Advanced Programming in the UNIX® Environment

(lily) #1
ptg10805159

Bibliography 953

Stonebraker, M. R.1981. ‘‘Operating System Support for Database Management,’’
Communications of the ACM,vol. 24, no. 7, pp. 412–418 (July).
Describes operating system services and how they affect database operation.


Strang, J. 1986.Programming with curses.O’Reilly & Associates, Sebastopol, CA.
Abook on the Berkeley version ofcurses.


Strang, J., Mui, L., and O’Reilly,T.1988.termcap & terminfo, Third Edition.O’Reilly & Associates,
Sebastopol, CA.
Abook ontermcapandterminfo.


Sun Microsystems. 2005.STREAMS Programming Guide.Sun Microsystems, Santa Clara, CA.
Describes STREAMS programming on the Solaris platform.


Thompson, K. 1978. ‘‘UNIX Implementation,’’The Bell System Technical Journal,vol. 57, no. 6,
pp. 1931–1946 (July–Aug.).
Describes some of the implementation details of Version 7.


Vo,Kiem-Phong. 1996. ‘‘Vmalloc: A General and Efficient Memory Allocator,’’SoftwarePractice
and Experience,vol. 26, no. 3, pp. 357–374.
Describes a flexible memory allocator.


Wei, J., and Pu, C. 2005. ‘‘TOCTTOU Vulnerabilities in UNIX_Style File Systems: An Anatomical
Study,’’Proceedings of the 4th USENIX Conference on File and Storage Technologoes (FAST’05),
pp. 155–167, San Francisco, CA.
Describes TOCTTOU weaknesses in the UNIX file system interface.


Weinberger,P.J.1982. ‘‘Making UNIX Operating Systems Safe for Databases,’’The Bell System
Te chnical Journal,vol. 61, no. 9, pp. 2407–2422 (Nov.).
Describes some problems in implementing databases in early UNIX systems.


Weinstock, C. B., and Wulf, W.A.1988. ‘‘Quick Fit: An Efficient Algorithm for Heap Storage
Allocation,’’SIGPLAN Notices,vol. 23, no. 10, pp. 141–148.
Describes a memory allocation algorithm suitable for a wide variety of applications.


Williams, T.1989. ‘‘Session Management in System V Release 4,’’Proceedings of the 1989 Winter
USENIX Conference,pp. 365–375, San Diego, CA.
Describes the session architecture in SVR4, on which the POSIX.1 interfaces werebased. This
includes process groups, job control, and controlling terminals. Also describes the security
concerns of existing approaches.


X/Open. 1989.X/Open Portability Guide.Prentice Hall, Englewood Cliffs, NJ.
Aset of seven volumes covering commands and utilities (Vol. 1), system interfaces and headers
(Vol. 2), supplementary definitions (Vol. 3), programming languages (Vol. 4), data management
(Vol. 5), window management (Vol. 6), networking services (Vol. 7). Although out of print, this
has been replaced by the Single UNIX Specification[Open Group 2008].

Free download pdf