Author: Mario Camou
Publisher: Sams Publishing
ISBN: 9780672317002
Category : Debian (Computer system)
Languages : en
Pages : 0
Book Description
Shows the reader how to install, configure and manage the latest version of Debian Linux at the time of pubication. The book covers the most important topics to the Debian Linux intermediate/advanced user on installation and management of Debian systems. The book also provides wisdom and insights on how to control some of the more difficult to use aspects of Debian, like integrating Debian into Microsoft networks. Advanced topics show how to set up an Internet server, set up a firewall, and install Linux on notebook computers. The text also offers coverage of working with open-source databases, and covers programming in several languages and shells in detail.
Debian GNU/Linux 2.1 Unleashed
Author: Mario Camou
Publisher: Sams Publishing
ISBN: 9780672317002
Category : Debian (Computer system)
Languages : en
Pages : 0
Book Description
Shows the reader how to install, configure and manage the latest version of Debian Linux at the time of pubication. The book covers the most important topics to the Debian Linux intermediate/advanced user on installation and management of Debian systems. The book also provides wisdom and insights on how to control some of the more difficult to use aspects of Debian, like integrating Debian into Microsoft networks. Advanced topics show how to set up an Internet server, set up a firewall, and install Linux on notebook computers. The text also offers coverage of working with open-source databases, and covers programming in several languages and shells in detail.
Publisher: Sams Publishing
ISBN: 9780672317002
Category : Debian (Computer system)
Languages : en
Pages : 0
Book Description
Shows the reader how to install, configure and manage the latest version of Debian Linux at the time of pubication. The book covers the most important topics to the Debian Linux intermediate/advanced user on installation and management of Debian systems. The book also provides wisdom and insights on how to control some of the more difficult to use aspects of Debian, like integrating Debian into Microsoft networks. Advanced topics show how to set up an Internet server, set up a firewall, and install Linux on notebook computers. The text also offers coverage of working with open-source databases, and covers programming in several languages and shells in detail.
Ubuntu Linux Unleashed 2021 Edition
Author: Matthew Helmke
Publisher: Addison-Wesley Professional
ISBN: 0136685277
Category : Computers
Languages : en
Pages : 2088
Book Description
Covers 20.04, 20.10, and 21.04 Ubuntu Linux Unleashed 2021 Edition is filled with unique and advanced information for everyone who wants to make the most of the Ubuntu Linux operating system. This new edition has been thoroughly updated by a long-time Ubuntu user and early community leader to reflect the exciting new Ubuntu 20.04 LTS release, with a forthcoming online update mid-2021, at the halfway mark before the next LTS release comes out. Linux writer Matthew Helmke covers all you need to know about Ubuntu 20.04 LTS installation, configuration, productivity, command-line usage, development, systems administration, server operations, networking, virtualization, cloud computing, DevOps, and more—including intermediate-to-advanced techniques you won't find in any other book. Helmke presents up-to-the-minute introductions to Ubuntu's key productivity and web development tools, programming languages, hardware support, and more. You'll find new or improved coverage of the Ubuntu desktop experience, common web servers and software stacks, an introduction to containers like Docker and Kubernetes, as well as a wealth of systems administration information that is stable and valuable over many years. Configure and use the Ubuntu desktop Get started with multimedia and productivity applications Manage Linux services, users, and software packages Administer and run Ubuntu from the command line Automate tasks and use shell scripting Provide secure remote access and configure a secure VPN Manage kernels and modules Administer file, print, email, proxy, LDAP, DNS, and HTTP servers (Apache, Nginx, or alternatives) Work with databases (SQL) and learn about NoSQL alternatives Get started with virtualization and cloud deployment, including information about containers Learn about options for managing large numbers of servers, including in the cloud Learn the basics about popular programming languages including Python, PHP, Perl, and gain an introduction to new alternatives such as Go and Rust
Publisher: Addison-Wesley Professional
ISBN: 0136685277
Category : Computers
Languages : en
Pages : 2088
Book Description
