HomeHelpSearchVideo SearchAudio SearchLabel Display ReserveMy AccountLibrary Map
Description Field Ind Field Data
Leader LDR cam i 00
Control # 1 hbl99077697
Control # Id 3 GCG
Date 5 20220929124419.0
Fixed Data 8 171002t20182018mauab 001 0 eng
LC Card 10    $a2017046504
Tag 19 19    $a1029662062$a1029808551$a1029862053
ISBN 20    $a9780262037938
ISBN 20    $a0262037939
Obsolete 39    $a318207$cTLC
Cat. Source 40    $aDLC$beng$erda$cDLC$dOCLCO$dOCLCF$dOCLCQ$dYDX$dBDX$dIUL$dHTM$dYDX$dOCLCO$dFM0$dNZAUC$dKSU$dUtOrBLW
Authen. Ctr. 42    $apcc
LC Call 50 00 $aQA76$b.D3333327 2018
Dewey Class 82 00 $a004$223
ME:Pers Name 100 $aDay, Mark Stuart,$eauthor.
Title 245 10 $aBits to bitcoin :$bhow our digital stuff works /$cMark Stuart Day ; with illustrations by C.A. Jennings.
Title:Varint 246 30 $aHow our digital stuff works
Tag 264 264  1 $aCambridge, Massachusetts :$bThe MIT Press,$c[2018]
Tag 264 264  4 $cÃ2018.
Phys Descrpt 300    $axi, 353 pages :$billustrations, maps ;$c24 cm
Tag 336 336    $atext$btxt$2rdacontent
Tag 337 337    $aunmediated$bn$2rdamedia
Tag 338 338    $avolume$bnc$2rdacarrier
Abstract 520    $aAn accessible guide to our digital infrastructure, explaining the basics of operating systems, networks, security, and other topics for the general reader.
Note:General 500    $aIncludes index.
Note:Content 505 $aPart 1. Single process -- Steps -- Processes -- Names -- Recursion -- Limits: imperfect programs -- Limits: perfect programs -- Part 2. Interacting processes -- Coordination -- State, change, and equality -- Controlled access -- Interrupts -- Virtualization -- Separation -- Packets -- Browsing -- Part 3. Unstoppable processes -- Failure -- Software failure -- Reliable networks -- Inside the cloud -- Browsing revisited -- Part 4. Defending processes -- Attackers -- Thompson's hack -- Secrets -- Secure channel, key distribution, and certificates -- Bitcoin goals -- Bitcoin mechanisms -- Looking back.
Subj:Topical 650  0 $aComputer science$vPopular works.
AE:Pers Name 700 $aJennings, C. A.$eillustrator.