0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (82)
  • R500+ (1,094)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General

Practical TCP/IP and Ethernet Networking for Industry (Paperback): Deon Reynders, Edwin Wright Practical TCP/IP and Ethernet Networking for Industry (Paperback)
Deon Reynders, Edwin Wright
R1,491 Discovery Miles 14 910 Ships in 10 - 15 working days

TCP/IP (Transmission Control Protocol/Internet Protocol) is the suite of communications protocols used to connect hosts on the Internet. TCP/IP uses several protocols, the two main ones being TCP and IP. TCP/IP is built into the UNIX operating system and is used by the Internet, making it the de facto standard for transmitting data over networks. The TCP/IP suite of protocols has become a dominant technology due to its widespread use and reliability, while Ethernet is fast becoming a de facto industrial networking standard.
* A practical hands-on book that covers troubleshooting and maintenance of TCP/IP networks
* Provides a solid understanding of the application of TCP/IP from an engineering perspective
* Complete coverage from networking fundamentals to Internet-enabled control systems

Mike Meyers' CompTIA A+ Guide to 802 Managing and Troubleshooting PCs Lab Manual, Fourth Edition (Exam 220-802)... Mike Meyers' CompTIA A+ Guide to 802 Managing and Troubleshooting PCs Lab Manual, Fourth Edition (Exam 220-802) (Paperback, 4th edition)
Mike Meyers
R1,201 Discovery Miles 12 010 Ships in 18 - 22 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Bestselling CompTIA A+ author Mike Meyers provides hands-on, step-by-step labs-updated for the 2012 release of Exam 220-802-so you can practice the IT skills essential for your successMike Meyers' CompTIA A+ Guide to Managing and Troubleshooting Operating Systems Lab Manual, Fourth Edition contains more than 80 labs that challenge you to solve real-world problems with key concepts. Clear, measurable lab objectives map to certification exam objectives, ensuring direct correspondence to Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting Operating Systems, Fourth Edition. Lab solutions are only available to instructors and are not printed inside the book. The Lab Manual also includes materials lists and lab set-up instructions. Step-by-step, not click-by click, lab scenarios require you to think critically, and Hint and Warning icons guide you through potentially tricky situations. Post-lab observation questions measure your understanding of lab results and the key term quiz helps to build your vocabulary.

BTEC Nationals Information Technology Student Book + Activebook - For the 2016 specifications (Paperback): Jenny Phillips, Alan... BTEC Nationals Information Technology Student Book + Activebook - For the 2016 specifications (Paperback)
Jenny Phillips, Alan Jarvis, Mark Fishpool, Richard McGill, Tim Cook, …
R1,018 Discovery Miles 10 180 Ships in 10 - 15 working days

Each Student Book and ActiveBook have has clearly laid out pages with a range of supportive features to aid learning and teaching: Getting to know your unit sections ensure learners understand the grading criteria and unit requirements. Getting ready for Assessment sections focus on preparation for external assessment with guidance for learners on what to expect. Hints and tips will help them prepare for assessment and sample answers are provided for a range of question types including, short and long answer questions, all with a supporting commentary. Learners can also prepare for internal assessment using this feature. A case study of a learner completing the internal assessment for that unit covering 'How I got started', 'How I brought it all together' and 'What I got from the experience'. Pause Point feature provide opportunities for learners to self-evaluate their learning at regular intervals. Each Pause Point point feature gives learners a Hint or Extend option to either revisit and reinforce the topic or to encourage independent research or study skills. Case Study and Theory into Practice features enable development of problem-solving skills and place the theory into real life situations learners could encounter. Assessment Activity/Practice provide scaffolded assessment practice activities that help prepare learners for assessment. Within each assessment practice activity, a Plan, Do and Review section supports learners' formative assessment by making sure they fully understand what they are being asked to do, what their goals are and how to evaluate the task and consider how they could improve. Dedicated Think Future pages provide case studies from the industry, with a focus on aspects of skills development that can be put into practice in a real work environment and further study.

