Books: Difference between revisions

1,200 bytes added ,  12 years ago
no edit summary
[unchecked revision][unchecked revision]
No edit summary
No edit summary
Line 98:
|description=''Computer Networks, 5/e'' is appropriate for Computer Networking or Introduction to Networking courses at both the undergraduate and graduate level in Computer Science, Electrical Engineering, CIS, MIS, and Business Departments.
 
Tanenbaum takes a structured approach to explaining how networks work from the inside out. He starts with an explanation of the physical layer of networking, computer hardware and transmission systems; then works his way up to network applications. Tanenbaum's in-depth application coverage includes email; the domain name system; the World Wide Web (both client- and server-side); and multimedia (including voice over IP, Internet radio video on demand, video conferencing, and streaming media. Each chapter follows a consistent approach: Tanenbaum presents key principles, then illustrates them utilizing real-world example networks that run through the entire book—thebook—the Internet, and wireless networks, including Wireless LANs, broadband wireless and Bluetooth. The Fifth Edition includes a chapter devoted exclusively to network security. The textbook is supplemented by a Solutions Manual, as well as a Website containing PowerPoint slides, art in various forms, and other tools for instruction, including a protocol simulator whereby students can develop and test their own network protocols.
|review=}}
 
Line 168:
|title=Practical File System Design with the Be File System
|author=Dominic Giampaolo
|supp=[http://www.nobius.org/~dbg/ LinkFree book and code]
|description=This is the new guide to the design and implementation of file systems in general, and the Be File System (BFS) in particular. This book covers all topics related to file systems, going into considerable depth where traditional operating systems books often stop. Advanced topics are covered in detail such as journaling, attributes, indexing and query processing. Built from scratch as a modern 64 bit, journaled file system, BFS is the primary file system for the Be Operating System (BeOS), which was designed for high performance multimedia applications.
 
Line 194:
| valign="top" | '''Official Description:''' '''''Windows Internals, 6th edition''''' covers the internals of the core kernel components of the Windows 7 and Windows Server 2008 R2 operating systems. This classic book will help you:
 
* Understand how the core system and management mechanisms work—fromwork—from the object manager to services to the registry
* Explore internal system data structures using tools like the kernel debugger
* Grasp the scheduler’s priority and CPU placement algorithms
* Go inside the Windows security model to see how it authorizes access to data
* Understand how Windows manages physical and virtual memory
* Tour the Windows networking stack from top to bottom—includingbottom—including APIs, protocol drivers, and network adapter drivers
* Troubleshoot file-system access problems and system boot problems
* Learn how to analyze crashes
Line 250:
 
As we said in the first preface to the first edition, C "wears well as one's experience with it grows." With a decade more experience, we still feel that way. We hope that this book will help you to learn C and use it well.
|review=}}
 
{{Book|ISBN=0321563212|ASIN=0321563212
|title=The CERT C Secure Coding Standard
|author=Robert C. Seacord
|supp=[https://www.securecoding.cert.org/confluence/display/seccode/CERT+C+Secure+Coding+Standard Freely available]
|description=Software security has major implications for the operations and assets of organizations, as well as for the welfare of individuals. To create secure software, developers must know where the dangers lie. Secure programming in C can be more difficult than even many experienced programmers believe.
 
This book is an essential desktop reference documenting the first official release of '''''The CERT® C Secure Coding Standard'''''. The standard itemizes those coding errors that are the root causes of software vulnerabilities in C and prioritizes them by severity, likelihood of exploitation, and remediation costs. Each guideline provides examples of insecure code as well as secure, alternative implementations. If uniformly applied, these guidelines will eliminate the critical coding errors that lead to buffer overflows, format string vulnerabilities, integer overflow, and other common software vulnerabilities.
|review=}}
 
Line 263 ⟶ 272:
|title=Managing Projects with GNU Make, 3rd ed.
|author=Robert Mecklenburg
|supp=[http://shop.oreilly.com/product/9780596006105.do Free book, errata, and code], [http://oreilly.com/catalog/make3/errata/ more errata]
|description=The utility simply known as ''make'' is one of the most enduring features of both Unix and other operating systems. First invented in the 1970s, ''make'' still turns up to this day as the central engine in most programming projects; it even builds the Linux kernel. In the third edition of the classic ''Managing Projects with GNU make'', readers will learn why this utility continues to hold its top position in project build software, despite many younger competitors.
 
Anonymous user