Showing posts with label Computer. Show all posts
Showing posts with label Computer. Show all posts

Wednesday, March 28, 2012

Hello! Python


Hello! Python
Anthony S. Briggs
 Publisher: M./ni.g P..li//tio.s | ISBN: 1935182080 | 2012 
PDF | 424 pages | 17 MB/28 MB

 Hello! Python fully covers the building blocks of Python programming and gives you a gentle introduction to more advanced topics such as object-oriented programming, functional programming, network programming, and program design. New (or nearly new) programmers will learn most of what they need to know to start using Python immediately.

 Programmers love Python because it's fast and efficient. Shouldn't learning Python be just the same? Hello! Python starts quickly and simply, with a line of Python code. You'll learn the basics the right way--by writing your own programs. Along the way, you'll get a gentle introduction to more advanced concepts and new programming styles.>

 No experience with Python needed. Exposure to another programming language is helpful but not required.
 What Makes Hello! Python special

 Learn Python fast Even if you've never written a line of code before, you'll be writing real Python apps in just an hour or two.
 Great examples There's something new in every chapter, including games, web programming with Django, databases, and more.
 User Friendly guides Using lots of illustrations and a down-to-earth writing style, this book invites you to explore Python along with half-a-dozen travelling companions from the User Friendly cartoon strip.


Saturday, March 17, 2012

Machine Learning for Hackers


Machine Learning for Hackers
 English | PDF | 20 MB | 322 pages

 If you’re an experienced programmer interested in crunching data, this book will get you started with machine learning—a toolkit of algorithms that enables computers to train themselves to automate useful tasks. Authors Drew Conway and John Myles White help you understand machine learning and statistics tools through a series of hands-on case studies, instead of a traditional math-heavy presentation.

 Each chapter focuses on a specific problem in machine learning, such as classification, prediction, optimization, and recommendation. Using the R programming language, you’ll learn how to analyze sample datasets and write simple machine learning algorithms. Machine Learning for Hackers is ideal for programmers from any background, including business, government, and academic research.

 Develop a naïve Bayesian classifier to determine if an email is spam, based only on its text
 Use linear regression to predict the number of page views for the top 1,000 websites
 Learn optimization techniques by attempting to break a simple letter cipher
 Compare and contrast U.S. Senators statistically, based on their voting records
 Build a “whom to follow” recommendation system from Twitter data

 Table of Contents
 Chapter 1. Using R
 Chapter 2. Data Exploration
 Chapter 3. Classification: Spam Filtering
 Chapter 4. Ranking: Priority Inbox
 Chapter 5. Regression: Predicting Page Views
 Chapter 6. Regularization: Text Regression
 Chapter 7. Optimization: Breaking Codes
 Chapter 8. PCA: Building a Market Index
 Chapter 9. MDS: Visually Exploring US Senator Similarity
 Chapter 10. kNN: Recommendation Systems
 Chapter 11. Analyzing Social Graphs
 Chapter 12. Model Comparison


MySQL Troubleshooting


MySQL Troubleshooting
O'Reilly Media (Feb2012) | ISBN-13: 978-1449312008
PDF |  264 pages | 7.5 MB

Stuck with bugs, performance problems, crashes, data corruption, and puzzling output? If you are a database programmer or DBA, they are part of your life. The trick is knowing how to quickly recover from them. This unique, example-packed book shows you how to handle an array of vexing problems when working with MySQL.

 Written by a principal technical support engineer at Oracle, MySQL Troubleshooting provides the background, tools, and expert steps for solving problems from simple to complex whether data you thought you inserted doesn't turn up in a query, or the entire database is corrupt because of a server failure. With this book in hand, you'll work with more confidence.

 Understand the source of a problem, even when the solution is simple
 Handle problems that occur when applications run in multiple threads
 Debug and fix problems caused by configuration options
 Discover how operating system tuning can affect your server
 Use troubleshooting techniques specific to replication issues
 Get a reference to additional troubleshooting techniques and tools, including third-party solutions
 Learn best practices for safe and effective troubleshooting—and for preventing problems

 Table of Contents
 Chapter 1. Basics
 Chapter 2. You Are Not Alone: Concurrency Issues
 Chapter 3. Effects of Server Options
 Chapter 4. MySQL’s Environment
 Chapter 5. Troubleshooting Replication
 Chapter 6. Troubleshooting Techniques and Tools
 Chapter 7. Best Practices




Saturday, March 10, 2012

Professional DotNetNuke 4


Professional DotNetNuke 4 
Open Source Web Application Framework for ASP.NET 2.0
Shaun Walker 
 Publisher: W---x | ISBN: 0471788163 | edition 2006 
 CHM | 544 pages | 10,8 mb

 DotNetNuke is a powerful open source framework that creates and deploys robust modules on the ASP.NET platform. Written by its core team of developers, this book will provide you with the tools and insight you'll need to install, configure, and develop your own stunning Web applications using DotNetNuke 4.


