| Êíèãà | Ñòðàíèöû äëÿ ïîèñêà |
| Âîðîéñêèé Ô.Ñ. — Èíôîðìàòèêà. Íîâûé ñèñòåìàòèçèðîâàííûé òîëêîâûé ñëîâàðü | 396 |
| Îëèôåð Â.Ã., Îëèôåð Í.À. — Ñåòåâûå îïåðàöèîííûå ñèñòåìû | 485 |
| Àäìèíèñòðèðîâàíèå Microsoft SQL Server 2000 | ñì. «Ïðîâåðêà ïîäëèííîñòè» |
| Khosrowpour M. — Encyclopedia Of Information Science And Technology | 1966 |
| Sobell M.G. — A Practical Guide to Red Hat Linux | |
| Beauchemin B., Sullivan D. — A Developer's Guide to SQL Server 2005 | |
| Berman F., Fox G., Hey T. (eds.) — Grid Computing | 68, 71, 73, 102, 104, 105, 107, 109, 110, 229, 242, 545, 682, 735, 743 |
| Roshan P., Leary J. — 802.11 wireless LAN fundamentals | |
| Hobbs C. — A Practical Approach to WBEM/CIM Management | 111 |
| Duncan J., Deraleau J. — Running Mac OS X Tiger | |
| Doar M.B. — Practical Development Environments | |
| Ray J., Ray W. — Mac OS X Tiger Unleashed | |
| Lester A. — MAC OS X Tiger in a Nutshell | |
| Suegring S., Ziegler R. — Linux Firewalls | |
| Gregg M., Kim D. — Inside Network Security Assessment: Guarding your IT Infrastructure | |
| Webb J. — Essential SharePoint | 2nd |
| Barrett D.J., Silverman R., Byrnes R.G. — SSH, The Secure Shell: The Definitive Guide | 2nd |
| Hucabi D., McQuerry S. — Cisco Field Manual: Catalyst Switch Configuration | 2nd 3rd |
| McMurtry, Mercuri, Watling — Presenting Microsoft Communication Foundation: Hands-on! | |
| Spealman J., Hudson K., Craft M. — MCSE Self-Paced Training Kit (Exam 70-294) Planning, Implementing, and Maintaining a Microsoft® Windows Server™ 2003 Active Directory® Infrastructure | |
| Zacker C., Steven A. — MCSE Self-Paced Training Kit (Exam 70-293): Planning and Maintaining a Microsoft® Windows Server™ 2003 Network Infrastructure | |
| Hamilton B., Chipman M., Baron A. — ADO.NET Cookbook | [See also security] |
| Graham — Building Web Services with Java: Making Sense of XML, SOAP, WSDL and UDDI | |
| Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management | |
| Sobell M.G., Seebach P. — A Practical Guide to UNIX® for Mac OS® X Users | |
| Allen R., Hunter L.E. — Active Directory Cookbook | |
| Allen R., Richards J., Lowe-Norris A.G. — Active Directory | |
| Allen R., Lowe-Norris A.G. — Active Directory | |
| MacDonald M. — Access 2007: The Missing Manual | |
| Davis H. — Absolute Beginner's Guide to Wi-Fi® Wireless Networking | |
| Kirkland J., Carmichael D., Tinker Ch.L. — Linux Troubleshooting for System Administrators and Power Users | |
| Jones B.K., von Hagen W. — Linux Server Hacks (Vol. 2) | |
| Hassell J. — Learning Windows Server 2003 | |
| Madsen L., Smith J., Van Meggelen J. — Asterisk: The Future of Telephony | |
| Smith R. — Linux in a Windows World | |
| Bauer M.D. — Linux Server Security | 2nd |
| Niemeyer P., Knudsen J. — Learning Java | |
| Bautts T., Dawson T., Purdy G.N. — Linux Network Administrator's Guide | |
| Kern S., Lynd D., Penny D. — Lotus Notes and Domino 6 Development | |
| McCarty B. — Learning Red Hat Linux | |
| Carter G. — LDAP System Administration | [See also authorization] |
| Davis M., Phillips J. — Learning PHP and MySQL | |
| Schroder C. — Linux Cookbook | |
| Castelli M.J. — LAN switching first-step | |
| Boswell W. — Learning Exchange Server 2003 | |
| Hoffman K., Kruger L. — Visual C#.NET 2003 Unleashed | |
