Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
Ìåõìàòÿíàì
square Ïåðâûé êóðñ

square Âòîðîé êóðñ

square Òðåòèé êóðñ

square ×åòâåðòûé êóðñ

square Ïÿòûé êóðñ
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
Êðàñîòà
blank
blank
Ðåçóëüòàò ïîèñêà

Ïîèñê êíèã, ñîäåðæàùèõ: Authentication



ÊíèãàÑòðàíèöû äëÿ ïîèñêà
Âîðîéñêèé Ô.Ñ. — Èíôîðìàòèêà. Íîâûé ñèñòåìàòèçèðîâàííûé òîëêîâûé ñëîâàðü396
Îëèôåð Â.Ã., Îëèôåð Í.À. — Ñåòåâûå îïåðàöèîííûå ñèñòåìû485
Àäìèíèñòðèðîâàíèå Microsoft SQL Server 2000ñì. «Ïðîâåðêà ïîäëèííîñòè»
Khosrowpour M. — Encyclopedia Of Information Science And Technology1966
Sobell M.G. — A Practical Guide to Red Hat Linux
Beauchemin B., Sullivan D. — A Developer's Guide to SQL Server 2005
Berman F., Fox G., Hey T. (eds.) — Grid Computing68, 71, 73, 102, 104, 105, 107, 109, 110, 229, 242, 545, 682, 735, 743
Roshan P., Leary J. — 802.11 wireless LAN fundamentals
Hobbs C. — A Practical Approach to WBEM/CIM Management111
Duncan J., Deraleau J. — Running Mac OS X Tiger
Doar M.B. — Practical Development Environments
Ray J., Ray W. — Mac OS X Tiger Unleashed
Lester A. — MAC OS X Tiger in a Nutshell
Suegring S., Ziegler R. — Linux Firewalls
Gregg M., Kim D. — Inside Network Security Assessment: Guarding your IT Infrastructure
Webb J. — Essential SharePoint2nd
Barrett D.J., Silverman R., Byrnes R.G. — SSH, The Secure Shell: The Definitive Guide2nd
Hucabi D., McQuerry S. — Cisco Field Manual: Catalyst Switch Configuration2nd 3rd
McMurtry, Mercuri, Watling — Presenting Microsoft Communication Foundation: Hands-on!
Spealman J., Hudson K., Craft M. — MCSE Self-Paced Training Kit (Exam 70-294) Planning, Implementing, and Maintaining a Microsoft® Windows Server™ 2003 Active Directory® Infrastructure
Zacker C., Steven A. — MCSE Self-Paced Training Kit (Exam 70-293): Planning and Maintaining a Microsoft® Windows Server™ 2003 Network Infrastructure
Hamilton B., Chipman M., Baron A. — ADO.NET Cookbook[See also security]
Graham — Building Web Services with Java: Making Sense of XML, SOAP, WSDL and UDDI
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
Sobell M.G., Seebach P. — A Practical Guide to UNIX® for Mac OS® X Users
Allen R., Hunter L.E. — Active Directory Cookbook
Allen R., Richards J., Lowe-Norris A.G. — Active Directory
Allen R., Lowe-Norris A.G. — Active Directory
MacDonald M. — Access 2007: The Missing Manual
Davis H. — Absolute Beginner's Guide to Wi-Fi® Wireless Networking
Kirkland J., Carmichael D., Tinker Ch.L. — Linux Troubleshooting for System Administrators and Power Users
Jones B.K., von Hagen W. — Linux Server Hacks (Vol. 2)
Hassell J. — Learning Windows Server 2003
Madsen L., Smith J., Van Meggelen J. — Asterisk: The Future of Telephony
Smith R. — Linux in a Windows World
Bauer M.D. — Linux Server Security2nd
Niemeyer P., Knudsen J. — Learning Java
Bautts T., Dawson T., Purdy G.N. — Linux Network Administrator's Guide
Kern S., Lynd D., Penny D. — Lotus Notes and Domino 6 Development
McCarty B. — Learning Red Hat Linux
Carter G. — LDAP System Administration[See also authorization]
Davis M., Phillips J. — Learning PHP and MySQL
