Bidgoli, H. (2008). Global Perspectives In Information Security: Legal, Social, and International Issues. New York: Willey.
Boer, P. d., & Pels, M. (2005). Host Based Intrusion Detection Systems: University of Amsterdam.
Burman, F., Fox, G., & Hey, A. (2003). Grid Computing: Making Global Infrstructure Reality. San Franscisco: Wiley.
Costello, R. (2009). Building Web Services the REST Way.
Eustace, K. (2009). ITC 594 - E-systems Infrastructure Development Study Guide. Wagga Wagga: Charles Sturt University.
Flanagan, D. (2005). Java in a Nutshell. California: O'Reily Media.
Hartl, M., & Prochazka, A. (2008). RailsSpace: Building a Social Networking Website with Ruby on Rails: Pearson Education.
Holzner, S. (2006). Beginning Ruby on Rails. Indianapolis: Wiley Publishing.
Ince, D. (2004). Developing Distributed and E-Commerce Applications (2nd ed.). Essex: Pearson Education.
MSDN (2010). Waitable Timer Object (Windows) Retrieved 10 April, 2010, from http://msdn.microsoft.com/en-us/library/ms687012%28VS.85%29.aspx
Reynolds, G. W. (2010). Information Technology for Managers. Boston: Course Technology.
Selvam, R. (2004). Thread Synchonization for Beginner Retrieved 10 April, 2010, from http://www.codeproject.com/KB/threads/Synchronization.aspx
Webopedia (2010). DHCP Retrieved 20 Mar 2010, from http://www.webopedia.com/TERM/D/DHCP.html
Webopedia (2010, 6 Jan 2010). Phishing Retrieved 10 April 2010, from http://www.webopedia.com/TERM/P/phishing.html
Whatis.com (2010). What is Cloud Computing Retrieved 21 Mar, 2010, from http://searchcloudcomputing.techtarget.com/sDefinition/0,,sid201_gci1287881,00.html
Whatis.com (2010). What is peer to peer Retrieved 29 Mar, 2010, from http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212769,00.html
Friday, April 16, 2010
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment