|
|
Результат поиска |
Поиск книг, содержащих: DES (Data Encryption Standard)
Книга | Страницы для поиска | Айвенс К. — Компьютерные сети. Хитрости | 38 | Макнамара Д. — Секреты компьютерного шпионажа: Тактика и контрмеры | 194, 226 | Gregg M., Kim D. — Inside Network Security Assessment: Guarding your IT Infrastructure | | Barrett D.J., Silverman R., Byrnes R.G. — SSH, The Secure Shell: The Definitive Guide | | Steel Ch., Nagappan R., Lai R. — Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management | 2nd | Olsen G.L. — Windows Server 2003 on Proliants: Deployment Techniques and Management Tools for System Administrators | | Patrick T., Craig J. — Visual Basic 2005 Cookbook: Solutions for VB 2005 Programmers | | Vladimirov A.A., Gavrilenko K.V., Mikhailovsky A.A. — Wi-Foo | | Snader J.C. — VPNs Illustrated: Tunnels, VPNs, and IPsec | 2nd 3rd 4th 5th | Huggins D. — Windows 2000 Network Infrastructure Exam Cram 2 (Exam 70-216) | 2nd | Cohen K., Daniels A. — Windows XP networking | 2nd | Stevens W.R. — Unix network programming (volume 2) | 417 | Stevens W.R. — Unix Network Programming. Interprocess Communications | 417 | Rob P., Coronel C. — Database systems: Design, Implementation, and Management | 631 | Hatch B., Lee J., Kurtz G. — Hacking linux exposed: linux security secrets & solutions | 287—289 | Feuerstein S., Pribyl B. — Oracle PL-SQL programming | 924 |
|
|