Skip to main content

Shopping Cart

You're getting the VIP treatment!

Item(s) unavailable for purchase
Please review your cart. You can remove the unavailable item(s) now or we'll automatically remove it at Checkout.
itemsitem
itemsitem

Recommended For You

Loading...

Operating Systems eBooks

If you like Operating Systems eBooks, then you'll love these top picks.
Showing 1 - 24 of 10283 Results
Skip side bar filters
  • DevOps: Introduction to DevOps and its impact on Business Ecosystem

    Introduction to DevOps and its impact on Business Ecosystem

    “It is not the strongest of the species that survive, nor the most intelligent, but the one most responsive to change.”- Charles DarwinAs the industry is moving towards maximum digitization there is a consensus that DevOps practices help you deliver software faster, more reliable, and with fewer errors.DevOps is set of practices and cultural values that have been proven to help organizations of ... Read more

    $3.99 USD or Free with Kobo Plus

  • lex & yacc

    This book shows you how to use two Unix utilities, lex andyacc, in program development. These tools help programmers build compilers and interpreters, but they also have a wider range of applications.The second edition contains completely revised tutorial sections for novice users and reference sections for advanced users. This edition is twice the size of the first and has an expanded index.The ... Read more

    $17.99 USD

  • UNIX System V Network Programming

    by Stephen Rago ...
    Series series Addison-Wesley Professional Computing Series
    Finally, with UNIX® System V Network Programming, an authoritative reference is available for programmers and system architects interested in building networked and distributed applications for UNIX System V. Even if you currently use a different version of the UNIX system, such as the latest release of 4.3BSD or SunOS, this book is valuable to you because it is centered around UNIX System V ... Read more

    $32.99 USD

  • Programming with POSIX Threads

    With this practical book, you will attain a solid understanding of threads and will discover how to put this powerful mode of programming to work in real-world applications.The primary advantage of threaded programming is that it enables your applications to accomplish more than one task at the same time by using the number-crunching power of multiprocessor parallelism and by automatically ... Read more

    $67.99 USD

  • Exploring Expect

    A Tcl-based Toolkit for Automating Interactive Programs

    by Don Libes ...
    Expect is quickly becoming a part of every UNIX user's toolbox. It allows you to automate Telnet, FTP, passwd, rlogin, and hundreds of other applications that normally require human interaction. Using Expect to automate these applications will allow you to speed up tasks and, in many cases, solve new problems that you never would have even considered before.For example, you can use Expect to test ... Read more

    $20.99 USD

  • Using csh & tcsh

    Type Less, Accomplish More

    by Paul DuBois ...
    If you use UNIX, you probably use csh to type commands even if you've never heard of it. It's the standard shell (command line) on most UNIX systems. tcsh is an enhanced version that's freely available and highly recommended.Using csh & tcsh describes from the beginning how to use these shells interactively. More important, it shows how to get your work done faster with less typing. Even if you've ... Read more

    $20.99 USD

  • Practical C Programming

    Why Does 2+2 = 5986?

    There are lots of introductory C books, but this is the first one that has the no-nonsense, practical approach that has made Nutshell Handbooks® famous.C programming is more than just getting the syntax right. Style and debugging also play a tremendous part in creating programs that run well and are easy to maintain. This book teaches you not only the mechanics of programming, but also describes ... Read more

    $20.99 USD

  • Java Cryptography

    Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not ... Read more

    $25.99 USD

  • At Large

    The Strange Case of the World's Biggest Internet Invasion

    Hailed as "a chilling portrait" by The Boston Globe and "a crafty thriller" by Newsweek, this astonishing story of an obsessive hacker promises to change the way you look at the Internet forever.At Large chronicles the massive manhunt that united hard-nosed FBI agents, computer nerds, and uptight security bureaucrats against an elusive computer outlaw who broke into highly secured computer systems ... Read more

    $15.99 USD

  • vi Editor Pocket Reference

    For many users, working in the UNIX environment means using vi, a full-screen text editor available on most UNIX systems. Even those who know vi often make use of only a small number of its features.The vi Editor Pocket Reference is a companion volume to O'Reilly's updated sixth edition of Learning the vi Editor, a complete guide to text editing with vi. New topics in Learning the vi Editor ... Read more

