21.01.2022 Views

Sommerville-Software-Engineering-10ed

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 17.4 ■ References 519

References

Bernstein, P. A. 1996. “Middleware: A Model for Distributed System Services.” Comm. ACM 39 (2):

86–97. doi:10.1145/230798.230809.

Coulouris, G., J. Dollimore, T. Kindberg, and G. Blair. 2011. Distributed Systems: Concepts and

Design, 5th ed. Harlow, UK: Addison-Wesley.

Holdener, A. T. (2008). Ajax: The Definitive Guide. Sebastopol, CA.: O’Reilly & Associates.

McDougall, P. 2000. “The Power of Peer-to-Peer.” Information Week (August 28, 2000). http://www

.informationweek.com/801/peer.htm

Oram, A. 2001. “Peer-to-Peer: Harnessing the Benefits of a Disruptive Technology.” Sebastopol, CA:

O’Reilly & Associates.

Orfali, R., D. Harkey, and J. Edwards. 1997. Instant CORBA. Chichester, UK: John Wiley & Sons.

Pope, A. 1997. The CORBA Reference Guide: Understanding the Common Object Request Broker

Architecture. Harlow, UK: Addison-Wesley.

Sanderson, D. 2012. Programming with Google App Engine. Sebastopol, CA: O’Reilly Media Inc.

Sarris, S. 2013. HTML5 Unleashed. Indianapolis, IN: Sams Publishing.

Tanenbaum, A. S., and M. Van Steen. 2007. Distributed Systems: Principles and Paradigms, 2nd ed.

Upper Saddle River, NJ: Prentice-Hall.

Wallach, D. S. 2003. “A Survey of Peer-to-Peer Security Issues.” In Software Security: Theories and

Systems, edited by M. Okada, B. C. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, 42–57.

Heidelberg: Springer-Verlag. doi:10.1007/3-540-36532-X_4.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!