Operating System Concepts


Abraham Silberschatz - 1985
    By staying current, remaining relevant, and adapting to emerging course needs, this market-leading text has continued to define the operating systems course. This Seventh Edition not only presents the latest and most relevant systems, it also digs deeper to uncover those fundamental concepts that have remained constant throughout the evolution of today's operation systems. With this strong conceptual foundation in place, students can more easily understand the details related to specific systems. New Adaptations * Increased coverage of user perspective in Chapter 1. * Increased coverage of OS design throughout. * A new chapter on real-time and embedded systems (Chapter 19). * A new chapter on multimedia (Chapter 20). * Additional coverage of security and protection. * Additional coverage of distributed programming. * New exercises at the end of each chapter. * New programming exercises and projects at the end of each chapter. * New student-focused pedagogy and a new two-color design to enhance the learning process.

Practical UNIX & Internet Security


Simson Garfinkel - 1991
    Crammed with information about host security, it saved many a UNIX system administrator and user from disaster.This second edition is a complete rewrite of the original book. It's packed with twice the pages and offers even more practical information for UNIX users and administrators. It covers features of many types of UNIX systems, including SunOS, Solaris, BSDI, AIX, HP-UX, Digital UNIX, Linux, and others. The first edition was practical, entertaining, and full of useful scripts, tips, and warnings. This edition is all those things -- and more.If you are a UNIX system administrator or user in this security-conscious age, you need this book. It's a practical guide that spells out, in readable and entertaining language, the threats, the system vulnerabilities, and the countermeasures you can adopt to protect your UNIX system, network, and Internet connection. It's complete -- covering both host and network security -- and doesn't require that you be a programmer or a UNIX guru to use it.Practical UNIX & Internet Security describes the issues, approaches, and methods for implementing security measures. It covers UNIX basics, the details of security, the ways that intruders can get into your system, and the ways you can detect them, clean up after them, and even prosecute them if they do get in. Filled with practical scripts, tricks, and warnings, Practical UNIX & Internet Security tells you everything you need to know to make your UNIX system as secure as it possible can be.Contents include:Part I: Computer Security Basics. Introduction and security policies. Part II: User Responsibilities. Users and their passwords, groups, the superuser, the UNIX filesystem, and cryptography. Part III: System Administrator Responsibilities. Backups, defending accounts, integrity checking, log files, programmed threats, physical security, and personnel security. Part IV: Network and Internet Security: telephone security, UUCP, TCP/IP networks, TCP/IP services, WWW, RPC, NIS, NIS+, Kerberos, and NFS. Part V: Advanced Topics: firewalls, wrappers, proxies, and secure programming. Part VI: Handling Security Incidents: discovering a breakin, U.S. law, and trust. VII: Appendixes. UNIX system security checklist, important files, UNIX processes, paper and electronic sources, security organizations, and table of IP services.

Overdrive: Bill Gates and the Race to Control Cyberspace


James Wallace - 1997
    James Wallace brings readers up to date on the Gates saga to 1997 and reveals the inside story of the struggle to keep Microsoft on top in the World Wide Web game.

HTML Pocket Reference


Jennifer Niederst Robbins - 1999
    In this pocket reference, Jennifer Niederst, the author of the best-selling Web Design in a Nutshell, delivers a concise guide to every HTML tag.Each tag entry includes:Detailed information on the tag's attributes Support information on browsers such as Netscape Navigator, Microsoft Internet Explorer, Opera, and WebTV HTML 4.0 support information, including whether the tag is deprecated in the current spec In addition to tag-by-tag descriptions, you'll find useful charts on such topics as:Character entities Decimal-to-hexadecimal conversions Color names Niederst also provides context for the tags, indicating which tags are grouped together and bare-bones examples of how standard web page elements are constructed.This pocket reference is targeted at web designers and web authors and is likely to be the most dog-eared book on every web professional's desk.

