Mujahed Sebai
Interactive Secure Communication      
Main
University
iPIX Folder
Cover Abstract  Introduction Research Design Implementation Testing Conclusion Bibliography Class Definitions

Bibliography

 Books

[1]        Andrew S. Tanenbaum, Computer Networks, Prentice-Hall International, Inc (1996.)

[2]        Macro Pistoia, Duane F. Reller, Deepak Guta, Milind Nagur, Ashok K. Ramani, Java2 Network Security, Prentice Hall PTR, 2nd Edition, 1999.

[3]        Charles E. Spurgon, Ethernet, O’Reilly, 2000.

[4]        Andrew Simmonds, Data Communications and Transmission Principles, A. J Simmonds, 1997. 

World Wide Web

[5]        http://library.cs.tuiasi.ro/networking/clientserver/

[6]        http://www.davidreilly.com/java/java_network_programming/

[7]        http://www.mathtools.net/Java/Communication/

[8]        http://www.lancs.ac.uk/postgrad/cambioti/client-server/client-server-architecture.html

[9]        http://www.csse.monash.edu.au/courseware/cse3420/Resources/jmf-2.0/docs/HotMedia.html

[10]      http://www.ibiblio.org/javafaq/course/

[11]      http://www.javaworld.com/jw-07-1998/jw-07-exceptions.html

[12]      http://java.sun.com/docs/books/tutorial/essential/exceptions/

[13]      http://java.sun.com/docs/books/tutorial/networking/overview

[14]      http://www.uic.edu/depts/accc/network/ftp/v452.html

[15]      http://www.javaworld.com/javaworld/jw-04-2000/jw-0428-security.html

[16]      http://java.sun.com