![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
Written by VM-certified instructors with years of professional and teaching experience, VMware Certified Professional Test Prep is the ultimate guide to the VCP exam. Its organized and highly practical approach will help administrators successfully complete the exam while also maximizing their ability to apply this tool on the job. The guide covers the body of knowledge required of a VMware certified professional, provides the tools needed to keep that knowledge current, and helps develop the wherewithal to apply that knowledge to real solutions. Covering the ESX 3.0.x through ESX 3.5.x releases that are the focus of the VCP test, this volume: Reproduces many of the real-world examples that have proven very helpful to students in the authors' classrooms Applies step-by-step instructions to more than 700 software screenshots, providing a virtual hands-on experience Points to Web resources that will keep the reader current with the latest advances Includes logistical information on the test, including costs and class location Covers background information on various topics such as storage and networking to provide a complete understanding on the implementation of a VMWare VI3 solution Provides questions at the end of the chapters that cover the important concepts Also of great use to those administrators who have already received their certification, this book includes solutions to many of the common gotchas that they are certain to encounter in virtual environments. In particular, capacity-planning concepts reveal the specific details needed to make full use of VMware's unique resource management capabilities. Troubleshooting tips appear throughout the book, making it a useful resource in the virtualized datacenter.
Integrating concepts from multiple theoretical disciplines and detailed analyses of the evolution of Internet-related innovations (including computer networking, the World Wide Web and the Linux open source operating system), this book develops foundations for a new theoretical and practical understanding of innovation. It covers topics ranging from fashion to history of art, and includes the most detailed analysis of the open source development model so far published.
Web Dynpro ABAP, a NetWeaver web application user interface tool from SAP, enables web programming connected to SAP Systems. The authors' main focus was to create a book based on their own practical experience. Each chapter includes examples which lead through the content step-by-step and enable the reader to gradually explore and grasp the Web Dynpro ABAP process. The authors explain in particular how to design Web Dynpro components, the data binding and interface methods, and the view controller methods. They also describe the other SAP NetWeaver Elements (ABAP Dictionary, Authorization) and the integration of the Web Dynpro Application into the SAP NetWeaver Portal. The new edition has been expanded to include chapters on subjects such as POWER Lists; creating the Modal Windows and External Windows; using Web Dynpro application parameters and Shared Objects to communicate between the Web Dynpro ABAP Application and Business Server Pages; and creating multi-language mails using Web Dynpro ABAP.
* Unique entry-level guide to Domain Name System (DNS), which translates Internet host names into IP addresses and is used with all Internet servers
This book presents a historical and philosophical analysis of programming systems, intended as large computational systems like, for instance, operating systems, programmed to control processes. The introduction to the volume emphasizes the contemporary need of providing a foundational analysis of such systems, rooted in a broader historical and philosophical discussion. The different chapters are grouped around three major themes. The first concerns the early history of large systems developed against the background of issues related to the growing semantic gap between hardware and code. The second revisits the fundamental issue of complexity of large systems, dealt with by the use of formal methods and the development of `grand designs' like Unix. Finally, a third part considers several issues related to programming systems in the real world, including chapters on aesthetical, ethical and political issues. This book will interest researchers from a diversity of backgrounds. It will appeal to historians, philosophers, as well as logicians and computer scientists who want to engage with topics relevant to the history and philosophy of programming and more specifically the role of programming systems in the foundations of computing.
Introduction to Radar Analysis, Second Edition is a major revision of the popular textbook. It is written within the context of communication theory as well as the theory of signals and noise. By emphasizing principles and fundamentals, the textbook serves as a vital source for students and engineers. Part I bridges the gap between communication, signal analysis, and radar. Topics include modulation techniques and associated Continuous Wave (CW) and pulsed radar systems. Part II is devoted to radar signal processing and pulse compression techniques. Part III presents special topics in radar systems including radar detection, radar clutter, target tracking, phased arrays, and Synthetic Aperture Radar (SAR). Many new exercise are included and the author provides comprehensive easy-to-follow mathematical derivations of all key equations and formulas. The author has worked extensively for the U.S. Army, the U.S. Space and Missile Command, and other military agencies. This is not just a textbook for senior level and graduates students, but a valuable tool for practicing radar engineers. Features Authored by a leading industry radar professional. Comprehensive up-to-date coverage of radar systems analysis issues. Easy to follow mathematical derivations of all equations and formulas Numerous graphical plots and table format outputs. One part of the book is dedicated to radar waveforms and radar signal processing.
As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system. The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs. The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.
As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system. The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs. The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.
