“As an author, editor, and publisher, I never paid much attention to the competition–except in a few cases. This is one of those cases. The UNIX System Administration Handbook is one of the few books we ever measured ourselves against.” –From the Foreword by Tim O’Reilly, founder of O’Reilly Media …
Cloud Computing
Introduction to Computer Security is a new Computer Security textbook for a new generation of IT professionals. It is ideal for computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence (e.g., CS 1/CS 2). Unlike most other computer security textbooks available today, Introduction to …
Master your virtual environment with the ultimate vSphere guide Mastering VMware vSphere 6 is the fully updated edition of the bestselling guide to VMware’s virtualization solution. With comprehensive coverage of this industry-leading toolset, this book acts as an informative guide and valuable reference. Step-by-step instruction walks you through installation, configuration, operation, security processes, and much more as …
An ideal first text on communication systems in electrical engineering, Modern Digital and Analog Communication Systems is now in its fourth edition. Retaining the superb pedagogical style of the first three editions, the authors first introduce the fundamentals of signals and systems and core communication topics; they then present the tools essential to the design and analysis of …
Unlike some operating systems, Linux doesn’t try to hide the important bits from you—it gives you full control of your computer. But to truly master Linux, you need to understand its internals, like how the system boots, how networking works, and what the kernel actually does.In this completely revised second edition of the perennial best seller How Linux …
Discrete-Time Signal Processing (3rd Edition) (Prentice-Hall Signal Processing Series)
For senior/graduate-level courses in Discrete-Time Signal Processing. Discrete-Time Signal Processing, Third Edition is the definitive, authoritative text on DSP – ideal for those with introductory-level knowledge of signals and systems. Written by prominent DSP pioneers, it provides thorough treatment of the fundamental theorems and properties of discrete-time linear systems, filtering, sampling, and discrete-time Fourier Analysis. By …
Cryptography and Network Security: Principles and Practice (6th Edition)
For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is suitable for self-study and so provides a solid and up-to-date tutorial. The book is also a comprehensive treatment of cryptography and network security and so is suitable as a reference for a system engineer, programmer, system manager, network manager, product marketing …
MANAGEMENT OF INFORMATION SECURITY, Fourth Edition gives readers an overview of information security and assurance using both domestic and international standards, all from a management perspective. Beginning with the foundational and technical components of information security, this edition then focuses on access control models, information security governance, and information security program assessment and metrics.The Fourth Edition is revised …
5 Gears: How to Be Present and Productive When There Is Never Enough Time
Be present, connect more effectively, all while being as productive as possible5 Gears: How to Be Present and Productive When There Is Never Enough Time teaches you to shift into the right gear at the right time so that you can grow in your relational intelligence and increase your influence. This revolutionary text introduces you to the five …
Computer Networks, 5/e is appropriate for Computer Networking or Introduction to Networking courses at both the undergraduate and graduate level in Computer Science, Electrical Engineering, CIS, MIS, and Business Departments. Tanenbaum takes a structured approach to explaining how networks work from the inside out. He starts with an explanation of the physical layer of networking, computer hardware …