UNIX Network Programming

Author: W. Richard Stevens
Publisher: Addison-Wesley Professional
ISBN: 0131411551
Release Date: 2004
Genre: Computers

* *Previous editions sold over 160,000 units! Second Edition (1998) sold over 53,000 in retail alone! *Updates coverage of programming standards, debugging techniques, and covers Operating Systems including Red Hat 9, Solaris 9, HP-UX, Free BSD 4.8/5.0, AIX 5.x, and Mac OS X. *Bill Fenner (AT/T Labs) and Andrew Rudoff (SUN) carry on the tradition of this great work.

UNIX Network Programming Interprocess communications

Author: W. Richard Stevens
Publisher: Prentice Hall
ISBN: 0130810819
Release Date: 1999
Genre: Computers

Well-implemented interprocess communications (IPC) are key to the performance of virtually every non-trivial UNIX program. This book provides coverage of various forms of IPC, including message passing, synchronization, shared memory, and Remote Procedure Calls (RPC). It offers a basic introduction to IPC and the problems it is intended to solve.

UNIX System V Network Programming

Author: Stephen A. Rago
Publisher: Addison-Wesley Professional
ISBN: 9780133893014
Release Date: 1993-03-31
Genre: Computers

Finally, with UNIX® System V Network Programming, an authoritative reference is available for programmers and system architects interested in building networked and distributed applications for UNIX System V. Even if you currently use a different version of the UNIX system, such as the latest release of 4.3BSD or SunOS, this book is valuable to you because it is centered around UNIX System V Release 4, the version of the UNIX system that unified many of the divergent UNIX implementations. For those professionals new to networking and UNIX system programming, two introductory chapters are provided. The author then presents the programming interfaces most important to building communication software in System V, including STREAMS, the Transport Layer Interface library, Sockets, and Remote Procedure Calls. So that your designs are not limited to user-level, the author also explains how to write kernel-level communication software, including STREAMS drivers, modules, and multiplexors. Many examples are provided, including an Ethernet driver and a transport-level multiplexing driver. In the final chapter, the author brings the material from previous chapters together, presenting the design of a SLIP communication package.

Adventures in UNIX network applications programming

Author: Bill Rieken
Publisher: Wiley
ISBN: 0471528595
Release Date: 1992-11-04
Genre: Computers

Written to help you with the ten percent of the network programming that consumes ninety percent of your time and causes most of your vexing problems, it teaches communications/network programing, including interprocess communicator, protocols, and process level application programming. Geared to the growing number of programmers in the UNIX workstation environment, it covers a variety of the most widely used protocols of OSI, TCP/IP, X.25, Berkeley Sockets, AT&T System V Streams and more. In addition, it develops the code for solutions to typical problems in network software programming and offers numerous practical and helpful examples.

IPv6 Network Programming

Author: Jun-ichiro itojun Hagino
Publisher: Elsevier
ISBN: 0080478794
Release Date: 2004-11-16
Genre: Computers

This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to take a security stance - to audit every line of code, to use proper API and write correct and secure code as much as possible. To achieve this goal, the examples presented in this book are implemented with a security stance. Also, the book leads you to write secure programs. For instance, the book recommends against the use of some of the IPv6 standard APIs - unfortunately, there are some IPv6 APIs that are inherently insecure, so the book tries to avoid (and discourage) the use of such APIs. Another key issue is portability. The examples in the book should be applicable to any of UNIX based operating systems, MacOS X, and Windows XP. * Covers the new protocol just adopted by the Dept of Defense for future systems * Deals with security concerns, including spam and email, by presenting the best programming standards * Fully describes IPv6 socket APIs (RFC2553) using real-world examples * Allows for portability to UNIX-based operating systems, MacOS X, and Windows XP

Network programming interface

Publisher: Prentice Hall
ISBN: UOM:39015029875229
Release Date: 1992
Genre: Computers

Covers development tools needed to create applications based on a client/server model of computing. Describes the programming interfaces to SVR4.2 networking facilities such as TLI (Transport Library Interface), Sockets, Remote Procedure Call (RPC), Connection Server, and REXEC.

Advanced Programming in the UNIX Environment

Author: W. Richard Stevens
Publisher: Addison-Wesley
ISBN: 9780321638007
Release Date: 2013-06-10
Genre: Computers

For more than twenty years, serious C programmers have relied on one book for practical, in-depth knowledge of the programming interfaces that drive the UNIX and Linux kernels: W. Richard Stevens’ Advanced Programming in the UNIX® Environment . Now, once again, Rich’s colleague Steve Rago has thoroughly updated this classic work. The new third edition supports today’s leading platforms, reflects new technical advances and best practices, and aligns with Version 4 of the Single UNIX Specification. Steve carefully retains the spirit and approach that have made this book so valuable. Building on Rich’s pioneering work, he begins with files, directories, and processes, carefully laying the groundwork for more advanced techniques, such as signal handling and terminal I/O. He also thoroughly covers threads and multithreaded programming, and socket-based IPC. This edition covers more than seventy new interfaces, including POSIX asynchronous I/O, spin locks, barriers, and POSIX semaphores. Most obsolete interfaces have been removed, except for a few that are ubiquitous. Nearly all examples have been tested on four modern platforms: Solaris 10, Mac OS X version 10.6.8 (Darwin 10.8.0), FreeBSD 8.0, and Ubuntu version 12.04 (based on Linux 3.2). As in previous editions, you’ll learn through examples, including more than ten thousand lines of downloadable, ISO C source code. More than four hundred system calls and functions are demonstrated with concise, complete programs that clearly illustrate their usage, arguments, and return values. To tie together what you’ve learned, the book presents several chapter-length case studies, each reflecting contemporary environments. Advanced Programming in the UNIX® Environment has helped generations of programmers write code with exceptional power, performance, and reliability. Now updated for today’s systems, this third edition will be even more valuable.

