Статьи по сетевой безопасности
Author:
Штирлиц
[287 views] 2013-11-28 22:30:28
http://software.dell.com/documents/anatomy-of-a-cyber-attack-ebook-24640.pdf
http://www.enpointe.com/images/pdf/Virtual-Machine-Backup-and-Recovery-Five-Critical-Decisions.pdf
http://www.sans.org/reading-room/analysts-program/networking-survey
http://public.dhe.ibm.com/common/ssi/ecm/en/tsw03197usen/TSW03197USEN.PDF
http://public.dhe.ibm.com/common/ssi/ecm/en/rll12350usen/RLL12350USEN.PDF
Reply
|
Reply to sender (private)
|
Synchronize
|
Thread