![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
TCP/IP (Transmission Control Protocol/Internet Protocol) is the
suite of communications protocols used to connect hosts on the
Internet. TCP/IP uses several protocols, the two main ones being
TCP and IP. TCP/IP is built into the UNIX operating system and is
used by the Internet, making it the de facto standard for
transmitting data over networks. The TCP/IP suite of protocols has
become a dominant technology due to its widespread use and
reliability, while Ethernet is fast becoming a de facto industrial
networking standard.
This bestselling on-the-job reference and test preparation guide has been fully revised for new 2022 exam objectives This fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1101 & 220-1102. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CompTIA A+ exams with ease, this definitive guide also serves as an essential on-the-job IT reference. Covers all exam topics, including how to: Work with CPUs, RAM, BIOS, motherboards, power supplies, and other personal computer components Install, configure, and maintain hard drives Manage input devices and removable media Set up, upgrade, and maintain Microsoft Windows Troubleshoot and fix computer problems Install printers and other peripherals Configure and secure mobile devices >Connect to the Internet Set up wired and wireless networks Protect your personal computer and your network Implement virtualization and cloud-based technologies Online content includes: Practice exams for 1101 & 1102 with hundreds of questions One hour of video training from Mike Meyers TotalSim simulations of performance-based questions A collection of Mike Meyers' favorite shareware and freeware PC tools and utilities
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Bestselling CompTIA A+ author Mike Meyers provides hands-on, step-by-step labs-updated for the 2012 release of Exam 220-802-so you can practice the IT skills essential for your successMike Meyers' CompTIA A+ Guide to Managing and Troubleshooting Operating Systems Lab Manual, Fourth Edition contains more than 80 labs that challenge you to solve real-world problems with key concepts. Clear, measurable lab objectives map to certification exam objectives, ensuring direct correspondence to Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting Operating Systems, Fourth Edition. Lab solutions are only available to instructors and are not printed inside the book. The Lab Manual also includes materials lists and lab set-up instructions. Step-by-step, not click-by click, lab scenarios require you to think critically, and Hint and Warning icons guide you through potentially tricky situations. Post-lab observation questions measure your understanding of lab results and the key term quiz helps to build your vocabulary.
Each Student Book and ActiveBook have has clearly laid out pages with a range of supportive features to aid learning and teaching: Getting to know your unit sections ensure learners understand the grading criteria and unit requirements. Getting ready for Assessment sections focus on preparation for external assessment with guidance for learners on what to expect. Hints and tips will help them prepare for assessment and sample answers are provided for a range of question types including, short and long answer questions, all with a supporting commentary. Learners can also prepare for internal assessment using this feature. A case study of a learner completing the internal assessment for that unit covering 'How I got started', 'How I brought it all together' and 'What I got from the experience'. Pause Point feature provide opportunities for learners to self-evaluate their learning at regular intervals. Each Pause Point point feature gives learners a Hint or Extend option to either revisit and reinforce the topic or to encourage independent research or study skills. Case Study and Theory into Practice features enable development of problem-solving skills and place the theory into real life situations learners could encounter. Assessment Activity/Practice provide scaffolded assessment practice activities that help prepare learners for assessment. Within each assessment practice activity, a Plan, Do and Review section supports learners' formative assessment by making sure they fully understand what they are being asked to do, what their goals are and how to evaluate the task and consider how they could improve. Dedicated Think Future pages provide case studies from the industry, with a focus on aspects of skills development that can be put into practice in a real work environment and further study.
As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system. The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs. The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.
Intelligent systems are rapidly becoming a central focus of study for researchers as they have the ability to learn and adapt during their existence in order to achieve certain goals and objectives. Intelligent Systems for Automated Learning and Adaptation: Emerging Trends and Applications presents methodologies, architectures, and approaches on experiential automated learning. This critical mass of sought after research assembles the most intriguing and innovative applications, advancements, and leading studies on the methodology of intellectual computing.
This book is the sixth volume of the successful book series on Robot Operating System: The Complete Reference. The objective of the book is to provide the reader with comprehensive coverage of the Robot Operating Systems (ROS) and the latest trends and contributed systems. ROS is currently considered as the primary development framework for robotics applications. There are seven chapters organized into three parts. Part I presents two chapters on the emerging ROS 2.0 framework; in particular, ROS 2.0 is become increasingly mature to be integrated into the industry. The first chapter from Amazon AWS deals with the challenges that ROS 2 developers will face as they transition their system to be commercial-grade. The second chapter deals with reactive programming for both ROS1 and ROS. In Part II, two chapters deal with advanced robotics, namely on the usage of robots in farms, and the second deals with platooning systems. Part III provides three chapters on ROS navigation. The first chapter deals with the use of deep learning for ROS navigation. The second chapter presents a detailed tuning guide on ROS navigation and the last chapter discusses SLAM for ROS applications. I believe that this book is a valuable companion for ROS users and developers to learn more ROS capabilities and features.
