | 2nd 3rd | Bauer M.D. — Linux Server Security | 2nd | Carter G. — LDAP System Administration | | Eckstein R., Carter G., Watters P. — Using Samba | | Ts J., Eckstein R., Collier-Brown D. — Using Samba | | Dean J., Pessanha B.G., Langfeldt N. — LPI Linux Certification in a Nutshell | 2nd | Barrett D.J., Byrnes R.G., Silverman R. — Linux Security Cookbook | [See PAM] | Bauer M.D. — Building Secure Servers With Linux | 2nd | Lavigne D. — BSD Hacks | | Nyberg G., Patrick R. — Mastering BEA WebLogic Server: Best Practices for Building and Deploying J2EE Applications | 413 | Hatch B., Lee J., Kurtz G. — Hacking linux exposed: linux security secrets & solutions | 304—305, 311, 345—347 |
|
|