Dynamic HTML: The Definitive Reference: The Definitive Reference


Danny Goodman - 1998
    You need to stay current on the relevant Web specifications, like HTML, CSS, DOM, and ECMAScript. You also need to know how the latest Web browsers from Netscape and Microsoft actually implement these standards, since browser implementations of the standards are less than perfect. Right now, you're forced to keep multiple reference books open on your desk (or multiple browser windows open on your screen), just to develop a simple dynamic Web page that works properly under both Navigator and Internet Explorer.Dynamic HTML: The Definitive Reference changes all that. This book is an indispensable compendium for Web content developers. It contains everything you need to create functional cross-platform Web applications, including:A complete reference for all of the HTML tags, CSS style attributes, browser document objects, and JavaScript objects supported by the various standards and the latest versions of Navigator and Internet Explorer. Browser compatibility is emphasized throughout; the reference pages clearly indicate browser support for every entity. Handy cross-reference indexes that make it easy to find interrelated HTML tags, style attributes, and document objects. An advanced introduction to creating dynamic Web content that addresses the cross-platform compromises inherent in Web page design today. If you have some experience with basic Web page creation, but are new to the world of dynamic content, Dynamic HTML: The Definitive Reference will jump-start your development efforts. If you are an experienced Web programmer, you'll find the browser-compatibility information invaluable. This book is the only DHTML reference that a Web developer needs.Dynamic HTML: The Definitive Reference is designed to work in conjunction with HTML: The Definitive Guide and JavaScript: The Definitive Guide. HTML: The Definitive Guide teaches you about every element of HTML in detail, with explanations of how each element works and how it interacts with other elements, as well as numerous examples. JavaScript: The Definitive Guide provides a thorough description of the JavaScript language, complete with sophisticated examples that show you how to handle common Web application tasks. Together, these three books provide a complete library for Web content developers.

Programming Arduino Next Steps: Going Further with Sketches


Simon Monk - 2013
    Featuring coverage of the Arduino Uno, Leonardo, and Due boards, Programming Arduino Next Steps: Going Further with Sketches shows you how to use interrupts, manage memory, program for the Internet, maximize serial communications, perform digital signal processing, and much more. All of the 75+ example sketches featured in the book are available for download.Learn advanced Arduino programming techniques, including how to:Use hardware and timer interruptsBoost performance and speed by writing time-efficient sketchesMinimize power consumption and memory usageInterface with different types of serial busses, including I2C, 1-Wire, SPI, and TTL SerialUse Arduino with USB, including the keyboard and mouse emulation features of the Leonardo and Due boardsProgram Arduino for the InternetPerform digital signal processingAccomplish more than one task at a time--without multi-threadingCreate and release your own code library

Metasploit: The Penetration Tester's Guide


David Kennedy - 2011
    But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.

Programming the World Wide Web


Robert W. Sebesta - 2001
    'Programming The World Wide Web', written by bestselling author, Robert Sebesta, provides a comprehensive introduction to the programming tools and skills required for building and maintaining server sites on the Web.

The Sarah Roberts Series Vol. 1-3


Jonas Saul - 2011
    Prophecies. Dark Visions. Future events with dire consequences only she can avert.Sarah is an Automatic Writer who suffers from a rare obsessive-compulsive disorder called trichotillomania. She has dealt with kidnappings before, so when she receives a message that details a kidnapping, when it is to take place, and what she can do to stop it, she's ready. But things go wrong fast when the kidnappers recognize her from a previous intervention on her part. People are killed. Witnesses place Sarah at the scene. The police find her notebook riddled with prophecies of accidents and crimes from her automatic writing episodes and they want answers.Sarah is in a fight for her life with no one to trust. Her Dark Visions have brought her into the hands of a kidnapping ring who will do anything to find out how she knows so much about them.While the police hunt Sarah for the wrong reasons, her parents think she is at a sleepover. Her life is in her own hands and whether she makes it out of this mess alive or not depends on how many people have to die.The Warning (Sarah Roberts Book Two)At the end of Dark Visions (Sarah Roberts Book One), Sarah had spent the last four years saving people and averting serious accidents using the messages she receives from the dead.In The Warning, Sarah has learned the whereabouts of her sister's murderer. It is time to exact justice for the gruesome murder of Vivian Roberts, whose killer has never been found. When Sarah receives the warning, a message that tells her to stand down and let it go, she refuses. Against sound advice, Sarah enters a heavily guarded compound where the odds are stacked against her.In The Warning, Sarah Roberts becomes the hunted rather than the hunter.How many people have to die to catch one murderer? Sarah must face the reality that has become her life as an Automatic Writer. The Warning begins as a flame, ignites to a fire and explodes in an inferno of violence over a girl who receives messages from the dead to help the living.The Crypt (Sarah Roberts Book Three)Sarah Roberts is in Budapest searching for a weapon. During her time there, she notices a strange man wearing a fedora following her. Before she can find out who he is, she gets arrested. After her release from the Hungarian jail, she is ordered out of the country.The man in the fedora shows up at her Budapest hotel before she has a chance to leave for the airport. He is from a psychic research organization and he wants to take her back to the States with him to further understand her automatic writing abilities. When Sarah refuses to go, she is informed that she does not have a choice because she is now property of the United States government.While Sarah remains in Hungary after her deadline and then travels to Italy in a struggle to locate Armond Stuart, she has to keep the fedora-wearing American and his ten-man team off her back. The only way to escape their reach is to fake her own death. Convinced that is her only option, Sarah concocts a plan that will deal with Armond and have herself killed in the process.

