52 products were found matching your search for System Kernel in 2 shops:
-
Linux System Programming: Talking Directly to the Kernel and C Library
Vendor: Abebooks.com Price: 4.52 $Write software that draws directly on services offered by the Linux kernel and core system libraries. With this comprehensive book, Linux kernel contributor Robert Love provides you with a tutorial on Linux system programming, a reference manual on Linux system calls, and an insider’s guide to writing smarter, faster code.Love clearly distinguishes between POSIX standard functions and special services offered only by Linux. With a new chapter on multithreading, this updated and expanded edition provides an in-depth look at Linux from both a theoretical and applied perspective over a wide range of programming topics, including:A Linux kernel, C library, and C compiler overviewBasic I/O operations, such as reading from and writing to filesAdvanced I/O interfaces, memory mappings, and optimization techniquesThe family of system calls for basic process managementAdvanced process management, including real-time processesThread concepts, multithreaded programming, and PthreadsFile and directory managementInterfaces for allocating memory and optimizing memory accessBasic and advanced signal interfaces, and their role on the systemClock management, including POSIX clocks and high-resolution timers
-
Expert Trading Systems: Modeling Financial Markets with Kernel Regression
Vendor: Abebooks.com Price: 26.68 $With the proliferation of computer programs to predict market direction, professional traders and sophisticated individual investors have increasingly turned to mathematical modeling to develop predictive systems. Kernel regression is a popular data modeling technique that can yield useful results fast. Provides data modeling methodology used to develop trading systems. * Shows how to design, test, and measure the significance of results John R. Wolberg (Haifa, Israel) is professor of mechanical engineering at the Haifa Institute in Israel. He does research and consulting in data modeling in the financial services area.
-
Expert Trading Systems : Modeling Financial Markets With Kernel Regression
Vendor: Abebooks.com Price: 63.41 $With the proliferation of computer programs to predict market direction, professional traders and sophisticated individual investors have increasingly turned to mathematical modeling to develop predictive systems. Kernel regression is a popular data modeling technique that can yield useful results fast. Provides data modeling methodology used to develop trading systems. * Shows how to design, test, and measure the significance of results John R. Wolberg (Haifa, Israel) is professor of mechanical engineering at the Haifa Institute in Israel. He does research and consulting in data modeling in the financial services area.
-
Unix Systems for Modern Architectures: Symmetric Multiprocessing and Caching for Kernel Programmers
Vendor: Abebooks.com Price: 57.19 $Any UNIX programmer using the latest workstations or super minicomputers from vendors such as Sun, Silicon Graphics (SGI), AT&T, Amdahl, IBM, Apple, Compaq, Mentor Graphics, and Thinking Machines needs this book to optimize his/her job performance. This book teaches how these architectures operate using clear, comprehensible examples to explain the concepts, and provides a good reference for people already familiar with the basic concepts.
