19. Dijkstra, E.W. Cooperating Sequential Processes // Programming Languages, ed. F. Genuys, Academic Press, New York, 1968.
20. Drepper, U. Futexes Are Tricky, 2004 (a). http://people.redhat.com/drepper/futex.pdf.
21. Drepper, U. How to Write Shared Libraries, 2004 (b). http://people.redhat.com/drepper/dsohowto.pdf.
22. Drepper, U. What Every Programmer Should Know About Memory, 2007. http://people.redhat.com/drepper/cpumemory.pdf.
23. Drepper, U. Defensive Programming for Red Hat Enterprise Linux, 2009. http://people.redhat.com/drepper/defprogramming.pdf.
24. Erickson, J.M. Hacking: The Art of Exploitation (2nd edition). No Starch Press, San Francisco, California, 2008.
25. Floyd, S. TCP and Explicit Congestion Notification // ACM Computer Communication Review. Vol. 24, No. 5, October 1994, pages 10–23. http://www.icir.org/floyd/papers/tcp_ecn.4.pdf.
26. Franke, H., Russell, R., Kirkwood, M. Fuss, Futexes and Furwocks: Fast Userlevel Locking in Linux // Proceedings of the Ottawa Linux Symposium, 2002. http://www.kernel.org/doc/ols/2002/ols2002-pages-479-495.pdf.
27. Frisch, A. Essential System Administration (3rd edition). O’Reilly, Sebastopol, California, 2002.
28. Gallmeister, B.O. POSIX.4: Programming for the Real World. O’Reilly, Sebastopol, California, 1995.
29. Gammo, L., Brecht, T., Shukla, A., Pariag, D. Comparing and Evaluating epoll, select, and poll Event Mechanisms // Proceedings of the Ottawa Linux Symposium, 2002. http://www.kernel.org/doc/ols/2004/ols2004v1-pages-215-226.pdf.
30. Gancarz, M. Linux and the Unix Philosophy. Digital Press, 2003.
31. Garfinkel, S., Spafford, G., Schwartz, A. Practical Unix and Internet Security (3rd edition). O’Reilly, Sebastopol, California, 2003.
32. Gont, F. Security Assessment of the Internet Protocol. UK Centre for the Protection of the National Infrastructure, 2008. http://www.cpni.gov.uk/Docs/InternetProtocol.pdf.
33. Gont, F. Security Assessment of the Transmission Control Protocol (TCP). CPNI Technical Note 3/2009. UK Centre for the Protection of the National Infrastructure, 2009 (a). http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf.
34. Gont, F., Yourtchenko, A. On the implementation of TCP urgent data // Internet draft, 20 May 2009(b). http://www.gont.com.ar/drafts/urgent-data/.
35. Goodheart, B., Cox, J. The Magic Garden Explained: The Internals of UNIX SVR4. Prentice Hall, Englewood Cliffs, New Jersey, 1994.
36. Goralski, W. The Illustrated Network: How TCP/IP Works in a Modern Network. Morgan Kaufmann, Burlington, Massachusetts, 2009.
37. Gorman, M. Understanding the Linux Virtual Memory Manager. Prentice Hall, Upper Saddle River, New Jersey, 2004. http://www.phptr.com/perens.
38. Grünbacher, A. “POSIX Access Control Lists on Linux // Proceedings of USENIX 2003/Freenix Track, pages 259–272. http://www.suse.de/~agruen/acl/linux-acls/online/.
39. Gutmann, P. Secure Deletion of Data from Magnetic and Solid-State Memory // Proceedings of the 6th USENIX Security Symposium, 1996. http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html.
40. Hallyn, S. POSIX file capabilities: Parceling the power of root, 2007. http://www.ibm.com/developerworks/library/l-posixcap.html.
41. Harbison, S., Steele, G. C: A Reference Manual (5th edition). Prentice Hall, Englewood Cliffs, New Jersey, 2002.
42. Herbert, T.F. The Linux TCP/IP Stack: Networking for Embedded Systems. Charles River Media, Hingham, Massachusetts, 2004.
43. Hubika, J. Porting GCC to the AMD64 Architecture // Proceedings of the First Annual GCC Developers’ Summit, 2003. http://www.ucw.cz/~hubicka/papers/amd64/index.html.
44. Johnson, M.K., Troan, E.W. Linux Application Development (2nd edition). Addison-Wesley, Reading, Massachusetts, 2005.