rev |
line source |
meillo@54
|
1 @book{mmm,
|
meillo@39
|
2 author = "Brooks, Jr., Frederick P.",
|
meillo@8
|
3 title = "The mythical man-month: essays on software engineering",
|
meillo@8
|
4 year = "1995",
|
meillo@8
|
5 publisher = "Addison-Wesley"
|
meillo@8
|
6 }
|
meillo@8
|
7
|
meillo@39
|
8 @book{unixprogenv,
|
meillo@39
|
9 author = "Brian W. Kernighan and Rob Pike",
|
meillo@39
|
10 title = "The UNIX Programming Environment",
|
meillo@39
|
11 year = "1984",
|
meillo@39
|
12 publisher = "Prentice-Hall"
|
meillo@39
|
13 }
|
meillo@8
|
14
|
meillo@39
|
15 @book{advunixprog,
|
meillo@39
|
16 author = "Marc J. Rochkind",
|
meillo@39
|
17 title = "Advanced UNIX Programming",
|
meillo@39
|
18 year = "1985",
|
meillo@39
|
19 publisher = "Prentice-Hall"
|
meillo@39
|
20 }
|
meillo@39
|
21
|
meillo@39
|
22 @book{practiceprog,
|
meillo@39
|
23 author = "Brian W. Kernighan and Rob Pike",
|
meillo@39
|
24 title = "The Practice of Programming",
|
meillo@39
|
25 year = "1999",
|
meillo@39
|
26 publisher = "Addison-Wesley"
|
meillo@39
|
27 }
|
meillo@39
|
28
|
meillo@54
|
29 @book{k&r,
|
meillo@39
|
30 author = "Brian W. Kernighan and Dennis M. Ritchie",
|
meillo@39
|
31 title = "The C Programming Language",
|
meillo@39
|
32 edition = "Second",
|
meillo@39
|
33 year = "1988",
|
meillo@39
|
34 publisher = "Prentice-Hall"
|
meillo@39
|
35 }
|
meillo@39
|
36
|
meillo@50
|
37 @book{catb,
|
meillo@50
|
38 author = "Eric S. Raymond",
|
meillo@50
|
39 title = "The Cathedral \& the Bazaar",
|
meillo@50
|
40 year = "1999",
|
meillo@50
|
41 publisher = "O'Reilly Media",
|
meillo@113
|
42 note = "ISBN: 1-56592-724-9. Also available online at {\small\url{http://catb.org/esr/writings/cathedral-bazaar/cathedral-bazaar/} (2008-10-14)}",
|
meillo@50
|
43 }
|
meillo@39
|
44
|
meillo@71
|
45 @book{costales97,
|
meillo@54
|
46 author = "Bryan Costales and Eric Allman",
|
meillo@54
|
47 title = "sendmail",
|
meillo@54
|
48 year = "1997",
|
meillo@54
|
49 edition = "Second",
|
meillo@54
|
50 publisher = "O'Reilly \& Associates, Inc",
|
meillo@54
|
51 note = "ISBN: 1-56592-222-0",
|
meillo@54
|
52 }
|
meillo@54
|
53
|
meillo@71
|
54 @book{vixie01,
|
meillo@71
|
55 author = "Paul A. Vixie and Frederick M. Avolio",
|
meillo@71
|
56 title = "Sendmail: Theory and Practice",
|
meillo@71
|
57 year = "2001",
|
meillo@71
|
58 edition = "Second",
|
meillo@71
|
59 publisher = "Digital Press",
|
meillo@71
|
60 note = "ISBN: 1-55558-229-X. The first chapter ``Background and History'' is available online at {\small\url{http://smtap.al.org/ch01.pdf} (2008-10-23)}",
|
meillo@71
|
61 }
|
meillo@71
|
62
|
meillo@54
|
63
|
meillo@113
|
64 @book{powerof2x2,
|
meillo@113
|
65 author = "Alex Lowy and Phil Hood",
|
meillo@113
|
