Networking A Beginner's Guide, 6th Edition

Networking A Beginner’s Guide, 6th Edition

(1 reviews, 2343 downloads)
, 2013-09-24, 416 pages, pdf, epub
Current, essential IT networking skills–made easy! Thoroughly revised to cover the latest technologies, this practical resource provides you with a solid foundation in networking fundamentals. Networking: A Beginner’s Guide, Sixth Edition discusses wired and wireless network design, configuration, hardware, protocols,…
Modern Operating Systems, 4th Edition

Modern Operating Systems, 4th Edition

(2 reviews, 1608 downloads)
, 2014-03-20, 1136 pages, pdf, epub
Modern Operating Systems, Fourth Edition, is intended for introductory courses in Operating Systems in Computer Science, Computer Engineering, and Electrical Engineering programs. It also serves as a useful reference for OS professionals. The widely anticipated revision of this worldwide best-seller…
Seven Concurrency Models in Seven Weeks: When Threads Unravel

Seven Concurrency Models in Seven Weeks: When Threads Unravel

(10 reviews, 1441 downloads)
, 2014-07-10, 300 pages, pdf, epub
Your software needs to leverage multiple cores, handle thousands of users and terabytes of data, and continue working in the face of both hardware and software failure. Concurrency and parallelism are the keys, and Seven Concurrency Models in Seven Weeks…
Instant HTML5 2D Platformer

Instant HTML5 2D Platformer

(4 reviews, 646 downloads)
, 2013-08-26, 52 pages, pdf, epub
Learn how to develop a 2D HTML5 platformer that is capable of running in modern browsers Overview Learn something new in an Instant! A short, fast, focused guide delivering immediate results Learn about HTML5 2D game development and how to…
A Guide to Claims-Based Identity and Access Control, 2nd Edition

A Guide to Claims-Based Identity and Access Control, 2nd Edition

(2 reviews, 570 downloads)
, 2013-03-16, 410 pages, pdf, epub
As an application designer or developer, imagine a world where you don’t have to worry about authentication. Imagine instead that all requests to your application already include the information you need to make access control decisions and to personalize the…