eBooks-it.org Logo
eBooks-IT.org Inner Image

OReilly eBooks Page 27

Download free OReilly eBooks Page 27

Programming Embedded Systems

With C and GNU Development Tools
Programming Embedded Systems Image
2nd Edition
If you have programming experience and a familiarity with C--the dominant language in embedded systems--Programming Embedded Systems, Second Edition is exactly what you need to get started with embedded software. This software is ubiquitous, hidden away inside our watches, DVD players, mobile phones, anti-lock brakes, and even a few toasters. The military uses embedded software to guide missiles, detect enemy aircraft, and pilot UAVs. Communication satellites, deep-space probes, and many medical instruments would have been nearly impossible to create without embedded software.The first edition of Programming Embedded Systems taught the subject to tens ...

Theory of Fun for Game Design

Theory of Fun for Game Design Image
2nd Edition
Now in full color, the 10th anniversary edition of this classic book takes you deep into the influences that underlie modern video games, and examines the elements they share with traditional games such as checkers. At the heart of his exploration, veteran game designer Raph Koster takes a close look at the concept of fun and why it's the most vital element in any game.Why do some games become boring quickly, while others remain fun for years? How do games serve as fundamental and powerful learning tools? Whether you're a game developer, dedicated gamer, or curious observer, this illustrated, fully updated edition helps you understand what drives this ...

Understanding MySQL Internals

Understanding MySQL Internals Image
Although MySQL's source code is open in the sense of being publicly available, it's essentially closed to you if you don't understand it. In this book, Sasha Pachev -- a former member of the MySQL Development Team -- provides a comprehensive tour of MySQL 5 that shows you how to figure out the inner workings of this powerful database. You'll go right to heart of the database to learn how data structures and convenience functions operate, how to add new storage engines and configuration options, and much more. The core of Understanding MySQL Internals begins with an Architecture Overview that provides a brief introduction of how the different components of MySQL work together. You then learn the steps for setting up a working compilable copy of the co...

Junos Security

Junos Security Image
Junos Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks.Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat management, and WAN acceleration. Junos Security is a clear and detailed roadmap to the SRX platform. The author's newer book, Juniper SRX Series, covers the SRX devices...

JUNOS High Availability

Best Practices for High Network Uptime
JUNOS High Availability Image
Whether your network is a complex carrier or just a few machines supporting a small enterprise, JUNOS High Availability will help you build reliable and resilient networks that include Juniper Networks devices. With this book's valuable advice on software upgrades, scalability, remote network monitoring and management, high-availability protocols such as VRRP, and more, you'll have your network uptime at the five, six, or even seven nines -- or 99.99999% of the time.Rather than focus on "greenfield" designs, the authors explain how to intelligently modify multi-vendor networks. You'll learn to adapt new devices to existing protocols and platforms, and deploy continuous systems even when reporting scheduled downtime. JUNOS High Availability ...



2007 - 2017 © eBooks-IT.org