|
[1]http://www.ibm.com/developer,”IBM developerWorks”,2002[2]http://www.alphaworks.ibm.com,”IBM alphaworks”,2002[3]http://java.sun.com/,”The Source for Java Technology”,2002[4]http://www7.software.ibm.com/vad.nsf,” VisualAge Developer Domain”,2002[5]http://www7b.boulder.ibm.com/wsdd,” WebSphere Developer Domain”,2002[6]http://www.redbooks.ibm.com,”IBM RedBooks”,2002[7]Http://www.ibm.com, “RS/6000 AIXLink / X.25 Cookbook”, IBM Corporation, 2002.[8]http://nim.cit.cornell.edu/,”CIT’s AIX”,2002[9]W.Richard Stevens,”Advanced Programming in the Unix Environment”,2000.[10]W.Richard Stevens, “UNIX Network Programming”, 1994.[11]David A.Curry, “UNIX Systems Programming”, 1995.[12]Seberry, Jennifer, “Cryptography: An Introduction to Computer Security”, 1994.[13]Elmasri, Navathe, “Fundamentals of Database Systems”, 1994.[14]季延平/郭鴻志﹐系統分析與設計﹐1995.
|