As technology expands and evolves, one-dimensional, graphical user
interface (GUI) design becomes increasingly limiting and
simplistic. Designers must meet the challenge of developing new and
creative interfaces that adapt to meet human needs and
technological trends. HCI Beyond the GUI provides designers with
this know how by exploring new ways to reach users that involve all
of the human senses. Dr. Kortum gathers contributions from leading
human factors designers to present a single reference for
professionals, researchers, and students.
Microsoft Forefront is a comprehensive suite of security products
that will provide companies with multiple layers of defense against
threats. Computer and Network Security is a paramount issue for
companies in the global marketplace. Businesses can no longer
afford for their systems to go down because of viruses, malware,
bugs, trojans, or other attacks. Running a Microsoft Forefront
Suite within your environment brings many different benefits.
Forefront allows you to achieve comprehensive, integrated, and
simplified infrastructure security. This comprehensive suite of
tools provides end-to-end security stretching from Web servers back
to the desktop. This book will provide system administrators
familiar with Syngress' existing Microsoft networking and security
titles with a complete reference to Microsoft's flagship security
products.
Digital signal processing is now a growing area of study invading all walks of organizational life, from consumer products to database management. ""Web-Based Supply Chain Management and Digital Signal Processing: Methods for Effective Information Administration and Transmission"" presents trends and techniques for successful intelligent decision-making and transfer of products through digital signal processing. A defining collection of field advancements, this publication provides the latest and most complete research in supply chain management with examples and case studies useful for those involved with various levels of management.
A virtual evolution in IT shops large and small has begun. VMware s
ESX Server is the enterprise tool to free your infrastructure from
its physical limitations providing the great transformation into a
virtual environment--this book shows you how. Use Syngress proven
How to Cheat methodology to configure and build VMware s ESX Server
version 3. This clear, concise guide provides all the information
you need to become a virtual whiz
" Biometric Technologies and Verification Systems" is organized
into nine parts composed of 30 chapters, including an extensive
glossary of biometric terms and acronyms. It discusses the current
state-of-the-art in biometric verification/authentication,
identification and system design principles. It also provides a
step-by-step discussion of how biometrics works; how biometric data
in human beings can be collected and analyzed in a number of ways;
how biometrics are currently being used as a method of personal
identification in which people are recognized by their own unique
corporal or behavioral characteristics; and how to create detailed
menus for designing a biometric verification system.
This second edition is not only a thorough update of the first
edition, it is also a marriage of the best-known RISC
architecture--MIPS--with the best-known open-source OS--Linux. The
first part of the book begins with MIPS design principles and then
describes the MIPS instruction set and programmers resources. It
uses the MIPS32 standard as a baseline (the 1st edition used the
R3000) from which to compare all other versions of the architecture
and assumes that MIPS64 is the main option. The second part is a
significant change from the first edition. It provides concrete
examples of operating system low level code, by using Linux as the
example operating system. It describes how Linux is built on the
foundations the MIPS hardware provides and summarizes the Linux
application environment, describing the libraries, kernel
device-drivers and CPU-specific code. It then digs deep into
application code and library support, protection and memory
management, interrupts in the Linux kernel and multiprocessor
Linux.
Over 95% of computers around the world are running at least one
Microsoft product. Microsoft Windows Software Update Service is
designed to provide patches and updates to every one of these
computers.
This book contains extended and revised versions of the best papers presented at the 27th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2019, held in Cusco, Peru, in October 2019. The 15 full papers included in this volume were carefully reviewed and selected from the 28 papers (out of 82 submissions) presented at the conference. The papers discuss the latest academic and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) design, considering the challenges of nano-scale, state-of-the-art and emerging manufacturing technologies. In particular they address cutting-edge research fields like heterogeneous, neuromorphic and brain-inspired, biologically-inspired, approximate computing systems.
