UNIX Network Programming, Volume 2: Interprocess Communications (2nd Edition) This book describes four different forms of IPC in detail:
- message passing (pipes, FIFOs, and message queues),
- synchronization (mutexes, condition variables, read-write locks, file and record locks, and semaphores),
- shared memory (anonymous and named), and
Network Protocol Handbook (4th Edition) All active network protocols, including the most popular TCP/IP, WAN, LAN technologies are fully explained and well illustrated; Covers the latest and emerging technologies such as VOIP, SAN, MAN, VPN/Security, WLAN, VLAN and more.
About the Author
Javvin Technologies Inc., based at the Silicon...
Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit
Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences...