The Art of Linux Kernel Design

The Art of Linux Kernel Design

(2 reviews, 766 downloads)
, 2014-04-01, 534 pages, pdf, epub
The Art of Linux Kernel Design: Illustrating the Operating System Design Principle and Implementation Uses the Running Operation as the Main Thread Difficulty in understanding an operating system (OS) lies not in the technical aspects, but in the complex relationships…
Beginning Fedora Desktop: Fedora 20 Edition

Beginning Fedora Desktop: Fedora 20 Edition

(1 reviews, 743 downloads)
, 2014-07-01, 504 pages, pdf, epub
Beginning Fedora Desktop: Fedora 20 Edition is a complete guide to using the Fedora 20 Desktop Linux release as your daily driver for multimedia, productivity, social networking, the GNOME 3 desktop, administrative tasks, and more. Author and Linux expert Richard…
Exam 70-687 Configuring Windows 8

Exam 70-687 Configuring Windows 8

(1 reviews, 553 downloads)
, 2013-08-05, 744 pages, pdf, epub
Microsoft Windows 8 is the newest version of the market-leading operating system, designed for use on home and business desktops, laptops, tablets, and home theater PCs. Windows 8 represents what Microsoft terms as “a reimaging of Windows”, with the most…
SAS and R: Data Management, Statistical Analysis, and Graphics, 2nd Edition

SAS and R: Data Management, Statistical Analysis, and Graphics, 2nd Edition

(2 reviews, 546 downloads)
, 2014-07-17, 468 pages, pdf, epub
An Up-to-Date, All-in-One Resource for Using SAS and R to Perform Frequent Tasks The first edition of this popular guide provided a path between SAS and R using an easy-to-understand, dictionary-like approach. Retaining the same accessible format, SAS and R:…
Malware and Computer Security Incidents: Handling Guides

Malware and Computer Security Incidents: Handling Guides

(1 reviews, 663 downloads)
, 2013-09-03, 161 pages, pdf, epub
Malware, also known as malicious code, refers to a program that is covertly inserted into another program with the intent to destroy data, run destructive or intrusive programs, or otherwise compromise the confidentiality, integrity, or availability of the victim’s data,…