This volume is a record of the Workshop on Graphics and Communications organized within ESPRIT II Project 2463 ARGOSI (Applications Related Graphics and OSI Standards Integration). The workshop was included in the Eurographics workshop programme for 1990. The ARGOSI project essentially arose from the observation that international standards in the graphics and networking areas were generally being developed in isolation and that insufficient attention was being paid to the needs of applications whose requirements spanned several standards. The importance of the integration of graphics and networking has been growing over recent years, with the growth of interest in multi-media systems to support cooperative working, and the use of computer graphics techniques in the visualization of the results of scientific and engineering computations. The latter frequently involve high-speed links between workstations and supercomputers. The presentations in this volume cover a broad range of activities from a classification scheme for graphics and networking to interconnection experiments with broadband networks. Three topics were selected for detailed discussion in working groups: - Improvements to the computer graphics metafile standard, - The role of application profiles in graphics data exchange, - The impact of multi-media. The volume contains a record of the discussions and the recommendations from the working groups, subsequently endorsed by the workshop.
Features Teaches software design by showing programmers how to build the tools they use every day. Each chapter includes exercises to help readers check and deepen their understanding. All the example code can be downloaded, re-used, and modified under an open license.
Graph Searching Games and Probabilistic Methods is the first book that focuses on the intersection of graph searching games and probabilistic methods. The book explores various applications of these powerful mathematical tools to games and processes such as Cops and Robbers, Zombie and Survivors, and Firefighting. Written in an engaging style, the book is accessible to a wide audience including mathematicians and computer scientists. Readers will find that the book provides state-of-the-art results, techniques, and directions in graph searching games, especially from the point of view of probabilistic methods. The authors describe three directions while providing numerous examples, which include: * Playing a deterministic game on a random board. * Players making random moves. * Probabilistic methods used to analyze a deterministic game.
Discover a clear, straightforward explanation of both current operating system theory and today's practices within UNDERSTANDING OPERATING SYSTEMS, 8E. This leading book's proven approach begins with a valuable discussion of fundamentals before introducing specific operating systems. Fully updated, timely content offers an expanded analysis of how modern innovations, such as multi-core processing and wireless technologies, have impacted today's operating systems. Revised Research Topics within this edition's practical exercises encourage you to research emerging and influential topics on your own. In addition, updates throughout the final four chapters now highlight information on the most current versions of UNIX (including the latest Macintosh OS), Linux, Windows, and Android to equip you with the contemporary knowledge and skills you need to working most effectively with today's systems.
Now in full color, the 10th anniversary edition of this classic book takes you deep into the influences that underlie modern video games, and examines the elements they share with traditional games such as checkers. At the heart of his exploration, veteran game designer Raph Koster takes a close look at the concept of fun and why it's the most vital element in any game. Why do some games become boring quickly, while others remain fun for years? How do games serve as fundamental and powerful learning tools? Whether you're a game developer, dedicated gamer, or curious observer, this illustrated, fully updated edition helps you understand what drives this major cultural force, and inspires you to take it further. You'll discover that: Games play into our innate ability to seek patterns and solve puzzles Most successful games are built upon the same elements Slightly more females than males now play games Many games still teach primitive survival skills Fictional dressing for modern games is more developed than the conceptual elements Truly creative designers seldom use other games for inspiration Games are beginning to evolve beyond their prehistoric origins
Features Teaches software design by showing programmers how to build the tools they use every day. Each chapter includes exercises to help readers check and deepen their understanding. All the example code can be downloaded, re-used, and modified under an open license.
The second edition of this popular book presents the theory of graphs from an algorithmic viewpoint. The authors present the graph theory in a rigorous, but informal style and cover most of the main areas of graph theory. The ideas of surface topology are presented from an intuitive point of view. We have also included a discussion on linear programming that emphasizes problems in graph theory. The text is suitable for students in computer science or mathematics programs.
Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a practical field guide approach to performance monitoring and analysis from experts who do this work every day. Think of this book as your own guide to "What would Microsoft support do?" when you have a Windows performance issue. Author Clint Huffman, a Microsoft veteran of over fifteen years, shows you how to identify and alleviate problems with the computer resources of disk, memory, processor, and network. You will learn to use performance counters as the initial indicators, then use various tools to "dig in" to the problem, as well as how to capture and analyze boot performance problems.
