Bibliography - How Linux Works: What Every Superuser Should Know (2015)

How Linux Works: What Every Superuser Should Know (2015)

Appendix A. Bibliography

Abrahams, Paul W., and Bruce Larson, UNIX for the Impatient, 2nd ed. Boston: Addison-Wesley Professional, 1995.

Aho, Alfred V., Brian W. Kernighan, and Peter J. Weinberger, The AWK Programming Language. Boston: Addison-Wesley, 1988.

Aho, Alfred V., Monica S. Lam, Ravi Sethi, and Jeffrey D. Ullman, Compilers: Principles, Techniques, and Tools, 2nd ed. Boston: Addison-Wesley, 2006.

Barrett, Daniel J., Richard E. Silverman, and Robert G. Byrnes, SSH, The Secure Shell: The Definitive Guide, 2nd ed. Sebastopol: O’Reilly, 2005.

Beazley, David M., Python Essential Reference, 4th ed. Boston: Addison-Wesley, 2009.

Beazley, David M., Brian D. Ward, and Ian R. Cooke, “The Inside Story on Shared Libraries and Dynamic Loading.” Computing in Science & Engineering 3, no. 5 (September/October 2001): 90-97.

Calcote, John, Autotools: A Practitioner’s Guide to GNU Autoconf, Automake, and Libtool. San Francisco: No Starch Press, 2010.

Carter, Gerald, Jay Ts, and Robert Eckstein, Using Samba: A File and Print Server for Linux, Unix & Mac OS X, 3rd ed. Sebastopol: O’Reilly, 2007.

Christiansen, Tom, brian d foy, Larry Wall, and Jon Orwant, Programming Perl: Unmatched Power for Processing and Scripting, 4th ed. Sebastopol: O’Reilly, 2012.

Chromatic, Modern Perl, rev. ed. Hillsboro: Onyx Neon Press, 2014.

Davies, Joshua, Implementing SSL/TLS Using Cryptography and PKI. Hoboken: Wiley, 2011.

Filesystem Hierarchy Standard Group, “Filesystem Hierarchy Standard, Version 2.3,” edited by Rusty Russell, Daniel Quinlan, and Christopher Yeoh, 2004, http://www.pathname.com/fhs/.

Friedl, Jeffrey E. F., Mastering Regular Expressions: Understand Your Data and Be More Productive, 3rd ed. Sebastopol: O’Reilly, 2006.

Gregg, Brendan, Systems Performance: Enterprise and the Cloud. Upper Saddle River: Prentice Hall, 2013.

Grune, Dick, Kees van Reeuwijk, Henri E. Bal, Ceriel J.H. Jacobs, and Koen Langendoen, Modern Compiler Design, 2nd ed. New York: Springer, 2012.

Hopcroft, John E., Rajeev Motwani, and Jeffrey D. Ullman, Introduction to Automata Theory, Languages and Computation, 3rd ed. Upper Saddle River: Prentice Hall, 2006.

Kernighan, Brian W., and Rob Pike, The UNIX Programming Environment. Upper Saddle River: Prentice Hall, 1983.

Kernighan, Brian W., and Dennis M. Ritchie, The C Programming Language, 2nd ed. Upper Saddle River: Prentice Hall, 1988.

Kochan, Stephen G., and Patrick Wood, Unix Shell Programming, 3rd ed. Indianapolis: SAMS Publishing, 2003.

Levine, John R., Linkers and Loaders. San Francisco: Morgan Kaufmann, 1999.

Liu, Cricket, and Paul Albitz, DNS and BIND, 5th ed. Sebastopol: O’Reilly, 2006.

Lucas, Michael W., SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys. Tilted Windmill Press, 2012.

Matloff, Norman, The Art of R Programming: A Tour of Statistical Software Design. San Francisco: No Starch Press, 2011.

Matloff, Norman, and Peter Jay Salzman, The Art of Debugging with GDB, DDD, and Eclipse. San Francisco: No Starch Press, 2008.

Mecklenburg, Robert, Managing Projects with GNU Make: The Power of GNU Make for Building Anything, 3rd ed. Sebastopol: O’Reilly, 2004.

The New Hacker’s Dictionary, 3rd ed. Edited by Eric S. Raymond. Cambridge: MIT Press, 1996.

Peek, Jerry, Grace Todino-Gonguet, and John Strang, Learning The UNIX Operating System: A Concise Guide for the New User, 5th ed. Sebastopol: O’Reilly, 2001.

Pike, Rob, Dave Presotto, Sean Dorward, Bob Flandrena, Ken Thompson, Howard Trickey, and Phil Winterbottom, “Plan 9 from Bell Labs.” Bell Labs. Accessed July 10, 2014, http://plan9.bell-labs.com/sys/doc/9.html.

Robbins, Arnold, sed & awk Pocket Reference: Text Processing with Regular Expressions, 2nd ed. Sebastopol: O’Reilly, 2002.

Robbins, Arnold, Elbert Hannah, and Linda Lamb, Learning the vi and Vim Editors: Unix Text Processing, 7th ed. Sebastopol: O’Reilly, 2008.

Salus, Peter H., The Daemon, the Gnu, and the Penguin. Reed Media Services, 2008.

Samar, V., and R. Schemers, “Unified Login with Pluggable Authentication Modules (PAM),” October 1995, Open Software Foundation (RFC 86.0), http://www.opengroup.org/rfc/mirror-rfc/rfc86.0.txt.

Schneier, Bruce, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed. Hoboken: Wiley, 1996.

Shotts, William E. Jr., The Linux Command Line: A Complete Introduction. San Francisco: No Starch Press, 2012

Schwartz, Randal L., brian d foy, and Tom Phoenix, Learning Perl: Making Easy Things Easy and Hard Things Possible, 6th ed. Sebastopol: O’Reilly, 2011.

Silberschatz, Abraham, Peter B. Galvin, and Greg Gagne, Operating System Concepts, 9th ed. Hoboken: Wiley, 2012.

Stallman, Richard M., GNU Emacs Manual, 17th ed. Boston: Free Software Foundation, 2012. http://www.gnu.org/software/emacs/manual/.

Stallman, Richard M., Roland Pesch, Stan Shebs, Etienne Suvasa, and Matt Lee, Debugging with GDB: The GNU Source-Level Debugger, 10th ed. Boston: GNU Press, 2011. http://sourceware.org/gdb/current/onlinedocs/gdb/.

Stevens, W. Richard, UNIX Network Programming, Volume 2: Interprocess Communications, 2nd ed. Upper Saddle River: Prentice Hall, 1998.

Stevens, W. Richard, Bill Fenner, and Andrew M. Rudoff, Unix Network Programming, Volume 1: The Sockets Networking API, 3rd ed. Boston: Addison-Wesley Professional, 2003.

Tanenbaum, Andrew S., and Herbert Bos, Modern Operating Systems, 4th ed. Upper Saddle River: Prentice Hall, 2014.

Tanenbaum, Andrew S., and David J. Wetherall, Computer Networks, 5th ed. Upper Saddle River: Prentice Hall, 2010.