Computing Handbook, 3rd Edition: Computer Science and Software Engineering

Computing Handbook, 3rd Edition: Computer Science and Software Engineering

(1 reviews, 751 downloads)
, 2014-05-07, 2326 pages, pdf, epub
Computing Handbook, Third Edition: Computer Science and Software Engineering mirrors the modern taxonomy of computer science and software engineering as described by the Association for Computing Machinery (ACM) and the IEEE Computer Society (IEEE-CS). Written by established leading experts and…
Principles Of Modern Operating Systems, 2nd Edition

Principles Of Modern Operating Systems, 2nd Edition

(8 reviews, 783 downloads)
, 2011-09-26, 564 pages, pdf, epub
This revised and updated Second Edition presents a practical introduction to operating systems and illustrates these principles through a hands-on approach using accompanying simulation models developed in Java and C++. This text is appropriate for upper-level undergraduate courses in computer…
Implementing Samba 4

Implementing Samba 4

(1 reviews, 708 downloads)
, 2014-03-24, 284 pages, pdf, epub
Exploit the real power of Samba 4 Server by leveraging the benefits of an Active Directory Domain Controller Overview Understand the different roles that Samba 4 Server can play on the network Implement Samba 4 as an Active Directory Domain…
Microcontrollers: High-Performance Systems and Programming

Microcontrollers: High-Performance Systems and Programming

(1 reviews, 569 downloads)
, 2013-10-28, 701 pages, pdf, epub
Focusing on the line of high-performance microcontrollers offered by Microchip, Microcontrollers: High-Performance Systems and Programming discusses the practical factors that make the high-performance PIC series a better choice than their mid-range predecessors for most systems. However, one consideration in favor…
Penetration Testing: A Hands-On Introduction to Hacking

Penetration Testing: A Hands-On Introduction to Hacking

(1 reviews, 1454 downloads)
, 2014-06-08, 528 pages, pdf, epub
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the…