You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Encouraging hands-on practice, Mastering Linux provides a comprehensive, up-to-date guide to Linux concepts, usage, and programming. Through a set of carefully selected topics and practical examples, the book imparts a sound understanding of operating system concepts and shows how to use Linux effectively.Ready-to-Use Examples Offer Immediate Acces
Paul Wang's JAVA WITH OBJECT-ORIENTED PROGRAMMING eases students into an understanding of the object-oriented paradigm from the very first page, just as he does in JAVA WITH OBJECT-ORIENTED PROGRAMMING WITH WORLDWIDE WEB APPLICATIONS, on which this new book is modeled. After the early chapters that present classes and Java features and constructs, Wang introduces new object-oriented concepts throughout the book, while clearly showing how Java addresses these issues. He also goes the extra step of including case studies to illustrate how Java and object-oriented programming are applied. Early in the book, Wang introduces students to a case study involving a pocket calculator. This case study is revisited throughout the book as students learn new aspects of object-oriented programming and the Java language. The book then concludes with a chapter on some of the processes associated with object-oriented design. As a result, students are able to fully grasp the concepts they learn.
With organizations and individuals increasingly dependent on the Web, the need for competent, well-trained Web developers and maintainers is growing. Helping readers master Web development, Dynamic Web Programming and HTML5 covers specific Web programming languages, APIs, and coding techniques and provides an in-depth understanding of the underlyin
Computational Thinking (CT) involves fundamental concepts and reasoning, distilled from computer science and other computational sciences, which become powerful general mental tools for solving problems, increasing efficiency, reducing complexity, designing procedures, or interacting with humans and machines. An easy-to-understand guidebook, From Computing to Computational Thinking gives you the tools for understanding and using CT. It does not assume experience or knowledge of programming or of a programming language, but explains concepts and methods for CT with clarity and depth. Successful applications in diverse disciplines have shown the power of CT in problem solving. The book uses puzzles, games, and everyday examples as starting points for discussion and for connecting abstract thinking patterns to real-life situations. It provides an interesting and thought-provoking way to gain general knowledge about modern computing and the concepts and thinking processes underlying modern digital technologies.
Praise for the First Edition: "This outstanding book ... gives the reader robust concepts and implementable knowledge of this environment. Graphical user interface (GUI)-based users and developers do not get short shrift, despite the command-line interface’s (CLI) full-power treatment. ... Every programmer should read the introduction’s Unix/Linux philosophy section. ... This authoritative and exceptionally well-constructed book has my highest recommendation. It will repay careful and recursive study." --Computing Reviews, August 2011 Mastering Modern Linux, Second Edition retains much of the good material from the previous edition, with extensive updates and new topics added. The book p...
The first book to introduce computer architecture for security and provide the tools to implement secure computer systems This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace. Examination of memory, CPU architecture and system implementation Discussion of computer buses and a dual-port bus interface Examples cover a board spectrum of hardware and software systems Design and implementation of a patent-pending secure computer system Includes the latest patent-pending technologies in architecture security Placement of computers in a security fulfilled network environment Co-authored by the inventor of the modern Computed Tomography (CT) scanner Provides website for lecture notes, security tools and latest updates
An introductory text to Web design and programming that offers a comprehensive overview of the techniques, programs, and applications related to Web page design and programming, with activities and exercises to supplement the text.
Designed to teach ANSI C on the UNIX system, this text begins with a chapter on UNIX for C Programmers that aims to facilitate hands-on learning of C in realistic situations.
The retail sector is an integral part of a national economy. From the political economy perspective, all consumer goods have surplus values locked up in them; the surplus values are not realized until the consumer goods are purchased by consumers through various distribution channels. As such, retailing is the essential link between production and consumption. The success of a retail business depends on two general factors: the location of the retail outlet, and management of the business. Both factors are equally important. If the business is located in the wrong place with the wrong customer base, it will not generate expected sales. Similarly, if the business is poorly managed and operate...
In today’s workplace, computer and cybersecurity professionals must understand both hardware and software to deploy effective security solutions. This book introduces readers to the fundamentals of computer architecture and organization for security, and provides them with both theoretical and practical solutions to design and implement secure computer systems. Offering an in-depth and innovative introduction to modern computer systems and patent-pending technologies in computer security, the text integrates design considerations with hands-on lessons learned to help practitioners design computer systems that are immune from attacks. Studying computer architecture and organization from a s...