John K. Ousterhout’s Definitive Introduction to Tcl/Tk–Now Fully Updated for Tcl/Tk 8.5 Tcl and the Tk Toolkit, Second Edition, is the fastest way for newcomers to master Tcl/Tk and is the most authoritative resource for experienced programmers seeking to gain from Tcl/Tk 8.5’s powerful enhancements. Written by Tcl/Tk creator John K. Ousterhout and top Tcl/Tk trainer Ken Jones, this updated volume provides the same extraordinary clarity and careful organization that made the first edition the world’s number one Tcl/Tk tutorial. Part I introduces Tcl/Tk through simple scripts that demonstrate its value and offer a flavor of the Tcl/Tk scripting experience. The authors then present detailed, practical guidance on every feature necessary to build effective, efficient production applications–including variables, expressions, strings, lists, dictionaries, control flow, procedures, namespaces, file and directory management, interprocess communication, error and exception handling, creating and using libraries, and more. Part II turns to the Tk extension and Tk 8.5’s new themed widgets, showing how to organize sophisticated user interface elements into modern GUI applications for Tcl. Part III presents incomparable coverage of Tcl’s C functions, which are used to create new commands and packages and to integrate Tcl with existing C software–thereby leveraging Tcl’s simplicity while accessing C libraries or executing performance-intensive tasks. Throughout, the authors illuminate all of Tcl/Tk 8.5’s newest, most powerful improvements. You’ll learn how to use new Starkits and Starpacks to distribute run-time environments and applications through a single file; how to take full advantage of the new virtual file system support to treat entities such as zip archives and HTTP sites as mountable file systems; and more. From basic syntax to simple Tcl commands, user interface development to C integration, this fully updated classic covers it all. Whether you’re using Tcl/Tk to automate system/network administration, streamline testing, control hardware, or even build desktop or Web applications, this is the one Tcl/Tk book you’ll always turn to for answers.
The Gang of Four’s seminal catalog of 23 patterns to solve commonly occurring design problems Patterns allow designers to create more flexible, elegant, and ultimately reusable designs without having to rediscover the design solutions themselves. Highly influential, Design Patterns is a modern classic that introduces what patterns are and how they can help you design object-oriented software and provides a catalog of simple solutions for those already programming in at last one object-oriented programming language. Each pattern: Describes the circumstances in which it is applicable, when it can be applied in view of other design constraints, and the consequences and trade-offs of using the pattern within a larger design Is compiled from real systems and based on real-world examples Includes downloadable C++ source code that demonstrates how patterns can be implemented and Python From the preface: “Once you the design patterns and have had an ‘Aha!’ (and not just a ‘Huh?’) experience with them, you won't ever think about object-oriented design in the same way. You'll have insights that can make your own designs more flexible, modular, reusable, and understandable - which is why you're interested in object-oriented technology in the first place, right?”
Most organizations have a firewall, antivirus software, and intrusion detection systems, all of which are intended to keep attackers out. So why is computer security a bigger problem today than ever before? The answer is simple--bad software lies at the heart of all computer security problems. Traditional solutions simply treat the symptoms, not the problem, and usually do so in a reactive way. This book teaches you how to take a proactive approach to computer security. Building Secure Software cuts to the heart of computer security to help you get security right the first time. If you are serious about computer security, you need to read this book, which includes essential lessons for both security professionals who have come to realize that software is the problem, and software developers who intend to make their code behave. Written for anyone involved in software development and use—from managers to coders—this book is your first step toward building more secure software. Building Secure Software provides expert perspectives and techniques to help you ensure the security of essential software. If you consider threats and vulnerabilities early in the devel-opment cycle you can build security into your system. With this book you will learn how to determine an acceptable level of risk, develop security tests, and plug security holes before software is even shipped. Inside you'll find the ten guiding principles for software security, as well as detailed coverage of: Software risk management for security Selecting technologies to make your code more secure Security implications of open source and proprietary software How to audit software The dreaded buffer overflow Access control and password authentication Random number generation Applying cryptography Trust management and input Client-side security Dealing with firewalls Only by building secure software can you defend yourself against security breaches and gain the confidence that comes with knowing you won't have to play the "penetrate and patch" game anymore. Get it right the first time. Let these expert authors show you how to properly design your system; save time, money, and credibility; and preserve your customers' trust.