    $7.99 USD

  • Tcl/Tk in a Nutshell

    A Desktop Quick Reference

    The Tcl language and Tk graphical toolkit are simple and powerful building blocks for custom applications. The Tcl/Tk combination is increasingly popular because it lets you produce sophisticated graphical interfaces with a few easy commands, develop and change scripts quickly, and conveniently tie together existing utilities or programming libraries.One of the attractive features of Tcl/Tk is the ... Read more

    $23.99 USD

  • Effective Use of Teams for IT Audits

    by Martin Krist ...
    Most organizations find that an empowered team will improve the effectiveness of the IT auditing function. Such a team has the appropriate authority, resources, and skills to perform a project, determine the solution, and implement that solution without outside intervention. Audit management should establish certain guidelines for the teams to foll ... Read more

    $250.99 USD

  • Coding Theory and Cryptography

    The Essentials, Second Edition

    Series series Chapman & Hall/CRC Pure and Applied Mathematics
    Containing data on number theory, encryption schemes, and cyclic codes, this highly successful textbook, proven by the authors in a popular two-quarter course, presents coding theory, construction, encoding, and decoding of specific code families in an "easy-to-use" manner appropriate for students with only a basic background in mathematics offerin ... Read more

    $150.99 USD

  • Windows 2000 Pro: The Missing Manual

    The Missing Manual

    Windows 2000 Pro combines the friendly interface of Windows 98 with the famous stability of Windows NT. Windows 2000, the successor to NT, introduces many technologies that weren't available in NT, including Plug-and-Play, support for USB devices, power management features, and more. It's 25% faster than Windows 98 and three times as stable. Unfortunately, despite all the enhancements, Microsoft ... Read more

    $15.99 USD

  • Database Nation

    The Death of Privacy in the 21st Century

    Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rights--still use Orwell's "Big Brother" language to ... Read more

    $10.99 USD

  • Crypto

    How the Code Rebels Beat the Government--Saving Privacy in the Digital Age

    by Steven Levy ...
    If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy-the author who made "hackers" a household word-comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"—nerds and visionaries turned ... Read more

    $14.99 USD

  • A Mathematical Introduction to Logic

    A Mathematical Introduction to Logic ... Read more

    $80.99 USD

  • The Cathedral & the Bazaar

    Musings on Linux and Open Source by an Accidental Revolutionary

    Open source provides the competitive advantage in the Internet Age. According to the August Forrester Report, 56 percent of IT managers interviewed at Global 2,500 companies are already using some type of open source software in their infrastructure and another 6 percent will install it in the next two years. This revolutionary model for collaborative software development is being embraced and ... Read more

    $10.99 USD

  • Unix for Oracle DBAs Pocket Reference

    Command Syntax and Scripts

    The Unix for Oracle DBAs Pocket Reference puts within easy reach the commands that Oracle database administrators need most when operating in a Unix environment. If you are an Oracle DBA moving to Unix from another environment such as Windows NT or IBM Mainframe, you know that these commands are far different from those covered in most beginning Unix books. To jump start your learning process, Don ... Read more

    $7.99 USD

  • Peer-to-Peer

    Harnessing the Power of Disruptive Technologies

    by Andy Oram ...
    The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and control to ordinary users.While this book is mostly about the technical ... Read more

    $18.99 USD

  • Java Security

    Writing and Deploying Secure Applications

    by Scott Oaks ...
    One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is the in-depth exploration you need.Java Security, ... Read more

    $31.99 USD

  • AppleScript in a Nutshell

    A Desktop Quick Reference

    AppleScript in a Nutshell is the first complete reference to AppleScript, the popular programming language that gives both power users and sophisticated enterprise customers the important ability to automate repetitive tasks and customize applications. As the Macintosh continues to expand and solidify its base in the multimedia and publishing industries, AppleScript is the tool of choice on this ... Read more

    $20.99 USD

  • Managing NFS and NIS

    Help for Unix System Administrators

    A modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991. But however widespread networks have become, managing a network and getting it to perform well can still be a problem.Managing NFS and NIS, in a new edition based on Solaris 8, is a guide to two tools that are absolutely essential to ... Read more

    $28.99 USD

  • Malicious Mobile Code

    Virus Protection for Windows

    Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when ... Read more

    $28.99 USD