Covers 20.04, 20.10, and 21.04 Ubuntu Linux Unleashed 2021 Edition is filled with unique and advanced information for everyone who wants to make the most of the Ubuntu Linux operating system. This new edition has been thoroughly updated by a long-time Ubuntu user and early community leader to reflect the exciting new Ubuntu 20.04 LTS release, with a forthcoming online update mid-2021, at the halfway mark before the next LTS release comes out. Linux writer Matthew Helmke covers all you need to know about Ubuntu 20.04 LTS installation, configuration, productivity, command-line usage, development, systems administration, server operations, networking, virtualization, cloud computing, DevOps, and more—including intermediate-to-advanced techniques you won't find in any other book. Helmke presents up-to-the-minute introductions to Ubuntu's key productivity and web development tools, programming languages, hardware support, and more. You'll find new or improved coverage of the Ubuntu desktop experience, common web servers and software stacks, an introduction to containers like Docker and Kubernetes, as well as a wealth of systems administration information that is stable and valuable over many years. Configure and use the Ubuntu desktop Get started with multimedia and productivity applications Manage Linux services, users, and software packages Administer and run Ubuntu from the command line Automate tasks and use shell scripting Provide secure remote access and configure a secure VPN Manage kernels and modules Administer file, print, email, proxy, LDAP, DNS, and HTTP servers (Apache, Nginx, or alternatives) Work with databases (SQL) and learn about NoSQL alternatives Get started with virtualization and cloud deployment, including information about containers Learn about options for managing large numbers of servers, including in the cloud Learn the basics about popular programming languages including Python, PHP, Perl, and gain an introduction to new alternatives such as Go and Rust
IBM PowerAI: Deep Learning Unleashed on IBM Power Systems Servers
Author: Dino Quintero
Publisher: IBM Redbooks
ISBN: 0738442941
Category : Computers
Languages : en
Pages : 278
Book Description
This IBM® Redbooks® publication is a guide about the IBM PowerAI Deep Learning solution. This book provides an introduction to artificial intelligence (AI) and deep learning (DL), IBM PowerAI, and components of IBM PowerAI, deploying IBM PowerAI, guidelines for working with data and creating models, an introduction to IBM SpectrumTM Conductor Deep Learning Impact (DLI), and case scenarios. IBM PowerAI started as a package of software distributions of many of the major DL software frameworks for model training, such as TensorFlow, Caffe, Torch, Theano, and the associated libraries, such as CUDA Deep Neural Network (cuDNN). The IBM PowerAI software is optimized for performance by using the IBM Power SystemsTM servers that are integrated with NVLink. The AI stack foundation starts with servers with accelerators. graphical processing unit (GPU) accelerators are well-suited for the compute-intensive nature of DL training, and servers with the highest CPU to GPU bandwidth, such as IBM Power Systems servers, enable the high-performance data transfer that is required for larger and more complex DL models. This publication targets technical readers, including developers, IT specialists, systems architects, brand specialist, sales team, and anyone looking for a guide about how to understand the IBM PowerAI Deep Learning architecture, framework configuration, application and workload configuration, and user infrastructure.
Publisher: IBM Redbooks
ISBN: 0738442941
Category : Computers
Languages : en
Pages : 278
Book Description
This IBM® Redbooks® publication is a guide about the IBM PowerAI Deep Learning solution. This book provides an introduction to artificial intelligence (AI) and deep learning (DL), IBM PowerAI, and components of IBM PowerAI, deploying IBM PowerAI, guidelines for working with data and creating models, an introduction to IBM SpectrumTM Conductor Deep Learning Impact (DLI), and case scenarios. IBM PowerAI started as a package of software distributions of many of the major DL software frameworks for model training, such as TensorFlow, Caffe, Torch, Theano, and the associated libraries, such as CUDA Deep Neural Network (cuDNN). The IBM PowerAI software is optimized for performance by using the IBM Power SystemsTM servers that are integrated with NVLink. The AI stack foundation starts with servers with accelerators. graphical processing unit (GPU) accelerators are well-suited for the compute-intensive nature of DL training, and servers with the highest CPU to GPU bandwidth, such as IBM Power Systems servers, enable the high-performance data transfer that is required for larger and more complex DL models. This publication targets technical readers, including developers, IT specialists, systems architects, brand specialist, sales team, and anyone looking for a guide about how to understand the IBM PowerAI Deep Learning architecture, framework configuration, application and workload configuration, and user infrastructure.
Learning Kali Linux
Author: Ric Messier
Publisher: "O'Reilly Media, Inc."