Coding Basics for Beginners - The Smart Way to Approach the World of Computer Programming and the Fundamental Functions of the... Coding Basics for Beginners - The Smart Way to Approach the World of Computer Programming and the Fundamental Functions of the Most Popular Languages Such as Python, Java and C++ (Hardcover)
Jefferson Sandyman
R588 Discovery Miles 5 880 Ships in 10 - 15 working days
The Continuing Arms Race - Code-Reuse Attacks and Defenses (Hardcover): Per Larsen, Ahmad-Reza Sadeghi The Continuing Arms Race - Code-Reuse Attacks and Defenses (Hardcover)
Per Larsen, Ahmad-Reza Sadeghi
R2,482 Discovery Miles 24 820 Ships in 18 - 22 working days

As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system. The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs. The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.

SNMP Mastery (Hardcover): Michael W Lucas SNMP Mastery (Hardcover)
Michael W Lucas
R896 R815 Discovery Miles 8 150 Save R81 (9%) Ships in 18 - 22 working days
The Networknomicon, or SNMP Mastery (Hardcover): Michael W Lucas, Abdul Alhazred The Networknomicon, or SNMP Mastery (Hardcover)
Michael W Lucas, Abdul Alhazred
R1,436 R1,247 Discovery Miles 12 470 Save R189 (13%) Ships in 18 - 22 working days
Intelligent Systems for Automated Learning and Adaptation - Emerging Trends and Applications (Hardcover, New): Raymond Chiong Intelligent Systems for Automated Learning and Adaptation - Emerging Trends and Applications (Hardcover, New)
Raymond Chiong
R4,585 Discovery Miles 45 850 Ships in 18 - 22 working days

Intelligent systems are rapidly becoming a central focus of study for researchers as they have the ability to learn and adapt during their existence in order to achieve certain goals and objectives. Intelligent Systems for Automated Learning and Adaptation: Emerging Trends and Applications presents methodologies, architectures, and approaches on experiential automated learning. This critical mass of sought after research assembles the most intriguing and innovative applications, advancements, and leading studies on the methodology of intellectual computing.

Microsoft Forefront Security Administration Guide (Paperback): Jesse Varsalone Microsoft Forefront Security Administration Guide (Paperback)
Jesse Varsalone
R1,129 R878 Discovery Miles 8 780 Save R251 (22%) Ships in 10 - 15 working days

Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for their systems to go down because of viruses, malware, bugs, trojans, or other attacks. Running a Microsoft Forefront Suite within your environment brings many different benefits. Forefront allows you to achieve comprehensive, integrated, and simplified infrastructure security. This comprehensive suite of tools provides end-to-end security stretching from Web servers back to the desktop. This book will provide system administrators familiar with Syngress' existing Microsoft networking and security titles with a complete reference to Microsoft's flagship security products.
* First book to address securing an entire Microsoft network from Web servers all the way back to the desktop.
* Companion Web site provides best practices checklists for securing Microsoft operating systems, applications, servers, and databases.
* Companion Web site provides special chapter on designing and implementing a disaster recover plan for a Microsoft network.

HCI Beyond the GUI - Design for Haptic, Speech, Olfactory, and Other Nontraditional Interfaces (Paperback): Philip Kortum HCI Beyond the GUI - Design for Haptic, Speech, Olfactory, and Other Nontraditional Interfaces (Paperback)
Philip Kortum
R1,247 Discovery Miles 12 470 Ships in 10 - 15 working days

As technology expands and evolves, one-dimensional, graphical user interface (GUI) design becomes increasingly limiting and simplistic. Designers must meet the challenge of developing new and creative interfaces that adapt to meet human needs and technological trends. HCI Beyond the GUI provides designers with this know how by exploring new ways to reach users that involve all of the human senses. Dr. Kortum gathers contributions from leading human factors designers to present a single reference for professionals, researchers, and students.
Explores the human factors involved in the design and implementation of the nontraditional interfaces, detailing design strategies, testing methodologies, and implementation techniques
Provides an invaluable resource for practitioners who design interfaces for children, gamers and users with accessibility needs
Offers extensive case studies, examples and design guidelines