Computer Engineering: A DEC View of Hardware Systems Design focuses on the principles, progress, and concepts in the design of hardware systems. The selection first elaborates on the seven views of computer systems, technology progress in logic and memories, and packaging and manufacturing. Concerns cover power supplies, DEC computer packaging generations, general packaging, semiconductor logic technology, memory technology, measuring (and creating) technology progress, structural levels of a computer system, and packaging levels-of -integration. The manuscript then examines transistor circuitry in the Lincoln TX-2, digital modules, PDP-1 and other 18-bit computers, PDP-8 and other 12-bit computers, and structural levels of the PDP-8. The text takes a look at cache memories for PDP-11 family computers, buses, DEC LSI-11, and design decisions for the PDP-11/60 mid-range minicomputer. Topics include reliability and maintainability, price/performance balance, advances in memory technology, synchronization of data transfers, error control strategies, PDP-11/45, PDP-11/20, and cache organization. The selection is a fine reference for practicing computer designers, users, programmers, designers of peripherals and memories, and students of computer engineering and computer science.
A guide to building and modifying Tcl scripts to automate network administration tasks Streamline Cisco network administration and save time with Tcl scripting Cisco networking professionals are under relentless pressure to accomplish more, faster, and with fewer resources. The best way to meet this challenge is to automate mundane or repetitive tasks wherever possible. In this book, three Cisco experts show you how to use Tcl scripting for Cisco IOS devices to do just that. You’ll learn easy techniques for creating, using, and modifying Tcl scripts that run directly on Cisco network devices from the Cisco IOS command line. The authors first teach basic Tcl commands and concepts for capturing and manipulating data and for querying or controlling Cisco equipment. Building on these core skills, they show you how to write scripts that automate and streamline many common IOS configuration, monitoring, and problem-solving tasks. The authors walk through the entire script development process, including planning and flowcharting what you want to accomplish, formatting your code, adding comments, and troubleshooting script errors. They also present many downloadable sample scripts, along with practical guidance for adapting them to your own environment. Whatever your role in managing, monitoring, or securing Cisco IOS networks and equipment, this book will help you get the job done more rapidly and efficiently. Automate routine administration tasks you’ve always performed manually Instantly collect and modify IOS router configurations and other data Write Syslog scripts to document failures, monitor network health, collect statistics, and send alarm messages Implement automated network performance measurement using IP SLA Use the Embedded Event Manager’s event detectors, server, and policies to customize device operation Trigger preplanned actions to correct problems as they arise Simplify policy management using the Tcl script refresh feature Protect Tcl script security with digital signatures and PKI Understand how Tcl functions within the Cisco IOS environment Master Tcl syntax and commands through hands-on practice Learn best scripting practices through expert examples Quickly modify this book’s examples for your own environment This book is part of the Networking Technology Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
This book was originally written to support an introductory course in Object Orientation through the medium of Smalltalk (and VisualWorks in particular). However, it can be used as a book to teach the reader Smalltalk, to introduce object orientation as well as present object oriented design and analysis. It takes as its basic premise that most Computer Scientists I Software Engineers learn best by doing rather than from theoretical notes. The chapters therefore attempt to introduce concepts by getting you the reader to do things, rather than by extensive theoretical discussions. This means that these chapters take a hands-on approach to the subject and assume that the student/reader has a suitable Small talk environment available to them. The chapters are listed below and are divided into six parts. The reader is advised to work through Parts 1 and 3 thoroughly in order to gain a detailed understanding of object orientation. Part 2 then provides an introduction to the Smalltalk environment and language. Other chapters may then be dipped into as required. For example, if the reader wishes to hone their Smalltalk skills then the chapters in Part 4 would be useful. However, if at that point they wish to get on and discover the delights of graphical user interfaces in Smalltalk, then Part 5 could be read next. Part 6 presents some more advances subjects such as metaclasses and concurrency which are not required for straight forward Small talk development.
Explains how to build a scrolling game engine, play sound effects, manage compressed audio streams, build multiplayer games, construct installation scripts, and distribute games to the Linux community.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.