-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathzotero_library.json
14 lines (14 loc) · 5.82 KB
/
zotero_library.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
[
{"id":"cachinIntroductionReliableSecure2011","accessed":{"date-parts":[[2023,1,19]]},"author":[{"family":"Cachin","given":"Christian"},{"family":"Guerraoui","given":"Rachid"},{"family":"Rodrigues","given":"Luís"}],"citation-key":"cachinIntroductionReliableSecure2011","DOI":"10.1007/978-3-642-15260-3","event-place":"Berlin, Heidelberg","ISBN":"978-3-642-15259-7 978-3-642-15260-3","issued":{"date-parts":[[2011]]},"language":"en","publisher":"Springer Berlin Heidelberg","publisher-place":"Berlin, Heidelberg","source":"DOI.org (Crossref)","title":"Introduction to Reliable and Secure Distributed Programming","type":"book","URL":"http://link.springer.com/10.1007/978-3-642-15260-3"},
{"id":"cachinIntroductionReliableSecure2011a","accessed":{"date-parts":[[2023,1,19]]},"author":[{"family":"Cachin","given":"Christian"},{"family":"Guerraoui","given":"Rachid"},{"family":"Rodrigues","given":"Luís"}],"citation-key":"cachinIntroductionReliableSecure2011a","DOI":"10.1007/978-3-642-15260-3","event-place":"Berlin, Heidelberg","ISBN":"978-3-642-15259-7 978-3-642-15260-3","issued":{"date-parts":[[2011]]},"language":"en","publisher":"Springer Berlin Heidelberg","publisher-place":"Berlin, Heidelberg","source":"DOI.org (Crossref)","title":"Introduction to Reliable and Secure Distributed Programming","type":"book","URL":"http://link.springer.com/10.1007/978-3-642-15260-3"},
{"id":"cormenIntroductionAlgorithms2009","call-number":"QA76.6 .C662 2009","citation-key":"cormenIntroductionAlgorithms2009","edition":"3rd ed","editor":[{"family":"Cormen","given":"Thomas H."}],"event-place":"Cambridge, Mass","ISBN":"978-0-262-03384-8 978-0-262-53305-8","issued":{"date-parts":[[2009]]},"language":"en","note":"OCLC: ocn311310321","number-of-pages":"1292","publisher":"MIT Press","publisher-place":"Cambridge, Mass","source":"Library of Congress ISBN","title":"Introduction to algorithms","type":"book"},
{"id":"downeyLittleBookSemaphores","author":[{"family":"Downey","given":"Allen B"}],"citation-key":"downeyLittleBookSemaphores","language":"en","source":"Zotero","title":"The Little Book of Semaphores","type":"article-journal"},
{"id":"garcia-molinaDatabaseSystemsComplete2002","author":[{"family":"Garcia-Molina","given":"Hector"},{"family":"Ullman","given":"Jeffrey D."},{"family":"Widom","given":"Jennifer"}],"call-number":"QA76.9.D3 G3653 2002","citation-key":"garcia-molinaDatabaseSystemsComplete2002","event-place":"Upper Saddle River, NJ","ISBN":"978-0-13-031995-1","issued":{"date-parts":[[2002]]},"number-of-pages":"1119","publisher":"Prentice Hall","publisher-place":"Upper Saddle River, NJ","source":"Library of Congress ISBN","title":"Database systems: the complete book","title-short":"Database systems","type":"book"},
{"id":"helmHeadFirstDesign","author":[{"family":"Helm","given":"Richard"}],"citation-key":"helmHeadFirstDesign","language":"en","page":"867","source":"Zotero","title":"Head First: Design Patterns","type":"article-journal"},
{"id":"kuroseComputerNetworkingTopdown2017a","author":[{"family":"Kurose","given":"James F."},{"family":"Ross","given":"Keith W."}],"call-number":"TK5105.875.I57 K88 2017","citation-key":"kuroseComputerNetworkingTopdown2017a","edition":"Seventh edition","event-place":"Boston","ISBN":"978-0-13-359414-0","issued":{"date-parts":[[2017]]},"language":"en","number-of-pages":"824","publisher":"Pearson","publisher-place":"Boston","source":"Library of Congress ISBN","title":"Computer networking: a top-down approach","title-short":"Computer networking","type":"book"},
{"id":"martinCleanCodeHandbook2009","call-number":"QA76.76.D47 C583 2009","citation-key":"martinCleanCodeHandbook2009","editor":[{"family":"Martin","given":"Robert C."}],"event-place":"Upper Saddle River, NJ","ISBN":"978-0-13-235088-4","issued":{"date-parts":[[2009]]},"language":"en","number-of-pages":"431","publisher":"Prentice Hall","publisher-place":"Upper Saddle River, NJ","source":"Library of Congress ISBN","title":"Clean code: a handbook of agile software craftsmanship","title-short":"Clean code","type":"book"},
{"id":"mcdowell189ProgrammingQuestions","author":[{"family":"Mcdowell","given":"Gayle Laakmann"}],"citation-key":"mcdowell189ProgrammingQuestions","language":"en","page":"708","source":"Zotero","title":"189 Programming Questions and Solutions","type":"article-journal"},
{"id":"schwartzHighPerformanceMySQL2012","author":[{"family":"Schwartz","given":"Baron"},{"family":"Zaitsev","given":"Peter"},{"family":"Tkachenko","given":"Vadim"}],"call-number":"QA76.73.S67 Z39 2012","citation-key":"schwartzHighPerformanceMySQL2012","edition":"3rd ed","event-place":"Beijing ; Cambridge [Mass.]","ISBN":"978-1-4493-1428-6","issued":{"date-parts":[[2012]]},"language":"en","note":"OCLC: ocn769546527","number-of-pages":"793","publisher":"O'Reilly","publisher-place":"Beijing ; Cambridge [Mass.]","source":"Library of Congress ISBN","title":"High performance MySQL","type":"book"},
{"id":"silberschatzOperatingSystemConcepts","author":[{"family":"Silberschatz","given":"Abraham"},{"family":"Galvin","given":"Peter Baer"},{"family":"Gagne","given":"Greg"}],"citation-key":"silberschatzOperatingSystemConcepts","page":"1278","source":"Zotero","title":"Operating System Concepts","type":"article-journal"},
{"id":"wengrowCommonsenseGuideData2017","author":[{"family":"Wengrow","given":"Jay"}],"call-number":"QA76.9.D35 W46 2017","citation-key":"wengrowCommonsenseGuideData2017","collection-title":"The pragmatic programmers","event-place":"Raleigh, North Carolina","ISBN":"978-1-68050-244-2","issued":{"date-parts":[[2017]]},"language":"en","note":"OCLC: ocn982651040","number-of-pages":"198","publisher":"Pragmatic Bookshelf","publisher-place":"Raleigh, North Carolina","source":"Library of Congress ISBN","title":"A common-sense guide to data structures and algorithms: level up your core programming skills","title-short":"A common-sense guide to data structures and algorithms","type":"book"}
]