How to Cheat at Configuring VmWare ESX Server (Paperback): David Rule How to Cheat at Configuring VmWare ESX Server (Paperback)
David Rule
R1,084 R842 Discovery Miles 8 420 Save R242 (22%) Ships in 10 - 15 working days

A virtual evolution in IT shops large and small has begun. VMware s ESX Server is the enterprise tool to free your infrastructure from its physical limitations providing the great transformation into a virtual environment--this book shows you how. Use Syngress proven How to Cheat methodology to configure and build VMware s ESX Server version 3. This clear, concise guide provides all the information you need to become a virtual whiz
This book will detail the default and custom installation of VMware s ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine templates. Best practices for securing and backing up your virtual environment are also provided. The book concludes with a series of handy, time-saving command and configuration for: bash shell keystrokes, Linux commands, configuration files, common/proc files, VMware ESX commands, and troubleshooting.
Reap the Benefits of Server Virtualization
Realize improved ROI, ensure efficient mergers and acquisitions, and reduce compliance risk exposure through server virtualization and consolidation.
Build a Virtual Machine
Create a Gold Master and use your VMlibrary to leverage the power and flexibility of VMware.
Manage Your Virtual Infrastructure
Use VMware tools to partition physical servers and manage virtual machines.
Set Up Scripted Installation
See how a scripted installation method can be a fast and efficient way to provision ESX hosts.
Master ESX Native Tools
Use tools like Esxtop to diagnose performance issues and vmkfstools to import and export
Install and Use VMware Scripting APIs
Develop programs to help automate and ease administration even with a limited background in scripting or programming.
Learn the Fundamentals of a VM Backup
VMware ESX ships with three scripts that work together to create a backup and restore system: vmsnap.pl, vmsnap_all.pl, and vmres.pl.
Extend a Cloned Windows VM s Root Partition
Use Microsoft s Sysprep utility to extend a newly deployed virtual machine s root partition from the original clone size to a larger size."

Web-Based Supply Chain Management and Digital Signal Processing - Methods for Effective Information Administration and... Web-Based Supply Chain Management and Digital Signal Processing - Methods for Effective Information Administration and Transmission (Hardcover)
R. Manjunath
R4,567 Discovery Miles 45 670 Ships in 18 - 22 working days

Digital signal processing is now a growing area of study invading all walks of organizational life, from consumer products to database management. ""Web-Based Supply Chain Management and Digital Signal Processing: Methods for Effective Information Administration and Transmission"" presents trends and techniques for successful intelligent decision-making and transfer of products through digital signal processing. A defining collection of field advancements, this publication provides the latest and most complete research in supply chain management with examples and case studies useful for those involved with various levels of management.

Keeping Found Things Found: The Study and Practice of Personal Information Management (Paperback): William Jones Keeping Found Things Found: The Study and Practice of Personal Information Management (Paperback)
William Jones
R1,357 Discovery Miles 13 570 Ships in 10 - 15 working days

WE ARE ADRIFT IN A SEA OF INFORMATION. We need information to make good decisions, to get things done, to learn, and to gain better mastery of the world around us. But we do not always have good control of our information - not even in the "home waters" of an office or on the hard drive of a computer. Instead, information may be controlling us - keeping us from doing the things we need to do, getting us to waste money and precious time. The growth of available information, plus the technologies for its creation, storage, retrieval, distribution and use, is astonishing and sometimes bewildering. Can there be a similar growth in our understanding for how best to manage information and informational tools?
This book provides a comprehensive overview of personal information management (PIM) as both a study and a practice of the activities people do and need to be doing so that information can work for them in their daily lives.
Introductory chapters of "Keeping Found Things Found: The Study and Practice of Personal Information Management" provide an overview of PIM and a sense for its many facets. The next chapters look more closely at the essential challenges of PIM, including finding, keeping, organizing, maintaining, managing privacy, and managing information flow. The book also contains chapters on search, email, mobile PIM, web-based support, and other technologies relevant to PIM.
*For more information and author blog visit http: //www.keepingthingsfound.com/.
* Focuses exclusively on one of the most interesting and challenging problems in today's world
* Explores what good and better PIM looks like, and how to measure improvements
* Presents key questions to consider when evaluating any new PIM informational tools or systems

