|
|
Результат поиска |
Поиск книг, содержащих: Confidentiality
Книга | Страницы для поиска | Олифер В.Г., Олифер Н.А. — Сетевые операционные системы | 469 | Khosrowpour M. — Encyclopedia Of Information Science And Technology | 97, 870, 874 | Chopra V., Eaves J., Jones R. — Beginning JavaServer Pages | 830—831 | Gregg M., Kim D. — Inside Network Security Assessment: Guarding your IT Infrastructure | | Graham — Building Web Services with Java: Making Sense of XML, SOAP, WSDL and UDDI | | Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management | 2nd | Castelli M.J. — LAN switching first-step | | Hellberg Ch., Boyes T., Greene D. — Broadband Network Architectures: Designing and Deploying Triple Play Services | 481 | Lee W. — Windows XP Unwired: A Guide for Home, Office, and the Road | 2nd | Cabrera l.-F., Kurt C. — Web Services Architecture and Its Specifications: Essentials for Understanding WS-* | | Weerawarana S., Curbera F., Leymann F. — Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More | | Bragg R. — Windows Server 2003 Security: A Technical Reference | 2nd 3rd 4th | Cohen K., Daniels A. — Windows XP networking | | Criddle L., Muir N. — Look Both Ways: Help Protect Your Family on the Internet | 2nd | Ferrari E. — Web and Information Security | 41, 53, 180, 241, 244 | Reddy K. — Building MPLS-Based Broadband Access VPNs | | Paquet W, Saxe W. — Business Case for Network Security: Advocacy, Governance, and ROI | | Carolan J., Radeztsky S., Strong P. — Buliding N1 Grid Solutions Preparing, Architecting, and Implementing Service-Centric Data Centers | | Maruska D. — How Great Decisions Get Made: 10 Easy Steps for Reaching Agreement on Even the Toughest Issues | 104—106, 108 | Олифер В. Г., Олифер Н. А. — Компьютерные сети. Принципы, технологии, протоколы: Учебник для вузов. | 206 | Patil G.P. (ed.), Rao C.R. — Environmental Statistics | 104 | Berquist K., Berquist A. — Managing Information Highways: The PRISM Book: Principles, Methods, and Case Studies for Designing Telecommunications Management Systems | 44 |
|
|
|
|
|