Ottawa
Linux Symposium
, 2007.
Goyvaerts, J., and Levithan, S.
Regular Expressions Cookbook
, MA: O’Reilly, 2009.
Grampp, F., and Morris, R. UNIX Operating-System Security,
AT&T Bell Laboratories Technical
Journal
, Vol. 63, pp. 1649–1672, 1984.
Green, R., Baird, A., and Davies, J. Designing a Fast, On-line Backup System for a Log-Structured
File System,
Digital Technical Journal of Digital Equipment Corporation
, Vol. 8, Issue 2, pp.
32–45, 1986.
Gregg, J.
Ones and Zeros: Understanding Boolean Algebra, Digital Circuits, and the Logic of Sets
, NJ:
Wiley-IEEE Press, 1998.
624
◾
Bibliography
Groom, F. The Structure and Software of the Internet,
Annual Review of Communications
, Vol. 50,
pp. 695–707, 1997.
Guttman, E. Service Location Protocol: Automatic Discovery of IP Network Services,
IEEE Internet
Computing
, Vol. 3, Issue 4, pp. 71–80, 1999.
Hagen, S.
IPv6 Essentials
, MA: O’Reilly, 2006.
Halsall, F.
Data Communications, Computer Networks, and Open Systems
, MA: Addison-Wesley, 1996.
Hamacher, C., Vranesci, Z., Zaky, S., and Manjikian, N.
Computer Organization and Embedded
Systems
, NY: McGraw–Hill, 2012.
Hansen, P. (editor).
Classic Operating Systems: From Batch Processing to Distributed Systems
, NY:
Springer, 2010.
Harker, J., Brede, D., Pattison, R., Santana, G., and Taft, L. A Quarter Century of Disk File Innovation,
IBM Journal of Research and Development
, Vol. 25, Issue 5, pp. 677–689, 1981.
Harkins, M.
Managing Risk and Information Security: Protect to Enable
, NJ: Apress, 2012.
Hartig, H., Hohmuth, M., Liedtke, J., Schonberg, S., and Wolter, J. The Performance of Micro-Kernel-
Based Systems,
Proceedings of the 16th ACM Symposium on Operating Systems Principles
, 1997.
Hecker, F. Setting up Shop: The Business of Open-Source Software,
IEEE Software
, Vol. 16, Issue 1,
pp. 45–51, 1999.
Helmke, M.
Ubuntu Unleashed
, IN: Sams, 2012.
Hicks, B., Rueda, S., St. Clair, L., Jaeger, T., and McDaniel, P. A Logical Specification and Analysis for
SELinux MLS Policy,
ACM Transactions on Information and System Security
, Vol. 13, Issue 3,
pp. 26–31, Article 26, 2010.
Hill, B., Burger, C., Jesse, J., and Bacon, J.
The Official Ubuntu Book
, NJ: Prentice-Hall, 2011.
Holcombe, C., and Holcombe, J.
Survey of Operating Systems
, NY: McGraw-Hill Osborne Media,
2002.
Huitema, C.
IPv6: The New Internet Protocol
, NJ: Prentice-Hall, 1998.
Hunt, C.
TCP/IP Network Administration
, MA: O’Reilly, 2002.
Jacko, J.
Human–Computer Interaction Handbook: Fundamentals, Evolving Technologies, and
Emerging Applications
, FL: CRC Press, 2012.
Jacob, B., and Mudge, T. Virtual Memory in Contemporary Multiprocessors,
IEEE Micro Magazine
,
Vol. 18, pp. 60–75, 1998.
Jacob, B., and Wang, D.
Memory Systems: Cache, DRAM, Disk
, CA: Morgan Kaufmann, 2007.
Jang, M.
Security Strategies in Linux Platforms and Applications
, MA: Jones and Bartlett, 2010.
Kamel, M., Keast, J., and Pal, C. Concrete Architecture of the Linux Kernel, technical report,
University of Waterloo, Waterloo, Ontario, N2L 3G1. Department of Electrical and Computer
Engineering, Department of Computer Science, 1998.
Katsicas, S. Chapter 35,
Do'stlaringiz bilan baham: |