ISBN: 1492028657
Category : Computers
Languages : en
Pages : 392
Book Description
With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kaliâ??s expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. Youâ??ll also explore the vulnerabilities that make those tests necessary. Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. Youâ??ll discover different techniques for extending Kali tools and creating your own toolset. Learn tools for stress testing network stacks and applications Perform network reconnaissance to determine whatâ??s available to attackers Execute penetration tests using automated exploit tools such as Metasploit Use cracking tools to see if passwords meet complexity requirements Test wireless capabilities by injecting frames and cracking passwords Assess web application vulnerabilities with automated or proxy-based tools Create advanced attack techniques by extending Kali tools or developing your own Use Kali Linux to generate reports once testing is complete
Publisher: "O'Reilly Media, Inc."
ISBN: 1492028657
Category : Computers
Languages : en
Pages : 392
Book Description
With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kaliâ??s expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. Youâ??ll also explore the vulnerabilities that make those tests necessary. Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. Youâ??ll discover different techniques for extending Kali tools and creating your own toolset. Learn tools for stress testing network stacks and applications Perform network reconnaissance to determine whatâ??s available to attackers Execute penetration tests using automated exploit tools such as Metasploit Use cracking tools to see if passwords meet complexity requirements Test wireless capabilities by injecting frames and cracking passwords Assess web application vulnerabilities with automated or proxy-based tools Create advanced attack techniques by extending Kali tools or developing your own Use Kali Linux to generate reports once testing is complete
Linux Programming Unleashed
Author: Kurt Wall
Publisher: Sams Publishing
ISBN:
Category : Computers
Languages : en
Pages : 916
Book Description
Complete and comprehensive reference with in-depth coverage of the core topics. Learn how to program core systems and find out about such topics as interprocess communications, user interfaces, device drives and X Windows system. Written by top Linux programming consultsnts Kurt Wall and Mark Watson and reviewed by Linux Journal writer and freelance developer, Michael Hamilton. Practical, tested examples of how to apply the best programming practices in the Linux environment.
Publisher: Sams Publishing
ISBN:
Category : Computers
Languages : en
Pages : 916
Book Description
Complete and comprehensive reference with in-depth coverage of the core topics. Learn how to program core systems and find out about such topics as interprocess communications, user interfaces, device drives and X Windows system. Written by top Linux programming consultsnts Kurt Wall and Mark Watson and reviewed by Linux Journal writer and freelance developer, Michael Hamilton. Practical, tested examples of how to apply the best programming practices in the Linux environment.
Kali Linux - An Ethical Hacker's Cookbook
Author: Himanshu Sharma
Publisher: Packt Publishing Ltd
ISBN: 1787120287
Category : Computers
Languages : en
Pages : 366
Book Description
Over 120 recipes to perform advanced penetration testing with Kali Linux About This Book Practical recipes to conduct effective penetration testing using the powerful Kali Linux Leverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities with ease Confidently perform networking and application attacks using task-oriented recipes Who This Book Is For This book is aimed at IT security professionals, pentesters, and security analysts who have basic knowledge of Kali Linux and want to conduct advanced penetration testing techniques. What You Will Learn Installing, setting up and customizing Kali for pentesting on multiple platforms Pentesting routers and embedded devices Bug hunting 2017 Pwning and escalating through corporate network Buffer overflows 101 Auditing wireless networks Fiddling around with software-defned radio Hacking on the run with NetHunter Writing good quality reports In Detail With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) according to your needs, and move on to core functionalities. This book will start with the installation and configuration of Kali Linux so that you can perform your tests. You will learn how to plan attack strategies and perform web application exploitation using tools such as Burp, and Jexboss. You will also learn how to perform network exploitation using Metasploit, Sparta, and Wireshark. Next, you will perform wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Lastly, you will learn how to create an optimum quality pentest report! By the end of this book, you will know how to conduct advanced penetration testing thanks to the book's crisp and task-oriented recipes. Style and approach This is a recipe-based book that allows you to venture into some of the most cutting-edge practices and techniques to perform penetration testing with Kali Linux.
