Books—Papers—Web resources
Arnold, Gosling, and Holmes, The Java Programming Language, 3rd edition, Addison-Wesley, 2000
Campione and Walrath, The Java Tutorial, 2nd edition, Addison-Wesley, 1998
Campione, Walrath, Huml, et al., The Java Tutorial Continued, Addison-Wesley, 1999
Chan, The Java Developers Almanac 2000, Addison-Wesley, 2000
Chan, Lee, and Kramer, The Java Class Libraries, 2nd Edition, Vols I, II, and Supplement, Addison-Wesley, 1998, 1999
Freeman, Hupfer, and Arnold, JavaSpaces Principles, Patterns, and Practice, Addison-Wesley 1999
Gong, Inside Java 2 Platform Security: Architecture, API Design, and Implementation, Addison-Wesley, 1999
Gosling, Joy, Steele, and Bracha, The Java Language Specification, 2nd edition, Addison-Wesley, 2000
Lea, Concurrent Programming in Java, Addison-Wesley, 1997
Lee and Seligman, JNDI API Tutorial and Reference, Addison-Wesley, 2000
Shannon et al., Java 2 Platform, Enterprise Edition: Platform and Component Specifications, Addison-Wesley, 1999
Waldo et al., The Jini Specifications Second Edition, Addison-Wesley, 2001
Wilson and Kesselman, Java Platform Performance, Addison-Wesley, 2000
Cheswick and Bellovin, Firewalls and Internet Security: Repelling the Wily Hacker, Addison-Wesley, 1994
Gamma, Helm, Johnson, and Vlissides: Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley, Reading, Massachusetts, 1995
Knuth, The Art of Computer Programming, 3 vols, various editions, Addison-Wesley
Mullender, ed., Distributed Systems, 2nd edition, Addison-Wesley, 1993
Singh, The Code Book: The Secret History of Codes and Codebreaking, Fourth Estate Limited, 1999
Stevens, TCP/IP Illustrated, Volume I, Addison-Wesley, 1994
Stevens and Wright, TCP/IP Illustrated, Volume II, Addison-Wesley, 1995
Stevens, TCP/IP Illustrated, Volume III, Addison-Wesley, 1996
Stevens, Unix Network Programming, 2 vols, Prentice Hall, 1998
Tanenbaum, Computer Networks, 3rd edition, Prentice Hall, 1996
All online at the Internet Engineering Task Force (IETF) site; http://www.ietf.org:
RFC 792: Postel, ed., Internet Control Message Protocol, 1981
RFC 793: Postel, ed., Transmission Control Protocol, 1981
RFC 1122: Braden, ed., Requirements for Internet Hosts — communication layers, 1989
RFC 1700: Reynolds and Postel, Assigned Numbers, 1994, as amended
RFC 1738: Berners-Lee et al., Uniform Resource Locators (URL), 1994
RFC 1777: Yeong et al., Lightweight Directory Access Protocol, 1995
RFC 1928: Leech et al., SOCKS Protocol version 5, 1996
RFC 2246: Dierks and Allen, The TLS Protocol Version 1.0, 1999
RFCs 2251 to 2256: Wahl et al., Lightweight Directory Access Protocol (v3), 1997
RFC 2396: Berners-Lee et al., Uniform Resource Identifiers (URI): Generic Syntax, 1998
RFC 2675: Borman et al., IPv6 Jumbograms, 1999
Java Object Serialization Specification, Revision 1.43, JDK 1.2, November 1998, distributed with Java JDK 1.3, or via the Java Software home page
Java Remote Method Invocation Specification, Revision 1.7, Java 2 SDK, Standard Edition, v1.3.0, December 1999, distributed with Java JDK 1.3, or via the Java Software home page
Object Management Group specification (CORBA,IIOP); at http://www.omg.org
Joint Revised Submission CORBA/Firewall Security, OMG Document orbos/98-06-03 (a minor revision of orbos/98-05-04), at http://www.omg.org
Abdullahi and Ringwood, Garbage Collecting the Internet: a Survey of Distributed Garbage Collection, ACM Computing Surveys, Vol. 3, No. 3, September 1998; abstract at http://www.acm.org/pubs/citations/journals/surveys/1998-30-3/p330-abdullahi/; text available online to subscribers
Birrell et al., Network Objects and Distributed garbage collection for network objects, Research Reports 115-116, Digital Equipment Corporation Systems Research Centre, 1993-5; at http://research.compaq.com/SRC/publications/src-rr.html
Frier, Karlton, and Kocher, The SSL 3.0 Protocol, Netscape Communications Corp., November 18, 1996; at http://home.netscape.com/eng/ssl3/
Thiruvathukal, Thomas, and Korczynski, Reflective Remote Method Invocation, ACM 1998 Workshop on Java for High-Performance Network Computing; at http://www.cs.ucsb.edu/conferences/java98/papers/reflective.pdf
The Java Reliable Multicast Service: Sun Microsystems Laboratory Technical Report TR-98-68; at http://www.sun.com/research/techrep
Liao, Lightweight Reliable Multicast Protocol as an Extension to RTP, http://webcanal.inria.fr/lrmp
Chiu et al., TRAM: a Tree-based Reliable Multicast Protocol, Sun Microsystems Laboratories, SMLI TR-98-66, July 1998
Wagner and Schneier, Analysis of the SSL 3.0 Protocol, Second USENIX Workshop on Electronic Commerce Proceedings, USENIX Press, November 1996, pp 29-40; at http://www.counterpane.com/ssl.html.
The Java Software home page is at http://java.sun.com/. The Java RMI home page is at http://java.sun.com/products/jdk/rmi/. Links on this page include the RMI White Paper, the RMI specification, online documentation, a note on RMI and SSL, the RMI-USERS mailing list, online tutorials, and real-world examples. The following additional Javasoft Web resources have been quoted in this book:
Activation debugging utility; under the name rmipm.jar
, at http://developer.jini.org/exchange/users/aecolley/rmiutil/
Maso, Re: Different classes that implement the same remote interface, posting to the RMI-USERS mailing list, June 1999
Java Developer Connection Bug Parade
Java RMI Security Extension Early Look Draft 3, Sun Microsystems, via the RMI Home Page; at http://java.sun.com/products/jdk/rmi/
Jini Network Technology page; at http://www.sun.com/jini
Jini Community page; at http://www.jini.org
Jini developer site; at http://developer.jini.org
Dornin, List of java.rmi.* and sun.rmi.* properties posting to the RMI-USERS mailing list, December 1999
RMI CGI Servlet Handler: from JDK 1.3; docs/guide/rmi/archives
directory; for earlier versions of the JDK, as rmiservlethandler.zip
, at http://java.sun.com/products/jdk 1.3/docs/guide/rmi/archives
Colley, RMI for large-scale applications, posting to the RMI Mailing List, April 1999
rmid exec policies for Jini technology; at http://developer.java.sun.com/developer/products/jini/execpolicy.html
RMI Proxy home page; at http://www.rmiproxy.com
Search the RMI-USERS archive; at http://archives.java.sun.com/cgi-bin/wa?S1=rmi-users
Uniform Resource Identifier: at http://www.ics.uci.edu/pub/ietf/uri/
Why Developers should not write Programs that call 'sun' Packages, http://java.sun.com/products/jdk/faq/faq-sun-packages.html
The home page for this book is at the following Web URL:
There you will find links to all the above Web resources, errata sheets, and links to all the source code published in this book. You will also find facilities for review and feedback to the authors. We particularly invite notifications of errors in this book, so that they can be corrected for the next edition.
3.145.204.201