Canadian Journal of Communication
, Vol. 30, pp. 585–611, 2005.
Bridger, R.
Introduction to Ergonomics
, FL: CSC Press, 2008.
Brinch, P.
Classic Operating Systems: From Batch Processing to Distributed Systems
, NY: Springer-
Verlag, 2001.
Brookshear, J.
Computer Science: An Overview
, NJ: Prentice-Hall, 2011.
Brown, F.
Boolean Reasoning: The Logic of Boolean Equations
, NY: Dover, 2012.
Brown, G.
zOS JCL (Job Control Language)
, NJ: John Wiley & Sons, 2002.
Burtch, K.
Linux Shell Scripting with Bash
, MA: Pearson, 2004.
Callaghan, B.
NFS Illustrated
, MA: Addison-Wesley, 2000.
Ceruzzi, P.
A History of Modern Computing
, MA: The MIT Press, 2003.
Chau, P. Selection of Packaged Software in Small Business,
European Journal of Information Systems
,
Vol. 3, Issue 4, pp. 292–302, 1994.
Chen, P., Lee, E., Gibson, G., Katz, R., and Patterson, D. RAID: High-Performance, Reliable Secondary
Storage,
ACM Computing Surveys
, Vol. 26, Issue 2, pp. 145–185, 1994.
Chervenak, A., Vellanki, V., and Kurmas, Z. Protecting File Systems: A Survey of Backup Techniques,
Proceedings of the Joint NASA and IEEE Mass Storage Conference
, 1998.
Cheung, W., and Loong, A. Exploring Issues of Operating Systems Structuring: From Microkernel to
Extensible Systems,
Operating Systems Review
, Vol. 29, pp. 4–16, 1995.
Ciampa, M.
Security
+
Guide to Network Security Fundamentals
, MA: Thomson Course Technologies,
2011.
Clements, A.
The Principles of Computer Hardware
, NY: Oxford, 2000.
Cole, E.
Network Security Bible
, NJ: Wiley and Sons, 2009.
Comer, D.
Internetworking with TCP/IP
, NJ: Prentice-Hall, 1996.
Comer, D.
Internetworking with TCP/IP
, Vol. I, MA: Addison-Wesley, 2013.
Corner, D.
Computer Networks and Internets
, NJ: Prentice-Hall, 2008.
Cox, R., Muthitacharoen, A., and Morris, R. Serving DNS Using a Peer-to-Peer Lookup Service,
Lecture Notes in Computer Science
, Vol. 2429, pp. 155–165, NY: Springer, 2002.
Cramer, R., and Shoup, V. Design and Analysis of Practical Public-Key Encryption Schemes Secure
against Adaptive Chosen Ciphertext Attack,
SIAM Journal on Computing
, Vol. 33, pp. 167–226,
2001.
Crawley, D.
The Accidental Administrator: Linux Server Step-by-Step Configuration Guide
, WA:
CreateSpace, 2010.
Dallheimer, M., and Welsh, M.
Running Linux
, MA: O’Reilly, 2005.
Davis, D., and Swick, R. Network Security via Private-Key Certificates,
ACM SIGOPS Operating
Systems Review
, Vol. 24, Issue 4, pp. 64–67, 1990.
Dean, T.
Network
+
Guide to Networks
, MA: Thomson Course Technology, 2009.
De Goyeneche, J. Loadable Kernel Modules,
IEEE Software
, Vol. 16, Issue 1, pp. 65–71, 1999.
Denning, P. Thrashing: Its Causes and Prevention,
Proceedings of the December 9–11 1968 AFIPS Fall
Join Computer Conference
, pp. 915–922, NY: ACM, 1968.
Denning, P. Virtual Memory,
ACM Computing Surveys
, Vol. 2, Issue 3, pp. 153–189, 1970.
Denning, P. A Short Theory of Multiprogramming,
Proceedings of the 3rd International Workshop on
Modeling, Analysis and Simulation of Computer and Telecommunication Systems
, pp. 2–7, 1995.
Dijkstra, E. The Structure of the THE Multiprogramming System,
Communications of the ACM
, Vol.
11, Issue 5, pp. 341–346, NY: ACM, 1968.
Bibliography
◾
623
Doeppner, T.
Do'stlaringiz bilan baham: |