66 title = "The Power of the 2 x 2 Matrix: Using 2 x 2 Thinking to Solve Business Problems and Make Better Decisions",
|
meillo@113
|
67 publisher = "Jossey-Bass",
|
meillo@113
|
68 year = "2004",
|
meillo@113
|
69 note = "ISBN: 0-78797-292-4",
|
meillo@113
|
70 pages = "129--131",
|
meillo@8
|
71 }
|
meillo@39
|
72
|
meillo@113
|
73 @article{wired:hype,
|
meillo@113
|
74 author = "Jesse Freund",
|
meillo@113
|
75 title = "\emph{Hype List}",
|
meillo@113
|
76 journal = "Wired Magazine",
|
meillo@113
|
77 month = "June",
|
meillo@113
|
78 year = "1998",
|
meillo@113
|
79 note = "Also available online at: {\small\url{http://www.wired.com/wired/archive/6.06/hypelist.html} (2008-11-26)}",
|
meillo@113
|
80 }
|
meillo@113
|
81
|
meillo@113
|
82 @techreport{panda:email-threats,
|
meillo@118
|
83 key = "Panda",
|
meillo@113
|
84 institution = "Panda Security and Commtouch",
|
meillo@113
|
85 author = "",
|
meillo@118
|
86 title = "\emph{Q2 2008 Email Threats Trend Report}",
|
meillo@113
|
87 note = "Also available online at: {\small\url{http://www.pandasecurity.com/emailhtml/oxygen/Q2_08%20Email_Threats%20-%20Panda.pdf} (2008-11-26)}",
|
meillo@113
|
88 year = "2008",
|
meillo@113
|
89 month = "July",
|
meillo@113
|
90 }
|
meillo@113
|
91
|
meillo@113
|
92 @techreport{ironport:zombie-computers,
|
meillo@118
|
93 key = "Ironport",
|
meillo@113
|
94 institution = "{IronPort Systems Inc.}",
|
meillo@113
|
95 type = "Press Release",
|
meillo@113
|
96 author = "",
|
meillo@118
|
97 title = "\emph{Spammers Continue Innovation: IronPort Study Shows Image-based Spam, Hit \& Run, and Increased Volumes Latest Threat to Your Inbox}",
|
meillo@113
|
98 month = "June",
|
meillo@113
|
99 year = "2006",
|
meillo@113
|
100 note = "Also available online at: {\small\url{http://ironport.com/company/ironport_pr_2006-06-28.html} (2008-11-26)}",
|
meillo@113
|
101 }
|
meillo@118
|
102
|
meillo@118
|
103
|
meillo@118
|
104 @incollection{lenke95,
|
meillo@118
|
105 author = "Nils Lenke and Peter Schmitz",
|
meillo@118
|
106 title = "\emph{Geschwätz im `Globalen Dorf' -- Kommunication im Internet}",
|
meillo@118
|
107 booktitle = "Osnabrücker Beiträge zur Sprachtheorie",
|
meillo@118
|
108 publisher = "Ulrich Schmitz",
|
meillo@118
|
109 volume = "50",
|
meillo@118
|
110 year = "1995",
|
meillo@118
|
111 pages = "117--141",
|
meillo@118
|
112 note = "(In German language)",
|
meillo@118
|
113 }
|
meillo@121
|
114
|
meillo@121
|
115 @mastersthesis{hafiz05,
|
meillo@121
|
116 author = "Munawar Hafiz",
|
meillo@121
|
117 title = "\emph{Security architecture of mail transfer agents}",
|
meillo@121
|
118 school = "University of Illinois",
|
meillo@121
|
119 year = "2005",
|
meillo@121
|
120 month = "June",
|
meillo@121
|
121 note = "Also available online at: {\small\url{FIXME} (2008-12-04)}",
|
meillo@121
|
122 }
|