You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
On computer networks
Appropriate for Computer Networking or Introduction to Networking courses at both the undergraduate and graduate level in Computer Science, Electrical Engineering, CIS, MIS, and Business Departments. Tanenbaum takes a structured approach to explaining how networks work from the inside out. He starts with an explanation of the physical layer of networking, computer hardware and transmission systems; then works his way up to network applications. Tanenbaum's in-depth application coverage includes email; the domain name system; the World Wide Web (both client- and server-side); and multimedia (including voice over IP, Internet radio video on demand, video conferencing, and streaming media.
The Second Edition of this best-selling introductory operating systems text is the only textbook that successfully balances theory and practice. The authors accomplish this important goal by first covering all the fundamental operating systems concepts such as processes, interprocess communication, input/output, virtual memory, file systems, and security. These principles are then illustrated through the use of a small, but real, UNIX-like operating system called MINIX that allows students to test their knowledge in hands-on system design projects. Each book includes a CD-ROM that contains the full MINIX source code and two simulators for running MINIX on various computers.
Modern Operating Systems is intended for introductory courses in Operating Systems in Computer Science, Computer Engineering, and Electrical Engineering programs.
This is the first book on New York's subway musicians--modern troubadours who perform on platforms, mezzanines, and even trains pounding through the city. Illustrating her account with captivating photos, Susie J. Tanenbaum draws on interviews with musicians and their audiences to explore both the vibrant culture and the intricate politics of subway music.
Investigating an explosion at a Harlem school that has caused numerous deaths and injuries, Karp and Ciampi discover links to a serial arsonist and a teacher's union president who would protest New York City's charter school movement.
A prosecutor goes after the truth about JFK’s assassination in a New York Times–bestselling author’s “most enthralling legal thriller to date” (Vincent Bugliosi). In a forgotten corner of the Georgetown library, New York prosecutor Butch Karp is about to commit a felony. He cracks the seal on a government file, in which he finds papers, a ledger, a reel of film, and a small jar that holds a chunk of human flesh. Just by looking at this material, he has broken the law. It’s the evidence he needs to prove the true identity of the man who killed Kennedy, and now that he has it, Karp is the most dangerous man in America. Brought to Washington to assist in the Congressional investigat...
An up-to-date overview of operating systems presented by world-renowned computer scientist and author, Andrew Tanenbaum. This is the first guide to provide balanced coverage between centralized and distributed operating systems. Part I covers processes, memory management, file systems, I/O systems, and deadlocks in single operating system environments. Part II covers communication, synchronization process execution, and file systems in a distributed operating system environment. Includes case studies on UNIX, MACH, AMOEBA, and DOS operating systems.
"Prosecutor Butch Karp and his wife, Marlene Ciampi, must team up to solve the suspicious murder of an FBI informant and battle corruption at the highest levels of the United States government"--
For coursesin Business Data Communication and Networking. Anintroduction to computer networking grounded in real-world examples In Computer Networks,Tanenbaum et al. explain how networks work from the inside out. They start withthe physical layer of networking, computer hardware and transmission systems,then work their way up to network applications. Each chapter follows aconsistent approach: The book presents key principles, then illustrates themutilizing real-world example networks that run through the entire book – theInternet, and wireless networks, including Wireless LANs, broadband wireless,and Bluetooth. The 6th Edition is updated throughout to reflect the mostcurrent technologies, and the chapter on network security is rewritten to focuson modern security principles and actions. Tutorial videos on key networkingtopics and techniques are available to students on the companion website at www.pearsonglobaleditions.com Instructors are supported with a SolutionsManual to end-of-chapter exercises featured in the book, LecturePowerPoint slides, and extracted art and figures featured in thebook.