This document outlines the course units and topics for CS9221 Database Technology. It covers 5 units: Distributed Databases, Object Oriented Databases, Emerging Systems, Database Design Issues, and Current Issues. Some key topics included are distributed and conventional database architectures, query processing, transaction processing, concurrency control, recovery, object oriented data modeling and design, and temporal, spatial, multimedia, and text databases. The document also lists 8 references for the course.
Distributed database system is collection of loosely coupled sites that are independeant of each other.
Distributed transaction model
Concurrency control
2 phase commit protocol
Distributed database system is collection of loosely coupled sites that are independeant of each other.
Distributed transaction model
Concurrency control
2 phase commit protocol
Veda Solutions http://www.techveda.com provides the best Training for Linux Driver and Embedded Developer with Android at Hyderabad. Here are the course content and Highlights.
Presentation about - Semantic Web - Overview -Semantic Web
Web of Data, Giant Global Graph, Data Web, Web 3.0, Linked Data Web, Semantic Data Web, Enterprise Information Web, HTML, CSS,
A comprehensive expert level course covering all aspects of system programming like
Linux Programming, Kernel Programming, Embedded Linux , Network Programming,
Linux Device Drivers
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Securing your Kubernetes cluster_ a step-by-step guide to success !
Me ii sem syllabus
1. CS9221 DATABASE TECHNOLOGY L T P C
UNIT I DISTRIBUTED DATABASES 5
Distributed Databases Vs Conventional Databases – Architecture – Fragmentation –
Query
Processing – Transaction Processing – Concurrency Control – Recovery.
UNIT II OBJECT ORIENTED DATABASES 10
Introduction to Object Oriented Data Bases - Approaches - Modeling and Design -
Persistence –
Query Languages - Transaction - Concurrency – Multi Version Locks - Recovery.
UNIT III EMERGING SYSTEMS 10
Enhanced Data Models - Client/Server Model - Data Warehousing and Data Mining -
Web
Databases – Mobile Databases.
UNIT IV DATABASE DESIGN ISSUES 10
ER Model - Normalization - Security - Integrity - Consistency - Database Tuning -
Optimization
and Research Issues – Design of Temporal Databases – Spatial Databases.
UNIT V CURRENT ISSUES 10
Rules - Knowledge Bases - Active And Deductive Databases - Parallel Databases –
Multimedia
Databases – Image Databases – Text Database
TOTAL : 45 PERIODS
REFERENCES:
1. Elisa Bertino, Barbara Catania, Gian Piero Zarri, “Intelligent Database Systems”,
Addison-
Wesley, 2001.
2. Carlo Zaniolo, Stefano Ceri, Christos Faloustsos, R.T.Snodgrass, V.S.Subrahmanian,
“Advanced Database Systems”, Morgan Kaufman, 1997.
3. N.Tamer Ozsu, Patrick Valduriez, “Principles Of Distributed Database Systems”,
Prentice
Hal International Inc., 1999.
4. C.S.R Prabhu, “Object-Oriented Database Systems”, Prentice Hall Of India, 1998.
5. Abdullah Uz Tansel Et Al, “Temporal Databases: Theory, Design And Principles”,
Benjamin
Cummings Publishers, 1993.
6. Raghu Ramakrishnan, Johannes Gehrke, “Database Management Systems”,
Mcgraw Hill,
Third Edition 2004.
7. Henry F Korth, Abraham Silberschatz, S. Sudharshan, “Database System Concepts”,
Fourth
Ediion, Mcgraw Hill, 2002.
8. R. Elmasri, S.B. Navathe, “Fundamentals Of Database Systems”, Pearso
2. CS9222 ADVANCED OPERATING SYSTEMS L T P C
UNIT I INTRODUCTION 9
Overview - Functions of an Operating System – Design Approaches – Types of Advanced
Operating System - Synchronization Mechanisms – Concept of a Process, Concurrent
Processes – The Critical Section Problem, Other Synchronization Problems – Language
Mechanisms for Synchronization – Axiomatic Verification of Parallel Programs - Process
Deadlocks - Preliminaries – Models of Deadlocks, Resources, System State – Necessary and
Sufficient conditions for a Deadlock – Systems with Single-Unit Requests, Consumable
Resources, Reusable Resources.
UNIT II DISTRIBUTED OPERATING SYSTEMS 9
Introduction – Issues – Communication Primitives – Inherent Limitations - Lamport’s Logical
Clock; Vector Clock; Causal Ordering; Global State; Cuts; Termination Detection. Distributed
Mutual Exclusion – Non-Token Based Algorithms – Lamport’s Algorithm - Token-Based
Algorithms – Suzuki-Kasami’s Broadcast Algorithm – Distributed Deadlock Detection – Issues –
Centralized Deadlock-Detection Algorithms - Distributed Deadlock-Detection Algorithms.
