Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux System Programming: Talking Directly to the Kernel and C Library

Buy

Write software that draws directly on services offered by the Linux kernel and core system libraries. With this comprehensive book, Linux kernel contributor Robert Love provides you with a tutorial on Linux system programming, a reference manual on Linux system calls, and an insider’s guide to writing smarter, faster code.

Love clearly distinguishes between POSIX standard functions and special services offered only by Linux. With a new chapter on multithreading, this updated and expanded edition provides an in-depth look at Linux from both a theoretical and applied perspective over a wide range of programming topics, including:

  • A Linux kernel, C library, and C compiler overview
  • Basic I/O operations, such as reading from and writing to files
  • Advanced I/O interfaces, memory mappings, and optimization techniques
  • The family of system calls for basic process management
  • Advanced process management, including real-time processes
  • Thread concepts, multithreaded programming, and Pthreads
  • File and directory management
  • Interfaces for allocating memory and optimizing memory access
  • Basic and advanced signal interfaces, and their role on the system
  • Clock management, including POSIX clocks and high-resolution timers
(HTML tags aren't allowed.)

All-Digital Frequency Synthesizer in Deep-Submicron CMOS
All-Digital Frequency Synthesizer in Deep-Submicron CMOS

Design flow and circuit techniques of contemporary transceivers for multigigahertz mobile radio-frequency (RF) wireless applications are typically quite analog intensive and utilize process technologies that are incompatible with a digital baseband (DBB) and application processor (AP). Nowadays, the DBB and AP designs constantly migrate to...

Fully Grown: Why a Stagnant Economy Is a Sign of Success
Fully Grown: Why a Stagnant Economy Is a Sign of Success
Most economists would agree that a thriving economy is synonymous with GDP growth. The more we produce and consume, the higher our living standard and the more resources available to the public. This means that our current era, in which growth has slowed substantially from its postwar highs, has raised alarm bells. But should it?...
Herrschaft - Staat - Mitbestimmung (German Edition)
Herrschaft - Staat - Mitbestimmung (German Edition)

Herrschaft - Staat - Mitbestimmung? ist eine theoretische und empirische Auseinandersetzung mit der Frage, was den modernen demokratischen Staat im Allgemeinen und die Bundesrepublik Deutschland in ihrer aktuellen Verfassung im Besonderen auszeichnet. Die These ist, dass sich moderne demokratische Staaten in einem Spannungsverhältnis von...


Software Process and Product Measurement: International Conference, IWSMMENSURA 2007, Palma de Mallorca, Spain, November 5-8, 2007, Revised Papers
Software Process and Product Measurement: International Conference, IWSMMENSURA 2007, Palma de Mallorca, Spain, November 5-8, 2007, Revised Papers
This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Software Measurement, IWSM-Mensura 2007, held in Palma de Mallorca, Spain, in November 2007.

The 16 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers deal with aspects of software measurement...

The Origins of Language: Unraveling Evolutionary Forces
The Origins of Language: Unraveling Evolutionary Forces
Developments in cognitive science indicate that human and nonhuman primates share a range of behavioral and physiological characteristics that speak to the issue of language origins. This volume has three major themes, woven throughout the chapters. First, it is argued that scientists in animal behavior and anthropology need to move beyond...
Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy