Komentari

kimif1.blog.hr

Dodaj komentar (3)

Marketing


  • bl

    Chapter 2 Executive Summary

    This section briefly summarizes the scope and results of each component of the study
    :Chapter
    4-5. Mandatory Ac Control6. Device MAC & Printing
    7-8. WE
    9. Privileges
    10. Trusted Path
    11. AG
    12. Networking
    13. TCB Integrity
    14. Modularity
    15. Other Features & Assurances
    16. Project Plan

    The investigation was based on Microsoft Windows NT 3.51 source code, the Microsoft Windows NT Developer Kit and Tech Net CD-ROM from Microsoft, a number of helpful documents,2 and included the current TCSEC interpretation list.3Notations of the form “[PA-##]” (for example, “[PA-32]”) denote comments that have been removed to a separate, proprietary document called the “Proprietary Appendix” because they portrayed Microsoft proprietary information.4 20

    avatar

    13.11.2009. (11:31)    -   -   -   -  

  • ALAN FORD

    http://www.stripovionline.com/AlanFord/?e=Super_Strip_Biblioteka&p=1

    avatar

    01.12.2009. (11:10)    -   -   -   -  

  • nabrzaka

    U vezi tvog pitanja... ne znam iskreno, nisam razmišljala još o tome. Kojeg je to datuma i na koju bi ti išao, ili na obje?

    avatar

    05.12.2009. (00:09)    -   -   -   -  

  •  
učitavam...