| Eck T. — Windows NT/2000 ADSI Scripting for System Administration | |
| Mathers T.W. — Windows® Server™ 2003/2000 terminal server solutions | |
| Allen R. — Windows Server Cookbook | |
| Carter E., Lippert E. — Visual Studio Tools for Office: Using Visual Basic 2005 with Excel, Word, Outlook, and InfoPath | |
| Bausch P. — Yahoo! Hacks | |
| Lane S., Love S., Bowers B. — Using FileMaker 8 | |
| Vladimirov A.A., Gavrilenko K.V., Mikhailovsky A.A. — Wi-Foo | 2nd 3rd 4th |
| Hellberg Ch., Boyes T., Greene D. — Broadband Network Architectures: Designing and Deploying Triple Play Services | 481 |
| Eckstein R., Carter G., Watters P. — Using Samba | |
| Bragg R., Hunt C. — Windows Server 2003 Network Administration | |
| Flickenger R., Weeks R. — Wireless Hacks | |
| Cole J. — Using Moodle | |
| Pogue D. — Windows Vista for Starters: The Missing Manual | |
| Lee W. — Windows XP Unwired: A Guide for Home, Office, and the Road | |
| Karp D.A., Mott T., O'Reilly T. — Windows XP in a Nutshell | |
| Snader J.C. — VPNs Illustrated: Tunnels, VPNs, and IPsec | 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th |
| Hassell J., Campbell T. — Windows Vista: Beyond the Manual | 55 |
| Cowart R., Knittel B. — Special Edition Using Microsoft Windows XP Professional | |
| Hemenway K., Calishain T. — Spidering Hacks | |
| Holzner S. — Spring Into PHP 5 | |
| Cumming A., Russell G. — SQL Hacks | |
| Brown E.L. — SQL Server 2005 Distilled | |
| Cabrera l.-F., Kurt C. — Web Services Architecture and Its Specifications: Essentials for Understanding WS-* | |
| MacDonald M. — Visual Basic 2005: A Developer's Notebook | |
| Ts J., Eckstein R., Collier-Brown D. — Using Samba | [See also passwords] |
| Wallingford T. — VoIP Hacks | |
| Lane D., Williams H.E. — Web Database Application with PHP and MySQL | |
| Huggins D. — Windows 2000 Network Infrastructure Exam Cram 2 (Exam 70-216) | |
| Lee W.-M. — Visual Basic 2005 Jumpstart | |
| Weerawarana S., Curbera F., Leymann F. — Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More | |
| Collins-Sussman B., Fitzpatrick B.W., Pilato C.M. — Version Control with Subversion | |
| Flickenger R., Dougherty D. — Wireless Hacks: 100 Industrial-Strength Tips and Techniques | |
| Chugh A., Mountjoy J. — WebLogic: The Definitive Guide | 2nd [See also security providers, Authentication Providers]3rd |
| Bragg R. — Windows Server 2003 Security: A Technical Reference | 2nd 3rd 4th |
| Tulloch M. — Windows Server 2003 in a Nutshell | |
| Geier J. — Wireless networks first-step | |
| Cohen K., Daniels A. — Windows XP networking | 2nd 3rd 4th 5th |
| Lessig L. — Code: Version 2.0 | 40, 41, 42—46, 43 |
| Konheim A.G. — Computer Security and Cryptography | 2—3, 464—466 |
| Regan Sch., White K. — Mac OS X Server 10.4 Tiger: Visual QuickPro Guide | [See also security.] |
| Criddle L., Muir N. — Look Both Ways: Help Protect Your Family on the Internet | |
| Jepson B., Rothman E.E. — Mac OS X Panther for Unix Geeks | |
| Dornfest R., Hemenway K. — Mac OS X Hacks | |
| Dean J., Pessanha B.G., Langfeldt N. — LPI Linux Certification in a Nutshell | |
| Barrett D.J., Byrnes R.G., Silverman R. — Linux Security Cookbook | |