Wi-Fi Security


Wi-Fi Security
Stewart S. Miller 
 Publisher: M+++w-Hill | ISBN: 0071410732 | edition 2003 
 PDF | 332 pages | 13 mb

 Wireless Security is one of the most talked about topics in the information security area. As more and more organizations are migrating from wired to wireless networks, questions surrounding the current status of the WiFi network implementations are emerging. The general opinion of both IT professionals and media outlets is that there is no wireless security, but that is just a superficial look on this technology. Books like the one I'm taking a look at today, clearly show that wireless security is not just about the infamous WEP. But is the book worth buying?


Thursday, February 9, 2012

PHP and MySQL 24-Hour Trainer


PHP and MySQL 24-Hour Trainer
 ISBN: 111806688X | Nov 2011
PDF | 504 Pages | 58.34 MB

Step-by-step lessons for using PHP and MySQL in a unique book-and-video combination
Assuming no previous experience with PHP or MySQL, this book-and-video package is ideal reading for anyone who wants to go beyond HTML/CSS in order to provide clients with the most dynamic web sites possible. The approachable tone breaks down the basics of programming and PHP and MySQL in individual lessons starting with the installation of the programs necessary to run PHP. 

You begin with a static web site and then watch and learn as PHP functionality is added as you work through the lessons.
When working with databases, the MySQL database is introduced with demonstrations that show how to interact with it. The accompanying videos enhance your learning experience, as each lesson in the book is portrayed in the video exercises.

Creating user logins
Turn the case study into a content management system

Note: As part of the print version of this title, video lessons are included on DVD. For e-book versions, video lessons can be accessed at wrox.com using a link provided in the interior of the e-book.


Advanced Visual Basic 2010


Advanced Visual Basic 2010
 (Pearson-2012-Ed5) | ISBN: 0132316749 
PDF | 696 Pages | 16.99 MB 

In the Fifth Edition, Advanced Visual Basic 2010 helps those who are familiar with the fundamentals of Visual Basic 2010 programming harness its power for more advanced uses. Coverage of sophisticated tools and techniques used in the industry today include various database, ASP.NET, LINQ, WPF and Web Services topics. 

After studying the book and completing the programming exercises, students should be able to create small- to medium-sized Windows and Web applications that use databases. They will also gain essential concepts in object-oriented programming, event-driven programming, and test-driven development. Each subject is presented in an understandable style that makes this book a leader in the field.


Monday, February 6, 2012

Ubuntu Unleashed 2012 Edition:


Ubuntu Unleashed 2012 Edition: 
Covering 11.10 and 12.04 By Matthew Helmke
 Publisher: S[am].s; 7 edition 2012  | ISBN: 0672335786 
 864 Pages | PDF | 5 MB

 Ubuntu Unleashed is filled with unique and advanced information for everyone who wants to make the most of the Ubuntu Linux operating system. This new edition has been thoroughly revised and updated by a long-time Ubuntu community leader to reflect the exciting new Ubuntu 11.10 (“Oneiric Ocelot”) and the forthcoming Ubuntu 12.04.

 Former Ubuntu Forum administrator Matthew Helmke covers all you need to know about Ubuntu 11.10/12.04 installation, configuration, productivity, multimedia, development, system administration, server operations, networking, virtualization, security, DevOps, and more—including intermediate-to-advanced techniques you won’t find in any other book.

 Helmke presents up-to-the-minute introductions to Ubuntu’s key productivity and Web development tools, programming languages, hardware support, and more. You’ll find brand-new coverage of the new Unity desktop, new NoSQL database support and Android mobile development tools, and many other Ubuntu 11.10/12.04 innovations. Whether you’re new to Ubuntu or already a power user, you’ll turn to this book constantly: for new techniques, new solutions, and new ways to do even more with Ubuntu!

