Sold Out
Book Categories |
Trademarks | ||
Preface | ||
Introduction | ||
A User's Guide to This Book | ||
Ch. 1 | Fundamentals | 3 |
Ch. 2 | Communication Technologies | 21 |
Ch. 3 | Basic Communication Services | 38 |
Ch. 4 | Remote Procedure Calls and the Client/Server Model | 56 |
Ch. 5 | Streams | 82 |
Ch. 6 | Corba and Object-Oriented Environments | 92 |
Ch. 7 | Client/Server Computing | 112 |
Ch. 8 | Operating System Support for High-Performance Communication | 141 |
Ch. 9 | The World Wide Web | 159 |
Ch. 10 | The Major Web Technologies | 166 |
Ch. 11 | Related Internet Technologies | 193 |
Ch. 12 | How and Why Computer Systems Fail | 205 |
Ch. 13 | Guaranteeing Behavior in Distributed Systems | 214 |
Ch. 14 | Point-to-Point and Multigroup Considerations | 301 |
Ch. 15 | The Virtually Synchronous Execution Model | 312 |
Ch. 16 | Consistency in Distributed Systems | 335 |
Ch. 17 | Retrofitting Reliability into Complex Systems | 351 |
Ch. 18 | Reliable Distributed Computing Systems | 390 |
Ch. 19 | Security Options for Distributed Settings | 414 |
Ch. 20 | Clock Synchronization and Synchronous Systems | 432 |
Ch. 21 | Transactional Systems | 449 |
Ch. 22 | Probabilistic Protocols | 472 |
Ch. 23 | Distributed System Management | 486 |
Ch. 24 | Cluster Computer Architectures | 504 |
Ch. 25 | Reasoning About Distributed Systems | 516 |
Ch. 26 | Other Distributed and Transactional Systems | 528 |
Appendix: Problems | 543 | |
Bibliography | 557 | |
Index | 581 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionBuilding secure and reliable network applications
X
This Item is in Your InventoryBuilding secure and reliable network applications
X
You must be logged in to review the productsX
X
X
Add Building secure and reliable network applications, As the 'network is the computer' slogan becomes reality so reliability and security of networked applications become more important. Not only are hospitals, air traffic control systems, and telephone systems becoming more networked, but business applicati, Building secure and reliable network applications to the inventory that you are selling on WonderClubX
X
Add Building secure and reliable network applications, As the 'network is the computer' slogan becomes reality so reliability and security of networked applications become more important. Not only are hospitals, air traffic control systems, and telephone systems becoming more networked, but business applicati, Building secure and reliable network applications to your collection on WonderClub |