Agreement Protocols – Classification - Solutions –Applications.
UNIT III DISTRIBUTED RESOURCE MANAGEMENT 9
Distributed File systems – Architecture – Mechanisms – Design Issues – Distributed Shared
Memory – Architecture – Algorithm – Protocols - Design Issues. Distributed Scheduling – Issues
– Components – Algorithms.
UNIT IV FAILURE RECOVERY AND FAULT TOLERANCE 9
Basic Concepts-Classification of Failures – Basic Approaches to Recovery; Recovery in
Concurrent System; Synchronous and Asynchronous Checkpointing and Recovery; Check
pointing in Distributed Database Systems; Fault Tolerance; Issues - Two-phase and
Nonblocking
Commit Protocols; Voting Protocols; Dynamic Voting Protocols;
UNIT V MULTIPROCESSOR AND DATABASE OPERATING SYSTEMS 9
Structures – Design Issues – Threads – Process Synchronization – Processor Scheduling –
Memory Management – Reliability / Fault Tolerance; Database Operating Systems –
Introduction – Concurrency Control – Distributed Database Systems – Concurrency Control
Algorithms.
TOTAL : 45 PERIODS
TEXT BOOK:
1. Mukesh Singhal and N. G. Shivaratri, “Advanced Concepts in Operating Systems”, McGraw-
Hill, 2000
REFERENCES: .
1. Abraham Silberschatz, Peter B. Galvin, G. Gagne, “Operating System Concepts”, Sixth
Edition, Addison Wesley Publishing Co., 2003.
2. Andrew S. Tanenbaum, “Modern Operating Systems”, Second Edition, Addison Wesley,
2001.
3. CS9223 ADVANCED SYSTEM SOFTWARE L T P C
UNIT I 9
Basic Compiler Functions – Grammars – Lexical Analysis – Syntactic Analysis – Code
Generation – Heap Management – Parameter Passing Methods – Semantics of Calls and
Returns – Implementing Subprograms – Stack Dynamic Local Variables – Dynamic binding of
method calls to methods – Overview of Memory Management, Virtual Memory, Process
Creation – Overview of I/O Systems, Device Drivers, System Boot
UNIT II 10
Introduction and Overview – Symbol table structure – Local and Global Symbol table
management Intermediate representation – Issues – High level, medium level, low level
intermediate languages – MIR, HIR, LIR – ICAN for Intermediate code – Optimization – Early
optimization – loop optimization
UNIT III 9
Procedure optimization – in-line expansion – leaf routine optimization and shrink wrapping –
register allocation and assignment – graph coloring – data flow analysis – constant propagation
– alias analysis – register allocation – global references – Optimization for memory hierarchy -
Code Scheduling – Instruction scheduling – Speculative scheduling – Software pipelining –
trace scheduling – Run-time support – Register usage – local stack frame – run-time stack –
Code sharing – position–independent code
UNIT IV 9
Introduction to Virtual Machines (VM) – Pascal P-Code VM – Object-Oriented VMs – Java VM
Architecture – Common Language Infrastructure – Dynamic Class Loading – Security –
Garbage Collection – Optimization
UNIT V 8
Emulation – Interpretation and Binary Translation – Instruction Set Issues – Process Virtual
Machines – Profiling – Migration – Grids – Examples of real world implementations of system
software
TOTAL : 45 PERIODS
TEXT BOOKS:
1. Steven S. Muchnick, “Advanced Compiler Design Implementation”, Morgan Koffman –
Elsevier Science, India, First Edition 2004
2. James E Smith and Ravi Nair, “Virtual Machines”, Elsevier, 2005. (Units 4, 5) (Sections
1.0-1.6, 2.0-2.5, 2.8, 3.0-3.6, 4.2, 5.0-5.3, 5.5-5.6, 6.0-6.3, 6.5-6.6, 10.2, 10.3)
3. Robert W. Sebesta, “Concepts of Programming Languages”, 7th ed., Pearson Education,
2006. (Unit 3) (Sections 6.9, 9.3, 9.5, 10.1-10.3, 12.10.2)
REFERENCES:
1. Alfred V Aho, Ravi Sethi, Jeffrey D Ullman, “Compilers”, Pearson Education, 1986.
2. Terrance W Pratt, Marvin V Zelkowitz, T V Gopal, “Programming Languages”, 4th ed.,
Pearson Education, 2006.
3. Carl Hamacher, Zvonko Vranesic, Safwat Zaky, “Computer Organization”, 5th ed., McGraw
Hill, 2002.
4. Silberschatz, Galvin, Gagne, “Operating System Concepts”, 6th ed., Wiley, 2003.
4. CS9224 INFORMATION SECURITY L T P C
UNIT I 9
An Overview of Computer Security, Access Control Matrix, Policy-Security policies,
Confidentiality policies, Integrity policies and Hybrid policies.
UNIT II 9
Cryptography- Key management – Session and Interchange keys, Key exchange and
generation, Cryptographic Key Infrastructure, Storing and Revoking Keys, Digital
Signatures,
Cipher Techniques
UNIT III 9
Systems: Design Principles, Representing Identity, Access Control Mechanisms,
Information
Flow and Confinement Problem.
UNIT IV 9
Malicious Logic, Vulnerability Analysis, Auditing and Intrusion Detection
UNIT V 9
Network Security, System Security, User Security and Program Security
TOTAL : 45 PERIODS
TEXT BOOK:
1. Matt Bishop ,“Computer Security art and science ”, Second Edition, Pearson
Education
REFERENCES:
1. Mark Merkow, James Breithaupt “ Information Security : Principles and Practices”
First
Edition, Pearson Education,
2. Whitman, “Principles of Information Security”, Second Edition, Pearson Education
3. William Stallings, “Cryptography and Network Security: Principles and Practices”,
Third
Edition, Pearson Education.
4. “Security in Computing ”, Charles P.Pfleeger and Shari Lawrence Pfleeger, Third
Edition.
5. CS9225 WEB TECHNOLOGY L T P C
UNIT I 9
Web essentials – clients – servers - communication – markup languages – XHTML –
simple
XHTML pages style sheets – CSS
UNIT II 9
Client side programming – Java script language – java script objects – host objects :
Browsers
and the DOM
UNIT III 9
Server side programming – java servlets – basics – simple program – separating
programming
and presentation – ASP/JSP - JSP basics ASP/JSP objects – simple ASP/JSP
UNIT IV 9
Representing Web data – data base connectivity – JDBC – Dynamic Web pages – XML
– DTD
– XML schema – DOM – SAX – Xquery.
UNIT V 9
Building Web applications - cookies – sessions – open source environment – PHP –
MYSQL –
case studies.
TOTAL : 45 PERIODS
TEXT BOOKS:
1. Jeffrey C Jackson, “ Web Technology – A computer Science perspective”, Persoson
Education, 2007.
2. Chris Bates, “Web Programming – Building Internet Applications, “Wiley India, 2006
6. CP9264 DISTRIBUTED COMPUTING L T P C
UNIT I COMMUNICATION IN DISTRIBUTED ENVIRONMENT 8
Introduction – Various Paradigms in Distributed Applications – Remote Procedure Call –
Remote Object Invocation – Message-Oriented Communication – Unicasting,
Multicasting and Broadcasting – Group Communication.
UNIT II DISTRIBUTED OPERATING SYSTEMS 12
Issues in Distributed Operating System – Threads in Distributed Systems – Clock
Synchronization – Causal Ordering – Global States – Election Algorithms –Distributed
Mutual Exclusion – Distributed Transactions – Distributed Deadlock – Agreement
Protocols .14
UNIT III DISTRIBUTED RESOURCE MANAGEMENT 10
Distributed Shared Memory – Data-Centric Consistency Models – Client-Centric
Consistency Models – Ivy – Munin – Distributed Scheduling – Distributed File Systems
– Sun NFS.
UNIT IV FAULT TOLERANCE AND CONSENSUS 7
Introduction to Fault Tolerance – Distributed Commit Protocols – Byzantine Fault
Tolerance – Impossibilities in Fault Tolerance.
UNIT V CASE STUDIES 8
Distributed Object-Based System – CORBA – COM+ – Distributed Coordination-Based
System– JINI.
TOTAL : 45 PERIODS
REFERENCES:
1. George Coulouris, Jean Dollimore, Tim Kindberg, “Distributed Systems Concepts and
Design”, Third Edition, Pearson Education Asia, 2002.
2. Hagit Attiya and Jennifer Welch, “Distributed Computing: Fundamentals, Simulations
and
Advanced Topics”, Wiley, 2004.
3. Mukesh Singhal, “Advanced Concepts In Operating Systems”, McGrawHill Series in
Computer Science, 1994.
4. A.S.Tanenbaum, M.Van Steen, “Distributed Systems”, Pearson Education, 2004.
5. M.L.Liu, “Distributed Computing Principles and Applications”, Pearson Addison
Wesley