Schroder C. — Linux Cookbook
Castelli M.J. — LAN switching first-step
Boswell W. — Learning Exchange Server 2003
Hoffman K., Kruger L. — Visual C#.NET 2003 Unleashed
Eck T. — Windows NT/2000 ADSI Scripting for System Administration
Mathers T.W. — Windows® Server™ 2003/2000 terminal server solutions
Allen R. — Windows Server Cookbook
Carter E., Lippert E. — Visual Studio Tools for Office: Using Visual Basic 2005 with Excel, Word, Outlook, and InfoPath
Bausch P. — Yahoo! Hacks
Lane S., Love S., Bowers B. — Using FileMaker 8
Vladimirov A.A., Gavrilenko K.V., Mikhailovsky A.A. — Wi-Foo2nd 3rd 4th
Hellberg Ch., Boyes T., Greene D. — Broadband Network Architectures: Designing and Deploying Triple Play Services481
Eckstein R., Carter G., Watters P. — Using Samba
Bragg R., Hunt C. — Windows Server 2003 Network Administration
Flickenger R., Weeks R. — Wireless Hacks
Cole J. — Using Moodle
Pogue D. — Windows Vista for Starters: The Missing Manual
Lee W. — Windows XP Unwired: A Guide for Home, Office, and the Road
Karp D.A., Mott T., O'Reilly T. — Windows XP in a Nutshell
Snader J.C. — VPNs Illustrated: Tunnels, VPNs, and IPsec2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th
Hassell J., Campbell T. — Windows Vista: Beyond the Manual55
Cowart R., Knittel B. — Special Edition Using Microsoft Windows XP Professional
Hemenway K., Calishain T. — Spidering Hacks
Holzner S. — Spring Into PHP 5
Cumming A., Russell G. — SQL Hacks
Brown E.L. — SQL Server 2005 Distilled
Cabrera l.-F., Kurt C. — Web Services Architecture and Its Specifications: Essentials for Understanding WS-*
MacDonald M. — Visual Basic 2005: A Developer's Notebook
Ts J., Eckstein R., Collier-Brown D. — Using Samba[See also passwords]
Wallingford T. — VoIP Hacks
Lane D., Williams H.E. — Web Database Application with PHP and MySQL
Huggins D. — Windows 2000 Network Infrastructure Exam Cram 2 (Exam 70-216)
Lee W.-M. — Visual Basic 2005 Jumpstart
Weerawarana S., Curbera F., Leymann F. — Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More
Collins-Sussman B., Fitzpatrick B.W., Pilato C.M. — Version Control with Subversion
Flickenger R., Dougherty D. — Wireless Hacks: 100 Industrial-Strength Tips and Techniques
Chugh A., Mountjoy J. — WebLogic: The Definitive Guide2nd [See also security providers, Authentication Providers]3rd
Bragg R. — Windows Server 2003 Security: A Technical Reference2nd 3rd 4th
Tulloch M. — Windows Server 2003 in a Nutshell
Geier J. — Wireless networks first-step
Cohen K., Daniels A. — Windows XP networking2nd 3rd 4th 5th
Lessig L. — Code: Version 2.040, 41, 42—46, 43
Konheim A.G. — Computer Security and Cryptography2—3, 464—466
Regan Sch., White K. — Mac OS X Server 10.4 Tiger: Visual QuickPro Guide[See also security.]
Criddle L., Muir N. — Look Both Ways: Help Protect Your Family on the Internet
Jepson B., Rothman E.E. — Mac OS X Panther for Unix Geeks
Dornfest R., Hemenway K. — Mac OS X Hacks
Dean J., Pessanha B.G., Langfeldt N. — LPI Linux Certification in a Nutshell
Barrett D.J., Byrnes R.G., Silverman R. — Linux Security Cookbook
