Êíèãà | Ñòðàíèöû äëÿ ïîèñêà |
Âîðîéñêèé Ô.Ñ. — Èíôîðìàòèêà. Íîâûé ñèñòåìàòèçèðîâàííûé òîëêîâûé ñëîâàðü | 396 |
Îëèôåð Â.Ã., Îëèôåð Í.À. — Ñåòåâûå îïåðàöèîííûå ñèñòåìû | 485 |
Àäìèíèñòðèðîâàíèå Microsoft SQL Server 2000 | ñì. «Ïðîâåðêà ïîäëèííîñòè» |
Khosrowpour M. — Encyclopedia Of Information Science And Technology | 1966 |
Sobell M.G. — A Practical Guide to Red Hat Linux | |
Beauchemin B., Sullivan D. — A Developer's Guide to SQL Server 2005 | |
Berman F., Fox G., Hey T. (eds.) — Grid Computing | 68, 71, 73, 102, 104, 105, 107, 109, 110, 229, 242, 545, 682, 735, 743 |
Roshan P., Leary J. — 802.11 wireless LAN fundamentals | |
Hobbs C. — A Practical Approach to WBEM/CIM Management | 111 |
Duncan J., Deraleau J. — Running Mac OS X Tiger | |
Doar M.B. — Practical Development Environments | |
Ray J., Ray W. — Mac OS X Tiger Unleashed | |
Lester A. — MAC OS X Tiger in a Nutshell | |
Suegring S., Ziegler R. — Linux Firewalls | |
Gregg M., Kim D. — Inside Network Security Assessment: Guarding your IT Infrastructure | |
Webb J. — Essential SharePoint | 2nd |
Barrett D.J., Silverman R., Byrnes R.G. — SSH, The Secure Shell: The Definitive Guide | 2nd |
Hucabi D., McQuerry S. — Cisco Field Manual: Catalyst Switch Configuration | 2nd 3rd |
McMurtry, Mercuri, Watling — Presenting Microsoft Communication Foundation: Hands-on! | |
Spealman J., Hudson K., Craft M. — MCSE Self-Paced Training Kit (Exam 70-294) Planning, Implementing, and Maintaining a Microsoft® Windows Server™ 2003 Active Directory® Infrastructure | |
Zacker C., Steven A. — MCSE Self-Paced Training Kit (Exam 70-293): Planning and Maintaining a Microsoft® Windows Server™ 2003 Network Infrastructure | |
Hamilton B., Chipman M., Baron A. — ADO.NET Cookbook | [See also security] |
Graham — Building Web Services with Java: Making Sense of XML, SOAP, WSDL and UDDI | |
Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management | |
Sobell M.G., Seebach P. — A Practical Guide to UNIX® for Mac OS® X Users | |
Allen R., Hunter L.E. — Active Directory Cookbook | |
Allen R., Richards J., Lowe-Norris A.G. — Active Directory | |
Allen R., Lowe-Norris A.G. — Active Directory | |
MacDonald M. — Access 2007: The Missing Manual | |
Davis H. — Absolute Beginner's Guide to Wi-Fi® Wireless Networking | |
Kirkland J., Carmichael D., Tinker Ch.L. — Linux Troubleshooting for System Administrators and Power Users | |
Jones B.K., von Hagen W. — Linux Server Hacks (Vol. 2) | |
Hassell J. — Learning Windows Server 2003 | |
Madsen L., Smith J., Van Meggelen J. — Asterisk: The Future of Telephony | |
Smith R. — Linux in a Windows World | |
Bauer M.D. — Linux Server Security | 2nd |
Niemeyer P., Knudsen J. — Learning Java | |
Bautts T., Dawson T., Purdy G.N. — Linux Network Administrator's Guide | |
Kern S., Lynd D., Penny D. — Lotus Notes and Domino 6 Development | |
McCarty B. — Learning Red Hat Linux | |
Carter G. — LDAP System Administration | [See also authorization] |
Davis M., Phillips J. — Learning PHP and MySQL | |
Schroder C. — Linux Cookbook | |
Castelli M.J. — LAN switching first-step | |
Boswell W. — Learning Exchange Server 2003 | |
Hoffman K., Kruger L. — Visual C#.NET 2003 Unleashed | |
