Uninformed: Informative Information for the Uninformed

Vol 4» 2006.Jun


Bibliography

1
CMU. The Mach Project.

http://www.cs.cmu.edu/afs/cs/project/mach/public/www/mach.html

2
Apple. Apple Security Overview.

http://developer.apple.com/documentation/Security/Conceptual/Security_Overview/Concepts/chapter_3_section_9.html

3
Mach. Mach Man-pages.

http://felinemenace.org/~nemo/mach/manpages

4
Rentzsch. Mach Inject.

http://rentzsch.com/mach_inject/

5
Guiheneuf. Mach Inject.

http://guiheneuf.org/Site/mach

6
Richard P. Draves/Michael B. Jones and Mary R. Thompson. Mach Interface Generator.

http://felinemenace.org/~nemo/mach/mig.txt

7
Richard P. Draves. MIG Slides.

http://felinemenace.org/ nemo/mach/Slides

8
Wikipedia. Mach Kernel.

http://en.wikipedia.org/wiki/Mach_kernel

9
Feline Menace. The Mach System.

http://felinemenace.org/~nemo/mach/Mach.txt

10
OSX Code. Mach.

http://www.osxcode.com/index.php?pagename=Articles&article=10

11
CMU. A Programmer's Guide to the Mach System Calls.

http://www.cs.cmu.edu/afs/cs/project/mach/public/www/doc/abstracts/machsys.html

12
CMU. A Programmer's Guide to the Mach User Environment.

http://www.cs.cmu.edu/afs/cs/project/mach/public/www/doc/abstracts/machuse.html