Alan Kaminsky Department of Computer Science Rochester Institute of Technology 4486 + 2220 = 6706
Home Page
Data Communications and Networks II 4003-541-70/4005-741-70 Spring Quarter 2006
Course Page

4003-541-70/4005-741-70 Data Communications and Networks II
Bibliography and Links

Prof. Alan Kaminsky -- Spring Quarter 2006
Rochester Institute of Technology -- Department of Computer Science

Java Tutorials
Java Documentation
Data Communications and Networks Books
TCP/IP Books
Network Security Books
Cryptography Books
Books on the Above in Java
Modem Books and Links
Scientific Computing Books and Links
Petri Net Books
Discrete Optimization Books and Links
M2MI and M2MP
Journals
Conferences
Internet Standards


Java Tutorials

The Java Tutorial. http://java.sun.com/docs/books/tutorial

Java I/O Tutorial (including object serialization). http://java.sun.com/docs/books/tutorial/essential/io/index.html

Java Threads Tutorial. http://java.sun.com/docs/books/tutorial/essential/threads/index.html

Java Exceptions Tutorial. http://java.sun.com/docs/books/tutorial/essential/exceptions/index.html


Java Documentation

Java 2 Standard Edition Software Development Kit Version 1.5.0 Documentation. http://java.sun.com/j2se/1.5.0/docs/index.html

Java 2 Standard Edition Software Development Kit Version 1.5.0 API Specification. http://java.sun.com/j2se/1.5.0/docs/api/index.html

Java New I/O APIs. http://java.sun.com/j2se/1.5.0/docs/guide/nio/index.html


Data Communications and Networks Books

James F. Kurose and Keith W. Ross. Computer Networking: A Top-Down Approach Featuring the Internet, Third Edition. Addison-Wesley, 2005.

Douglas E. Comer. Computer Networks and Internets with Internet Applications, Fourth Edition. Prentice-Hall, 2004.

William Stallings. Data and Computer Communications, Seventh Edition. Prentice Hall, 2004.

Larry L. Peterson and Bruce S. Davie. Computer Networks: A Systems Approach, Third Edition. Morgan Kaufmann Publishers, 2003.

Andrew S. Tanenbaum. Computer Networks, Fourth Edition. Prentice Hall PTR, 2003.

Alan Dennis. Networking in the Internet Age. John Wiley & Sons, 2002.

Charles E. Perkins, editor. Ad Hoc Networking. Addison-Wesley, 2001.

Radia Perlman. Interconnections: Bridges, Routers, Switches, and Internetworking Protocols, Second Edition. Addison-Wesley, 2000.

Dimitri Bertsekas and Robert Gallager. Data Networks, Second Edition. Prentice Hall, 1992.


TCP/IP Books

Douglas Comer, David Stevens, and Michael Evangelista. Internetworking with TCP/IP, Volume 2: Design, Implementation, and Internals, Fourth Edition. Prentice-Hall, 2005.

Douglas Comer and David Stevens. Internetworking with TCP/IP, Volume 3: Client-Server Programming and Applications, Linux/Posix Sockets Version. Prentice-Hall, 2001.

Douglas Comer. Internetworking with TCP/IP, Volume 1: Principles, Protocols, and Architecture, Fourth Edition. Prentice-Hall, 2000.

Warren W. Gay. Linux Socket Programming By Example. Que, 2000.

Douglas Comer and David Stevens. Internetworking with TCP/IP, Volume 3: Client-Server Programming and Applications, Windows Sockets Version. Prentice-Hall, 1997.

Douglas Comer and David Stevens. Internetworking with TCP/IP, Volume 3: Client-Server Programming and Applications, BSD Sockets Version, Second Edition. Prentice-Hall, 1996.

Sidnie Feit. TCP/IP: Architecture, Protocols, and Implementation. McGraw-Hill, 1993.


Network Security Books

Ryan Russell, Tim Mullen (Thor), FX, Dan "Effugas" Kaminsky, Joe Grand, Ken Pfeil, Ido Dubrawsky, Mark Burnett, and Paul Craig. Stealing the Network: How to Own the Box. Syngress Publishing, 2003.

Charlie Kaufman, Radia Perlman, and Mike Speciner. Network Security: Private Communication in a Public World, Second Edition. Prentice Hall PTR, 2002.

Kevin D. Mitnick and William L. Simon. The Art of Deception. Wiley Publishing, Inc., 2002.

Anonymous. Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation, Second Edition. Sams Publishing, 2001.

Anonymous. Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network, Third Edition. Sams Publishing, 2001.

Jeff Crume. Inside Internet Security: What Hackers Don't Want You to Know. Addison-Wesley, 2000.

Bruce Schneier. Secrets and Lies: Digital Security in a Networked World. John Wiley & Sons, 2000.


Cryptography Books

Douglas R. Stinson. Cryptography: Theory and Practice, Third Edition. Chapman & Hall, 2005.

Niels Ferguson and Bruce Schneier. Practical Cryptography. Wiley Publishing, 2003.