 Matthew Helmke served from 2006 to 2011 on the Ubuntu Forum Council, providing leadership and oversight of the Ubuntu Forums, and spent two years on the Ubuntu regional membership approval board for Europe, the Middle East, and Africa. He has written about Ubuntu for several magazines and websites, is a lead author of The Official Ubuntu Book. He works for The iPlant Collaborative, which is funded by the National Science Foundation and is building cyberinfrastructure for the biological sciences to support the growing use of massive amounts of data and computationally intensive forms of research.
Quickly install Ubuntu, configure it, and get your hardware running right 
Configure and customize the new Unity desktop (or alternatives such as GNOME) 
Get started with multimedia and productivity applications, including LibreOffice 
Manage Linux services, users, and software packages 
Administer and use Ubuntu from the command line 
Automate tasks and use shell scripting 
Provide secure remote access 
Manage kernels and modules 
Administer file, print, email, proxy, LDAP, and database services (both SQL and NoSQL) 
Use both Apache and alternative HTTP servers 
Support and use virtualization 
Use Ubuntu in cloud environments 
Learn the basics about popular programming languages including Python, PHP, and Perl, and how to use Ubuntu to develop in them 
Learn how to get started developing Android mobile devices


Hacking and Securing iOS Applications:


Hacking and Securing iOS Applications: 
Stealing Data, Hijacking Software, and How to Prevent It
O’Reilly |January 25, 2012 | ISBN-13: 978-1449318741
PDF | 356 pages | 10.3 MB

If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS  applications
  are vulnerable to 
attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications  in ways that most programmers aren’t aware of.

This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You’ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.
Examine subtle vulnerabilities in real-world applications—and avoid the same problems in your apps
Learn how attackers infect apps with malware through code injection
Discover how attackers defeat iOS keychain and data-protection encryption
Use a debugger and custom code injection to manipulate the runtime Objective-C environment
Prevent attackers from hijacking SSL sessions and stealing traffic
Securely delete files and design your apps to prevent forensic data leakage
Avoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace


Monday, January 30, 2012

A Practical Guide to Information Systems Strategic Planning


A Practical Guide to Information Systems Strategic Planning
(2nd Edition)- Anita Cassidy
Publisher: Auеrbach Publicаtions | 2005-10-14 | ISBN: 0849350735
PDF | 400 pages | 1.60 MB


 The foundation of a successful information systems strategic plan is the recognition that  business direction and requirements must drive the IS strategy and computing architecture.

A Practical Guide to Information Systems Strategic Planning, Second Edition outlines a  systematic approach to guide you through the development of an effective IS plan that is formulated from your company's business plan. This volume outlines a quick and easy approach with concepts, techniques, and templates for analyzing, organizing, communicating, and implementing an IS strategy. This approach unites an organization in a collaborative effort resulting in a solid direction that has the support of the entire organization. Establishing this direction cultivates the support of management, enabling necessary strategic IS investments.

With a new look at the role of IS governance in strategic planning, this second edition reflects advances in technology and provides an improved and thorough planning methodology. The strategic planning process outlined in this book has been supplemented by lessons learned from applying the process in numerous companies, cultures, and environments.

Download Link

Wednesday, January 25, 2012

Real-World Flash Game Development:


Real-World Flash Game Development:
How to Follow Best Practices AND Keep Your Sanity
Focal Press; 2 edition | April 22, 2011 | ISBN-10: 0240817680
| 432 pages | PDF | 15.78 MB

Your deadline just got moved up. Your artist has never worked with Flash before. Your inner programmer is telling you that no OOP is a big Oops! Any Flash developer can share similar tales of woe. This book breaks down the process of Flash game development into simple, approachable steps. Never heard of a game loop before? No idea what a design pattern is? No problem! Chris Griffith gives you real-world expertise, and real-world code that you can use in your own games. Griffith has been building games in Flash long enough to know what works and what doesn't. He shows you what you need to know to get the job done.

Griffith covers Flash for the everyday developer. The average Flash developer doesn't have luxurious timelines, employers who understand the value of reusability, or the help of an information architect to design a usable experience. This book helps bridge the gap for these coders who may be used to C++, Java, or C# and want to move over to Flash. Griffith covers real-world scenarios pulled from his own experiences developing games for over 10 years in the industry.

The 2nd edition will include: completely new game examples on more advanced topics like 3D; more robust physics and collision detection; and mobile device coverage with Android platform development for us on phones and tablets. Also coverage of the new features available in Flash CS5, Flash Player 10.1, and AIR 2.0 that can be used for game development. The associated web site for the book: www.flashgamebook.com gets close to 1,000 visits a month. On the site, readers can find all the source code for the examples, news on industry happenings, updates and special offers, and a discussion forum to ask questions and share ideas.

