|
|
 |
| Результат поиска |
Поиск книг, содержащих: PAM (pluggable authentication modules)
| Книга | Страницы для поиска | | Duncan J., Deraleau J. — Running Mac OS X Tiger | | | Barrett D.J., Silverman R., Byrnes R.G. — SSH, The Secure Shell: The Definitive Guide | 2nd | | Jang M. — Linux Annoyances for Geeks | | | Smith R. — Linux in a Windows World | 2nd 3rd | | Bauer M.D. — Linux Server Security | 2nd | | Carter G. — LDAP System Administration | | | Eckstein R., Carter G., Watters P. — Using Samba | | | Ts J., Eckstein R., Collier-Brown D. — Using Samba | | | Dean J., Pessanha B.G., Langfeldt N. — LPI Linux Certification in a Nutshell | 2nd | | Barrett D.J., Byrnes R.G., Silverman R. — Linux Security Cookbook | [See PAM] | | Bauer M.D. — Building Secure Servers With Linux | 2nd | | Lavigne D. — BSD Hacks | | | Nyberg G., Patrick R. — Mastering BEA WebLogic Server: Best Practices for Building and Deploying J2EE Applications | 413 | | Hatch B., Lee J., Kurtz G. — Hacking linux exposed: linux security secrets & solutions | 304—305, 311, 345—347 |
|
|