Biometric Technologies and Verification Systems (Paperback): John Vacca Biometric Technologies and Verification Systems (Paperback)
John Vacca
R1,586 Discovery Miles 15 860 Ships in 10 - 15 working days

" Biometric Technologies and Verification Systems" is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system.
Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost "smart cards" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.
* Contains elements such as Sidebars, Tips, Notes and URL links
* Heavily illustrated with over 150 illustrations, screen captures, and photographs
* Details the various biometric technologies and how they work while providing a discussion of the economics, privacy issues and challenges of implementing biometric security solutions

See MIPS Run (Paperback, 2nd edition): Dominic Sweetman See MIPS Run (Paperback, 2nd edition)
Dominic Sweetman
R1,680 Discovery Miles 16 800 Ships in 10 - 15 working days

This second edition is not only a thorough update of the first edition, it is also a marriage of the best-known RISC architecture--MIPS--with the best-known open-source OS--Linux. The first part of the book begins with MIPS design principles and then describes the MIPS instruction set and programmers resources. It uses the MIPS32 standard as a baseline (the 1st edition used the R3000) from which to compare all other versions of the architecture and assumes that MIPS64 is the main option. The second part is a significant change from the first edition. It provides concrete examples of operating system low level code, by using Linux as the example operating system. It describes how Linux is built on the foundations the MIPS hardware provides and summarizes the Linux application environment, describing the libraries, kernel device-drivers and CPU-specific code. It then digs deep into application code and library support, protection and memory management, interrupts in the Linux kernel and multiprocessor Linux.
Sweetman has revised his best-selling MIPS bible for MIPS programmers, embedded systems designers, developers and programmers, who need an in-depth understanding of the MIPS architecture and specific guidance for writing software for MIPS-based systems, which are increasingly Linux-based.
* Completely new material offers the best explanation available on how Linux runs on real hardware.
* Provides a complete, updated and easy-to-use guide to the MIPS instruction set using the MIPS32 standard as the baseline architecture with the MIPS64 as the main option.
* Retains the same engaging writing style that made the first edition so readable, reflecting the authors 20+ years experience in designing systems based on the MIPS architecture."

How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback): B. Barber How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback)
B. Barber
R879 R734 Discovery Miles 7 340 Save R145 (16%) Ships in 10 - 15 working days

Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers.
The book will begin by describing the feature set of WSUS, and the benefits it provides to system administrators. Next, the reader will learn the steps that must be taken to configure their servers and workstations to make the compatible with WSUS. A special section then follows to help readers migrate from Microsoft s earlier update service, Software Update Service (SUS) to WSUS. The next chapters will then address the particular needs and complexities of managing WSUS on an enterprise network. Although WSUS is designed to streamline the update process, this service can still be a challenge for administrators to use effectively. To address these issues, the next chapters deal specifically with common problems that occur and the reader is provides with invaluable troubleshooting information. One of the other primary objectives of WSUS is to improve the overall security of Windows networks by ensuring that all systems have the most recent security updates and patches. To help achieve this goal, the next sections cover securing WSUS itself, so that critical security patches are always applied and cannot be compromised by malicious hackers.
* Only book available on Microsoft's brand new, Windows Server Update Services
* Employs Syngress' proven "How to Cheat" methodology providing readers with everything they need and nothing they don't
* WSUS works with every Microsoft product, meaning any system administrator running a Windows-based network is a potential customer for this book"

