The Essentials of Computer Organization and Architecture
, MA: Jones and
Bartlett, 2012.
Odom, W.
Computer Networking First-Step
, IN: Cisco Press, 2004.
Paar, C., and Pelzl, J.
Understanding Cryptography
, NY: Springer. 2010.
Pate, S.
UNIX Filesystems: Evolution, Design and Implementation
, NJ: Wiley and Sons, 1988.
Patterson, D., Gibson, G., and Katz, R. A Case for Redundant Arrays of Inexpensive Disks (RAID),
Proceedings of SIGMOD ‘88
, pp. 109–116, NY: ACM, 1988.
Patterson, D., and Hennessy, J.
Computer Organization and Design: The Hardware/Software Interface
,
CA: Morgan Kaufmann, 1998.
Peek, J., Powers, S., O’Reilly, T., and Loukides, M.
Unix Power Tools
, MA: O’Reilly, 2007.
Petersen, R.
Linux: The Complete Reference
, NY: McGraw-Hill, 2007.
Peterson, L., and Davie, B.
Computer Networks: A Systems Approach
, CA: Morgan Kaufmann, 2011.
Pfleeger, C., and Pfleeger, S.
Security in Computing
, NJ: Prentice-Hall, 2006.
Plank, J. A Tutorial on Reed-Solomon Coding for Fault-Tolerance in RAID-like Systems,
Software
Practice and Experience
, Vol. 27, Issue 9, pp. 995–1012, NJ: Wiley and Sons, 1997.
Portnoy, M.
Virtualization Essentials
, NJ: Sybex, 2012.
Prabhakaran, V., Arpaci-Dusseau, A., and Arpaci-Dusseau, R. Analysis and Evolution of Journaling
File Systems,
USENIX ‘05 Online Proceedings
, pp. 105–120, 2005.
Puryear, D.
Best Practices for Managing Linux and Unix Servers
, NY: Penton, 2006.
Quarterman, J., and Hoskins, H. Notable Computer Networks,
Communications of the ACM
, Vol. 29,
Issue 10, pp. 932–971, NY: ACM, 1986.
Quigley, E.
UNIX Shells by Example with CDROM
, NJ: Prentice-Hall, 1999.
Ramey, C., and Fox, B. Bash Reference Manual, http://www.gnu.org/software/bash/manual, Network
Theory LTD, 2012.
Rash, M.
Linux Firewalls: Attack Detection and Response with iptables, psad and fwsnort
, CA: No
Starch Press, 2007.
Raymond, E.
The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental
Revolutionary
, MA: O’Reilly, 2001.
Red Hat Linux 8.0: The Official Red Hat Linux Reference Guide, Raleigh, NC: Red Hat, Inc, 2002.
Rescorla, E. An Introduction to openssl Programming,
Linux Journal
, Vol. 2001, p. 3, Issue 89,
Article 3, 2001.
Reynolds, G.
Ethics in Information Technology
, KY: Cengage, 2011.
Riehle, D. The Economic Motivation of Open Source: Stakeholder Perspectives,
IEEE Computer
, Vol.
40, Issue 4, pp. 25–32, April 2007.
Bibliography
◾
627
Ritchie, D. The Evolution of the UNIX Time-Sharing System,
Language Design and Programming
Methodology, Lecture Notes on Computer Science
, Vol. 79, Berlin: Springer-Verlag, 1979.
Ritchie, D., and Thompson, K. The UNIX Time-Sharing System,
Communications of the ACM
, Vol.
17, Issue 7, pp. 365–375, 1974.
Robbins, A.
Bash Pocket Reference
, MA: O’Reilly, 2010.
Robbins, A., and Beebe, N.
Classic Shell Scripting
, MA: O’Reilly, 2005.
Robbins, A., and Dougherty, D.
Sed and Awk
, MA: O’Reilly, 1997.
Rose, R. Survey of System Virtualization Techniques,
Technical Report, Oregon State University
, 2004.
Royon, Y., and Frenot, S. A Survey of Unix Init Schemes, Technical report arXiv:0706.2748v2,
Cornell University Library, 2007.
Rusen, C.
Do'stlaringiz bilan baham: |