Future Generation Computer Systems
, Vol. 22, Issue 1–2, pp. 16–31, Amsterdam:
Elsevier, 2006.
Abrams, M., LaPadula, L., Eggers, K., and Olson, I. A Generalized Framework for Access Control:
An Informal Description,
Proceedings of the 13th National Computer Security Conference
, pp.
135–143, 1990.
Accetta, M., Baron, R., Bolosky, W., Golub, D., Rashid, R., Tevanian, A., and Young, M. Mach: A
New Kernel Foundation for Unix Development,
Proceedings of the Summer 1986 USENIX
Conference
, pp. 93–112, 1986.
Adelstein, T., and Lubanovic, B.
Linux System Administration
, CA: O’Reilly, 2007.
Aho, A., Kernighan, B., and Weinberger, P.
The AWK Programming Language
, MA: Addison-Wesley,
1988.
Al-Hafeedh, A., Crochemore, M., Ilie, L., Kopylova, E., Smyth, W., Tishcler, G., and Yusufu, M. A
Comparison of Index-Based Lempel-Ziv LZ77 Factorization Algorithms,
ACM Computing
Surveys
, Vol. 45, Issue 1, 5:9–5:17, Article 5, 2012.
Allen, N.
Network Maintenance and Troubleshooting Guide: Field Tested Solutions for Everyday
Problems
, MA: Addison-Wesley, 2009.
Almesberger, W. Booting Linux: The History and the Future,
Proceedings of the Ottawa Linux
Symposium
, 2000.
Almgren, M., Debar, H., and Dacier, M. A Lightweight Tool for Detecting Web Server Attacks,
Networks and Distributed System Security Symposium
, pp. 157–170, 2000.
Anderson, K. Convergence: A Holistic Approach to Risk Management,
Network Security
, Vol. 2007,
Issue 5, pp. 4–7, Amsterdam: Elsevier Science Publishers, 2007.
Aulds, C.
Linux Apache Web Server Administration
, CA: SYBEX, 2000.
Bach, M.
The Design of the Unix Operating System
, NJ: Prentice-Hall, 1996.
Balasubramanian, K., and Johnson, D. Linux Memory Management Overview,
The Linux Kernel
Hacker’s Guide
, http://www.redhat.com:8080/HyperNews/get/memory/memory.html, 1993.
Bar, M.
Linux File Systems
, NY: McGraw-Hill, 2001.
Barrett, D., Silverman, R., and Byrnes, R.
Linux Security Cookbook
, MA: O’Reilly, 2003.
Bembenek, J., and Klus, A.
Grep Pocket Reference
, MA: O’Reilly, 2009.
Bennett, H. CD-E: Call It Erasable, Call It Rewritable, but Will It Fly?
CD-ROM Professional
, 1996.
Benvenuti, C.
Understanding Linux Network Internals
, MA: O’Reilly, 2006.
Berry, D.
Copy, Rip, Burn: The Politics of Copyleft and Open Source
, London: Pluto Press, 2008.
Black, D., Golub, D., Julin, D., Rashid, R., Draves, R., Dean, R., Forin, A., Barrera, J., Tokadu, H.,
Malan, G., and Bohman, D. Microkernel Operating System Architecture and Mach,
Proceedings
of the USENIX Workshop on Micro-Kernels and Other Kernel Architectures
, pp. 11–30, 1992.
622
◾
Bibliography
Blum, R., and Bresnahan, C.
Linux Command Line and Shell Scripting Bible
, NJ: Wiley & Sons, 2011.
Bonaccorsi, A., and Rossi, C. Why Open Source Software Can Succeed,
Research Policy
, Vol. 32, Issue
7, pp. 1149–1292, Elsevier, 2003.
Bourne, S.R. The UNIX Shell,
The Bell System Technical Journal
, NJ: American Telephone and
Telegraph Company, Vol. 57, Issue 6, pp. 1971–1990, 1978.
Bovet, D.
Understanding the Linux Kernel
, MA: O’Reilly, 2005.
Bradley, D. The Divergent Anarcho-Utopian Discourses of the Open Source Software Movement,
Do'stlaringiz bilan baham: |