Статьи по сетевой безопасности

Author: Штирлиц [288 views] 2013-11-28 22:30:28

http://software.dell.com/documents/anatomy-of-a-cyber-attack-ebook-24640.pdf
http://www.enpointe.com/images/pdf/Virtual-Machine-Backup-and-Recovery-Five-Critical-Decisions.pdf
http://www.sans.org/reading-room/analysts-program/networking-survey
http://public.dhe.ibm.com/common/ssi/ecm/en/tsw03197usen/TSW03197USEN.PDF
http://public.dhe.ibm.com/common/ssi/ecm/en/rll12350usen/RLL12350USEN.PDF

From:
Password:
Subject:
[b] [i] [u] [s]     [quote] [code] [tmdb] [sarcasm]  [url=]Title[/url]  [img=]
Preview first NSFW
Smileys  BBCode help  Translit help
[b]bolded text[/b]bolded text
[i]italicized text[/i]italicized text
[u]underlined text[/u]underlined text
[s]strikethrough text[/s]strikethrough text
[url]http://example.org[/url]http://example.org
[url=http://example.com]Example[/url]Example
[quote]quoted text[/quote]quoted text
[code]monospaced text[/code]monospaced text
[sarcasm]reverse italicized text[/sarcasm]sarcasm
[color=red]Red Text[/color]Red Text
[color=#FF0000]Red Text[/color]Red Text
[color=FF0000]Red Text[/color]Red Text
[size=15]Large Text[/size]Large Text
[img=https://www.kirdyk.club/images/Tip-Hat.gif]
А=AБ=BВ=VГ=GД=DЕ=EЁ=JOЖ=ZHЗ=ZИ=I
Й=JК=KЛ=LМ=MН=NО=OП=PР=RС=SТ=T
У=UФ=FХ=HЦ=CЧ=CHШ=SHЩ=XHЪ=##Ы=YЬ=''
Э=WЮ=JUЯ=JA
а=aб=bв=vг=gд=dе=eё=joж=zhз=zи=i
й=jк=kл=lм=mн=nо=oп=pр=rс=sт=t
у=uф=fх=hц=cч=chш=shщ=xhъ=#ы=yь='
э=wю=juя=ja