December 1999
Intermediate to advanced
544 pages
13h 38m
English
[ANSI83] American National Standards Institute, American National Standard X.3106: Data Encryption Algorithm, Modes of Operation, 1983.
[Bellovin+91] S. M. Bellovin, M. Merrit, “Limitations of the Kerberos Authentication System,” USENIX Conference Proceedings, Dallas, Winter 1991.
[Bhide+91] A. K. Bhide, E. N. Elnozahy, S. P. Morgan, “A Highly Available Network File Server,” USENIX Conference Proceedings, Dallas, Winter 1991: 199–205.
[Bhide+92] A. K. Bhide, S. Shepler, “A Highly Available Lock Manager for HA-NFS,” USENIX Conference Proceedings, Summer 1992: 177–184.
[Birrell84] A. D. Birrell, B. J. Nelson, “Implementing Remote Procedure Calls,” ACM Transactions on Computer Systems, 1984, 2: 39–59.
[Blair98] John D. Blair, “SAMBA, ...