Unix Network Programming, Volume 1: The Sockets Networking Api, 3/E by W. Richard Stevens (2015-08-06)

Titre : Unix Network Programming, Volume 1: The Sockets Networking Api, 3/E by W. Richard Stevens (2015-08-06)
Auteur :
Éditeur : Pearson India
ISBN-13 :
Libération :

Télécharger Lire en ligne



A été écrit sous une forme ou une autre pendant la plus grande partie de sa vie. Vous pouvez trouver autant d'inspiration de Unix Network Programming, Volume 1: The Sockets Networking Api, 3/E by W. Richard Stevens (2015-08-06) Aussi informatif et amusant. Cliquez sur le bouton TÉLÉCHARGER ou Lire en ligne pour obtenir gratuitement le livre de titre $ gratuitement.

TCP IP Illustrated

Titre : TCP IP Illustrated
Auteur : Kevin R. Fall
Éditeur : Addison-Wesley Professional
ISBN-13 : 9780321336316
Libération : 2011-11-01

Télécharger Lire en ligne



A major revision of the classic TCP/IP bestseller that has sold more than 162,000 units! * *W. Richard Stevens' legendary TCP/IP guide, now updated by top network protocol developer and instructor Kevin Fall. *Shows how each protocol actually operates, and explains why they work that way. *New coverage includes RPC, access control, authentication, privacy, NFS, SMB/CIFS, DHCP, NAT, firewalls, email, Web, web services, wireless, wireless security, and much more More than 162,000 networking professionals have relied on W. Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP bestseller has been thoroughly updated to reflect a new generation of TCP/IPbased networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: * *Remote procedure call. *Identity management (access control / authentication). *Network and transport layer security (authentication / privacy). *File access protocols, including NFS and SMB/CIFS. *Host initialization and DHCP. *NAT and firewalls. *E-mail. *Web and web services. *Wireless and wireless security. *New tools, including Ethereal, nmap and netcat

UNIX Network Programming

Titre : UNIX Network Programming
Auteur : W. Richard Stevens
Éditeur : Addison-Wesley Professional
ISBN-13 : 0131411551
Libération : 2004

Télécharger Lire en ligne



* *Previous editions sold over 160,000 units! Second Edition (1998) sold over 53,000 in retail alone! *Updates coverage of programming standards, debugging techniques, and covers Operating Systems including Red Hat 9, Solaris 9, HP-UX, Free BSD 4.8/5.0, AIX 5.x, and Mac OS X. *Bill Fenner (AT/T Labs) and Andrew Rudoff (SUN) carry on the tradition of this great work.

UNIX Network Programming Volume 2

Titre : UNIX Network Programming Volume 2
Auteur : W. Richard Stevens
Éditeur : Prentice Hall
ISBN-13 : 0132974290
Libération : 1998-08-25

Télécharger Lire en ligne



Well-implemented interprocess communications (IPC) are key to the performance of virtually every non-trivial UNIX program. In UNIX Network Programming, Volume 2, Second Edition, legendary UNIX expert W. Richard Stevens presents a comprehensive guide to every form of IPC, including message passing, synchronization, shared memory, and Remote Procedure Calls (RPC). Stevens begins with a basic introduction to IPC and the problems it is intended to solve. Step-by-step you'll learn how to maximize both System V IPC and the new Posix standards, which offer dramatic improvements in convenience and performance.

Networked Graphics

Titre : Networked Graphics
Auteur : Anthony Steed
Éditeur : Elsevier
ISBN-13 : 0080922236
Libération : 2009-10-30

Télécharger Lire en ligne



Networked Graphics equips programmers and designers with a thorough grounding in the techniques used to create truly network-enabled computer graphics and games. Written for graphics/game/VE developers and students, it assumes no prior knowledge of networking. The text offers a broad view of what types of different architectural patterns can be found in current systems, and readers will learn the tradeoffs in achieving system requirements on the Internet. It explains the foundations of networked graphics, then explores real systems in depth, and finally considers standards and extensions. Numerous case studies and examples with working code are featured throughout the text, covering groundbreaking academic research and military simulation systems, as well as industry-leading game designs. Everything designers need to know when developing networked graphics and games is covered in one volume - no need to consult multiple sources. The many examples throughout the text feature real simulation code in C++ and Java that developers can use in their own design experiments. Case studies describing real-world systems show how requirements and constraints can be managed.

TCP IP and Related Protocols

Titre : TCP IP and Related Protocols
Auteur : Uyless D. Black
Éditeur : McGraw-Hill Companies
ISBN-13 : UOM:39015040151428
Libération : 1998

Télécharger Lire en ligne



This is an introduction for TCP/IP users. Designed for relative newcomers and experienced network professionals alike. It explains the basics through IPv6 (the latest TCP/IP release) from a user's perspective.

