Book Description
Back in the mid 90s, Beej got tired of all his friends asking him how to do this stuff with networking programming in C, so he put pen to paper on the early World Wide Web and wrote down everything he knew just to get them off his back. Since then, the Guide has expanded significantly, with plenty of examples, and covers IPv6. Inside you'll find such diverse topics as: Sockets programming in the C programming language, client/server, IPv4 and IPv6, data encoding, lots of manual pages rewritten in a friendlier format with examples, and goats! Actually no goats, but goats will be with you in spirit!
This open book is licensed under a Open Publication License (OPL). You can download Beej's Guide to Network Programming ebook for free in PDF format (0.8 MB).
Table of Contents
Chapter 1
Intro
Chapter 2
What is a socket?
Chapter 3
IP Addresses, structs, and Data Munging
Chapter 4
Jumping from IPvnn
Chapter 5
System Calls or Bust
Chapter 6
Client-Server Background
Chapter 7
Slightly Advanced Techniques
Chapter 8
Common Questions
Chapter 9
Man Pages
Chapter 10
More References
Book Details
Title
Beej's Guide to Network Programming
Subject
Computer Science
Publisher
Self-publishing
Published
2020
Pages
134
Edition
1
Language
English
ISBN13 Digital
9781705309902
ISBN10 Digital
1705309909
PDF Size
0.8 MB
License
Open Publication License
This is an intro to C for folks who already know how to program in another language. The first half of the book is written in a tutorial style, while the second half is a reference section complete with examples (inspired by the incomparable Turbo C Bible). The goal is to keep this up-to-date with the latest C standards.
This guide assumes that ...
Invent Your Own Computer Games with Python teaches you how to program in the Python language. Each chapter gives you the complete source code for a new game, and then teaches the programming concepts from the examples. Games include Guess the Number, Hangman, Tic Tac Toe, and Reversi. This book also has an introduction to making games with 2D graph...
This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments ...
This book is aimed at readers who are interested in software development but have very little to no prior experience. The book focuses on teaching the core principles around software development. It uses several technologies to this goal (e.g. C, Python, JavaScript, HTML, etc.) but is not a book about the technologies themselves. The reader will le...
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out.
Simply put, this book is designed to empower and excite the programming community to go out and do co...
When you explore a new technology landscape, the journey can take you to places you never expected. Take O'Reilly's CTO, Andrew Odewahn. While working on ideas for a new publishing platform, Andrew kept notes as he probed the depth and breadth of what we call the "distributed development stack" (DDS).
As patterns emerged, and...