UNIX Network Programming
* *Previous editions sold over 160,000 units! Second Edition (1998) sold over 53,000 in retail alone! *Updates coverage of programming standards, debugging techniques, and covers Operating Systems including Red Hat 9, Solaris 9, HP-UX, Free BSD 4.8/5.0, AIX 5.x, and Mac OS X. *Bill Fenner (AT/T Labs) and Andrew Rudoff (SUN) carry on the tradition of this great work.
TCP IP and related protocols
This new edition clearly explains all facets of TCP/IP and the many protocols that operate within these two standards. It's written for anyone either using or managing data communications systems and networks. Updated coverage includes resource records (RR) for DNS, discovery services, messaging in the Internet, and more.
Unix in a Nutshell
As an open operating system, Unix can be improved on by anyone and everyone: individuals, companies, universities, and more. As a result, the very nature of Unix has been altered over the years by numerous extensions formulated in an assortment of versions. Today, Unix encompasses everything from Sun's Solaris to Apple's Mac OS X and more varieties of Linux than you can easily name. The latest edition of this bestselling reference brings Unix into the 21st century. It's been reworked to keep current with the broader state of Unix in today's world and highlight the strengths of this operating system in all its various flavors. Detailing all Unix commands and options, the informative guide provides generous descriptions and examples that put those commands in context. Here are some of the new features you'll find in Unix in a Nutshell, Fourth Edition: Solaris 10, the latest version of the SVR4-based operating system, GNU/Linux, and Mac OS X Bash shell (along with the 1988 and 1993 versions of ksh) tsch shell (instead of the original Berkeley csh) Package management programs, used for program installation on popular GNU/Linux systems, Solaris and Mac OS X GNU Emacs Version 21 Introduction to source code management systems Concurrent versions system Subversion version control system GDB debugger As Unix has progressed, certain commands that were once critical have fallen into disuse. To that end, the book has also dropped material that is no longer relevant, keeping it taut and current. If you're a Unix user or programmer, you'll recognize the value of this complete, up-to-date Unix reference. With chapter overviews, specific examples, and detailed command.
Twelve Years a Slave
Solomon Northup was a free man, the son of an emancipated Negro Slave. Until the spring of 1841 he lived a simple, uneventful life with his wife and three children in Upstate New York. Then, suddenly, he fell victim to a series of bizarre events that make this one of the most amazing autobiographies ever written. Northup accepted an offer from two strangers in Saratoga, New York, to catch up with their traveling circus and play in its band. But when the chase ended, Northup had been drugged, beaten, and sold to a slave trader in Washington, D.C. Subsequently, he was shipped to New Orleans, where he was purchased by a planter in the Red River region of Louisiana. For the next twelve years Northup lived as a chattel slave under several masters. He might well have died a slave, except for another set of bizarre circumstances which enabled him to get word to his family and finally regain his freedom. These elements alone -- the kidnapping, enslavement, and rescue -- are sufficient for a sensational story. But Northup provides more. He was a shrewd observer of people and events. His memory was remarkable. He described cultivation of cotton and sugar in the Deep South. He detailed the daily routine and general life of the Negro slave. Indeed, he vividly portrayed the world of slavery -- from the underside. Originally published in 1853, Northup's autobiography is regarded as one of the best accounts of American Negro slavery ever written by a slave. It is reprinted in full here for the first time, as the initial volume in The Library of Southern Civilization. Northup's account has been carefully checked by the editors and has been found to be remarkably accurate. To his own narrative of a long and tragic adventure, Professors Eakin and Logsdon have added significant new details about Northup and the plantation country where he spent most of his time as a slave. Heretofore unknown information about the capture and trial of Northup's kidnappers has been included, adding still another fascinating episode to an already astounding story.
The UNIX Command Reference Guide
Describes the most useful UNIX commands and covers the System V UNIX system and the Berkeley UNIX system. In addition to listing the commands and definitions, the book includes examples that illustrate the use of the commands. Covers core commands, making it easier for the novice to distinguish between the essential and the extraneous. Summaries of several key subsystems -- vi, awk, sed, shells, text processing -- will make it easier for intermediate and advanced users to find important information.Includes synopses and examples as well as Editor Command charts for vi and ed texts, Command Syntax charts, and MS DOS to UNIX cross references.