Android Security Internals

Titre : Android Security Internals
Auteur : Nikolay Elenkov
Éditeur : No Starch Press
ISBN-13 : 9781593276416
Libération : 2014-10-14

Télécharger Lire en ligne



There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals—until now. In Android Security Internals, top Android security expert Nikolay Elenkov takes us under the hood of the Android security sys­tem. Elenkov describes Android security archi­tecture from the bottom up, delving into the imple­mentation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration. You’ll learn: –How Android permissions are declared, used, and enforced –How Android manages application packages and employs code signing to verify their authenticity –How Android implements the Java Cryptography Architecture (JCA) and Java Secure Socket Extension (JSSE) frameworks –About Android’s credential storage system and APIs, which let applications store cryptographic keys securely –About the online account management framework and how Google accounts integrate with Android –About the implementation of verified boot, disk encryption, lockscreen, and other device security features –How Android’s bootloader and recovery OS are used to perform full system updates, and how to obtain root access With its unprecedented level of depth and detail, Android Security Internals is a must-have for any security-minded Android developer.

Advanced Programming in the UNIX Environment

Titre : Advanced Programming in the UNIX Environment
Auteur : W. Richard Stevens
Éditeur : Addison-Wesley
ISBN-13 : 9780321638007
Libération : 2013-06-10

Télécharger Lire en ligne



For more than twenty years, serious C programmers have relied on one book for practical, in-depth knowledge of the programming interfaces that drive the UNIX and Linux kernels: W. Richard Stevens’ Advanced Programming in the UNIX® Environment . Now, once again, Rich’s colleague Steve Rago has thoroughly updated this classic work. The new third edition supports today’s leading platforms, reflects new technical advances and best practices, and aligns with Version 4 of the Single UNIX Specification. Steve carefully retains the spirit and approach that have made this book so valuable. Building on Rich’s pioneering work, he begins with files, directories, and processes, carefully laying the groundwork for more advanced techniques, such as signal handling and terminal I/O. He also thoroughly covers threads and multithreaded programming, and socket-based IPC. This edition covers more than seventy new interfaces, including POSIX asynchronous I/O, spin locks, barriers, and POSIX semaphores. Most obsolete interfaces have been removed, except for a few that are ubiquitous. Nearly all examples have been tested on four modern platforms: Solaris 10, Mac OS X version 10.6.8 (Darwin 10.8.0), FreeBSD 8.0, and Ubuntu version 12.04 (based on Linux 3.2). As in previous editions, you’ll learn through examples, including more than ten thousand lines of downloadable, ISO C source code. More than four hundred system calls and functions are demonstrated with concise, complete programs that clearly illustrate their usage, arguments, and return values. To tie together what you’ve learned, the book presents several chapter-length case studies, each reflecting contemporary environments. Advanced Programming in the UNIX® Environment has helped generations of programmers write code with exceptional power, performance, and reliability. Now updated for today’s systems, this third edition will be even more valuable.

An Introduction to TCP IP

Titre : An Introduction to TCP IP
Auteur : John Davidson
Éditeur : Springer Science & Business Media
ISBN-13 : 9781461245728
Libération : 2012-12-06

Télécharger Lire en ligne



This unique and valuable source of information describes the protocol suite according to the International Organization for StandardsISO) seven-level (OSI) reference model. Written by Dr. John Davidson at Ungermann/Bass, the worlds largest manufacturer of local area networks, this book will appeal to everybody interested or involved in local or wide-area computer networking projects.

Bulletproof SSL and TLS

Titre : Bulletproof SSL and TLS
Auteur : Ivan Ristic
Éditeur : Feisty Duck
ISBN-13 : 9781907117046
Libération : 2014

Télécharger Lire en ligne



Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and impersonation attacks. In this book, you’ll find just the right mix of theory, protocol detail, vulnerability and weakness information, and deployment advice to get your job done: - Comprehensive coverage of the ever-changing field of SSL/TLS and Internet PKI, with updates to the digital version - For IT security professionals, help to understand the risks - For system administrators, help to deploy systems securely - For developers, help to design and implement secure web applications - Practical and concise, with added depth when details are relevant - Introduction to cryptography and the latest TLS protocol version - Discussion of weaknesses at every level, covering implementation issues, HTTP and browser problems, and protocol vulnerabilities - Coverage of the latest attacks, such as BEAST, CRIME, BREACH, Lucky 13, RC4 biases, Triple Handshake Attack, and Heartbleed - Thorough deployment advice, including advanced technologies, such as Strict Transport Security, Content Security Policy, and pinning - Guide to using OpenSSL to generate keys and certificates and to create and run a private certification authority - Guide to using OpenSSL to test servers for vulnerabilities - Practical advice for secure server configuration using Apache httpd, IIS, Java, Nginx, Microsoft Windows, and Tomcat This book is available in paperback and a variety of digital formats without DRM.

TCP IP Essentials

Titre : TCP IP Essentials
Auteur : Shivendra S. Panwar
Éditeur : Cambridge University Press
ISBN-13 : 052160124X
Libération : 2004-11-18

Télécharger Lire en ligne



A hands-on textbook on TCP/IP technologies, showing how the protocols are implemented in practice.