The Black List

Peter Norton Programmer's Guide to the IBM PC

Introduction to Algorithms, Thomas H. Kormen.

Reference Encyclopedia for the IBM Personal Computer

Undocumented DOS, Second Edition, Andrew Shulman

The Undocumented PC, Second Edition, Frank van Gilluwe

Red Dragon Book

NCSC-TG-005: Trusted Network Interpretation

NCSC-TG-003: Discretionary Access Control in Trusted Systems

The Design and Implementation of the 4.3 BSD UNIX Operating System

C Programming in a Unix Environment, Judy Kay

Advanced Programming in a Unix Environment, Stevens

Unix Network Programming, Stevens

Code Complete, 2nd Edition, Microsoft Press

Software Estimation, Microsoft Press