Network Programming with Perl

Author: Lincoln D. Stein
Publisher: Addison-Wesley Professional
ISBN: 0201615711
Release Date: 2001
Genre: Computers

A text focusing on the methods and alternatives for designed TCP/IP-based client/server systems and advanced techniques for specialized applications with Perl. A guide examining a collection of the best third party modules in the Comprehensive Perl Archive Network. Topics covered: Perl function libraries and techniques that allow programs to interact with resources over a network. IO: Socket library ; Net: FTP library -- Telnet library -- SMTP library ; Chat problems ; Internet Message Access Protocol (IMAP) issues ; Markup-language parsing ; Internet Protocol (IP) broadcasting and multicasting.

UNIX Network Programming Volume 2

Author: W. Richard Stevens
Publisher: Prentice Hall
ISBN: 0132974290
Release Date: 1998-08-25
Genre: Computers

Well-implemented interprocess communications (IPC) are key to the performance of virtually every non-trivial UNIX program. In UNIX Network Programming, Volume 2, Second Edition, legendary UNIX expert W. Richard Stevens presents a comprehensive guide to every form of IPC, including message passing, synchronization, shared memory, and Remote Procedure Calls (RPC). Stevens begins with a basic introduction to IPC and the problems it is intended to solve. Step-by-step you'll learn how to maximize both System V IPC and the new Posix standards, which offer dramatic improvements in convenience and performance.

Network Security with OpenSSL

Author: John Viega
Publisher: "O'Reilly Media, Inc."
ISBN: 0596551975
Release Date: 2002-06-17
Genre: Computers

Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it can be used programmatically or from the command line to secure most TCP-based network protocols.Network Security with OpenSSL enables developers to use this protocol much more effectively. Traditionally, getting something simple done in OpenSSL could easily take weeks. This concise book gives you the guidance you need to avoid pitfalls, while allowing you to take advantage of the library?s advanced features. And, instead of bogging you down in the technical details of how SSL works under the hood, this book provides only the information that is necessary to use OpenSSL safely and effectively. In step-by-step fashion, the book details the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges.As a system or network administrator, you will benefit from the thorough treatment of the OpenSSL command-line interface, as well as from step-by-step directions for obtaining certificates and setting up your own certification authority. As a developer, you will further benefit from the in-depth discussions and examples of how to use OpenSSL in your own programs. Although OpenSSL is written in C, information on how to use OpenSSL with Perl, Python and PHP is also included.OpenSSL may well answer your need to protect sensitive data. If that?s the case, Network Security with OpenSSL is the only guide available on the subject.

Objektorientierte Middleware Konzepte und Infrastrukturen in verteilten Anwendungen

Author: Hans Heering
Publisher: diplom.de
ISBN: 9783832412005
Release Date: 1998-12-01
Genre: Computers

Inhaltsangabe:Gang der Untersuchung: Die Diplom-Arbeit richtet sich einerseits an IT-Verantwortliche aus dem Management im Rahmen der Entscheidung des Software-Reengineering versus Integration und andererseits an Entwickler, die sich einen umfassenden Überblick unten aufgeführter Aspekte der verteilten Anwendungsentwicklung und ihrer Alternativen verschaffen wollen. ·Die Arbeit beginnt mit einem themenabgrenzenden Überblick über Verteilungsmodelle und Middleware-Konzepte der letzten Jahre. Es werden Basis-Kommunikationsmechanismen (RPC, Message Queuing), SQL-Middleware im Datenbank-Bereich, objekt-orientierte Verteilungsverfahren (CORBA) und Transaktions-Monitore kurz vorgestellt. ·Das Kapitel 2 wird sich mit der Beschreibung und dem Einsatz objektorientierter Verteilungsmechanismen der Common Object Request Broker Architecture (CORBA) befassen. In diesem Rahmen muß auch näher auf die Paradigmen und Konzepte der Objektorientierung eingegangen werden. Danach werden die historischen Entwicklungen, Grundlagen, Dienste (fortan Services und Facilities genannt) und Architekturkonzepte der Object Management Architecture (OMA) vorgestellt. Neben den Komponenten des Object Adapters, Interface- und Implementation-Repository werden hier ebenfalls Mechanismen zur Selbstbeschreibung (Datentyp any und TypeCodes), Interoperabilität und Dynamisierung (Dynamic Invocation- und Dynamic Skeleton-Interface) beschrieben. Im Anschluß wird zur Veranschaulichung eine kleine Beispielanwendung (Taschenrechner) implementiert (Kapitel 3), die Wrapper-Technik erörtert und Zum Beweis der Integrationsfähigkeit ein auf Methodenebene standardgerechter Namensdienst und sein Gebrauch (Kapitel 4) vorgestellt. ·Daran schließen sich die Beschreibung und der Vergleich konkurrierender Verteilungstechnologien an, in der näher auf Microsofts COM/DCOM- und Sun Microsystems Java RMI-Technologie eingegangen wird (Kapitel 5). In den Schlußbemerkungen (Kapitel 6) kommt es zur einer kritischen Würdigung, in der Aspekte wie fehlende Standardisierungsdetails, mangelnde Unterstützung von Fehlerbedingungen (Exceptions) und Wertesemantiken (Objekt-Referenzen) behandelt werden, und einem Ausblick auf zukünftige Entwicklungen (CORBA 3.0). Abgerundet wird diese Ausarbeitung von einem Anhang, in dem IDL-Schnittstellen, tabellarische Übersichten über Services, Features und unterstützte Betriebssysteme der jeweiligen, verfügbaren CORBA-Produkte und ein Quellenverzeichnis zur Literatur und dem World [...]