Teaches Flash users the most effective ways to leverage Flash as a game development tool. Concrete, relatable approaches to Flash game development.
Covers ALL the aspects that come into play when developing a game in Flash, including art, animation, scripting, and optimization. Provides sound strategies, and realistic goals for success - with REAL-WORLD examples and code included so that programmers become quickly empowered to make their own Flash games.

Website www.flashgamebook.com offers all the source code for the examples, news on industry happenings, updates and special offers, and a discussion forum to ask questions and share ideas.
WHAT'S NEW in 2nd Edition: adding mobile game development on Android OS, along with host of other updates, revisions. There are 3 new games that author builds from scratch. One uses a popular 3D framework to demonstrate bringing Flash games into the 3rd dimension, while using 2D programming under the hood. The other two game examples focus on deployment to the Android mobile platforms, one for a phone and one for a tablet.


Monday, January 16, 2012

Beginning Java 7


Beginning Java 7
By Jeff Friesen
Publisher: Apr..ess 2011 | ISBN: 1430239093
| PDF | 920 Pages |14 MB

Beginning Java 7 guides you through this language and a huge assortment of platform APIs.

What you’ll learn
The entire Java language, including Java 7-specific features such as switch on string, try -with-resources, final rethrow, multicatch, and SafeVarargs
A huge assortment of Java 7 APIs, beginning with those APIs oriented toward the language itself, and including Java 7-specific APIs such as the Fork/Join Framework, Objects, JLayer, and NIO.2
Various Java 7 tools, starting with the javac compiler and java application launcher
How to create user interfaces, working with web services, and a whole lot more
The basics of getting started with Android app development

Who this book is for
This book targets the following groups of developers:
Newcomers, skilled (to some degree) in other programming languages but with no previous  exposure to Java Intermediate Java developers, skilled in the fundamentals of Java prior to Java 7 and looking to increase their understanding of Java 7 language/API changes
All developers looking beyond standard Java, who want to leverage Java 7 to create mobile apps via Android
Even advanced Java developers may find a few items of interest Beginning Java 7 guides you through this language and a huge assortment of platform APIs according to the following table of contents:

Chapter 1: Getting Started with Java
Chapter 2: Discovering Classes and Objects
Chapter 3: Exploring Advanced Language Features
Chapter 4: Touring Language APIs
Chapter 5: Collecting Objects
Chapter 6: Touring Additional Utility APIs
Chapter 7: Creating and Enriching Graphical User Interfaces
Chapter 8: Interacting with Filesystems
Chapter 9: Interacting with Networks and Databases
Chapter 10: Parsing, Creating, and Transforming XML Documents
Chapter 11: Working with Web Services
Chapter 12: Java 7 Meets Android
Appendix A: Solutions to Exercises
Appendix B: Scripting API and Dynamically Typed Language Support
Appendix C: Odds and Ends
Appendix D: Applications Gallery

 Chapter 1 introduces you to Java and begins to cover the Java language by focusing on  fundamental concepts such as comments, identifiers, variables, expressions, and statements.

 Chapter 2 continues to explore this language by presenting all of its features for working with classes and objects. You learn about features related to class declaration and object creation, encapsulation, information hiding, inheritance, polymorphism, interfaces, and garbage collection.

 Chapter 3 focuses on the more advanced language features related to nested classes, packages, static imports, exceptions, assertions, annotations, generics, and enums. Additional chapters will introduce you to the few features not covered in Chapters 1 through 3.

 Chapter 4 largely moves away from covering language features (although it does introduce class literals and strictfp) while focusing on language-oriented APIs. You learn about Math, StrictMath, Package, Primitive Type Wrapper Classes, Reference, Reflection, String, StringBuffer and StringBuilder, Threading, BigDecimal, and BigInteger in this chapter.

 Chapter 5 begins to explore Java's utility APIs by focusing largely on the Collections Framework. However, it also discusses legacy collection-oriented APIs and how to create your own collections.

 Chapter 6 continues to focus on utility APIs by presenting the concurrency utilities along with the Objects and Random classes.
Chapter 7 moves you away from the command-line user interfaces that appear in previous chapters and toward graphical user interfaces. You first learn about the Abstract Window Toolkit foundation, and then explore the Java Foundation Classes in terms of Swing and Java 2D. Appendix C explores Accessibility and Drag and Drop.

