Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2009_3_a10, author = {P. A. Pautov}, title = {The implementation of the {DBMS} credentials protection method in the web applications}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {100--105}, publisher = {mathdoc}, number = {3}, year = {2009}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2009_3_a10/} }
P. A. Pautov. The implementation of the DBMS credentials protection method in the web applications. Prikladnaâ diskretnaâ matematika, no. 3 (2009), pp. 100-105. http://geodesic.mathdoc.fr/item/PDM_2009_3_a10/
[1] Pautov P. A., “Problema autentifikatsii v mnogourovnevykh prilozheniyakh”, Prikladnaya diskretnaya matematika, 2008, no. 2, 87–90
[2] Pautov P. A., “Realizatsiya metoda zaschity autentifikatsionnykh dannykh v mnogourovnevykh prilozheniyakh”, Prikladnaya diskretnaya matematika, Prilozhenie, No 1 (2009), 50–51
[3] Vikipediya , 2009 www.wikipedia.org
[4] Rukovodstvo po installyatsii “1S-Bitriks: Upravlenie saitom 6.xx”, , 2007 www.1c-bitrix.ru
[5] Karakas C., Erba C., PHP-Nuke: Management and Programming, , 2005 www.karakas-online.de/EN-Book
[6] , 2009 www.masterhost.ru
[7] , 2009 www.peterhost.ru
[8] Olson P., PHP Manual, , 2009 www.php.net/manual