Computer Books
Synthesis Lectures on Information Security Pr...
Operating systems provide the fundamental mechanisms for securing computer pro... Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s operating systems designers have explored how to build secure operating systems - operating systems whose mechanisms protect the system against a... more
Pre-Owned CompTIA A+ Core 2 Exam: Guide to Op...
Introduce IT technical support as best-selling authors and educators Andrews W... Introduce IT technical support as best-selling authors and educators Andrews West and Dark explain how to work with users as well as install maintain secure and troubleshoot software in COMPTIA A+ CORE 2 EXAM: GUIDE TO OPERATING SYSTEMS AND SECURITY... more
Pre-Owned Enterprise Mac Security: Mac OS X S...
A common misconception in the Mac community is that Mac s operating system is ... A common misconception in the Mac community is that Mac s operating system is more secure than others. While this might be true in certain cases security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are... more
Hardening Your Macs: Keeping Apple Computers ...
Learn the skills and solutions required to secure your Mac s operating system ... Learn the skills and solutions required to secure your Mac s operating system the underlying hardware and allow users to get work done safely. This book will show you how to create a Mac that s made of steel and won t buckle when attacked! Ok there... more
Expert s Voice in Linux: Pro Linux Embedded S...
When I got started in embedded Linux nearly a decade ago the question was Shou... When I got started in embedded Linux nearly a decade ago the question was Should I even use an operating system? Going with Linux frequently meant porting the operating system to run on your target hardware and building to the tools to do so. Much... more
Made Simple (Apress): Windows Phone 7 Made Si...
With Windows Phone 7 Microsoft has created a completely new smartphone operati... With Windows Phone 7 Microsoft has created a completely new smartphone operating system that focuses on allowing users to be productive with their smartphone in new ways while offering seamless integration and use of Microsoft Office Mobile as well... more
HP Technologies: OpenVMS System Management Gu...
The only book on the topic this edition details for system administrators the ... The only book on the topic this edition details for system administrators the tools technologies and techniques by which they can configure maintain and tune computers running Compaq s OpenVMS operating system. OpenVMS System Management Guide Second... more
Springerbriefs in Computer Science: Secure an...
Comprehensively reviews the cyber security and privacy issues in transportatio... Comprehensively reviews the cyber security and privacy issues in transportation cyber-physical systems (TCPSs) Provides novel solutions for the information/data security and privacy issues in the emerging intelligent transportation system Benefits... more
Computer Shortcuts : QuickStudy Laminated Ref...
Want to save time while surfing the Web or balancing a virtual checkbook? This... Want to save time while surfing the Web or balancing a virtual checkbook? This 4-page guide points out helpful shortcuts that can be found within the most popular Windows PC and Apple Macintosh software including: - Windows Operating System... more
Premier Reference Source: Advanced Operating ...
As any application running on a computer makes use of the operating system the... As any application running on a computer makes use of the operating system the potential impact of improving areas such as memory management process scheduling file systems and device drivers is tremendous. Advanced Operating Systems and Kernel... more
Lecture Notes in Computer Science: Integrity ...
This manual documents the outcome of the EC sponsored project RACE Integrity P... This manual documents the outcome of the EC sponsored project RACE Integrity Primitives Evaluation (R1040) RIPE. This project is a huge joint 350 man-month project conducted by 16 leading European security experts. This book offers expert advice to... more
TinyOS Programming (Paperback)
Do you need to know how to write systems services and applications using the T... Do you need to know how to write systems services and applications using the TinyOS operating system? Learn how to write nesC code and efficient applications with this indispensable guide to TinyOS programming. Detailed examples show you how to... more
Jones & Bartlett Learning Information Systems...
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSUR... PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Security Strategies in Web Applications and Social Networking provides a unique in-depth look at how to secure mobile users as customer-facing information... more
Pre-Owned Troubleshooting and Maintaining You...
∗ What the book covers: Most troubleshooting books concentrate on upgrad... ∗ What the book covers: Most troubleshooting books concentrate on upgrading--and usually hardware at that. This book concentrates on solving problems--whether they are software hardware or operating system problems. In addition Dan offers... more
Pre-Owned Windows 10: The Missing Manual (Pap...
With Windows 8 Microsoft completely reimagined the graphical user interface fo... With Windows 8 Microsoft completely reimagined the graphical user interface for its operating system which now runs on both desktop PCs and tablets but the overhaul was not without hitches and its dueling UIs (one designed for touch the other for... more
Pre-Owned The UNIX Operating System Used [Pap...
CONDITION – USED: Books sold are in GOOD or better condition. Good Condition... CONDITION – USED: Books sold are in GOOD or better condition. Good Condition: Minimal damage to the cover dust jacket may not be included minimal wear to binding most of the pages undamaged(e.g. minimal creases or tears) highlighting / underlining... more
Communications in Computer and Information Sc...
This book constitutes the proceedings of the 5th International Conference ICC3... This book constitutes the proceedings of the 5th International Conference ICC3 2021 held in Coimbatore India during December 16-18 2021. The 14 full papers included in this book were carefully reviewed and selected from 84 submissions. They were... more
FreeBSD Device Drivers : A Guide for the Intr...
Device drivers make it possible for your software to communicate with your har... Device drivers make it possible for your software to communicate with your hardware and because every operating system has specific requirements driver writing is nontrivial. When developing for FreeBSD you ve probably had to scour the Internet and... more
Windows 11 Users Guide: A Quick Reference Gui...
Need information on the New Windows 11 Operating System from Microsoft? Then r... Need information on the New Windows 11 Operating System from Microsoft? Then read on... Microsoft has released the future of the Windows operating system with a user interface completely different from the last Windows 10. There are new settings and... more
Synthesis Lectures on Computer Architecture: ...
In the last few years power dissipation has become an important design constra... In the last few years power dissipation has become an important design constraint on par with performance in the design of new computer systems. Whereas in the past the primary job of the computer architect was to translate improvements in operating... more
Ads related to secure operating systems
Shopping for the best deal on Secure operating systems Computer Books - Select a product below or see other matches to read product reviews, compare prices and store ratings.