 Chapter 8 explores filesystem-oriented I/O in terms of the File, RandomAccessFile, stream, and writer/reader classes. New I/O is covered in Appendix C.

 Chapter 9 introduces you to Java's network APIs, such as sockets. It also introduces you to the JDBC API for interacting with databases.

 Chapter 10 dives into Java's XML support by first presenting an introduction to XML (including DTDs and schemas). It next explores the SAX, DOM, StAX, XPath, and XSLT APIs. It even briefly touches on the Validation API. While exploring XPath, you encounter namespace contexts, extension functions and function resolvers, and variables and variable resolvers.

 Chapter 11 introduces you to Java's support for SOAP-based and RESTful web services. In addition to providing you with the basics of these web service categories, Chapter 11 presents some advanced topics, such as working with the SAAJ API to communicate with a SOAP-based web service without having to rely on JAX-WS. You will appreciate having learned about XML in Chapter 10 before diving into this chapter.

 Chapter 12 helps you put to use some of the knowledge you've gathered in previous chapters by showing you how to use Java to write an Android app's source code. This chapter introduces you to Android, discusses its architecture, shows you how to install necessary tools, and develops a simple app. 


Java for Programmers


Java for Programmers (2nd Edition)
Paul J. Deitel, Harvey M. Deitel
Publisher: Prentice Hall | ISBN: 0132821540 | edition 2011
PDF | 1164 pages | 14.6 mb

 The professional programmer’s Deitel® guide to Java™ development and the powerful Java platform
 Written for programmers with a background in high-level language programming, this book  applies the Deitel signature live-code approach to teaching programming and explores the Java language and Java APIs in depth. The book presents concepts in the context of fully tested programs, complete with syntax shading, code highlighting, line-by-line code walkthroughs and program outputs. The book features 200+ complete Java programs with 18,000+ lines of proven Java code, and hundreds of tips that will help you build robust
applications.

 Start with an introduction to Java using an early classes and objects approach, then  rapidly move on to more advanced topics, including GUI, graphics, exception handling, generics, collections, JDBC™, web-application development with JavaServer™ Faces, web services and more. You’ll enjoy the Deitels’ classic treatment of object-oriented programming and the OOD/UML® ATM case study, including a complete Java implementation. When you’re finished, you’ll have everything you need to build object-oriented Java applications.

Practical, example-rich coverage of:
Java SE 7
Classes, Objects, Encapsulation, Inheritance, Polymorphism, Interfaces
Integrated OOP Case Studies
Industrial-Strength, 95-Page OOD/UML® ATM Case Study
JavaServer™ Faces 2.0, Ajax-Enabled Web Apps, Web Services, Networking
JDBC™, SQL, Java DB, MySQL®
Threads and the Concurrency APIs
I/O, Types, Control Statements, Methods
Arrays, Generics, Collections
Exception Handling, Files
GUI, Graphics, GroupLayout, JDIC
Using the Debugger and the API Docs
Online, Three-Chapter Introduction to Android™ App Development


Application Security for the Android Platform:


Application Security for the Android Platform:
Processes, Permissions, and Other Safeguards
By Jeff Six
Publisher: O'Re..illy Me..dia 2011 | ISBN: 1449315070
112 Pages | PDF | 6 MB

 This book will educate readers on the need for application security and secure coding  practices when designing any app. No prior knowledge of security or secure programming techniques is assumed. The book will discuss the need for such practices, how the Android environment is structured with respect to security considerations, what services and techniques are available on the platform to protect data, and how developers can build and code applications that address the risk to their applications and the data processed by them.

This text is especially important now, as Android is fast becoming the mobile platform target of choice for attackers attempting to steal data from mobile devices.


Server Architectures:


Server Architectures:
Multiprocessors, Clusters, Parallel Systems, Web Servers, Storage Solutions
René J. Chevance
Publisher: Digitаl Prеss | 2004-12-29 | ISBN: 1555583334
PDF | 784 pages | 7.51 MB

 The goal of this book is to present and compare various options one for systems  architecture from two separate points of view. One, that of the information technology decision-maker who must choose a solution matching company business requirements, and secondly that of the systems architect who finds himself between the rock of changes in hardware and software technologies and the hard place of changing business needs.
 Different aspects of server architecture are presented, from databases designed for  parallel architectures to high-availability systems, and touching en route on often-neglected performance aspects. 