Network Analysis Architecture and Design
Traditionally, networking has had little or no basis in analysis or architectural development, with designers relying on technologies they are most familiar with or being influenced by vendors or consultants. However, the landscape of networking has changed so that network services have now become one of the most important factors to the success of many third generation networks. It has become an important feature of the designer's job to define the problems that exist in his network, choose and analyze several optimization parameters during the analysis process, and then prioritize and evaluate these parameters in the architecture and design of the system. Network Analysis, Architecture, and Design, Third Edition, uses a systems methodology approach to teaching these concepts, which views the network (and the environment it impacts) as part of the larger system, looking at interactions and dependencies between the network and its users, applications, and devices. This approach matches the new business climate where customers drive the development of new services and the book discusses how networks can be architected and designed to provide many different types of services to customers. With a number of examples, analogies, instructor tips, and exercises, this book works through the processes of analysis, architecture, and design step by step, giving designers a solid resource for making good design decisions. With examples, guidelines, and general principles McCabe illuminates how a network begins as a concept, is built with addressing protocol, routing, and management, and harmonizes with the interconnected technology around it. Other topics covered in the book are learning to recognize problems in initial design, analyzing optimization parameters, and then prioritizing these parameters and incorporating them into the architecture and design of the system. This is an essential book for any professional that will be designing or working with a network on a routine basis. Substantially updated design content includes ad hoc networks, GMPLS, IPv6, and mobile networking Written by an expert in the field that has designed several large-scale networks for government agencies, universities, and corporations Incorporates real-life ideas and experiences of many expert designers along with case studies and end-of-chapter exercises
An Engineering Approach to Computer Networking
Taking a unique "engineering" approach that will help readers gain a grasp of not just how but also why networks work the way they do, this book includes the very latest network technology--including the first practical treatment of Asynchronous Transfer Mode (ATM). The CD-ROM contains an invaluable network simulator.
Hacking Electronics An Illustrated DIY Guide for Makers and Hobbyists
Bring your electronic inventions to life! "This full-color book is impressive...there are some really fun projects!" -GeekDad, Wired.com Who needs an electrical engineering degree? This intuitive guide shows how to wire, disassemble, tweak, and re-purpose everyday devices quickly and easily. Packed with full-color illustrations, photos, and diagrams, Hacking Electronics teaches by doing--each topic features fun, easy-to-follow projects. Discover how to hack sensors, accelerometers, remote controllers, ultrasonic rangefinders, motors, stereo equipment, microphones, and FM transmitters. The final chapter contains useful information on getting the most out of cheap or free bench and software tools. Safely solder, join wires, and connect switches Identify components and read schematic diagrams Understand the how and why of electronics theory Work with transistors, LEDs, and laser diode modules Power your devices with a/c supplies, batteries, or solar panels Get up and running on Arduino boards and pre-made modules Use sensors to detect everything from noxious gas to acceleration Build and modify audio amps, microphones, and transmitters Fix gadgets and scavenge useful parts from dead equipment
TCP IP Illustrated
A major revision of the classic TCP/IP bestseller that has sold more than 162,000 units! * *W. Richard Stevens' legendary TCP/IP guide, now updated by top network protocol developer and instructor Kevin Fall. *Shows how each protocol actually operates, and explains why they work that way. *New coverage includes RPC, access control, authentication, privacy, NFS, SMB/CIFS, DHCP, NAT, firewalls, email, Web, web services, wireless, wireless security, and much more More than 162,000 networking professionals have relied on W. Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP bestseller has been thoroughly updated to reflect a new generation of TCP/IPbased networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: * *Remote procedure call. *Identity management (access control / authentication). *Network and transport layer security (authentication / privacy). *File access protocols, including NFS and SMB/CIFS. *Host initialization and DHCP. *NAT and firewalls. *E-mail. *Web and web services. *Wireless and wireless security. *New tools, including Ethereal, nmap and netcat
Mastering Cloud Computing
Mastering Cloud Computing is designed for undergraduate students learning to develop cloud computing applications. Tomorrow's applications won’t live on a single computer but will be deployed from and reside on a virtual server, accessible anywhere, any time. Tomorrow's application developers need to understand the requirements of building apps for these virtual systems, including concurrent programming, high-performance computing, and data-intensive systems. The book introduces the principles of distributed and parallel computing underlying cloud architectures and specifically focuses on virtualization, thread programming, task programming, and map-reduce programming. There are examples demonstrating all of these and more, with exercises and labs throughout. Explains how to make design choices and tradeoffs to consider when building applications to run in a virtual cloud environment Real-world case studies include scientific, business, and energy-efficiency considerations