Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Presents a catalog of simple solutions to commonly occurring design problems. These 23 patterns allow designers to create more reusable designs without having to rediscover the design solutions themselves. The authors begin by describing what patterns are, and how they can help you design object-oriented software.
Geared to practical aspects of the C++ programming language, this book demonstrates how to design large systems. The author explains the process of decomposing large systems into physical hierarchies of smaller, more manageable components. This book concludes with a top-down approach to the logical design of individual components.
Helps the readers understand that Unix is really a style of community.
Organized around 55 specific guidelines, each of which describes a way to write better C++, this book reflects on modern design considerations, including exceptions, design patterns, and multithreading. It also provides guidance on the design of effective classes, functions, templates, and inheritance hierarchies.
The Network File System (NFS) protocol that enables remote access to files is a key element of any LAN. This book promotes an understanding of that protocol through extensive diagrams and real protocol traces that show NFS in action. Covering NFS versions 2 and 3, it also looks into WebNFS and the NFS version 4, with Internet support.
Shows how to create reusable APIs using interface-based design, a language-independent methodology that separates interfaces from their implementations. This book describes in detail 24 interfaces and their implementations, providing the reader with an understanding of this design approach.
More than 162,000 networking professionals have relied on W. Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP best-seller has been thoroughly updated to reflect a new generation of TCP/IP-based networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: ' Remote procedure call ' Identity management (access control / authentication) ' Network and transport layer security (authentication / privacy) ' File access protocols, including NFS and SMB/CIFS ' Host initialization and DHCP ' NAT and firewalls ' E-mail ' Web and web services ' Wireless and wireless security ' New tools, including Ethereal, nmap and netcat
Mathematical techniques pervade current research in computer networking, yet are not taught to most computer science undergraduates. This self-contained, highly-accessible book bridges the gap, providing the mathematical grounding students and professionals need to successfully design or evaluate networking systems. The only book of its kind, it brings together information previously scattered amongst multiple texts. It first provides crucial background in basic mathematical tools, and then illuminates the specific theories that underlie computer networking. Coverage includes: * Basic probability * Statistics * Linear Algebra * Optimization * Signals, Systems, and Transforms, including Fourier series and transforms, Laplace transforms, DFT, FFT, and Z transforms * Queuing theory * Game Theory * Control theory * Information theory
The book will quickly get students started using Go effectively from the beginning, and by the end, they will know how to use it well to write clear, idiomatic and efficient programs to solve real-world problems. They'll understand not just how to use its standard libraries, but how they work, and how to apply the same design techniques to their own projects.
BPF and related observability tools give software professionals and students alike unprecedented visibility into software, helping them analyze operating system and application performance, troubleshoot code, and strengthen security. BPF Performance Tools: Linux System and Application Observability is the industry's most comprehensive guide to using these tools for observability. Brendan Gregg, author of the industry's definitive guide to system performance, introduces powerful new methods and tools for doing analysis that leads to more robust, reliable, and safer code. This authoritative guide: Explores a wide spectrum of software and hardware targets Thoroughly covers open source BPF tools from the Linux Foundation iovisor project's bcc and bpftrace repositories Summarizes performance engineering and kernel internals you need to understand Provides and discusses 150+ bpftrace tools, including 80 written specifically for this book: tools you can run as-is, without programming - or customize and develop further, using diverse interfaces and the bpftrace front-endStudents will learn how to use BPF (eBPF) tracing tools to analyze CPUs, memory, disks, file systems, networking, languages, applications, containers, hypervisors, security, and the Linux kernel. Students will move from basic to advanced tools and techniques, producing new metrics, stack traces, custom latency histograms, and more. It's like having a superpower: with Gregg's guidance and tools, students can analyze virtually everything that impacts system performance, so they can improve virtually any Linux operating system or application. Deeper, more in-depth coverage than any other eBPF resource Quickly analyze everything that impacts Linux system performance: ask questions and get fast answers in production environments Learn by example, with tools you can use to find performance wins and then customize for even more power Covers invaluable, in-demand technology: eBPF was the subject of over two dozen talks at the recent Linux Plumbers developer's conference Downloadable source code includes 80+ new BPF analysis tools created for this bookUse BPF/eBPF tracing and observability tools to improve system performance, reduce costs, resolve software issues, and gain unprecedented visibility into running systems Deeper, more in-depth coverage than any other eBPF resource Quickly analyze everything that impacts Linux system performance: ask questions and get fast answers in production environments Learn by example, with tools you can use to find performance wins and then customize for even more power Covers invaluable, in-demand technology: eBPF was the subject of over two dozen talks at the recent Linux Plumbers developer's conference Downloadable source code includes 80+ new BPF analysis tools created for this book
"e;For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable."e; -Vint Cerf, Internet pioneer TCP/IP Illustrated, Volume 1, Second Edition, is a detailed and visual guide to today's TCP/IP protocol suite. Fully updated for the newest innovations, it demonstrates each protocol in action through realistic examples from modern Linux, Windows, and Mac OS environments. There's no better way to discover why TCP/IP works as it does, how it reacts to common conditions, and how to apply it in your own applications and networks. Building on the late W. Richard Stevens' classic first edition, author Kevin R. Fall adds his cutting-edge experience as a leader in TCP/IP protocol research, updating the book to fully reflect the latest protocols and best practices. He first introduces TCP/IP's core goals and architectural concepts, showing how they can robustly connect diverse networks and support multiple services running concurrently. Next, he carefully explains Internet addressing in both IPv4 and IPv6 networks. Then, he walks through TCP/IP's structure and function from the bottom up: from link layer protocols-such as Ethernet and Wi-Fi-through network, transport, and application layers. Fall thoroughly introduces ARP, DHCP, NAT, firewalls, ICMPv4/ICMPv6, broadcasting, multicasting, UDP, DNS, and much more. He offers extensive coverage of reliable transport and TCP, including connection management, timeout, retransmission, interactive data flow, and congestion control. Finally, he introduces the basics of security and cryptography, and illuminates the crucial modern protocols for protecting security and privacy, including EAP, IPsec, TLS, DNSSEC, and DKIM. Whatever your TCP/IP experience, this book will help you gain a deeper, more intuitive understanding of the entire protocol suite so you can build better applications and run more reliable, efficient networks.
Awk was developed in 1977 at Bell Labs, and it's still a remarkably useful tool for solving a wide variety of problems quickly and efficiently. In this update of the classic Awk book, the creators of the language show you what Awk can do and teach you how to use it effectively. Here's what programmers today are saying: "I love Awk." "Awk is amazing." "It is just so damn good." "Awk is just right." "Awk is awesome." "Awk has always been a language that I loved." It's easy: "Simple, fast and lightweight." "Absolutely efficient to learn because there isn't much to learn." "3-4 hours to learn the language from start to finish." "I can teach it to new engineers in less than 2 hours." It's productive: "Whenever I need to do a complex analysis of a semi-structured text file in less than a minute, Awk is my tool." "Learning Awk was the best bang for buck investment of time in my entire career." "Designed to chew through lines of text files with ease, with great defaults that minimize the amount of code you actually have to write to do anything." It's always available: "AWK runs everywhere." "A reliable Swiss Army knife that is always there when you need it." "Many systems lack Perl or Python, but include Awk." Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.