Eck T. — Windows NT/2000 ADSI Scripting for System Administration | |
Mathers T.W. — Windows® Server™ 2003/2000 terminal server solutions | |
Allen R. — Windows Server Cookbook | |
Carter E., Lippert E. — Visual Studio Tools for Office: Using Visual Basic 2005 with Excel, Word, Outlook, and InfoPath | |
Bausch P. — Yahoo! Hacks | |
Lane S., Love S., Bowers B. — Using FileMaker 8 | |
Vladimirov A.A., Gavrilenko K.V., Mikhailovsky A.A. — Wi-Foo | 2nd 3rd 4th |
Hellberg Ch., Boyes T., Greene D. — Broadband Network Architectures: Designing and Deploying Triple Play Services | 481 |
Eckstein R., Carter G., Watters P. — Using Samba | |
Bragg R., Hunt C. — Windows Server 2003 Network Administration | |
Flickenger R., Weeks R. — Wireless Hacks | |
Cole J. — Using Moodle | |
Pogue D. — Windows Vista for Starters: The Missing Manual | |
Lee W. — Windows XP Unwired: A Guide for Home, Office, and the Road | |
Karp D.A., Mott T., O'Reilly T. — Windows XP in a Nutshell | |
Snader J.C. — VPNs Illustrated: Tunnels, VPNs, and IPsec | 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th |
Hassell J., Campbell T. — Windows Vista: Beyond the Manual | 55 |
Cowart R., Knittel B. — Special Edition Using Microsoft Windows XP Professional | |
Hemenway K., Calishain T. — Spidering Hacks | |
Holzner S. — Spring Into PHP 5 | |
Cumming A., Russell G. — SQL Hacks | |
Brown E.L. — SQL Server 2005 Distilled | |
Cabrera l.-F., Kurt C. — Web Services Architecture and Its Specifications: Essentials for Understanding WS-* | |
MacDonald M. — Visual Basic 2005: A Developer's Notebook | |
Ts J., Eckstein R., Collier-Brown D. — Using Samba | [See also passwords] |
Wallingford T. — VoIP Hacks | |
Lane D., Williams H.E. — Web Database Application with PHP and MySQL | |
Huggins D. — Windows 2000 Network Infrastructure Exam Cram 2 (Exam 70-216) | |
Lee W.-M. — Visual Basic 2005 Jumpstart | |
Weerawarana S., Curbera F., Leymann F. — Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More | |
Collins-Sussman B., Fitzpatrick B.W., Pilato C.M. — Version Control with Subversion | |
Flickenger R., Dougherty D. — Wireless Hacks: 100 Industrial-Strength Tips and Techniques | |
Chugh A., Mountjoy J. — WebLogic: The Definitive Guide | 2nd [See also security providers, Authentication Providers]3rd |
Bragg R. — Windows Server 2003 Security: A Technical Reference | 2nd 3rd 4th |
Tulloch M. — Windows Server 2003 in a Nutshell | |
Geier J. — Wireless networks first-step | |
Cohen K., Daniels A. — Windows XP networking | 2nd 3rd 4th 5th |
Lessig L. — Code: Version 2.0 | 40, 41, 42—46, 43 |
Konheim A.G. — Computer Security and Cryptography | 2—3, 464—466 |
Regan Sch., White K. — Mac OS X Server 10.4 Tiger: Visual QuickPro Guide | [See also security.] |
Criddle L., Muir N. — Look Both Ways: Help Protect Your Family on the Internet | |
Jepson B., Rothman E.E. — Mac OS X Panther for Unix Geeks | |
Dornfest R., Hemenway K. — Mac OS X Hacks | |
Dean J., Pessanha B.G., Langfeldt N. — LPI Linux Certification in a Nutshell | |
Barrett D.J., Byrnes R.G., Silverman R. — Linux Security Cookbook | |
