Networking Your Computers & Devices Step by Step
, WA: Microsoft Press, 2011.
Rusling, D. The Linux Kernel, http://sunsite.unc.edu/Linux/LDP/tlk/tlk.html, 2001.
Ryan, P. Linux Market Share Set to Surpass Win 98, OS X Still Ahead of Vista, http://arstechnica.
com/apple/2007/09/linux-marketshare-set-to-surpass-windows-98, 2007.
Saini, K.
Squid Proxy Server 3.1: Beginner’s Guide
, Birmingham: Packt Publishing, 2011.
Salas, P.
The Daemon, the GNU and the Penguin
, Groklaw, 2005.
Salus, P (ed).
A Quarter Century of Unix
, MA: Addison-Wesley, 1994.
Samar V. Unified Login with Pluggable Authentication Modules,
Proceedings of the 3rd ACM
Conference on Computer and Communications Security
, pp. 1–10, ACM Press, 1996.
Sandberg, R., Goldberg, D., Kleiman, S., Walsh, D., and Lyon, B. Design and Implementation of the Sun
Network File System,
Proceedings of the 1985 USENIX Summer Conference
, pp. 119–130, 1985.
Sandhu, R., and Samarati, P. Access Control: Principles and Practice,
IEEE Communications
, Vol. 32,
pp. 40–48, 1994.
Sarwar, S., and Koretsky, R.
Unix: The Textbook
, MA: Addison-Wesley, 2004.
Sawicki, E.
Guide to Apache
, MA: Thomson, 2008.
Schach, S., Jin, B., Wright, D., Heller, G., and Offutt, A. Maintainability of the Linux Kernel,
IEE
Proceedings—Software
, Vol. 149, Issue 1, pp. 18–23, London: Institute of Engineering and
Technology, 2002.
Scheifler, R., and Gettys, J.
X Window System: Core and Extension Protocols: X Version 11, Releases 6
and 6.1
, FL: Digital Press, 1996.
Schwartz, M. Linux Job Scheduling,
Linux Journal
, Vol. 2000, Issue 77, Article 8, 2000.
Sebesta, R.
Concepts of Programming Languages
, MA: Addison-Wesley, 2012.
Shoch, J., Dalal, Y., Redell, D., and Crane, R. Evolution of the Ethernet Local Computer Network,
Computer
, Vol. 15, Issue 8, pp.10–27, 1982.
Shotts Jr., W.
The Linux Command Line: A Complete Introduction
, CA: No Starch Press, 2012.
Siever, E., Weber, A., Figgins, S., Love, R., and Robbins, A.
Linux in a Nutshell: A Desktop Quick
Reference
, MA: Riley, 2005.
Silberschatz, A., Galvin, P., and Gagne, G.
Operating System Concepts
, NJ: Wiley & Sons, 2012.
Silva, S.
Web Server Administration
, MA: Thomson Course Technology, 2008.
Sloan, J.
Network Troubleshooting Tools
, MA: O’Reilly, 2001.
Smalley, S., and Fraser, T. A Security Policy Configuration for the Security-Enhanced Linux,
NAI
Labs Technical Report
, 2001.
Smith, J., and Nair, R.
Virtual Machines: Versatile Platforms for Systems and Processes
, CA: Morgan
Kaufmann, 2005.
Sobell, M.
A Practical Guide to Linux Commands, Editors, and Shell Programming
, NJ: Prentice-Hall,
2009.
Sobell, M.
A Practical Guide to Ubuntu Linux
, NJ: Prentice-Hall, 2010.
Spafford, E. The Internet Worm: Crisis and Aftermath,
Communications of the ACM
, Vol. 32, Issue
6, pp. 678–687, 1989.
St. Laurent, A.
Understanding Open Source and Free Software Licensing
, MA: O’Reilly, 2004.
628
◾
Bibliography
Stallings, W.
Computer Organization and Architecture: Designing for Performance
, NJ: Prentice-Hall,
2003.
Stallings, W.
Cryptography and Network Security: Principles and Practices
, NJ: Prentice-Hall, 2010.
Stallings, W.
Do'stlaringiz bilan baham: |