 1. The book provides IT managers, decision makers and project leaders who want to acquire  knowledge sufficient to understand the choices made in and capabilities of systems offered by various vendors:
2. Provides system design information to balance the characteristic applications against  the capabilities and nature of various architectural choices

3. In addition, it offers an integrated view of the concepts in server architecture, accompanied by discussion of effects on the evolution of the data processing industry.


Computer Telephony Demystified


Computer Telephony Demystified
Michael Thomas Bayer -
Publisher: McGrаw-Hill| 2000-08-11 | ISBN: 0071359877
PDF | 704 pages | 7.12 MB

Reshape your world with computer telephony
 The existing telephone infrastructure is quickly being replaced with products, systems,  and solutions based on off-the-shelf computer technology. Michael Bayer’s Computer Telephony Demystified gives you everything you need to take advantage of customizable telephony technology. Perfect for everyone from call center managers, network planners, and CIOs, to telecom engineers, this is the one-stop, plain-English tutorial and reference book on this hot topic.

You’ll find concept-clarifying illustrations and plenty of answers and insights into this key technology area, including: 

 A complete framework for designing and evaluating products, services, and solutions based  on all relevant CT standards specifications
 A thorough explanation of CTI and how to implement and extend call processing  functionality
 Coverage of media services technologies including Text-to-Speech (TTS) and Automatic  Speech Recognition (ASR)
 Integrated explanations of both traditional and next-generation switching fabric  technology such as IP telephony real-world scenarios that demonstrate how CT technology can improve business and day-to-day life

Friday, January 6, 2012

Microsoft Visio 2010 Step by Step


Microsoft Visio 2010 Step by Step
Microsoft Press | April 27, 2011 | ISBN-10: 0735648875
 480 pages | PDF | 66.7 MB

Experience learning made easy—and quickly teach yourself how to create professional-looking business and technical diagrams with Visio 2010. With Step by Step, you set the pace—building and practicing the skills you need, just when you need them!

Build a variety of charts and diagrams with Visio templates
Draw organization charts, floor plans, flowcharts, and more
Apply color, text, and themes to your Visio diagrams
Use Visio shapes to link to, store, and visualize data
Collaborate on diagrams with Microsoft SharePoint® 2010
Create custom diagrams with your own shapes and templates



Download Link

Hacking Exposed - Web Applications


Hacking Exposed - Web Applications
Joel Scambray
Publisher: McGraw-Hill | ISBN: 007222438X | 2002
PDF | 416 pages | 12,9 mb

Covering hacking scenarios across different programming languages and depicting various types of attacks and countermeasures, this book offers you up to date and highly valuable insight into Web application security.
Get in-depth coverage of Web application platforms and their vulnerabilities, presented the same popular format as the international bestseller, Hacking Exposed. Covering hacking scenarios across different programming languages and depicting various types of attacks and countermeasures, this book offers you up-to-date and highly valuable insight into Web application security.


Saturday, December 31, 2011

Data Communications and Networking


Data Communications and Networking
By Behrouz A. Forouzan
Publisher: Mc/Gr a w-Hi ll 2007 | ISBN: 0072967757
 1130 Pages  | PDF | 51 MB

As one of the fastest growing technologies in our culture today, data communications and networking presents a unique challenge for instructors. As both the number and types of students are increasing, it is essential to have a textbook that provides coverage of the latest advances, while presenting the material in a way that is accessible to students with little or no background in the field. Using a bottom-up approach, Data Communications and Networking presents this highly technical subject matter without relying on complex formulas by using a strong pedagogical approach supported by more than 700 figures.
Now in its Fourth Edition, this textbook brings the beginning student right to the forefront of the latest advances in the field, while presenting the fundamentals in a clear, straightforward manner. Students will find better coverage, improved figures and better explanations on cutting-edge material. The "bottom-up" approach allows instructors to cover the material in one course, rather than having separate courses on data communications and networking.


Go Programming


Go Programming
by John P. Baugh
СrеаtеSрасе | 2010 | ISBN: 1453636676
176 pages | PDF | 5 MB

Google's new programming language Go has caused a lot of excitement. As a modern systems programming language, Go offers significant advantages over older languages like C, C++, and Java. This book, "Go Programming" takes an example-based approach to teach the reader how to effectively get started with programming in Go.

From basic variable usage, to control structures, to File I/O, to basic network programming, this book has all you need to become confident with the basics of the language, and will prepare you to create basic programs, as well as to perform more research of the language.