Title Authors Published date Publisher Pages ISBN Summary
80486 Programming Scanlon, Leo J. 1991

9780830635771
Advanced Programming in the UNIX Environment W. Richard Stevens 1992 Addison-Wesley Professional 744 9780201563177 Bestselling UNIX author Stevens offers application and system programmers his professional, experienced-based guidance on using the system call interface with C. Since good examples are the key to a book like this, a simple shell program is developed in the first chapter and then expanded throughout the book to demonstrate the principles.
Algol 68-R. Users' Guide. By P.M. Woodward and S.G. Bond. (Second Edition.). Great Britain. Ministry of Defence 1974 H.M.S.O 99 0117716006
Algorithms in C, Parts 1-4: Fundamentals, Data Structures, Sorting, Searching (3rd Edition) (Pts. 1-4) Robert Sedgewick 1997 Addison-Wesley Professional 720 0201314525
Applied Cryptography Bruce Schneier 1995 Wiley 792 9780471117094 ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine ". . .the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations
C Programming Language Second edition Brian W. Kernighan 2005
272 0131193716
CSS The Missing Manual David McFarland 2006 O'Reilly Media 476 0596526873 Explores CSS tasks and discusses such topics as creating usable Web designs, controlling typography, and choosing appearance-enhancing colors and backgrounds.
Exploring Expect Don Libes 1995 O'Reilly Media 566 9781565920903 Written by the author of Expect, this is the first book to explain how this new part of the UNIX toolbox can be used to automate telnet, ftp, passwd, rlogin, and hundreds of other interactive applications. The book provides lots of practical examples and scripts solving common problems, including a chapter of extended examples.
Firewalls and Internet Security William R. Cheswick, Steven M. Bellovin 1994 Addison-Wesley Professional 306 9780201633573 These authors are both well-known senior researchers at AT&T Bell Labs, and this book is based on their actual experiences maintaining, improving, and redesigning AT&T's Internet gateway. They show why the most popular technologies for keeping intruders out are insufficient, while providing a step-by-step guide to their solution--building firewall gateways.
Informal introduction to ALGOL 68. Revised edition C. H. Lindsey, S. G. van der Meulen 1971 North-Holland Pub. Co
0720420482
Internet Routing Architectures (Design & Implementation) First Edition Bassam Halabi 1997 New Riders Pub
1562056522
Java Handbook Patrick Naughton 1996 Osborne/McGraw-Hill
9780078821998
Lex & Yacc Second edition Doug Brown, John Levine, Tony Mason 1992 O'Reilly Media
9781565920002
Number Theory in Science and Communication Manfred R. Schroeder 1985 Springer 324 3540121641
PGP: Pretty Good Privacy Simson Garfinkel 1995 O'Reilly Media 393 9781565920989 Use of the Internet is expanding beyond anyone's expectations. As corporations, government offices, and ordinary citizens begin to rely on the information highway to conduct business, they are realizing how important it is to protect their communications -- both to keep them a secret from prying eyes and to ensure that they are not altered during transmission. Encryption, which until recently was an esoteric field of interest only to spies, the military, and a few academics, provides a mechanism for doing this. PGP, which stands for Pretty Good Privacy, is a free and widely available encryption program that lets you protect files and electronic mail. Written by Phil Zimmermann and released in 1991, PGP works on virtually every platform and has become very popular both in the U.S. and abroad. Because it uses state-of-the-art public key cryptography, PGP can be used to authenticate messages, as well as keep them secret. With PGP, you can digitally "sign" a message when you send it. By checking the digital signature at the other end, the recipient can be sure that the message was not changed during transmission and that the message actually came from you. PGP offers a popular alternative to U.S. government initiatives like the Clipper Chip because, unlike Clipper, it does not allow the government or any other outside agency access to your secret keys. PGP: Pretty Good Privacy by Simson Garfinkel is both a readable technical user's guide and a fascinating behind-the-scenes look at cryptography and privacy. Part I, "PGP Overview," introduces PGP and the cryptography that underlies it. Part II, "Cryptography History and Policy," describes the history of PGP -- its personalities, legal battles, and other intrigues; it also provides background on the battles over public key cryptography patents and the U.S. government export restrictions, and other aspects of the ongoing public debates about privacy and free speech. Part III, "Using PGP," describes how to use PGP: protecting files and email, creating and using keys, signing messages, certifying and distributing keys, and using key servers. Part IV, "Appendices," describes how to obtain PGP from Internet sites, how to install it on PCs, UNIX systems, and the Macintosh, and other background information. The book also contains a glossary, a bibliography, and a handy reference card that summarizes all of the PGP commands, environment variables, and configuration variables.
POSIX.4 Programmers Guide Bill Gallmeister 1995 O'Reilly Media 548 9781565920743 Written in an informal, informative style, this authoritative guide goes way beyond the standard reference manual. It discusses each of the POSIX.4 facilities and what they mean, why and when you would use each of these facilities, and trouble spots you might run into. c.
Tcl and the Tk Toolkit John K. Ousterhout 1994 Addison-Wesley Professional 480 9780201633375
TCP/IP Illustrated: The protocols W. Richard Stevens, Gary R. Wright 1994 Edward Elgar Publishing 600 9780201633467 This book's innovative approach helps readers at all levels to truly understand how TCP/IP really works. Rather than just describing what the RFCs say the protocol suite should do, TCP/IP Illustrated uses a popular diagnostic tool so you can actually watch the protocols in action. By forcing certain conditions to occur (connection establishment, timeout and retransmission, fragmentation, etc.) and watching the results, Rich Stevens provides insight into how the protocols work, and why certain design decisions were made. Written in his well-known style with lots of examples, Stevens shows how current, popular TCP/IP implementations operate (SunOS 4.1.3, Solaris 2.2, System V Release 4, BSD/386, AIX 3.2.2, and 4.4 BSD), and relates these real-world implementations to the RFC standards.
The Practical Performance Analyst Neil J. Gunther 1998 McGraw-Hill Companies 432 9780079129468 This book will help you master performance analysis and apply it at either end of the development cycle: to support decisions in the early stages of system design, or to evaluate your existing system.
The RS232 Solution Joe Campbell 1989 Sybex Inc 196 9780895884886
Understanding PostScript David A. Holzgang 1992 Sybex Inc.
9780782110593
UNIX Internals Uresh Vahalia 1996 Pearson 601 9780131019089 This book offers an up-to-date, in-depth, and broad-based exploration of the latest advances in UNIX-based operating systems. Focusing on the design and implementation of the operating system itself, this text compares and analyzes the alternatives offered by several important UNIX variants, and covers several advanced subjects, such as multi-processors and threads.
UNIX Network Programming Volume 1 W. Richard Stevens 1997 Prentice Hall 1009 013490012X
Unix System Security Patrick H. Wood, Stephen G. Kochan 1991 Hayden Books 541 9780672484940
UNIX Systems for Modern Architectures Curt Schimmel 1994 Addison-Wesley Professional 396 0201633388 Any UNIX programmer using the latest workstations or super minicomputers from vendors such as Sun, Silicon Graphics (SGI), ATandT, Amdahl, IBM, Apple, Compaq, Mentor Graphics, and Thinking Machines needs this book to optimize his/her job performance. This book teaches how these architectures operate using clear, comprehensible examples to explain the concepts, and provides a good reference for people already familiar with the basic concepts.
XML Complete Steven Holzner 1998 Computing McGraw-Hill 515 0079137024 Introduces the features of the XML (eXtensible Markup Language), shows how to create Web documents, and shares shortcuts and step-by-step tutorials