Maier R. — Knowledge Management Systems: Information and Communication Technologies for Knowledge Management335
Masanes J. — Web Archiving104—105
Ferrari E. — Web and Information Security38, 53, 176
Mayo J. — C# Builder KickStart
McManus J.P., Kinsman Ch. — C# Developer's Guide to ASP.NET, XML, and ADO.NET
Swart B., Cashman M., Gustavson P. — C++ Builder Developer's Guide
Reddy K. — Building MPLS-Based Broadband Access VPNs
Paquet W, Saxe W. — Business Case for Network Security: Advocacy, Governance, and ROI2nd
Rea S.M. — Building Intelligent .NET Applications: Agents, Data Mining, Rule-Based Systems, and Speech Processing
Henderson C. — Building Scalable Web Sites
Building Applications with the Linux Standard Base2nd 3rd 4th 5th
Yaghmour K. — Building Embedded Linux Systems
Bauer M.D. — Building Secure Servers With Linux
Carolan J., Radeztsky S., Strong P. — Buliding N1 Grid Solutions Preparing, Architecting, and Implementing Service-Centric Data Centers
McGuiggan P. — GPRS in Practice : A Companion to the Specifications266
Bauer F.L. — Decrypted Secrets: Methods and Maxims of Cryptology26, 30, 188, 191, 194—196, 201, 209, 218, 228, 485
Microsoft Corporation — Guidelines for Application Integration56—57, 117
Koblitz N. — A course in number theory and cryptography88, 95
Wesseles D. — Web Caching
Donald L. — MCSA/MCSE 2003 JumpStart: Computer and Network Basics191
von zur Gathen J., Gerhard J. — Modern computer algebra550, 552
Brookshear J.G. — Computer Science: An Overview202, 436
Ñêåìáðåé Ä., Øåìà Ì. — Ñåêðåòû õàêåðîâ. Áåçîïàñíîñòü Web-ïðèëîæåíèé — ãîòîâûå ðåøåíèÿ31, 138, 144, 155, 163, 167, 262
Koblitz N., Wu Y.-H., Menezes A.J. — Algebraic Aspects of Cryptography4
Tanenbaum A.S. — Distributed operating systems554
Andrew S.Tanenbaum — Distributed Systems: Principles and Paradigms554
Feldt R., Johnson L., Neumann M. — Ruby Developer's Guidesee “HyperText Transfer Protocol”
Kumar P., D'Ariano G.M., Hirota O. — Quantum communication, computing, and measurement 2389
Koblitz N., Menezes A.J. (Contributor), Wu Y.-H. (Contributor) — Algebraic Aspects of Cryptography4
Rob P., Coronel C. — Database systems: Design, Implementation, and Management231, 629—630
Wood D. — Programming Internet Email HQ [SMTP,MIME,IMAP,POP3]72
Leeuwen J.V. — Handbook of Theoretical Computer Science: Algorithms and Complexity720
Brookshear J. — Computer Science202, 436
Fowler C. — Rails recipes115
Leeuwen J. (ed.), Meyer A.R., Nivat M. — Algorithms and Complexity, Volume A720
Maltoni D., Maio D., Jain A.K. — Handbook of fingerprint recognition3
Goebel A., Ritthaler D. — SAP Enterprise Portal: Technology and Programming36, 39, 223, 226, 229, 231, 233, 264
Orloff J. — How to Do Everything: Ubuntu176
Lerdorf R., Tatroe K., MacIntyre P. — Programming PHP177
Laahs K., McKenna E., Veli-Matti Vanamo — Microsoft SharePoint 2007 Technologies: Planning, Design and Implementation42
Bruss D. (ed.), Leuchs G. (ed.) — Lectures on Quantum Information275
John Aycock — Computer Viruses and Malware13, 16, 17, 135, 145
blank
HR
@Mail.ru
© Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01!| Valid CSS! Î ïðîåêòå