view thesis/bib/thesis.bib @ 115:0c72b9409bc8

some comments
author meillo@marmaro.de
date Wed, 26 Nov 2008 22:08:55 +0100
parents 37ee90a25d4b
children 078fb8ac6bf8
line wrap: on
line source

@book{mmm,
	author    = "Brooks, Jr., Frederick P.",
	title     = "The mythical man-month: essays on software engineering",
	year      = "1995",
	publisher = "Addison-Wesley"
}

@book{unixprogenv,
	author =  "Brian W. Kernighan and Rob Pike",
	title = "The UNIX Programming Environment",
	year = "1984",
	publisher = "Prentice-Hall"
}

@book{advunixprog,
	author = "Marc J. Rochkind",
	title = "Advanced UNIX Programming",
	year = "1985",
	publisher = "Prentice-Hall"
}

@book{practiceprog,
	author = "Brian W. Kernighan and Rob Pike",
	title = "The Practice of Programming",
	year = "1999",
	publisher = "Addison-Wesley"
}

@book{k&r,
	author = "Brian W. Kernighan and Dennis M. Ritchie",
	title = "The C Programming Language",
	edition = "Second",
	year = "1988",
	publisher = "Prentice-Hall"
}

@book{catb,
	author = "Eric S. Raymond",
	title = "The Cathedral \& the Bazaar",
	year = "1999",
	publisher = "O'Reilly Media",
	note = "ISBN: 1-56592-724-9. Also available online at {\small\url{http://catb.org/esr/writings/cathedral-bazaar/cathedral-bazaar/} (2008-10-14)}",
}

@book{costales97,
	author = "Bryan Costales and Eric Allman",
	title = "sendmail",
	year = "1997",
	edition = "Second",
	publisher = "O'Reilly \& Associates, Inc",
	note = "ISBN: 1-56592-222-0",
}

@book{vixie01,
	author = "Paul A. Vixie and Frederick M. Avolio",
	title = "Sendmail: Theory and Practice",
	year = "2001",
	edition = "Second",
	publisher = "Digital Press",
	note = "ISBN: 1-55558-229-X. The first chapter ``Background and History'' is available online at {\small\url{http://smtap.al.org/ch01.pdf} (2008-10-23)}",
}


@book{powerof2x2,
	author = "Alex Lowy and Phil Hood",
	title = "The Power of the 2 x 2 Matrix: Using 2 x 2 Thinking to Solve Business Problems and Make Better Decisions",
	publisher = "Jossey-Bass",
	year = "2004",
	note = "ISBN: 0-78797-292-4",
	pages = "129--131",
}

@article{wired:hype,
	author = "Jesse Freund",
	title = "\emph{Hype List}",
	journal = "Wired Magazine",
	month = "June",
	year = "1998",
	note = "Also available online at: {\small\url{http://www.wired.com/wired/archive/6.06/hypelist.html} (2008-11-26)}",
}

@techreport{panda:email-threats,
	institution = "Panda Security and Commtouch",
	author = "",
	title = "Q2 2008 Email Threats Trend Report",
	note = "Also available online at: {\small\url{http://www.pandasecurity.com/emailhtml/oxygen/Q2_08%20Email_Threats%20-%20Panda.pdf} (2008-11-26)}",
	year = "2008",
	month = "July",
}

@techreport{ironport:zombie-computers,
	institution = "{IronPort Systems Inc.}",
	type = "Press Release",
	author = "",
	title = "Spammers Continue Innovation: IronPort Study Shows Image-based Spam, Hit \& Run, and Increased Volumes Latest Threat to Your Inbox",
	month = "June",
	year = "2006",
	note = "Also available online at: {\small\url{http://ironport.com/company/ironport_pr_2006-06-28.html} (2008-11-26)}",
}