Skip to main content

Books in Operating systems

    • Quantum Computing

      • 1st Edition
      • June 30, 2025
      • Rajkumar Buyya + 1 more
      • English
      • Paperback
        9 7 8 0 4 4 3 2 9 0 9 6 1
      • eBook
        9 7 8 0 4 4 3 2 9 0 9 7 8
      Quantum Computing: Principles and Paradigms covers a broad range of topics, providing a state-of-the-art and comprehensive reference for the rapid progress in the field of quantum computing and related technologies from major international companies (such as IBM, Google, Intel, Rigetti, Q-Control) and academic researchers. This book appeals to a broad readership, as it covers comprehensive topics in the field of quantum computing, including hardware, software, algorithms, and applications, with chapters written by both academic researchers and industry developers.This book presents readers with the fundamental concepts of quantum computing research, along with the challenges involved in developing practical devices and applications.
    • Windows Registry Forensics

      • 2nd Edition
      • March 3, 2016
      • Harlan Carvey
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 2 9 1 6
      • eBook
        9 7 8 0 1 2 8 0 3 3 3 5 7
      Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition, provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of the Registry to help users develop an understanding of the structure of registry hive files, as well as information stored within keys and values that can have a significant impact on forensic investigations. Tools and techniques for post mortem analysis are discussed at length to take users beyond the current use of viewers and into real analysis of data contained in the Registry. This second edition continues a ground-up approach to understanding so that the treasure trove of the Registry can be mined on a regular and continuing basis.
    • Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

      • 1st Edition
      • December 10, 2015
      • Henry Dalziel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 1 8 7
      • eBook
        9 7 8 0 1 2 8 0 5 1 0 5 4
      Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defences for these attacks.
    • Deploying Secure Containers for Training and Development

      • 1st Edition
      • December 10, 2015
      • Henry Dalziel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 1 7 0
      • eBook
        9 7 8 0 1 2 8 0 5 1 0 4 7
      In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided.
    • Operating System Forensics

      • 1st Edition
      • November 12, 2015
      • Ric Messier
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 9 4 9 8
      • eBook
        9 7 8 0 1 2 8 0 1 9 6 3 4
      Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference. Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical concepts, and the tools needed to perform examinations. Mobile operating systems such as Android, iOS, Windows, and Blackberry are also covered, providing everything practitioners need to conduct a forensic investigation of the most commonly used operating systems, including technical details of how each operating system works and how to find artifacts. This book walks you through the critical components of investigation and operating system functionality, including file systems, data recovery, memory forensics, system configuration, Internet access, cloud computing, tracking artifacts, executable layouts, malware, and log files. You'll find coverage of key technical topics like Windows Registry, /etc directory, Web browers caches, Mbox, PST files, GPS data, ELF, and more. Hands-on exercises in each chapter drive home the concepts covered in the book. You'll get everything you need for a successful forensics examination, including incident response tactics and legal requirements. Operating System Forensics is the only place you'll find all this covered in one book.
    • Thor's OS Xodus

      • 1st Edition
      • October 28, 2015
      • Timothy "Thor" Mullen
      • English
      • Paperback
        9 7 8 0 1 2 4 1 0 4 6 3 1
      • eBook
        9 7 8 0 1 2 4 1 0 5 0 6 5
      Thor's OS Xodus: Securely Migrating from Microsoft Windows to Mac OS X provides readers with everything they need to securely and successfully migrate from Microsoft to Mac. It includes information that can be found nowhere else, enabling users to execute a MSFT to OS X migration seamlessly and with minimal downtime. The text is the most complete roadmap for entities that want to move away from Microsoft and decouple their dependency on Microsoft products. It is a perfect choice for enterprise computing, providing the ease and simplicity of a UI that can also be incredibly customized via configuration files because of its BSD core. The text, authored by Thor Mullen, the founder of the "Hammer of God" security co-op group and Principal Security Architect for a worldwide, multi-billion dollar commerce platform, provides the perfect combination of Windows and Unix.
    • Alpha Architecture Reference Manual

      • 1st Edition
      • June 28, 2014
      • Alpha Architecture Committee
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 0 9 8 8
      • eBook
        9 7 8 1 4 8 3 2 9 4 3 3 9
      This is the authoritative reference on Digital Equipment Corporation's new 64-bit RISC Alpha architecture. Written by the designers of the internal Digital specifications, this book contains complete descriptions of the common architecture required for all implementations and the interfaces required to support the OSF/1 and OpenVMS operating systems.
    • Computer System Organization

      • 1st Edition
      • June 25, 2014
      • Elliott I. Organick
      • Robert L. Ashenhurst
      • English
      • Paperback
        9 7 8 1 4 8 3 2 0 5 6 1 8
      • eBook
        9 7 8 1 4 8 3 2 1 9 0 4 2
      Computer System Organization: The B5700/B6700 Series focuses on the organization of the B5700/B6700 Series developed by Burroughs Corp. More specifically, it examines how computer systems can (or should) be organized to support, and hence make more efficient, the running of computer programs that evolve with characteristically similar information structures. Comprised of nine chapters, this book begins with a background on the development of the B5700/B6700 operating systems, paying particular attention to their hardware/software architecture. The discussion then turns to the block-structured processes involved in the B6700 job, which consists of a time-invariant algorithm and a time-varying data structure which is the record of execution of that algorithm. Subsequent chapters deal with the basic data structures for B6700 algorithms; task attributes and the creation and coordination of tasks; stack structure and stack ownership; and software interrupts. Storage control strategies as well as the pros and cons of B6700 are also considered, along with some hardware details of procedure entry and return and tasking. This monograph is intended for computer center directors, other computer professionals, and serious students in computer science who have an interest in the subject of computer organization.
    • The Hacker's Guide to OS X

      • 1st Edition
      • November 16, 2012
      • Alijohn Ghassemlouei + 2 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 5 0 7
      • eBook
        9 7 8 1 5 9 7 4 9 9 5 4 5
      Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide links from the authors, commentary and updates.
    • Embedded Linux Development Using Eclipse

      • 1st Edition
      • November 13, 2008
      • Doug Abbott
      • English
      • Paperback
        9 7 8 0 7 5 0 6 8 6 5 4 9
      • eBook
        9 7 8 0 0 8 0 9 4 2 7 9 7
      The Eclipse environment solves the problem of having to maintain your own Integrated Development Environment (IDE), which is time consuming and costly. Embedded tools can also be easily integrated into Eclipse. The C/C++CDT is ideal for the embedded community with more than 70% of embedded developers using this language to write embedded code. Eclipse simplifies embedded system development and then eases its integration into larger platforms and frameworks. In this book, Doug Abbott examines Eclipse, an IDE, which can be vital in saving money and time in the design and development of an embedded system. Eclipse was created by IBM in 2001 and then became an open-source project in 2004. Since then it has become the de-facto IDE for embedded developers. Virtually all of the major Linux vendors have adopted this platform, including MontVista, LynuxWorks, and Wind River.