Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Systems Programming: Designing and Developing Distributed Applications

Buy

Systems Programming: Designing and Developing Distributed Applications explains how the development of distributed applications depends on a foundational understanding of the relationship among operating systems, networking, distributed systems, and programming. Uniquely organized around four viewpoints (process, communication, resource, and architecture), the fundamental and essential characteristics of distributed systems are explored in ways which cut across the various traditional subject area boundaries. The structures, configurations and behaviours of distributed systems are all examined, allowing readers to explore concepts from different perspectives, and to understand systems in depth, both from the component level and holistically.

  • Explains key ideas from the ground up, in a self-contained style, with material carefully sequenced to make it easy to absorb and follow.
  • Features a detailed case study that is designed to serve as a common point of reference and to provide continuity across the different technical chapters.
  • Includes a ‘putting it all together’ chapter that looks at interesting distributed systems applications across their entire life-cycle from requirements analysis and design specifications to fully working applications with full source code.
  • Ancillary materials include problems and solutions, programming exercises, simulation experiments, and a wide range of fully working sample applications with complete source code developed in C++, C# and Java.
  • Special editions of the author’s established ‘workbenches’ teaching and learning tools suite are included. These tools have been specifically designed to facilitate practical experimentation and simulation of complex and dynamic aspects of systems.
(HTML tags aren't allowed.)

Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel

Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James...

Introducing Regular Expressions
Introducing Regular Expressions
This book shows you how to write regular expressions through examples. Its goal is to make learning regular expressions as easy as possible. In fact, this book demonstrates nearly every concept it presents by way of example so you can easily imitate and try them yourself.

Regular expressions
...
OpenStack Cloud Security
OpenStack Cloud Security

Build a secure OpenStack cloud to withstand all common attacks

About This Book

  • Design, implement, and deliver a safe and sound OpenStack cluster using best practices
  • Create a production-ready environment and protect your data on the cloud
  • A step-by-step tutorial packed with...

UX for Beginners: A Crash Course in 100 Short Lessons
UX for Beginners: A Crash Course in 100 Short Lessons

Apps! Websites! Rubber Ducks! Naked Ninjas! This book has everything. If you want to get started in user experience design (UX), you've come to the right place: 100 self-contained lessons that cover the whole spectrum of fundamentals.

Forget dry, technical material. This book—based on the wildly popular UX...

Organise Yourself: Clear the Clutter; Take Charge of Your Time; Manage Information (Sunday Times Creating Success)
Organise Yourself: Clear the Clutter; Take Charge of Your Time; Manage Information (Sunday Times Creating Success)

Many people find it hard to get on top of their workload.  They constantly bounce from one task to another and struggle to prioritize, which can have a serious impact on productivity.

Organise Yourself helps readers develop effective organizational skills and dramatically improve the way they work. It...

TCP/IP: architecture, protocols, and implementation with IPv6 and IP security
TCP/IP: architecture, protocols, and implementation with IPv6 and IP security
TCP/IP by Sidnie Feit has sold over 20,000 copies in its previous two editions. We want to capitalize on their success with an updated paperback edition called "The Signature Edition." The Signature Series is reserved for our top selling communications authors that have established themselves as the authorities in computer communications....
©2017 LearnIT (support@pdfchm.net) - Privacy Policy