OS X for Hackers at Heart (Paperback): Bruce Potter, Chris Hurley, Johnny Long, Tom Owad, Russ Rogers OS X for Hackers at Heart (Paperback)
Bruce Potter, Chris Hurley, Johnny Long, Tom Owad, Russ Rogers
R1,013 Discovery Miles 10 130 Ships in 10 - 15 working days

The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hacker s eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the world s foremost true hackers unleash the power of OS X for everything form cutting edge research and development to just plain old fun.
OS X 10.4 Tiger is a major upgrade for Mac OS X for running Apple s Macintosh computers and laptops. This book is not a reference to every feature and menu item for OS X. Rather, it teaches hackers of all types from software developers to security professionals to hobbyists, how to use the most powerful (and often obscure) features of OS X for wireless networking, WarDriving, software development, penetration testing, scripting administrative tasks, and much more.
* Analyst reports indicate that OS X sales will double in 2005. OS X Tiger is currently the #1 selling software product on Amazon and the 12-inch PowerBook is the #1 selling laptop
* Only book on the market directly appealing to groundswell of hackers migrating to OS X
* Each chapter written by hacker most commonly associated with that topic, such as Chris Hurley (Roamer) organizer of the World Wide War Drive"

Certified System Administrator for HP-UX (Hardcover): Asghar Ghori Certified System Administrator for HP-UX (Hardcover)
Asghar Ghori
R1,369 Discovery Miles 13 690 Ships in 10 - 15 working days

This book is designed to cover three objectives. One, to provide a comprehensive resource to individuals (including novice, IT/Non-HP-UX administrators, HP-UX administrators) who intend to take the Certified System Administrator for HP-UX certification exam and pass it. Two, to provide a quick and valuable on-the-job resource to HP-UX administrators, administrators of other UNIX operating system software, IT managers, programmers, and DBAs working in the HP-UX environment. Three, to provide an easy-to-understand guide to novice and IT/non-HP-UX administrators who intend to learn HP-UX from the beginning. This book contains 33 chapters. The book is organized in such a way that it helps its audience understand concepts, implementation procedures, some basic troubleshooting, command syntax, configuration files, and daemons involved. There are three key areas: UNIX fundamentals, HP-UX system administration, and HP-UX network administration. 1.UNIX Fundamentals covers the basics of UNIX. Most information is not specific to a particular UNIX flavor, but rather includes general UNIX concepts, file manipulation and security techniques, shell and awk programming, vi editor, basic commands, and other topics. Chapters 01 through 06 and chapter 21 cover this area. Unlike many other similar books, a chapter on shell scripting is presented after covering HP-UX System Administration chapters. This is done intentionally to provide readers with some practical examples based on the knowledge they have gained from UNIX Fundamentals and HP-UX System Administration chapters. 2.HP-UX System Administration covers the HP-UX-specific system administration concepts and topics including HP-UX installation methods; software and patch management; user and group account administration; disk and device file management; LVM and file system administration; swap space and printer management; system startup and shutdown procedures; kernel reconfiguration techniques; backup, restore, and system recovery functions; job automation and process control; system logging and performance monitoring; and so on. Chapters 07 through 20 cover this area. 3.HP-UX Network Administration covers HP-UX network administration concepts and topics such as OSI and TCP/IP models; network hardware overview; LAN card administration; IP subnetting and routing techniques; network troubleshooting tools; system startup services; naming services such as DNS, NIS, and LDAP; File sharing tools viz. NFS and AutoFS; Time synchronization using NTP; internet services administration; BootP/TFTP services; system security; and so on. Chapters 22 through 33 cover this area. The beginning of each chapter highlights objectives covered. The end of each chapter includes a summary as to what is learnt in the chapter. Throughout the book tables, figures, screen shots, and examples are given to explain concepts and tasks. The output generated as a result of running commands is highlighted in light grey background to differentiate it with surrounding text. The book includes several appendices one of which contains more than 550 practice exam questions. Tables of commands, important files, and service daemons are included in separate appendices.

