Information Technology Reference
In-Depth Information
Chapman, B. (2005). Incident command for IT: What we can learn from the fire depart-
ment.,
LISA
, USENIX.
Cheswick,W.R.,Bellovin,S.M.,&Rubin,A.D.(2003).
Firewalls and Internet Security:
Repelling the Wiley Hacker
, Addison-Wesley.
Clos, C. (1953). A study of non-blocking switching networks,
The Bell System Technical
Journal
32
(2): 406-424.
Corbett, J. C., Dean, J., Epstein, M., Fikes, A., Frost, C., Furman, J. J., Ghemawat, S.,
Gubarev, A., Heiser, C., Hochschild, P., Hsieh, W., Kanthak, S., Kogan, E., Li, H., Lloyd,
A., Melnik, S., Mwaura, D., Nagle, D., Quinlan, S., Rao, R., Rolig, L., Saito, Y., Szy-
maniak, M., Taylor, C., Wang, R., & Woodford, D. (2012). Spanner: Google's globally-
distributed database,
Proceedings of the 10th USENIX Conference on Operating Systems
Design and Implementation
,OSDI'12,USENIXAssociation,Berkeley,CA,pp.251-264.
Dean, J. (2009). Designs, lessons and advice from building large distributed systems.
Dean, J., & Barroso, L. A. (2013). The tail at scale,
Communications of the ACM
56
(2):
74-80.
Dean, J., & Ghemawat, S. (2004). MapReduce: Simplified data processing on large
clusters,
OSDI'04: Proceedings of the 6th USENIX Symposium on Operating Systems
Design and Implementation
, USENIX Association.
Debois, P. (2010a). Jedi4Ever blog.
Debois, P. (2010b). DevOps is a verb. Slideshare of talk.
Search WWH ::
Custom Search