Category: Computers

The First Computers--History and Architectures (History of Computing)

This heritage of computing focuses now not on chronology (what got here first and who merits credits for it) yet at the genuine architectures of the 1st machines that made digital computing a pragmatic fact. The e-book covers desktops in-built the USA, Germany, England, and Japan. It makes transparent that comparable options have been usually pursued concurrently and that the early researchers explored many architectures past the von Neumann structure that at last turned canonical. The individuals comprise not just historians but additionally engineers and desktop pioneers.An introductory bankruptcy describes the weather of computing device structure and explains why "being first" is even much less attention-grabbing for pcs than for different parts of expertise. The essays comprise a outstanding quantity of recent fabric, even on recognized machines, and several other describe reconstructions of the historical machines. those investigations are of greater than easily ancient curiosity, for architectures designed to resolve particular difficulties long ago may perhaps recommend new techniques to related difficulties in state-of-the-art machines.Contributors : Titiimaea F. Ala'ilima, Lin Ping Ang, William Aspray, Friedrich L. Bauer, Andreas Brennecke, Chris P. Burton, Martin Campbell-Kelly, Paul Ceruzzi, I. Bernard Cohen, John Gustafson, Wilhelm Hopmann, Harry D. Huskey, Friedrich W. Kistermann, Thomas Lange, Michael S. Mahoney, R. B. E. Napper, Seiichi Okoma, Hartmut Petzold, Raúl Rojas, Anthony E. Sale, Robert W. Seidel, Ambros P. Speiser, Frank H. Sumner, James F. Tau, Jan Van der Spiegel, Eiiti Wada, Michael R. Williams.

Show description

Continue reading The First Computers--History and Architectures (History of Computing)

Kindle Fire: The Missing Manual

By Peter Meyers

Input a shiny new global of leisure with Amazon’s crimson scorching capsule. This consultant lighting the best way with plenty of illustrations and step by step directions for shopping the net, emailing, enjoying video games, and viewing books, videos, and magazines in blazing colour. the way to deal with your media library at the fireplace and within the cloud—and the place to discover the best apps. every little thing you would like is true here.

The very important belongings you have to know:
* learn all approximately it. locate, load, and skim various ebooks, magazines, and newspapers.
* log on. Browse the net and deal with e-mail with a safe wireless connection.
* wear a convey. Watch videos and television sequence, and exhibit your images and videos.
* replenish your jukebox. take heed to your favourite track from Amazon and iTunes.
* Load up on apps. Get well known video games, courses, references, and extra with Amazon’s Apps for Android.
* Take your briefcase. learn PDFs, observe records, Excel spreadsheets, and different medical doctors.

Show description

Continue reading Kindle Fire: The Missing Manual

Buying a Computer For Dummies (For Dummies (Computers))

By Dan Gookin

Knowing that buying a working laptop or computer is an important funding, loved writer Dan Gookin assists readers to find a tailored laptop that fits particular wishes, whereas additionally providing durability. This booklet provides the entire information in an comprehensible, relaxing, pleasant variety, so readers do not feel beaten via all of the offerings they are going to face whilst paying for a working laptop or computer. It walks readers step-by-step via the entire new advancements: CD burner/DVD blend drives, processor enhancements, flat panel monitors, new modem and networking ideas, new peripherals, and extra. it truly is an important reference for first-time machine dealers trying to make a smart buy, and for an individual trying to get an extra machine.

Show description

Continue reading Buying a Computer For Dummies (For Dummies (Computers))

The Computer: A Very Short Introduction

By Darrel Ince

What's the uncomplicated nature of the trendy laptop? How does it paintings? How has it been attainable to squeeze loads strength into more and more smaller machines? what's going to the subsequent generations of desktops appear like? during this Very brief Introduction, Darrel Ince appears to be like on the easy suggestions in the back of all pcs, the adjustments in and software program that allowed desktops to develop into so small and ordinary, the demanding situations produced via the pc revolution--especially complete new modes of cybercrime and safeguard concerns, the net and the arrival of "cloud computing," and the promise of complete new horizons starting up with quantum computing and computing utilizing DNA.