-
The Art of Linux Kernel Design: Illustrating the Operating System Design Principle and Implementation
Vendor: Abebooks.com Price: 207.18 $Uses the Running Operation as the Main Thread Difficulty in understanding an operating system (OS) lies not in the technical aspects, but in the complex relationships inside the operating systems. The Art of Linux Kernel Design: Illustrating the Operating System Design Principle and Implementation addresses this complexity. Written from the perspective of the designer of an operating system, this book tackles important issues and practical problems on how to understand an operating system completely and systematically. It removes the mystery, revealing operating system design guidelines, explaining the BIOS code directly related to the operating system, and simplifying the relationships and guiding ideology behind it all. Based on the Source Code of a Real Multi-Process Operating System Using the 0.11 edition source code as a representation of the Linux basic design, the book illustrates the real states of an operating system in actual operations. It provides a complete, systematic analysis of the operating system source code, as well as a direct and complete understanding of the real operating system run-time structure. The author includes run-time memory structure diagrams, and an accompanying essay to help readers grasp the dynamics behind Linux and similar software systems. Identifies through diagrams the location of the key operating system data structures that lie in the memory Indicates through diagrams the current operating status information which helps users understand the interrupt state, and left time slice of processes Examines the relationship between process and memory, memory and file, file and process, and the kernel Explores the essential association, preparation, and transition, which is the vital part of operating system Develop a System of Your Own This text offers an in-dep
-
Linux Kernel Development 3 ed
Vendor: Abebooks.com Price: 33.47 $Linux Kernel Development details the design and implementation of the Linux kernel, presenting the content in a manner that is beneficial to those writing and developing kernel code, as well as to programmers seeking to better understand the operating system and become more efficient and productive in their coding. The book details the major subsystems and features of the Linux kernel, including its design, implementation, and interfaces. It covers the Linux kernel with both a practical and theoretical eye, which should appeal to readers with a variety of interests and needs. The author, a core kernel developer, shares valuable knowledge and experience on the 2.6 Linux kernel. Specific topics covered include process management, scheduling, time management and timers, the system call interface, memory addressing, memory management, the page cache, the VFS, kernel synchronization, portability concerns, and debugging techniques. This book covers the most interesting features of the Linux 2.6 kernel, including the CFS scheduler, preemptive kernel, block I/O layer, and I/O schedulers. The third edition of Linux Kernel Development includes new and updated material throughout the book: An all-new chapter on kernel data structures Details on interrupt handlers and bottom halves Extended coverage of virtual memory and memory allocation Tips on debugging the Linux kernel In-depth coverage of kernel synchronization and locking Useful insight into submitting kernel patches and working with the Linux kernel community
-
Microc Os Ii: the Real Time Kernel (with Cd-rom)
Vendor: Abebooks.com Price: 2.96 $MicroC/OS II Second Edition describes the design and implementation of the MicroC/OS-II real-time operating system (RTOS). In addition to its value as a reference to the kernel, it is an extremely detailed and highly readable design study particularly useful to the embedded systems student. While documenting the design and implementation of the kernel, the book also walks the reader through the many related development issues: how to adapt the kernel for a new microprocessor, how to install the kernel, and how to structure the applications that run on the kernel. This edition features documentation for several important new features of the software, including new real-time services, floating points, and coding conventions. The accompanying CDROM includes complete code for the MicroC/OS-II kernel.
-
A Guide to Kernel Exploitation: Attacking the Core
Vendor: Abebooks.com Price: 51.18 $A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented categorically so that even when a specifically detailed vulnerability has been patched, the foundational information provided will help hackers in writing a newer, better attack; or help pen testers, auditors, and the like develop a more concrete design and defensive structure. The book is organized into four parts. Part I introduces the kernel and sets out the theoretical basis on which to build the rest of the book. Part II focuses on different operating systems and describes exploits for them that target various bug classes. Part III on remote kernel exploitation analyzes the effects of the remote scenario and presents new techniques to target remote issues. It includes a step-by-step analysis of the development of a reliable, one-shot, remote exploit for a real vulnerabilitya bug affecting the SCTP subsystem found in the Linux kernel. Finally, Part IV wraps up the analysis on kernel exploitation and looks at what the future may hold.Covers a range of operating system families ― UNIX derivatives, Mac OS X, WindowsDetails common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditionsDelivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks
-
Mc/os the Real-time Kernel
Vendor: Abebooks.com Price: 70.14 $This book explains the design and implementation of C/OS [pronounced "MicroC/OS"], the Micro-Controller Operating System, a portable, ROMable, preemptive, real-time, multitasking kernel for microprocessors. The system is written in C with assembly language code for the target microprocessor kept to a minimum. It can be ported to any microprocessor that provides a stack pointer and allows the CPU registers to be pushed onto and popped from the stack. The C compiler must be ANSI compatible and provide in-line assembly or language extensions that allow you to enable and disable interrupts. The system can manage up to 63 tasks, with performance comparable to many commercially available kernels. An earlier version of C/OS was published in the May and June 1992 issues of Embedded Systems Programming magazine. The code available from that article on bulletin board systems is uncommented. The code provided in "C/OS" the book is fully commented. The current release of the companion code disk V 1.08 has been updated in response to reader response. See the author's Release Notes for more information on revisions to the code. The text explains the fundamentals of multitasking real-time systems, details the design decisions of this kernel, and includes a user's manual for the system. Appendices provide complete code for the system, a port for the Intel 80186/80188 chip, a survey of real-time kernel manufacturers, and references to the technical literature on real-time and embedded systems. Source code is provided, so you can add your own custom features. Integrating C/OS in your application can be done in less than one day. C/OS can be ported to a different microprocessor within a few days, because assembly code has been kept to a minimum. Audience: To use the book, you should be familiar with the ANSI standard for C, and have at least a minimum understanding of assembly language for the Intel 80x86 family of microprccessors.
-
Designing BSD Rootkits : An Introduction to Kernel Hacking
Vendor: Abebooks.com Price: 41.09 $Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process.Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and developing rootkits under the FreeBSD operating system. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD.Kongs liberal use of examples assumes no prior kernel-hacking experience but doesn't water down the information. All code is thoroughly described and analyzed, and each chapter contains at least one real-world application.Included:The fundamentals of FreeBSD kernel module programmingUsing call hooking to subvert the FreeBSD kernelDirectly manipulating the objects the kernel depends upon for its internal record-keepingPatching kernel code resident in main memory; in other words, altering the kernel's logic while it's still runningHow to defend against the attacks describedHack the FreeBSD kernel for yourself!
-
Microc/os-ii: the Real-time Kernel
Vendor: Abebooks.com Price: 100.12 $Showcases the new features in version 2.0, demonstrates the operating system's abilities, and offers a concise explanation of real-time computing
-
A Guide to Kernel Exploitation: Attacking the Core
Vendor: Abebooks.com Price: 20.00 $A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented categorically so that even when a specifically detailed vulnerability has been patched, the foundational information provided will help hackers in writing a newer, better attack; or help pen testers, auditors, and the like develop a more concrete design and defensive structure. The book is organized into four parts. Part I introduces the kernel and sets out the theoretical basis on which to build the rest of the book. Part II focuses on different operating systems and describes exploits for them that target various bug classes. Part III on remote kernel exploitation analyzes the effects of the remote scenario and presents new techniques to target remote issues. It includes a step-by-step analysis of the development of a reliable, one-shot, remote exploit for a real vulnerabilitya bug affecting the SCTP subsystem found in the Linux kernel. Finally, Part IV wraps up the analysis on kernel exploitation and looks at what the future may hold.Covers a range of operating system families ― UNIX derivatives, Mac OS X, WindowsDetails common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditionsDelivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks
-
Linux Core Kernel Commentary: Guide to Insider's Knowledge on the Core Kernel of the Linux Code
Vendor: Abebooks.com Price: 74.84 $The first 400 pages reproduce a selected subset of the Linux kernel source code. Maxwell, who writes software at the Jet Propulsion Laboratory, then comments on the code, discussing in each chapter a different kernel subsystem or other logical group of functionality, such as system calls or memory management. The CD-ROM contains the source code plus linux 2.2.5, linux 2.2.10 and linux 2.3.12. Annotation c. Book News, Inc., Portland, OR (booknews.com)
-
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Vendor: Abebooks.com Price: 44.84 $Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examples Covers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniques Provides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by step Demystifies topics that have a steep learning curve Includes a bonus chapter on reverse engineering tools Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals.