Publisher: Packt Publishing Ltd
ISBN: 1787120287
Category : Computers
Languages : en
Pages : 366
Book Description
Over 120 recipes to perform advanced penetration testing with Kali Linux About This Book Practical recipes to conduct effective penetration testing using the powerful Kali Linux Leverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities with ease Confidently perform networking and application attacks using task-oriented recipes Who This Book Is For This book is aimed at IT security professionals, pentesters, and security analysts who have basic knowledge of Kali Linux and want to conduct advanced penetration testing techniques. What You Will Learn Installing, setting up and customizing Kali for pentesting on multiple platforms Pentesting routers and embedded devices Bug hunting 2017 Pwning and escalating through corporate network Buffer overflows 101 Auditing wireless networks Fiddling around with software-defned radio Hacking on the run with NetHunter Writing good quality reports In Detail With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) according to your needs, and move on to core functionalities. This book will start with the installation and configuration of Kali Linux so that you can perform your tests. You will learn how to plan attack strategies and perform web application exploitation using tools such as Burp, and Jexboss. You will also learn how to perform network exploitation using Metasploit, Sparta, and Wireshark. Next, you will perform wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Lastly, you will learn how to create an optimum quality pentest report! By the end of this book, you will know how to conduct advanced penetration testing thanks to the book's crisp and task-oriented recipes. Style and approach This is a recipe-based book that allows you to venture into some of the most cutting-edge practices and techniques to perform penetration testing with Kali Linux.
Linux Basics for Hackers
Author: OccupyTheWeb
Publisher: No Starch Press
ISBN: 1593278551
Category : Computers
Languages : en
Pages : 249
Book Description
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers. If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment. First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password cracker Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?
Publisher: No Starch Press
ISBN: 1593278551
Category : Computers
Languages : en
Pages : 249
Book Description
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers. If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment. First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password cracker Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?
Hacker, Hoaxer, Whistleblower, Spy
Author: Gabriella Coleman
Publisher: Verso Books
ISBN: 1781689830
Category : Political Science
Languages : en
Pages : 497
Book Description
The ultimate book on the worldwide movement of hackers, pranksters, and activists collectively known as Anonymous—by the writer the Huffington Post says “knows all of Anonymous’ deepest, darkest secrets” “A work of anthropology that sometimes echoes a John le Carré novel.” —Wired Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption (before Anonymous shot to fame as a key player in the battles over WikiLeaks, the Arab Spring, and Occupy Wall Street). She ended up becoming so closely connected to Anonymous that the tricky story of her inside–outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book. The narrative brims with details unearthed from within a notoriously mysterious subculture, whose semi-legendary tricksters—such as Topiary, tflow, Anachaos, and Sabu—emerge as complex, diverse, politically and culturally sophisticated people. Propelled by years of chats and encounters with a multitude of hackers, including imprisoned activist Jeremy Hammond and the double agent who helped put him away, Hector Monsegur, Hacker, Hoaxer, Whistleblower, Spy is filled with insights into the meaning of digital activism and little understood facets of culture in the Internet age, including the history of “trolling,” the ethics and metaphysics of hacking, and the origins and manifold meanings of “the lulz.”
Publisher: Verso Books
ISBN: 1781689830
Category : Political Science
Languages : en
Pages : 497
Book Description
The ultimate book on the worldwide movement of hackers, pranksters, and activists collectively known as Anonymous—by the writer the Huffington Post says “knows all of Anonymous’ deepest, darkest secrets” “A work of anthropology that sometimes echoes a John le Carré novel.” —Wired Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption (before Anonymous shot to fame as a key player in the battles over WikiLeaks, the Arab Spring, and Occupy Wall Street). She ended up becoming so closely connected to Anonymous that the tricky story of her inside–outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book. The narrative brims with details unearthed from within a notoriously mysterious subculture, whose semi-legendary tricksters—such as Topiary, tflow, Anachaos, and Sabu—emerge as complex, diverse, politically and culturally sophisticated people. Propelled by years of chats and encounters with a multitude of hackers, including imprisoned activist Jeremy Hammond and the double agent who helped put him away, Hector Monsegur, Hacker, Hoaxer, Whistleblower, Spy is filled with insights into the meaning of digital activism and little understood facets of culture in the Internet age, including the history of “trolling,” the ethics and metaphysics of hacking, and the origins and manifold meanings of “the lulz.”
Unix System Administration Handbook
Author: Evi Nemeth
Publisher: Prentice Hall
ISBN:
Category : Computers
Languages : en
Pages : 900
Book Description
Now covers Red Hat Linux! Written by Evi Nemeth, Garth Snyder, Scott Seebass, and Trent R. Hein with Adam Boggs, Rob Braun, Ned McClain, Dan Crawl, Lynda McGinley, and Todd Miller "This is not a nice, neat book for a nice, clean world. It's a nasty book for a nasty world. This is a book for the rest of us." -Eric Allman and Marshall Kirk McKusick"I am pleased to welcome Linux to the UNIX System Administration Handbook!" -Linus Torvalds, Transmeta"This book is most welcome!" -Dennis Ritchie, AT&T Bell Laboratories This new edition of the world's most comprehensive guide to UNIX system administration is an ideal tutorial for those new to administration and an invaluable reference for experienced professionals. The third edition has been expanded to include "direct from the frontlines" coverage of Red Hat Linux. UNIX System Administration Handbook describes every aspect of system administration-from basic topics to UNIX esoterica-and provides explicit coverage of four popular UNIX systems: This book stresses a practical approach to system administration. It's packed with war stories and pragmatic advice, not just theory and watered-down restatements of the manuals. Difficult subjects such as sendmail, kernel building, and DNS configuration are tackled head-on. Examples are provided for all four versions of UNIX and are drawn from real-life systems-warts and all. "This book is where I turn first when I have system administration questions. It is truly a wonderful resource and always within reach of my terminal." -W. Richard Stevens, author of numerous books on UNIX and TCP/IP"This is a comprehensive guide to the care and feeding of UNIX systems. The authors present the facts along with seasoned advice and numerous real-world examples. Their perspective on the variations among systems is valuable for anyone who runs a heterogeneous computing facility." -Pat Parseghian, Transmeta"We noticed your book on the staff recommendations shelf at our local bookstore: 'Very clear, a masterful interpretation of the subject.' We were most impressed, until we noticed that the same staff member had also recommended Aunt Bea's Mayberry Cookbook." -Shannon Bloomstran, history teacher
Publisher: Prentice Hall
ISBN:
Category : Computers
Languages : en
Pages : 900
Book Description
Now covers Red Hat Linux! Written by Evi Nemeth, Garth Snyder, Scott Seebass, and Trent R. Hein with Adam Boggs, Rob Braun, Ned McClain, Dan Crawl, Lynda McGinley, and Todd Miller "This is not a nice, neat book for a nice, clean world. It's a nasty book for a nasty world. This is a book for the rest of us." -Eric Allman and Marshall Kirk McKusick"I am pleased to welcome Linux to the UNIX System Administration Handbook!" -Linus Torvalds, Transmeta"This book is most welcome!" -Dennis Ritchie, AT&T Bell Laboratories This new edition of the world's most comprehensive guide to UNIX system administration is an ideal tutorial for those new to administration and an invaluable reference for experienced professionals. The third edition has been expanded to include "direct from the frontlines" coverage of Red Hat Linux. UNIX System Administration Handbook describes every aspect of system administration-from basic topics to UNIX esoterica-and provides explicit coverage of four popular UNIX systems: This book stresses a practical approach to system administration. It's packed with war stories and pragmatic advice, not just theory and watered-down restatements of the manuals. Difficult subjects such as sendmail, kernel building, and DNS configuration are tackled head-on. Examples are provided for all four versions of UNIX and are drawn from real-life systems-warts and all. "This book is where I turn first when I have system administration questions. It is truly a wonderful resource and always within reach of my terminal." -W. Richard Stevens, author of numerous books on UNIX and TCP/IP"This is a comprehensive guide to the care and feeding of UNIX systems. The authors present the facts along with seasoned advice and numerous real-world examples. Their perspective on the variations among systems is valuable for anyone who runs a heterogeneous computing facility." -Pat Parseghian, Transmeta"We noticed your book on the staff recommendations shelf at our local bookstore: 'Very clear, a masterful interpretation of the subject.' We were most impressed, until we noticed that the same staff member had also recommended Aunt Bea's Mayberry Cookbook." -Shannon Bloomstran, history teacher
C Unleashed
Author: Richard Heathfield
Publisher: Sams Publishing
ISBN: 9780672318962
Category : C♯ (Computer program language)
Languages : en
Pages : 0
Book Description
C Unleashed is a very comprehensive book on the ANSI C programming language. This book promotes solid, portable programming using ANSI C, thus benefiting programmers on any platform, including mainframes. Covers the New Standard for C, known as C9X, and includes embedded systems, simulation processing, threading and multiprocessing, digital signal processing, and natural language processing.
Publisher: Sams Publishing
ISBN: 9780672318962
Category : C♯ (Computer program language)
Languages : en
Pages : 0
Book Description
C Unleashed is a very comprehensive book on the ANSI C programming language. This book promotes solid, portable programming using ANSI C, thus benefiting programmers on any platform, including mainframes. Covers the New Standard for C, known as C9X, and includes embedded systems, simulation processing, threading and multiprocessing, digital signal processing, and natural language processing.