Show description

Continue reading The Computer: A Very Short Introduction

Pro IronPython (Expert's Voice in .NET)

By Alan Harris

IronPython represents a special path for builders attracted to operating with dynamic languages in the .NET Framework. no matter if you are looking to improve functions from scratch or upload performance and maintainability to an present software, IronPython opens many doorways whereas supplying a high–speed, high–performance language that integrates tightly with different .NET languages.

  • Learn to create functions utilizing some great benefits of a dynamically typed language.
  • Discover tips to leverage the facility of IronPython to enhance present functions.
  • Explore interacting with different .NET languages by means of invoking the typical language runtime.

Show description

Continue reading Pro IronPython (Expert's Voice in .NET)


By Daniel Suarez

When a dressmaker of machine video games dies, he leaves at the back of a application that unravels the Internet's interconnected international. It corrupts, kills, and runs self reliant of human keep an eye on. it is as much as Detective Peter Sebeck to wrest the realm from the malevolent digital enemy sooner than its final function is learned: to dismantle society and convey a few new international order.

Show description

Continue reading DAEMON

Honeypots: Tracking Hackers

By Lance Spitzner

During this textual content, the writer of be aware of Your Enemy explores state of the art safeguard applied sciences referred to as Honeypots. It presents examples of genuine international deployments and assurance of the felony matters surrounding using honeypots. The CD comprises white papers, resource code and review software program.

Show description

Continue reading Honeypots: Tracking Hackers

Learning Pentesting for Android Devices

By Aditya Gupta

Android is the most well-liked cellular phone working approach at the moment, with over 1000000 functions. each day thousands of functions are released to the PlayStore, which clients from worldwide obtain and use. usually, those purposes have severe safeguard weaknesses in them, that could lead an attacker to take advantage of the applying and get entry to delicate info. this is often the place penetration checking out comes into play to examine for numerous vulnerabilities. 

studying Pentesting for Android is a realistic and hands-on advisor to take you from the very simple point of Android protection progressively to pentesting and auditing Android. it's a step by step advisor, protecting various options and methodologies that you should research and use as a way to practice genuine existence penetration checking out on Android units and purposes. The ebook begins with the fundamentals of Android safeguard and the permission version, which we'll pass utilizing a customized software, written by means of us. Thereafter we are going to flow to the internals of Android purposes from a safety standpoint, and may opposite and audit them to discover the safety weaknesses utilizing handbook research in addition to utilizing computerized tools. 
we'll then circulate to a dynamic research of Android functions, the place we are going to the way to catch and learn community site visitors on Android units and extract delicate info and documents from a packet catch from an Android equipment. we are going to look at SQLite databases, and discover ways to locate and make the most the injection vulnerabilities. additionally, we are going to inspect root exploits, and the way to use units to get complete entry besides a opposite attach shell. eventually, we are going to tips on how to write a penetration checking out document for an Android program auditing project.

Show description

Continue reading Learning Pentesting for Android Devices

HTML5 Pocket Reference (5th Edition)

By Jennifer Niederst Robbins

Need assistance discovering the appropriate HTML5 aspect or characteristic on your online page or software? HTML5 Pocket Reference is the vintage reference that internet designers and builders were conserving shut handy for greater than 13 years.

This 5th version has been up-to-date to mirror the present nation of HTML5, together with the HTML5 Candidate suggestion, the rising HTML5.1 operating Draft, and the residing WHATWG ordinary.

Features include:
* An alphabetical directory of each aspect and characteristic in HTML5, HTML5.1, and the WHATWG residing standard
* Descriptions, markup examples, content material different types, content material versions, and begin- and end-tag necessities for each element
* At-a-glance notes indicating the variations among the HTML5 necessities and HTML 4.01
* invaluable charts of particular characters
* an summary of HTML5 APIs

If you're an skilled internet fashion designer or developer who wishes a short source for operating with verified internet criteria, this convenient e-book is quintessential.

Show description

Continue reading HTML5 Pocket Reference (5th Edition)