You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Written by the co-managers of the Kermit Project, this is a revised and updated tutorial on data communications, with new material on today's high-speed modems and how to make the best use of them
Linux® is being adopted by an increasing number of embedded systems developers, who have been won over by its sophisticated scheduling and networking, its cost-free license, its open development model, and the support offered by rich and powerful programming tools. While there is a great deal of hype surrounding the use of Linux in embedded systems, there is not a lot of practical information. Building Embedded Linux Systems is the first in-depth, hard-core guide to putting together an embedded system based on the Linux kernel. This indispensable book features arcane and previously undocumented procedures for: Building your own GNU development toolchain Using an efficient embedded developme...
This authoritative, all-in-one introduction, manual, and complete reference shows readers - at all levels of technical expertise - how to use Kermit to transfer diverse data between different computer systems and data communications environments. Using tutorials, case studies, and examples of actual Kermit codes, it provides instructions for basic use and a detailed description of the Kermit protocols: * File management through protocols * Command referencing and extended features * Telecommunications protocols
With 1992: Includes electronic journals, electronic newsletters, Hypercard stacks, digest-newsletters, and academic discussion lists and interest groups.
The classic and authoritative reference in the field of computer security, now completely updated and revised With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them. With seventy-seven chapters contributed by a panel of renowned industry professionals, the new edition has increased coverage i...
"Computer Security Handbook" - Jetzt erscheint der Klassiker in der 4. aktualisierten Auflage. Es ist das umfassendste Buch zum Thema Computersicherheit, das derzeit auf dem Markt ist. In 23 Kapiteln und 29 Anhängen werden alle Aspekte der Computersicherheit ausführlich behandelt. Die einzelnen Kapitel wurden jeweils von renommierten Experten der Branche verfasst. Übersichtlich aufgebaut, verständlich und anschaulich geschrieben. Das "Computer Security Handbook" wird in Fachkreisen bereits als DAS Nachschlagewerk zu Sicherheitsfragen gehandelt.
To configure and maintain an operating system is serious business. With UNIX and its wide variety of "flavors," it can be especially difficult and frustrating, and networking with UNIX adds still more challenges. UNIX Administration: A Comprehensive Sourcebook for Effective Systems & Network Management is a one-stop handbook
Computing and communications in colleges and universities.