Maier R. — Knowledge Management Systems: Information and Communication Technologies for Knowledge Management | 335 |
Masanes J. — Web Archiving | 104—105 |
Ferrari E. — Web and Information Security | 38, 53, 176 |
Mayo J. — C# Builder KickStart | |
McManus J.P., Kinsman Ch. — C# Developer's Guide to ASP.NET, XML, and ADO.NET | |
Swart B., Cashman M., Gustavson P. — C++ Builder Developer's Guide | |
Reddy K. — Building MPLS-Based Broadband Access VPNs | |
Paquet W, Saxe W. — Business Case for Network Security: Advocacy, Governance, and ROI | 2nd |
Rea S.M. — Building Intelligent .NET Applications: Agents, Data Mining, Rule-Based Systems, and Speech Processing | |
Henderson C. — Building Scalable Web Sites | |
Building Applications with the Linux Standard Base | 2nd 3rd 4th 5th |
Yaghmour K. — Building Embedded Linux Systems | |
Bauer M.D. — Building Secure Servers With Linux | |
Carolan J., Radeztsky S., Strong P. — Buliding N1 Grid Solutions Preparing, Architecting, and Implementing Service-Centric Data Centers | |
McGuiggan P. — GPRS in Practice : A Companion to the Specifications | 266 |
Bauer F.L. — Decrypted Secrets: Methods and Maxims of Cryptology | 26, 30, 188, 191, 194—196, 201, 209, 218, 228, 485 |
Microsoft Corporation — Guidelines for Application Integration | 56—57, 117 |
Koblitz N. — A course in number theory and cryptography | 88, 95 |
Wesseles D. — Web Caching | |
Donald L. — MCSA/MCSE 2003 JumpStart: Computer and Network Basics | 191 |
von zur Gathen J., Gerhard J. — Modern computer algebra | 550, 552 |
Brookshear J.G. — Computer Science: An Overview | 202, 436 |
Ñêåìáðåé Ä., Øåìà Ì. — Ñåêðåòû õàêåðîâ. Áåçîïàñíîñòü Web-ïðèëîæåíèé — ãîòîâûå ðåøåíèÿ | 31, 138, 144, 155, 163, 167, 262 |
Koblitz N., Wu Y.-H., Menezes A.J. — Algebraic Aspects of Cryptography | 4 |
Tanenbaum A.S. — Distributed operating systems | 554 |
Andrew S.Tanenbaum — Distributed Systems: Principles and Paradigms | 554 |
Feldt R., Johnson L., Neumann M. — Ruby Developer's Guide | see “HyperText Transfer Protocol” |
Kumar P., D'Ariano G.M., Hirota O. — Quantum communication, computing, and measurement 2 | 389 |
Koblitz N., Menezes A.J. (Contributor), Wu Y.-H. (Contributor) — Algebraic Aspects of Cryptography | 4 |
Rob P., Coronel C. — Database systems: Design, Implementation, and Management | 231, 629—630 |
Wood D. — Programming Internet Email HQ [SMTP,MIME,IMAP,POP3] | 72 |
Leeuwen J.V. — Handbook of Theoretical Computer Science: Algorithms and Complexity | 720 |
Brookshear J. — Computer Science | 202, 436 |
Fowler C. — Rails recipes | 115 |
Leeuwen J. (ed.), Meyer A.R., Nivat M. — Algorithms and Complexity, Volume A | 720 |
Maltoni D., Maio D., Jain A.K. — Handbook of fingerprint recognition | 3 |
Goebel A., Ritthaler D. — SAP Enterprise Portal: Technology and Programming | 36, 39, 223, 226, 229, 231, 233, 264 |
Orloff J. — How to Do Everything: Ubuntu | 176 |
Lerdorf R., Tatroe K., MacIntyre P. — Programming PHP | 177 |
Laahs K., McKenna E., Veli-Matti Vanamo — Microsoft SharePoint 2007 Technologies: Planning, Design and Implementation | 42 |
Bruss D. (ed.), Leuchs G. (ed.) — Lectures on Quantum Information | 275 |
John Aycock — Computer Viruses and Malware | 13, 16, 17, 135, 145 |