| Maier R. — Knowledge Management Systems: Information and Communication Technologies for Knowledge Management | 335 |
| Masanes J. — Web Archiving | 104—105 |
| Ferrari E. — Web and Information Security | 38, 53, 176 |
| Mayo J. — C# Builder KickStart | |
| McManus J.P., Kinsman Ch. — C# Developer's Guide to ASP.NET, XML, and ADO.NET | |
| Swart B., Cashman M., Gustavson P. — C++ Builder Developer's Guide | |
| Reddy K. — Building MPLS-Based Broadband Access VPNs | |
| Paquet W, Saxe W. — Business Case for Network Security: Advocacy, Governance, and ROI | 2nd |
| Rea S.M. — Building Intelligent .NET Applications: Agents, Data Mining, Rule-Based Systems, and Speech Processing | |
| Henderson C. — Building Scalable Web Sites | |
| Building Applications with the Linux Standard Base | 2nd 3rd 4th 5th |
| Yaghmour K. — Building Embedded Linux Systems | |
| Bauer M.D. — Building Secure Servers With Linux | |
| Carolan J., Radeztsky S., Strong P. — Buliding N1 Grid Solutions Preparing, Architecting, and Implementing Service-Centric Data Centers | |
| McGuiggan P. — GPRS in Practice : A Companion to the Specifications | 266 |
| Bauer F.L. — Decrypted Secrets: Methods and Maxims of Cryptology | 26, 30, 188, 191, 194—196, 201, 209, 218, 228, 485 |
| Microsoft Corporation — Guidelines for Application Integration | 56—57, 117 |
| Koblitz N. — A course in number theory and cryptography | 88, 95 |
| Wesseles D. — Web Caching | |
| Donald L. — MCSA/MCSE 2003 JumpStart: Computer and Network Basics | 191 |
| von zur Gathen J., Gerhard J. — Modern computer algebra | 550, 552 |
| Brookshear J.G. — Computer Science: An Overview | 202, 436 |
| Ñêåìáðåé Ä., Øåìà Ì. — Ñåêðåòû õàêåðîâ. Áåçîïàñíîñòü Web-ïðèëîæåíèé — ãîòîâûå ðåøåíèÿ | 31, 138, 144, 155, 163, 167, 262 |
| Koblitz N., Wu Y.-H., Menezes A.J. — Algebraic Aspects of Cryptography | 4 |
| Tanenbaum A.S. — Distributed operating systems | 554 |
| Andrew S.Tanenbaum — Distributed Systems: Principles and Paradigms | 554 |
| Feldt R., Johnson L., Neumann M. — Ruby Developer's Guide | see “HyperText Transfer Protocol” |
| Kumar P., D'Ariano G.M., Hirota O. — Quantum communication, computing, and measurement 2 | 389 |
| Koblitz N., Menezes A.J. (Contributor), Wu Y.-H. (Contributor) — Algebraic Aspects of Cryptography | 4 |
| Rob P., Coronel C. — Database systems: Design, Implementation, and Management | 231, 629—630 |
| Wood D. — Programming Internet Email HQ [SMTP,MIME,IMAP,POP3] | 72 |
| Leeuwen J.V. — Handbook of Theoretical Computer Science: Algorithms and Complexity | 720 |
| Brookshear J. — Computer Science | 202, 436 |
| Fowler C. — Rails recipes | 115 |
| Leeuwen J. (ed.), Meyer A.R., Nivat M. — Algorithms and Complexity, Volume A | 720 |
| Maltoni D., Maio D., Jain A.K. — Handbook of fingerprint recognition | 3 |
| Goebel A., Ritthaler D. — SAP Enterprise Portal: Technology and Programming | 36, 39, 223, 226, 229, 231, 233, 264 |
| Orloff J. — How to Do Everything: Ubuntu | 176 |
| Lerdorf R., Tatroe K., MacIntyre P. — Programming PHP | 177 |
| Laahs K., McKenna E., Veli-Matti Vanamo — Microsoft SharePoint 2007 Technologies: Planning, Design and Implementation | 42 |
| Bruss D. (ed.), Leuchs G. (ed.) — Lectures on Quantum Information | 275 |
| John Aycock — Computer Viruses and Malware | 13, 16, 17, 135, 145 |