|
|
Результат поиска |
Поиск книг, содержащих: Snort
Книга | Страницы для поиска | Мак Клар С., Шах С., Шах Ш. — Хакинг в Web: атаки и защита | 114 | Ray J., Ray W. — Mac OS X Tiger Unleashed | 2nd 3rd 4th 5th 6th | Suegring S., Ziegler R. — Linux Firewalls | 2nd 3rd 4th | Gregg M., Kim D. — Inside Network Security Assessment: Guarding your IT Infrastructure | | Jones B.K., von Hagen W. — Linux Server Hacks (Vol. 2) | | Rankin K., Knopper K. — Knoppix Hacks: 100 Tips and Tricks | | Bauer M.D. — Linux Server Security | 2nd | Dean J., Pessanha B.G., Langfeldt N. — LPI Linux Certification in a Nutshell | | Barrett D.J., Byrnes R.G., Silverman R. — Linux Security Cookbook | 2nd | Bauer M.D. — Building Secure Servers With Linux | | Lavigne D. — BSD Hacks | | Conway J.H. — On Numbers and Games | 91, 96 | Berlekamp E.R., Conway J.H., Guy R.K. — Winning Ways for Your Mathematical Plays, Vol. 1 | 47, 145—147, 149—151, 153, 154, 156- 158, 161, 167, 168, 177, 180—183, 224 | Patten T. — Systemic text generation as problem solving | 104, 110—121 | Berlekamp E., Conway J., Guy R. — Winning Ways for your mathematical plays.Volume 2. | 47, 145—147, 149—151, 153, 154, 156—158, 161, 167, 168, 177, 180—183, 224 | Berlekamp E.R., Conway J.H., Guy R.K. — Winning Ways for your mathematical plays | 47, 145—147, 149—151, 153, 154, 156—158, 161, 167, 168, 177, 180—183, 224 |
|
|