Статьи по сетевой безопасности

Author: Штирлиц [287 views] 2013-11-28 22:30:28

http://software.dell.com/documents/anatomy-of-a-cyber-attack-ebook-24640.pdf
http://www.enpointe.com/images/pdf/Virtual-Machine-Backup-and-Recovery-Five-Critical-Decisions.pdf
http://www.sans.org/reading-room/analysts-program/networking-survey
http://public.dhe.ibm.com/common/ssi/ecm/en/tsw03197usen/TSW03197USEN.PDF
http://public.dhe.ibm.com/common/ssi/ecm/en/rll12350usen/RLL12350USEN.PDF

Reply
|
Reply to sender (private) |
Synchronize | Thread