| Книга | Страницы для поиска |
| Воройский Ф.С. — Информатика. Новый систематизированный толковый словарь | 117 |
| Davies G. — Designing and Developing Scalable IP Networks | 42 |
| Ray J., Ray W. — Mac OS X Tiger Unleashed | 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th |
| Lester A. — MAC OS X Tiger in a Nutshell | |
| Suegring S., Ziegler R. — Linux Firewalls | [See SSH] |
| Kirkland J., Carmichael D., Tinker Ch.L. — Linux Troubleshooting for System Administrators and Power Users | [See SSH (Secure Shell) encryption.] |
| Bauer M.D. — Linux Server Security | [See SSH] |
| McCarty B. — Learning Red Hat Enterprise Linux and Fedora | [See SSH] |
| Snader J.C. — VPNs Illustrated: Tunnels, VPNs, and IPsec | [See SSH] |
| Flickenger R., Dougherty D. — Wireless Hacks: 100 Industrial-Strength Tips and Techniques | [See SSH] |
| Скембрей Дж., Мак-Клар С. — Секреты хакеров. Безопасность Windows Server 2003 - готовые решения | 219 |
| Dornfest R., Hemenway K. — Mac OS X Hacks | [See SSH] |
| Bauer M.D. — Building Secure Servers With Linux | [See SSH] |
| Hatch B., Lee J., Kurtz G. — Hacking linux exposed: linux security secrets & solutions | See "SSH" |
| Воройский Ф.С. — Информатика. Энциклопедический словарь-справочник: введение в современные информационные и телекоммуникационные технологии в терминах и фактах | 92, 452 |