... E. Comer and David Stevens, Internetworking with TCP/IP, Vol. III: Client-Server Programming and Applications, Linux/Posix Sockets Version, Prentice Hall, 2001.2. Stevens, Unix Network Programming, ... Mount, Bioinformatics, Cold Spring Harbor Laboratory Press, 2000.2. Jason Wang, Data Mining in Bioinformatics, Springer-Verlag, 2005.3. Joseph Felsenstein, Inferring phylogenetics, Sinauer Associates, ... Cryptography Theory and Practice. 2nd ed. Chapman & Hall/CRC, 2002. 3. Danley Harrisson. An Introduction to Steganopraphy, 2002. 4. Bishop, M. Computer Security: Art and Science. Boston, MA,...