-
Understanding the LINUX Kernel: From I/O Ports to Process Management
Vendor: Abebooks.com Price: 39.51 $Why is Linux so efficient? Is it the right operating system for a particular application? What can be learned from looking at the kernel source code? These are the kinds of questions that Understanding the Linux Kernel takes in stride in this guided tour of the code that forms the core of all Linux operating systems.Linux is presented too often as a casual hacker experiment. It has increasingly become not only a mission-critical part of many organizations, but a sophisticated display of programming skill. It incorporates many advanced operating system concepts and has proven itself extremely robust and efficient for a wide range of uses.Understanding the Linux Kernel helps readers understand how Linux performs best and how it meets the challenge of different environments. The authors introduce each topic by explaining its importance, and show how kernel operations relate to the utilities that are familiar to Unix programmers and users.Major topics include:Memory management, including file buffering, process swapping, and Direct Memory Access (DMA)The Virtual File System and the Second Extended File SystemProcess creation and schedulingSignals, interrupts, and the essential interfaces to device driversTimingSynchronization in the kernelInter-Process Communication (IPC)Program execution
-
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Vendor: Abebooks.com Price: 32.06 $Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examples Covers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniques Provides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by step Demystifies topics that have a steep learning curve Includes a bonus chapter on reverse engineering tools Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals.
-
Solaris Internals: Core Kernel Architecture
Vendor: Abebooks.com Price: 55.71 $This is Sun's definitive guide to the internals of SunOS, the operating system component of Sun's Solaris operating environment. It will be invaluable for anyone responsible for Solaris management, maintenance, performance and/or application tuning. This book covers all aspects of SunOS internals, especially major kernel data structures and kernel code algorithms, with a focus on practical applications. Understand how the Solaris operating environment is organized; including the kernel directory hierarchy, system facilities, interfaces, system calls, libraries, Posix support, and more. Review processes, threads, the dispatcher, and the Virtual File System (VFS). Understand the Solaris Memory Architecture, virtual memory, and interprocess communications -- and master memory analysis, sizing and capacity planning.
-
Linux Kernel Internals
Vendor: Abebooks.com Price: 66.85 $Explains the inner mechanisms of Linux from process scheduling to memory management and file systems. CD-ROM included. Paper.
-
Designing BSD Rootkits: An Introduction to Kernel Hacking
Vendor: Abebooks.com Price: 37.74 $Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process.Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and developing rootkits under the FreeBSD operating system. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD.Kongs liberal use of examples assumes no prior kernel-hacking experience but doesn't water down the information. All code is thoroughly described and analyzed, and each chapter contains at least one real-world application.Included:The fundamentals of FreeBSD kernel module programmingUsing call hooking to subvert the FreeBSD kernelDirectly manipulating the objects the kernel depends upon for its internal record-keepingPatching kernel code resident in main memory; in other words, altering the kernel's logic while it's still runningHow to defend against the attacks describedHack the FreeBSD kernel for yourself!
-
OS X and iOS Kernel Programming
Vendor: Abebooks.com Price: 69.74 $OS X and iOS Kernel Programming combines essential operating system and kernel architecture knowledge with a highly practical approach that will help you write effective kernel-level code. You'll learn fundamental concepts such as memory management and thread synchronization, as well as the I/O Kit framework. You'll also learn how to write your own kernel-level extensions, such as device drivers for USB and Thunderbolt devices, including networking, storage and audio drivers. OS X and iOS Kernel Programming provides an incisive and complete introduction to the XNU kernel, which runs iPhones, iPads, iPods, and Mac OS X servers and clients. Then, you'll expand your horizons to examine Mac OS X and iOS system architecture. Understanding Apple's operating systems will allow you to write efficient device drivers, such as those covered in the book, using I/O Kit. With OS X and iOS Kernel Programming, you'll: Discover classical kernel architecture topics such as memory management and thread synchronization Become well-versed in the intricacies of the kernel development process by applying kernel debugging and profiling tools Learn how to deploy your kernel-level projects and how to successfully package them Write code that interacts with hardware devices Examine easy to understand example code that can also be used in your own projects Create network filters Whether you're a hobbyist, student, or professional engineer, turn to OS X andiOS Kernel Programming and find the knowledge you need to start developing What you'll learn OS X and iOS common core architecture How to write extremely efficient code by exploiting kernel details Coding kernel-level extensions How to write device drivers How to program the I/O Kit framework Key mobile device topics like power management drivers and video capture modules To understand OS X memory management and threads To parse kernel debug messages and package projects ready for deploym
52 results in 0.261 seconds
Related search terms
© Copyright 2024 shopping.eu