This book is designed to cover three objectives. One, to provide a comprehensive resource to individuals (including novice, IT/Non-HP-UX administrators, HP-UX administrators) who intend to take the Certified System Administrator for HP-UX certification exam and pass it. Two, to provide a quick and valuable on-the-job resource to HP-UX administrators, administrators of other UNIX operating system software, IT managers, programmers, and DBAs working in the HP-UX environment. Three, to provide an easy-to-understand guide to novice and IT/non-HP-UX administrators who intend to learn HP-UX from the beginning. This book contains 33 chapters. The book is organized in such a way that it helps its audience understand concepts, implementation procedures, some basic troubleshooting, command syntax, configuration files, and daemons involved. There are three key areas: UNIX fundamentals, HP-UX system administration, and HP-UX network administration. 1.UNIX Fundamentals covers the basics of UNIX. Most information is not specific to a particular UNIX flavor, but rather includes general UNIX concepts, file manipulation and security techniques, shell and awk programming, vi editor, basic commands, and other topics. Chapters 01 through 06 and chapter 21 cover this area. Unlike many other similar books, a chapter on shell scripting is presented after covering HP-UX System Administration chapters. This is done intentionally to provide readers with some practical examples based on the knowledge they have gained from UNIX Fundamentals and HP-UX System Administration chapters. 2.HP-UX System Administration covers the HP-UX-specific system administration concepts and topics including HP-UX installation methods; software and patch management; user and group account administration; disk and device file management; LVM and file system administration; swap space and printer management; system startup and shutdown procedures; kernel reconfiguration techniques; backup, restore, and system recovery functions; job automation and process control; system logging and performance monitoring; and so on. Chapters 07 through 20 cover this area. 3.HP-UX Network Administration covers HP-UX network administration concepts and topics such as OSI and TCP/IP models; network hardware overview; LAN card administration; IP subnetting and routing techniques; network troubleshooting tools; system startup services; naming services such as DNS, NIS, and LDAP; File sharing tools viz. NFS and AutoFS; Time synchronization using NTP; internet services administration; BootP/TFTP services; system security; and so on. Chapters 22 through 33 cover this area. The beginning of each chapter highlights objectives covered. The end of each chapter includes a summary as to what is learnt in the chapter. Throughout the book tables, figures, screen shots, and examples are given to explain concepts and tasks. The output generated as a result of running commands is highlighted in light grey background to differentiate it with surrounding text. The book includes several appendices one of which contains more than 550 practice exam questions. Tables of commands, important files, and service daemons are included in separate appendices.
As advances in technology continue to generate the collective knowledge of an organization and its operations, strategic models for information systems are developed in order to arrange business processes and business data. Frameworks for Developing Efficient Information Systems: Models, Theory, and Practice presents research and practices on the advancements in systems analysis and design. These theoretical frameworks and practical solutions are useful for researchers, practitioners, and academicians as this book aims to bridge the communication gap between business managers and system designers.
How to Cheat at Managing Windows Small Business Server 2003 deals
only with the vital, and will be a huge relief to the hundreds of
thousands of managers who probably never imagined they would be
managing the operating system equivalent of the Space Shuttle.
This book is the fifth volume in the successful book series Robot Operating System: The Complete Reference. The objective of the book is to provide the reader with comprehensive coverage on the Robot Operating System (ROS), which is currently considered to be the primary development framework for robotics applications, and the latest trends and contributing systems. The content is divided into six parts. Pat I presents for the first time the emerging ROS 2.0 framework, while Part II focuses on multi-robot systems, namely on SLAM and Swarm coordination. Part III provides two chapters on autonomous systems, namely self-driving cars and unmanned aerial systems. In turn, Part IV addresses the contributions of simulation frameworks for ROS. In Part V, two chapters explore robotic manipulators and legged robots. Finally, Part VI presents emerging topics in monocular SLAM and a chapter on fault tolerance systems for ROS. Given its scope, the book will offer a valuable companion for ROS users and developers, helping them deepen their knowledge of ROS capabilities and features.