Charlie Kaufman, Radia Perlman, and Mike Speciner. Network Security: Private Communication in a Public World, Second Edition. Prentice Hall PTR, 2002.

Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.

Bruce Schneier. Applied Cryptography, Second Edition. John Wiley & Sons, 1996.


Books on the Above in Java

Rich Helton and Johennie Helton. Java Security Solutions. Wiley Publishing, Inc., 2002.

David Reilly and Michael Reilly. Java Network Programming and Distributed Computing. Addison-Wesley, 2002.


Modem Books and Links

Frank Durda IV. Data/FAX Modem Transmission Modulation Systems. http://nemesis.lonestar.org/reference/telecom/modems/modulations.html.

Jared Hall. Data Modulation Devices (MODEMs). http://lwtchost.ctc.edu/programs/csnt/dcom1_06_hall.htm.


Scientific Computing Books and Links

GNU Scientific Library (free software for scientific computing). http://www.gnu.org/software/gsl/.

William H. Press, Saul A. Teukolsky, William T. Vetterling, and Brian P. Flannery. Numerical Recipes in C: The Art of Scientific Computing, Second Edition. Cambridge University Press, 1992.

Numerical Recipes Home Page. Includes the complete text of Numerical Recipes in C online. http://www.nr.com/.


Petri Net Books

Wolfgang Reisig. Petri Nets: An Introduction. Springer-Verlag, 1985.

Tadeo Murata. "Modeling and Analysis of Concurrent Systems." In C. R. Vick and C. V. Ramamoorthy, editors. Handbook of Software Engineering. Van Nostrand Reinhold Company, 1984, pages 39-63.


Discrete Optimization Books and Links

The Reactive Search Home Page. http://rtm.science.unitn.it/~battiti/reactive.html


M2MI and M2MP

Hans-Peter Bischof, Alan Kaminsky, and Joseph Binder. A new framework for building secure collaborative systems in ad hoc network. Second International Conference on AD-HOC Networks and Wireless (ADHOC-NOW '03), Montreal, Canada, October 2003.
(http://www.cs.rit.edu/~anhinga/publications/montreal_October_03.pdf, 253,664 bytes)

Alan Kaminsky and Hans-Peter Bischof. New architectures, protocols, and middleware for ad hoc collaborative computing. Middleware 2003 Workshop on Middleware for Pervasive and Ad Hoc Computing, Rio de Janeiro, Brazil, June 2003.
(http://www.cs.rit.edu/~anhinga/publications/mw2003cr.pdf, 243,645 bytes)

Hans-Peter Bischof and Alan Kaminsky. Many-to-Many Invocation: A new framework for building collaborative applications in ad hoc networks. CSCW 2002 Workshop on Ad Hoc Communication and Collaboration in Ubiquitous Computing Environments, New Orleans, Louisiana, USA, November 2002.
(http://www.cs.rit.edu/~anhinga/publications/m2mi20021015.pdf, 89,779 bytes)

Alan Kaminsky and Hans-Peter Bischof. Many-to-Many Invocation: A new object oriented paradigm for ad hoc collaborative systems. 17th Annual ACM Conference on Object Oriented Programming Systems, Languages, and Applications (OOPSLA 2002), Onward! track, Seattle, Washington, USA, November 2002.
(http://www.cs.rit.edu/~anhinga/publications/m2mi20020716.pdf, 872,653 bytes)

The Anhinga Project. http://www.cs.rit.edu/~anhinga/


Journals

ACM SIGCOMM Computer Communication Review

ACM SIGMOBILE Mobile Computing and Communications Review

ACM Transactions on Information and System Security

ACM Transactions on Internet Technology

IEEE Communications

IEEE Journal on Selected Areas in Communications

IEEE Network

IEEE Transactions on Communications

IEEE Transactions on Wireless Communications

IEEE Wireless Communications (formerly IEEE Personal Communications)

IEEE/ACM Transactions on Networking

Mobile Networks and Applications

Wireless Networks


Conferences

ACM Conference on Computer and Communications Security

ACM MobiCom International Conference on Mobile Computing and Networking

ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication

IEEE Conference on Local Computer Networks

IEEE INFOCOM

IEEE Intelligent Network Workshop

IEEE International Conference on Communications

IEEE International Conference on Computer Communications and Networks

IEEE International Conference on Network Protocols

IEEE International Conference on Networks

IEEE International Phoenix Conference on Computers and Communications

IEEE Symposium on Computers and Communications

IEEE Wireless Communications and Networking Conference


Internet Standards

Internet Engineering Task Force (IETF). http://www.ietf.org

IETF Requests for Comments (RFCs) -- Internet standards. http://www.ietf.org/rfc.html

Internet Assigned Numbers Authority (IANA). http://www.iana.org

Data Communications and Networks II 4003-541-70/4005-741-70 Spring Quarter 2006
Course Page
Alan Kaminsky Department of Computer Science Rochester Institute of Technology 4486 + 2220 = 6706
Home Page
Copyright © 2006 Alan Kaminsky. All rights reserved. Last updated 13-Mar-2006. Please send comments to ark­@­cs.rit.edu.