Sign up
Forgot password?
FAQ: Login

Kernighan Brian W. D is for Digital. What a well-informed person should know about computers and communications

  • pdf file
  • size 3,09 MB
  • added by
  • info modified
Kernighan Brian W. D is for Digital. What a well-informed person should know about computers and communications
CreateSpace Independent Publishing Platform, 2011. — 238 p.
Hardware
What's in a Computer?
Logical Construction
CPU
RAM
Disks and secondary storage

Et cetera
Physical Construction
Moore's Law
Bits, Bytes, and Representation of Information
Analog versus Digital
Analog-Digital Conversion
Bits, Bytes, and Binary
Bits
Powers of two and powers of ten
Binary numbers
Bytes
Summary

Inside the CPU
The Toy Computer
Real CPUs
Caching
Other Kinds of Computers
Wrapup on Hardware
Software
Algorithms
Linear Algorithms
Binary Search
Sorting
Hard Problems and Complexity
Programming and Programming Languages
Assembly Language
High-Level Languages
Software Development
5.3.1 Libraries, interfaces, and development kits
Bugs

Software as Property
Intellectual property
Standards
Open-source

Software Systems
Operating Systems
How an Operating System Works
System calls
Device drivers
Other Operating Systems
File Systems
Disk file systems
Removing files
Other file systems

Applications
Layers of Software
Learning to Program
Programming Language Concepts
A First JavaScript Example
A Second JavaScript Example
Loops
Conditionals
Libraries and Interfaces
How JavaScript Works
Wrapup on Software
Communications
Networking
Telephones and Modems
Cable and DSL
Local Area Networks and Ethernet
Wireless
Cell Phones
The Internet
An Internet Overview
Domain Names and Addresses
Domain Name System
IP addresses
Root servers
Registering your own domain

Routing
Protocols
IP, the Internet Protocol
TCP, the Transmission Control Protocol

Higher-level Protocols
FTP: File Transfer Protocol
Telnet: remote login
SMTP: Simple Mail Transfer Protocol
File sharing and peer-to-peer protocols
An aside on copyright
Summary of high-level protocols

Bandwidth
Compression
Error Detection and Correction
The World Wide Web
How the Web Works
HTML
Forms
Cookies
Active Content in Web Pages
Active Content Elsewhere
Viruses and Worms
Web Security
Attacks on clients
Attacks on servers
Attacks on information in transit
Defending yourself

Cryptography
Secret-key cryptography
Public-key cryptography
Data, Information, and Privacy
Search
Tracking
Databases, Information, and Aggregation
Giving It Away
Cloud Computing
Wrapping Up
  • Sign up or login using form at top of the page to download this file.
  • Sign up
Up