A Practical Guide to UNIX System V Release 4
This bestselling work has been revised and updated to reflect the newest release of UNIX System V, Release 4.0. Expanded coverage includes networking, variables, control structures, signal handling, and other aspects of programming using the Bourne Shell. Two chapters on word processing contain "vi", the "nroff" text formatter, and "mm" macros.
The Art of UNIX Programming
The Art of UNIX Programming poses the belief that understanding the unwritten UNIX engineering tradition and mastering its design patterns will help programmers of all stripes to become better programmers. This book attempts to capture the engineering wisdom and design philosophy of the UNIX, Linux, and Open Source software development community as it has evolved over the past three decades, and as it is applied today by the most experienced programmers. Eric Raymond offers the next generation of "hackers" the unique opportunity to learn the connection between UNIX philosophy and practice through careful case studies of the very best UNIX/Linux programs.
The Future of Ideas
The Internet revolution has come. Some say it has gone. In The Future of Ideas, Lawrence Lessig explains how the revolution has produced a counterrevolution of potentially devastating power and effect. Creativity once flourished because the Net protected a commons on which widest range of innovators could experiment. But now, manipulating the law for their own purposes, corporations have established themselves as virtual gatekeepers of the Net while Congress, in the pockets of media magnates, has rewritten copyright and patent laws to stifle creativity and progress. Lessig weaves the history of technology and its relevant laws to make a lucid and accessible case to protect the sanctity of intellectual freedom. He shows how the door to a future of ideas is being shut just as technology is creating extraordinary possibilities that have implications for all of us. Vital, eloquent, judicious and forthright, The Future of Ideas is a call to arms that we can ill afford to ignore. From the Trade Paperback edition.
Hacking Exposed 7
The latest tactics for thwarting digital attacks “Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.” --Brett Wahlin, CSO, Sony Network Entertainment “Stop taking punches--let’s change the game; it’s time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries.” --Shawn Henry, former Executive Assistant Director, FBI Bolster your system’s security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker’s latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive “countermeasures cookbook.” Obstruct APTs and web-based meta-exploits Defend against UNIX-based root access and buffer overflow hacks Block SQL injection, spear phishing, and embedded-code attacks Detect and terminate rootkits, Trojans, bots, worms, and malware Lock down remote access using smartcards and hardware tokens Protect 802.11 WLANs with multilayered encryption and gateways Plug holes in VoIP, social networking, cloud, and Web 2.0 services Learn about the latest iPhone and Android attacks and how to protect yourself
The Architecture of Computer Hardware and System Software An Information Technology Approach 5th Edition
The Architecture of Computer Hardware and System Software provides the right amount of technical detail needed to succeed in the field. This accessible introduction provides the basic principles of computer system architecture and organization in the context of the current technological landscape. The author provides chapters on the fundamentals of networking as it relates to computer systems as well as all kinds of business systems, from entrepreneurial to small business, networked, distributed, and more. This valuable book provides IT professionals with several real-world case studies that clearly show how the concepts are applied in the field.
Security in Computing
This third edition of the all time classic computer security book provides an overview of all types of computer security from centralized systems to distributed networks. The book has been updated to make the most current information in the field available and accessible to today's professionals.
Programming in C for Engineering and Science
Developed from the author’s many years of teaching computing courses, Programming in C++ for Engineering and Science guides students in designing programs to solve real problems encountered in engineering and scientific applications. These problems include radioactive decay, pollution indexes, digital circuits, differential equations, Internet addresses, data analysis, simulation, quality control, electrical networks, data encryption, beam deflection, and many other areas. To make it easier for novices to develop programs, the author uses an object-centered design approach that helps students identify the objects in a problem and the operations needed; develop an algorithm for processing; implement the objects, operations, and algorithm in a program; and test, correct, and revise the program. He also revisits topics in greater detail as the text progresses. By the end of the book, students will have a solid understanding of how C++ can be used to process complex objects, including how classes can be built to model objects. Web Resource The book’s website at http://cs.calvin.edu/books/c++/engr-sci provides source code, expanded presentations, links to relevant sites, reference materials, lab exercises, and projects. For instructors, solutions to exercises and PowerPoint slides for classroom use are available upon qualifying course adoption.
Memory Management: Algorithms and Implementation in C/C++ describes how to construct production-quality memory managers. This approach includes both high-performance explicit memory managers and more intricate garbage collectors like those popularized by the Java Virtual Machine. Every implementation is complemented by an in-depth presentation of theory, benchmark tests, extensive source code examples, and a discussion of each implementation's trade-offs.
The Operating Systems Handbook
In today's multivendor client/server environments, it is essential that computer professionals know how to do their job across a variety of platforms and systems. This book will help readers who are experts using one of the five most popular mainframe and mid-range operating systems become skilled users of the other four. Includes concise tutorials, step-by-step examples and quick-reference material.
Hacking 2nd Edition
An introduction to hacking describes the techniques of computer hacking, covering such topics as stack-based overflows, format string exploits, network security, cryptographic attacks, and shellcode.