Frameworks for Developing Efficient Information Systems - Models, Theory, and Practice (Hardcover, New): John Krogstie Frameworks for Developing Efficient Information Systems - Models, Theory, and Practice (Hardcover, New)
John Krogstie
R4,974 Discovery Miles 49 740 Ships in 18 - 22 working days

As advances in technology continue to generate the collective knowledge of an organization and its operations, strategic models for information systems are developed in order to arrange business processes and business data. Frameworks for Developing Efficient Information Systems: Models, Theory, and Practice presents research and practices on the advancements in systems analysis and design. These theoretical frameworks and practical solutions are useful for researchers, practitioners, and academicians as this book aims to bridge the communication gap between business managers and system designers.

Windows Server 2003 Security Infrastructures - Core Security Features (Paperback): Jan de Clercq Windows Server 2003 Security Infrastructures - Core Security Features (Paperback)
Jan de Clercq
R2,372 Discovery Miles 23 720 Ships in 10 - 15 working days

Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003 operating system. It also highlights the security principles an architect should remember when designing an infrastructure that is rooted on the Windows Server 2003 OS.
*Explains nuts and bolts of Windows Server 2003 security
*Provides practical insights into how to deploy and administer secure Windows Server 2003 infrastructures
*Draws on the experience of a lead consultant in the Microsoft security area

Co-Pilot (Hardcover): Till Bay, Benno Baumgartner, Matthias Huni Co-Pilot (Hardcover)
Till Bay, Benno Baumgartner, Matthias Huni
R1,152 Discovery Miles 11 520 Ships in 10 - 15 working days
Getting Started with OpenVMS System Management (Paperback): David Miller Getting Started with OpenVMS System Management (Paperback)
David Miller
R1,666 Discovery Miles 16 660 Ships in 10 - 15 working days

Getting Started with OpenVMS System Management gives new VMS system managers a jumpstart in managing this powerful and reliable operating system. Dave Miller describes the essentials of what an OpenVMS System Manager will have to manage. He defines areas of OpenVMS System Management and describes why each is important and how it fits into the larger management task. Even though some OpenVMS management concepts are unique (for instance quotas), many concepts (such as account creation) have counterparts in UNIX and Windows NT. So, wherever possible, Miller points out to his readers the parallel to other systems.
The book is intended as a precursor to Baldwin's OpenVMS System Management Guide and various OpenVMS documents. Thus it refers the reader to other books for the detailed management steps. Getting Started with OpenVMS System Management is a great introduction to the material Steve Hoffman and Dave Miller are revising for the OpenVMS System Management Guide, 2E.
-Permits experienced system managers to begin managing OpenVMS more quickly
-Dovetails with other Digital Press publications for easier reference by the OpenVMS manager
-Points you in the right direction for the complete documentation on each issue
-BONUS FEATURE! Includes excerpts from five key DP OpenVMS books

Getting Started with OpenVMS - A Guide for New Users (Paperback): Michael D Duffy Getting Started with OpenVMS - A Guide for New Users (Paperback)
Michael D Duffy
R1,679 Discovery Miles 16 790 Ships in 10 - 15 working days

OpenVMS professionals have long enjoyed a robust, full-featured operating system running the most mission-critical applications in existence. However, many of today's graduates may not yet have had the opportunity to experience it for themselves. Intended for an audience with some knowledge of operating systems such as Windows, UNIX and Linux, Getting Started with OpenVMS introduces the reader to the OpenVMS approach.

