Book picks similar to
Unix Internals by Steve Pate
unix
ashleys-library
operating-systems
softwareeng
London Under London: A Subterranean Guide
Richard Trench - 1984
A new section covers: the pioneering deep level water main 80 kilometres in length, much longer even than the Channel Tunnel; new power tunnels and the enormous substation beneath Leicester Square; new underground railways; glass fibre communication; and much more. Clearly, metropolitan man is burrowing as actively as ever. The London we know and see is only the tip of the iceberg. Beneath the familiar surface lies an unknown city, a Hades of buried and forgotten rivers, sunken sewers, underground railways, pipes and passages, tubes and tunnels, crypts and cellars. These lifelines of the metropolis twist and turn hidden beneath the pavements of the city - fifteen hundred miles of Neo-Gothic sewers, a hundred miles of Neolithic rivers, eighty-two miles of tube tunnels, twelve miles of government tunnels and hundreds of thousands of miles of cables and pipes. Layer upon layer, they run their urgent errands, carrying people, delivering water, removing sewage, passing currents, sending messages, conveying parcels. Drawing extensively from the literature and visual archives of the underworld, London under London traces the history of the tunnellers and borers who have pierced the ground beneath the city for close on two thousand years. The authors trace the routes taken by man and nature, and enable us to follow them from the comfort of our armchairs. They can also tell us, gazetteer-style, exactly where we can get below and see the strange world which they depict, whom to ask for permission, and which of the public service authorities organizes trips underground.
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age
Steven Levy - 2001
From Stephen Levy—the author who made "hackers" a household word—comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction.
A Practical Guide to Linux Commands, Editors, and Shell Programming
Mark G. Sobell - 2005
The book is a complete revision of the commands section of Sobell's Practical Guide to Linux - a proven best-seller. The book is Linux distribution and release agnostic. It will appeal to users of ALL Linux distributions. Superior examples make this book the the best option on the market! System administrators, software developers, quality assurance engineers and others working on a Linux system need to work from the command line in order to be effective. Linux is famous for its huge number of command line utility programs, and the programs themselves are famous for their large numbers of options, switches, and configuration files. But the truth is that users will only use a limited (but still significant) number of these utilities on a recurring basis, and then only with a subset of the most important and useful options, switches and configuration files. This book cuts through all the noise and shows them which utilities are most useful, and which options most important. And it contains examples, lot's and lot's of examples. programmability. Utilities are designed, by default, to work wtih other utilities within shell programs as a way of automating system tasks. This book contains a superb introduction to Linux shell programming. And since shell programmers need to write their programs in text editors, this book covers the two most popular ones: vi and emacs.
CISSP Study Guide
Eric Conrad - 2010
The exam is designed to ensure that someone who is handling computer security in a company has a standardized body of knowledge. The book is composed of 10 domains of the Common Body of Knowledge. In each section, it defines each domain. It also provides tips on how to prepare for the exam and take the exam. It also contains CISSP practice quizzes to test ones knowledge. The first domain provides information about risk analysis and mitigation. It also discusses security governance. The second domain discusses different techniques for access control, which is the basis for all the security disciplines. The third domain explains the concepts behind cryptography, which is a secure way of communicating that is understood only by certain recipients. Domain 5 discusses security system design, which is fundamental for operating the system and software security components. Domain 6 is a critical domain in the Common Body of Knowledge, the Business Continuity Planning, and Disaster Recovery Planning. It is the final control against extreme events such as injury, loss of life, or failure of an organization. Domains 7, 8, and 9 discuss telecommunications and network security, application development security, and the operations domain, respectively. Domain 10 focuses on the major legal systems that provide a framework in determining the laws about information system.