Bibliography

[1] O'Driscoll, G. The Essential Guide to Home Networking Technologies. 2000. Englewood Cliffs, NJ: Prentice Hall PTR.

[2] Motorola Broadband Communications Sector. “Broadband Convergence.” Search the product catalog for detailed specifications. Available at http://www.gi.com/noflash/index.html.

[3] Ericsson. “Ericsson Residential E-Services.” 2000. Available at http://www.ericsson.se/wireless/products/ebox/.

[4] Gimein, M. “Sunspots: Excerpts from a Diary of a Networked Future.” 1999. Salon.com. Available at http://www.salon.com/tech/log/1999/11/18/sunspots.

[5] Sun Microsystems, Inc. “PersonalJava™ Application Environment.” 2000. Available at http://java.sun.com/products/personaljava.

[6] Sun Microsystems, Inc. “Connected Device Configuration (CDC) and the C Virtual Machine (CVM).” 2000. Available at http://java.sun.com/products/cdc.

[7] Sun Microsystems, Inc. “JSR-000046 J2ME Foundation Profile.” 2000. Available at http://java.sun.com/aboutJava/communityprocess/jsr/jsr_046_j2mefnd.html.

[8] Sun Microsystems, Inc. “Java™ 2 Platform, Micro Edition (J2ME™ Platform).” 2001. Available at http://java.sun.com/j2me.

[9] Sun Microsystems, Inc. “Package Version Identification.” 1998. Available at http://java.sun.com/products/jdk/1.2/docs/guide/versioning/index.html.

[10] Meyers, S. Effective C++: 50 Specific Ways to Improve Your Programs and Designs, Second Edition. 1998. Reading, MA: Addison-Wesley, p. 176.

[11] Bierce A. The Devil's Dictionary (Albert and Charles Boni, Inc., 1911). Berkeley Digital Library SunSite. 1993. Available at http://sunsite.berkeley.edu/Literature/Bierce/DevilsDictionary/.

[12] Howes, T. “A String Representation of LDAP Search Filters.” 1996. Available at http://www.ietf.org/rfc/rfc1960.txt.

[13] Borenstein, N. “A User Agent Configuration Mechanism for Multimedia Mail Format Information.” 1993. Available at http://www.ietf.org/rfc/rfc1524.txt.

[14] Sun Microsystems, Inc. “JavaMail™ API.” 2000. Available at http://java.sun.com/products/javamail/index.html.

[15] McLaughlin, L. , et al. “Line Printer Daemon Protocol.” 1990. Available at http://www.ietf.org/rfc/rfc1179.txt.

[16] Liang, S. The Java™ Native Interface: Programmer's Guide and Specification. 1999. Reading, MA: Addison-Wesley.

[17] Gosling, J. , et al. The Java™ Language Specification, Second Edition. 2000. Boston, MA: Addison-Wesley. Available in HTML at http://java.sun.com/docs/books/jls.

[18] Freed, N. , et al. “Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies.” 1996. Available at http://www.ietf.org/rfc/rfc2045.txt.

[19] Freed, N. , et al. “Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types.” 1996. Available at http://www.ietf.org/rfc/rfc2046.txt.

[20] Moore, K. “MIME (Multipurpose Internet Mail Extensions) Part Three: Message Header Extensions for Non-ASCII Text.” 1996. Available at http://www.ietf.org/rfc/rfc2047.txt.

[21] Freed, N. , et al. “Multipurpose Internet Mail Extensions (MIME) Part Four: Registration Procedures.” 1996. Available at http://www.ietf.org/rfc/rfc2048.txt.

[22] Freed, N. , et al. “Multipurpose Internet Mail Extensions (MIME) Part Five: Conformance Criteria and Samples.” 1996. Available at http://www.ietf.org/rfc/rfc2049.txt.

[23] Franks, J. , et al. “HTTP Authentication: Basic and Digest Access Authentication.” 1999. Available at http://www.ietf.org/rfc/rfc2617.txt.

[24] Gong, L. Inside Java™ 2 Platform Security: Architecture, API Design, and Implementation. 1999. Reading, MA: Addison-Wesley

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.143.5.15