Hacking Exposed Wireless: Wireless Security Secrets & Solutions


Johnny Cache - 2007
    Providing tactical wireless security implementation coverage by showing how to execute the attacks and implement the defenses, this title demonstrates how attackers identify and exploit wireless network weaknesses and covers various wireless technologies - WiFi/802.11, Bluetooth, IRDA, 3G Wireless, and more.

Linux Network Administrator's Guide


Tony Bautts - 1994
    Along with some hardware considerations, this highly acclaimed guide takes an in-depth look at all of the essential networking software that comes with the operating system--including basic infrastructure (TCP/IP, wireless networking, firewalling) and the most popular services on Linux systems.But as the follow-up to a classic, the third edition of the Linux Network Administrator's Guide does more than just spruce up the basics. It also provides the very latest information on the following cutting-edge services:Wireless hubsOpenLDAPFreeS/WANIMAPSpam filteringOpenSSHBINDIPv6Featuring a litany of insider tips and techniques, the Linux Network Administrator's Guide, Third Edition is an invaluable companion for any network administrator interested in integrating Linux into their Windows environmentAuthored by Terry Dawson, Tony Bautts, and Gregor N. Purdy, the Linux Network Administrator's Guide, Third Edition emerged from the Linux Documentation Project (LDP). The LDP's goal is to centralize all of the issues of Linux documentation, ranging from online documentation topics such as installing, using, and running Linux.

C# 4.0 in a Nutshell


Joseph Albahari - 2010
    It is a book I recommend." --Scott Guthrie, Corporate Vice President, .NET Developer Platform, Microsoft Corporation "A must-read for a concise but thorough examination of the parallel programming features in the .NET Framework 4." --Stephen Toub, Parallel Computing Platform Program Manager, Microsoft "This wonderful book is a great reference for developers of all levels." -- Chris Burrows, C# Compiler Team, Microsoft When you have questions about how to use C# 4.0 or the .NET CLR, this highly acclaimed bestseller has precisely the answers you need. Uniquely organized around concepts and use cases, this fourth edition includes in-depth coverage of new C# topics such as parallel programming, code contracts, dynamic programming, security, and COM interoperability. You'll also find updated information on LINQ, including examples that work with both LINQ to SQL and Entity Framework. This book has all the essential details to keep you on track with C# 4.0. Get up to speed on C# language basics, including syntax, types, and variables Explore advanced topics such as unsafe code and preprocessor directives Learn C# 4.0 features such as dynamic binding, type parameter variance, and optional and named parameters Work with .NET 4's rich set of features for parallel programming, code contracts, and the code security model Learn .NET topics, including XML, collections, I/O and networking, memory management, reflection, attributes, security, and native interoperability

Hacking Exposed: Network Security Secrets and Solutions


Joel Scambray - 2000
    This text provides network administrators with a reference for implementing and maintaining sound security policies

Artificial Intelligence for Humans, Volume 1: Fundamental Algorithms


Jeff Heaton - 2013
    This book teaches basic Artificial Intelligence algorithms such as dimensionality, distance metrics, clustering, error calculation, hill climbing, Nelder Mead, and linear regression. These are not just foundational algorithms for the rest of the series, but are very useful in their own right. The book explains all algorithms using actual numeric calculations that you can perform yourself. Artificial Intelligence for Humans is a book series meant to teach AI to those without an extensive mathematical background. The reader needs only a knowledge of basic college algebra or computer programming—anything more complicated than that is thoroughly explained. Every chapter also includes a programming example. Examples are currently provided in Java, C#, R, Python and C. Other languages planned.

ggplot2: Elegant Graphics for Data Analysis


Hadley Wickham - 2009
    1 Welcome to ggplot2 ggplot2 is an R package for producing statistical, or data, graphics, but it is unlike most other graphics packages because it has a deep underlying grammar. This grammar, based on the Grammar of Graphics (Wilkinson, 2005), is composed of a set of independent components that can be composed in many di?erent ways. This makesggplot2 very powerful, because you are not limited to a set of pre-speci?ed graphics, but you can create new graphics that are precisely tailored for your problem. This may sound overwhelming, but because there is a simple set of core principles and very few special cases, ggplot2 is also easy to learn (although it may take a little time to forget your preconceptions from other graphics tools). Practically, ggplot2 provides beautiful, hassle-free plots, that take care of ?ddly details like drawing legends. The plots can be built up iteratively and edited later. A carefully chosen set of defaults means that most of the time you can produce a publication-quality graphic in seconds, but if you do have special formatting requirements, a comprehensive theming system makes it easy to do what you want. Instead of spending time making your graph look pretty, you can focus on creating a graph that best reveals the messages in your data