This two-part book puts the spotlight on how a real-time kernel works using Micrium's C/OS-III kernel as a reference. Part I includes an overview of the operation of real-time kernels, and walks through various aspects of C/OS-III implementation and usage. Part II provides application examples (using the versatile Renesas YRDKRX62N Evaluation Board, available separately) that enable readers to rapidly develop their own prototypes. This book is written for serious embedded systems programmers, consultants, hobbyists, and students interested in understanding the inner workings of a real-time kernel. C/OS-III is not just a great learning platform, but also a full commercial-grade software package, ready to be part of a wide range of products. C/OS-III is a highly portable, ROMable, scalable, preemptive real-time, multitasking kernel designed specifically to address the demanding requirements of today 's embedded systems. C/OS-III is the successor to the highly popular C/OS-II real-time kernel but can use most of C/OS-II 's ports with minor modifications. Some of the features of C/OS-III are: Preemptive multitasking with round-robin scheduling of tasks at
the same priority
This book puts the spotlight on how a real-time kernel works using Micrium s C/OS-III as a reference. The book consists of two complete parts. The first describes real-time kernels in generic terms. Part II provide examples for the reader, using Texas Instruments EVM-EVALBOT, a small, robotic evaluation board. The board is based on the Stellaris LM3S9B92 which combines the popular ARM Cortex-M3(r) architecture with Ethernet MAC+PHY, USB OTG (On-The-Go), and I2S. Together with the IAR Systems Embedded Workbench for ARM development tools, the evaluation board provides everything necessary to enable the reader to be up and running quickly, as well as a fun and educational experience, resulting in a high-level of proficiency in a short time. This book is written for serious embedded systems programmers, consultants, hobbyists, and students interested in understanding the inner workings of a real-time kernel. C/OS-III is not just a great learning platform, but also a full commercial-grade software package, ready to be part of a wide range of products. C/OS-III is a highly portable, ROMable, scalable, preemptive real-time, multitasking kernel designed specifically to address the demanding requirements of today s embedded systems. C/OS-III is the successor to the highly popular C/OS-II real-time kernel but can use most of C/OS-II s ports with minor modifications. Some of the features of C/OS-III are: Preemptive multitasking with round-robin scheduling of tasks at
the same priority
This book highlights how real-time kernels work, using Micrium s C/OS-III as a reference. The book consists of two parts: Part I describes real-time kernels in generic terms, while Part II provides practical examples using NXP s LPC1768 Microcontroller, based on the ARM Cortex M3(rev 2) architecture. A companion evaluation board (Keil MCB1700) and IDE (Keil MDK Evaluation Version) enable the reader to quickly and easily evaluate the microcontroller, tools and RTOS. A range of examples are included, providing a unique hands-on experience, and leading to a faster and better understanding of the concepts presented in the book. This book is written for serious embedded systems programmers, consultants, hobbyists, and students interested in understanding the inner workings of a real-time kernel. C/OS-III is not just a great learning platform, but also a full commercial-grade software package, ready to be part of a wide range of products. C/OS-III is a highly portable, ROMable, scalable, preemptive real-time, multitasking kernel designed specifically to address the demanding requirements of today s embedded systems. C/OS-III is the successor to the highly popular C/OS-II real-time kernel but can use most of C/OS-II s ports with minor modifications. Some of the features of C/OS-III are: Preemptive multitasking with round-robin scheduling of tasks at
the same priority
This book focuses on key simulation and evaluation technologies for 5G systems. Based on the most recent research results from academia and industry, it describes the evaluation methodologies in depth for network and physical layer technologies. The evaluation methods are discussed in depth. It also covers the analysis of the 5G candidate technologies and the testing challenges, the evolution of the testing technologies, fading channel measurement and modeling, software simulations, software hardware cosimulation, field testing and other novel evaluation methods. The fifth-generation (5G) mobile communications system targets highly improved network performances in terms of the network capacity and the number of connections. Testing and evaluation technologies is widely recognized and plays important roles in the wireless technology developments, along with the research on basic theory and key technologies. The investigation and developments on the multi-level and comprehensive evaluations for 5G new technologies, provides important performance references for the 5G technology filtering and future standardizations. Students focused on telecommunications, electronic engineering, computer science or other related disciplines will find this book useful as a secondary text. Researchers and professionals working within these related fields will also find this book useful as a reference. |
![]() ![]() You may like...
UC/OS-III - The Real-Time Kernel and the…
Jean J. Labrosse, Juan P. Benavides, …
Hardcover
R2,426
Discovery Miles 24 260
Behavioral Modeling for Embedded Systems…
Luis Gomes, Joao M Fernandes
Hardcover
R5,013
Discovery Miles 50 130
Uncertainty-aware Integration of Control…
Vassilis M. Charitopoulos
Hardcover
R2,960
Discovery Miles 29 600
Evaluating Children's Interactive…
Panos Markopoulos, Janet C. Read, …
Paperback
R1,205
Discovery Miles 12 050
|