Part 1 is a practical introduction to get the reader started using the system. The reader will learn the OpenVMS terminology and approach to common concepts such as processes and threads, queues, user profiles, command line and GUI interfaces and networking. Part 2 provides more in-depth information about the major components for the reader desiring a more technical description. Topics include process structure, scheduling, memory management and the file system. Short sections on the history of OpenVMS, including past, present, and future hardware support (like the Intel Itanium migration), are included. OpenVMS is considered in different roles, such as a desktop system, a multi-user system, a network server, and in a combination of roles.
Allows the more advanced reader some meaty content yet does not overwhelm the novice
Provides practical examples showing that OpenVMS is well-suited for popular modern applications
Gives a high-level overview of concepts behind internals such as memory management

UNIX for OpenVMS Users (Paperback, 3rd edition): Philip Bourne, Richard Holstein, Joseph McMullen UNIX for OpenVMS Users (Paperback, 3rd edition)
Philip Bourne, Richard Holstein, Joseph McMullen
R2,472 Discovery Miles 24 720 Ships in 10 - 15 working days

UNIX for OpenVMS Users, 3E, makes it easy to see what OpenVMS and UNIX have in common, and to transfer your knowledge and experience in OpenVMS over to the world of UNIX.
Since most shops rely on more than one operating system, it is critical for system administrators and managers to understand the similarities and differences between platforms, so they can easily work in both environments while taking full advantage of the tools and applications available on each. This book offers OpenVMS professionals a concise source of information, so that they can quickly bring their expertise to bear on UNIX file management, e-mail, networking, and security.
This new edition of the book is enhanced with updated references to VMS, incorporates suggestions made by readers of previous editions, and particularly, recognizes other UNIX implementations in addition to HP's Tru64.
-Includes extensive additions to the sections on VMS logical names, on the emacs editor, and on shell programming and Perl
-Describes the interfaces common to both operating systems, with appendices covering command and editor summaries
-Adds emphasis on Linux

Systems Software - Essential Concepts (Paperback): Euripides Montagne Systems Software - Essential Concepts (Paperback)
Euripides Montagne
R2,432 R2,072 Discovery Miles 20 720 Save R360 (15%) Ships in 10 - 15 working days

Systems Software: Essential Concepts provides students with an accessible introduction to the knowledge and fundamentals that are necessary to understand software and hardware. The text also reviews implementation techniques to familiarize students with more complex software, such as operating systems and compilers, and prepare them to take more advance courses within the discipline. The book is divided into two key topical areas: compiler fundamentals and the basic mechanisms and data structures required to support operating systems. In the compiler section, students learn about the runtime environment, how to implement a scanner and a symbol table, and how to implement parsing and code generation for a virtual machine. To emphasize practical application, students are challenged to implement a small compiler. In the operating system domain, students gain an understanding of the interrupt mechanism, process and thread implementation, and process synchronization. Featuring a modern and practical approach, Systems Software is an ideal resource for courses in system programming, systems software, software development, and assembly language. It can also serve as a supplementary material for introductory operating system and compiler courses.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Classic Operating Systems - From Batch…
Per Brinch Hansen Hardcover R2,812 Discovery Miles 28 120
Basic mathematics for economics students…
Derek Yu Paperback R420 Discovery Miles 4 200
Advances in Multimedia Information…
Sushil Jajodia, M. Tamar OEzsu, … Paperback R1,456 Discovery Miles 14 560
Advanced SQL with SAS
Christian F. G. Schendera Hardcover R2,458 Discovery Miles 24 580
Research Anthology on Recent Trends…
Information Reso Management Association Hardcover R9,789 Discovery Miles 97 890
Topology in Process Calculus…
Mingsheng Ying Hardcover R1,527 Discovery Miles 15 270
Symbolic Analysis for Parallelizing…
Mohammad R. Haghighat Hardcover R2,656 Discovery Miles 26 560
Environmental Statistics, Volume 12
G.P Patil Hardcover R1,972 Discovery Miles 19 720
Compilers and Operating Systems for Low…
Luca Benini, Mahmut Kandemir, … Hardcover R2,786 Discovery Miles 27 860
MACSYMA for Statisticians
B. Heller Hardcover R5,535 Discovery Miles 55 350

 

Partners