Computer and Information Security Handbook
, CA: Morgan Kaufmann, 2009.
Katz, J., and Lindell, Y.
Introduction to Modern Cryptography
, FL: CRC Press, 2007.
Kernighan, B., and Pike, R.
The Unix Programming Environment
, NJ: Prentice-Hall, 1984.
Kernighan, B., and Ritchie, D.
The C Programming Language
, NJ: Prentice-Hall, 1988.
Kehtarnavaz, N., and Gamadia, M.
Real Time Image and Video Processing: From Research to Reality
,
CA: Morgan & Claypool Publishers, 2006.
Kiddle, O., Stephenson, P., and Peek, J.
From Bash to Z Shell: Conquering the Command Line
, NJ:
Apress Media LLC, 2004.
Kirtch, O.
Linux Network Administrator’s Guide
, MA: O’Reilly, 1995.
Knuth, D. Dynamic Huffman Coding,
Journal of Algorithms
, Vol. 6, Issue 2, pp. 163–180, Amsterdam:
Elsevier, 1985.
Krishnamurthy, B., and Rexford, J.
Web Protocols and Practice: HTTP/1.1, Networking Protocols,
Caching and Traffic Measure
, MA: Addison-Wesley, 2001.
Kumar A. Migration from Microsoft to Linux on Servers and Desktops,
Proceedings of the 20th
Annual Conference of the National Advisory Committee on Computing Qualifications
, S. Mann
and N. Bridgeman (eds), pp. 117–123, 2007.
Bibliography
◾
625
Kurose, J., and Ross, K.
Computer Networking: A Top-Down Approach
, MA: Addison-Wesley, 2009.
Langfeldt, N.
The Concise Guide to DNS and Bind
, IN: Que Corp, 2000.
Laurent, A.
Understanding Open Source and Free Software Licensing
, MA: O’Reilly, 2004.
Leach, R.
Advanced Topics in UNIX: Processes, Files and Systems
, NJ: Wiley and Sons, 1994.
LeBlanc, D., and Yates, I.
Linux Install and Configuration Little Black Book: The Must-Have
Troubleshooting Guide to Installing and Configuring Linux
, AZ: Coriolis Open Press, 1999.
Lempel, A., and Ziv, J. On the Complexity of Finite Sequences,
IEEE Transactions on Information
Theory
, Vol. 22, Issue 1, pp. 75–81, 1976.
Lerner J., Pathak P. A., and Tirole, J. The Dynamics of Open Source Contributors,
American Economic
Review
, Vol. 96, Issue 2, pp. 114–118, 2006.
Lewine, D.
POSIX Programmer’s Guide: Writing Portable Unix Programs
, MA: O’Reilly, 1992.
Li, Y., Li, W., and Jiang, C. A Survey of Virtual Machine Systems: Current Technology and Future
Trends,
Proceedings of the Third International Symposium on Electronic Commerce and Security
,
2010.
Liedtke, J. On Micro-Kernel Construction,
Proceedings of the Fifteenth ACM Symposium on Operating
Systems Principles
, 1995.
Liedtke, J. Toward Real Microkernels,
Communications of the ACM
, Vol. 39, Issue 9, pp. 70–79, 1996.
Limoncelli, T., Hogan, C., and Chalup, S.
The Practice of System and Network Administration
, MA:
Addison-Wesley, 2007.
Lin, Y., Hwang, R., and Baker, F.
Computer Networks: An Open Source Approach
, NY: McGraw-Hill,
2011.
Linux Cross Reference Guide, lxr.linux.no.
Liu, C., and Albitz, P.
DNS and BIND
, MA: O’Reilly, 2003.
Loscocco, P., and Smalley, S. Integrating Flexible Support for Security Policies into the Linux Operating
System,
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, The
USENIX Association
, pp. 29–42, CA: USENIX Association, 2001.
Love, R.
Do'stlaringiz bilan baham: |