Data and Computer Communications
, NJ: Prentice-Hall, 2010.
Stallings, W.
Operating Systems: Internals and Design Principles
, NJ: Prentice-Hall, 2011.
Stallings, W., and Brown, L.
Computer Security: Principles and Practices
, NJ: Prentice-Hall, 2011.
Stallman, R. The GNU Operating System and the Free Software Movement,
Open Sources: Voices
from the Open Source Revolution
, C. DiBona, S. Ockman and M. Stone (eds), CA: O’Reilly,
1999.
Stallman, R. Why ‘Free Software’ Is Better than ‘Open Source’, http://www.gnu.org/philosophy/free-
software-for-freedom.html, 2007.
Stallman, R., and Gay, J.
Free Software, Free Society: Selected Essays of Richard M. Stallman
, NY: SoHo
Books, 2002.
Stankovic, J. Software Communication Mechanisms: Procedure Calls versus Messages,
Computer
,
Vol. 15, Issue 4, pp. 19–25, 1982.
Stevens, W.
UNIX Network Programming: The Sockets Networking API
, NJ: Prentice-Hall, 1998.
Stewart, J.
Network Security, Firewalls, and VPNs
, MA: Jones and Bartlett, 2010.
Tanenbaum, A.
Structured Computer Organization
, NJ: Prentice-Hall, 1999.
Tanenbaum, A.
Modern Operating Systems
, NJ: Prentice-Hall, 2007.
Tanenbaum, A.
Computer Networks
, NJ: Prentice-Hall, 2010.
Tanenbaum, A., Herder, J., and Bos, H. Can We Make Operating Systems Reliable and Secure?
Computer
, Vol. 39, Issue 5, pp. 44–51, 2006.
Tevanian, A., Rashid, R., Golub, D., Black, Dl, Cooper, E., and Young, M. Mach Threads and the UNIX
Kernel: The Battle for Control,
Proceedings of the Summer 1987 USENIX Conference
, 1987.
The Var Guy, Gartner: Microsoft Windows 15% Mobile, Desktop market Share? http://www.linuxtoday.
com/upload/gartner-microsoft-windows-15-mobile-desktop-market-share-130625183006.
html, 2013.
Toigo, J.
Disaster Recovery Planning: Preparing for the Unthinkable
, NJ: Prentice-Hall, 2002.
Tominaga, A., Nakamura, O., Teraoka, F., and Murai, J. Problems and Solutions of DHCP,
Proceedings
of INET 95
, 1995.
Toxen, B.
Real World Linux Security: Intrusion Prevention, Detection, and Recovery
, NJ: Prentice-
Hall, 2003.
Ts’o, T., and Tweedie, S. Planned Extensions to the Linux Ext2/Ext3 Filesystem,
Proceedings of the
FREENIX Track: 2002 USENIX Annual Technical Conference
, pp. 235–243, 2002.
Uti, N. Real Time Mobile Video Streaming Using Wavelet Transformation and Run-Length Coding,
Proceedings of the 2009 International Conference on Wireless Networks
, 2
(ICWN ‘09)
, pp. 368–
373, 2009.
Vacca, R.
Computer and Information Security Handbook
, CA: Morgan Kaufmann, 2009.
Vahalia, U.
UNIX Internals: The New Frontiers
, NJ: Prentice-Hall, 1996.
Warford, J.
Computer Systems
, MA: Jones and Bartlett, 2009.
Watt, A.
Beginning Regular Expressions (Programmer to Programmer)
, NJ: Wrox, 2005.
Welch, Terry A., A Technique for High Performance Data Compression,
IEEE Computer
, Vol. 17,
Issue 6, pp. 8–19, 1984.
Wells, N.
The Complete Guide to Linux System Administration
, MA: Thomson Course Technology,
2005.
Wessels, D.
Squid: The Definitive Guide
, MA: O’Reilly, 2005.
Whitesitt, J.
Boolean Algebra and Its Applications
, NY: Dover, 2010.
Williams, S.
Free as in Freedom: Richard Stallman’s Crusade for Free Software
, WA: CreateSpace, 2009.
Wirzenius, L. (ed). Linux System Administrator’s Guide, Linux Documentation Project, http://www.
tldp.org/LDP/sag/html/index.html.
Bibliography
◾
629
Wright, C. Linux Security Module Framework,
Do'stlaringiz bilan baham: |