NX-OS and Cisco Nexus SwitchingNext-Generation Data Center
ArchitecturesSecond Edition The complete guide to planning,
configuring, managing, and troubleshooting NX-OS in the
enterprise-updated with new technologies and examples Using Cisco
Nexus switches and the NX-OS operating system, data center
professionals can build unified core networks that deliver
unprecedented scalability, resilience, operational continuity,
flexibility, and performance. "NX-OS and Cisco Nexus Switching,"
Second Edition, is the definitive guide to applying these
breakthrough technologies in real-world environments. This
extensively updated edition contains five new chapters addressing a
wide range of new technologies, including FabricPath, OTV, IPv6,
QoS, VSG, Multi-Hop FCoE, LISP, MPLS, Layer 3 on Nexus 5000, and
Config sync. It also presents a start-to-finish, step-by-step case
study of an enterprise customer who migrated from Cisco Catalyst to
a Nexus-based architecture, illuminated with insights that are
applicable in virtually any enterprise data center. Drawing on
decades of experience with enterprise customers, the authors cover
every facet of deploying, configuring, operating, and
troubleshooting NX-OS in today's data center. You'll find updated
best practices for high availability, virtualization, security,
The main goal is to offer readers a panorama of recent progress in nonlinear physics, complexity and transport with attractive chapters readable by a broad audience. It allows readers to gain an insight into these active fields of research and notably promotes the interdisciplinary studies from mathematics to experimental physics. To reach this aim, the book collects a selection of contributions to the CCT11 conference (Marseille, 23 - 27 May 2011).
Recently, the pressure for fast processing and efficient storage of large data with complexrelations increased beyond the capability of traditional databases. Typical examples include iPhone applications, computer aided design - both electrical and mechanical, biochemistry applications, and incremental compilers. Serialization, which is sometimes used in such situations is notoriously tedious and error prone. In this book, Jiri Soukup and Petr Macha ek show in detail how to write programs which store their internal data automatically and transparently to disk. Together with special data structure libraries which treat relations among objects as first-class entities, and with a UML class-diagram generator, the core application code is much simplified. The benchmark chapter shows a typical example where persistent data is faster by the order of magnitude than with a traditional database, in both traversing and accessing the data. The authors explore and exploit advanced features of object-oriented languages in a depth hardly seen in print before. Yet, you as a reader need only a basic knowledge of C++, Java, C#, or Objective C. These languages are quite similar with respect to persistency, and the authors explain their differences where necessary. The book targets professional programmers working on any industry applications, it teaches you how to design your own persistent data or how to use the existing packages efficiently. Researchers in areas like language design, compiler construction, performance evaluation, and no-SQL applications will find a wealth of novel ideas and valuable implementation tips. Under http: //www.codefarms.com/bk, you will find a blog and other information, including a downloadable zip file with the sources of all the listings that are longer than just a few lines - ready to compile and run."
Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release. The book explores its features; describes differences between the available editions; and discusses its deployment. After introducing Windows Server 2008 R2, the book explains its installation and configuration processes followed by its networking. It also examines different features, such as the active directory, internet information services 7.5, Hyper-V, and PowerShell V2. It discusses securing Windows Server 2008 R2 files and its print services, remote desktop services, high-availability and recovery features, and monitoring and troubleshooting; in addition, their delta changes are discussed in the final chapter. The book also explores the features that influence both Windows Server 2008 R2 and Windows 7. These features allow the server operating system to work with Windows 7. One feature is the BranchCache, which offers users who open files across a Wide Area Network a better end-user experience by caching copy in the branch office when a document or intranet Web site is opened for the first time. Another feature is DirectAccess, which is the new remote connectivity solution for Windows networks.
This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.
Written by VM-certified instructors with years of professional and teaching experience, VMware Certified Professional Test Prep is the ultimate guide to the VCP exam. Its organized and highly practical approach will help administrators successfully complete the exam while also maximizing their ability to apply this tool on the job. The guide covers the body of knowledge required of a VMware certified professional, provides the tools needed to keep that knowledge current, and helps develop the wherewithal to apply that knowledge to real solutions. Covering the ESX 3.0.x through ESX 3.5.x releases that are the focus of the VCP test, this volume: Reproduces many of the real-world examples that have proven very helpful to students in the authors' classrooms Applies step-by-step instructions to more than 700 software screenshots, providing a virtual hands-on experience Points to Web resources that will keep the reader current with the latest advances Includes logistical information on the test, including costs and class location Covers background information on various topics such as storage and networking to provide a complete understanding on the implementation of a VMWare VI3 solution Provides questions at the end of the chapters that cover the important concepts Also of great use to those administrators who have already received their certification, this book includes solutions to many of the common gotchas that they are certain to encounter in virtual environments. In particular, capacity-planning concepts reveal the specific details needed to make full use of VMware's unique resource management capabilities. Troubleshooting tips appear throughout the book, making it a useful resource in the virtualized datacenter.
Based upon the authors' experience in designing and deploying an embedded Linux system with a variety of applications, Embedded Linux System Design and Development contains a full embedded Linux system development roadmap for systems architects and software programmers. Explaining the issues that arise out of the use of Linux in embedded systems, the book facilitates movement to embedded Linux from traditional real-time operating systems, and describes the system design model containing embedded Linux. This book delivers practical solutions for writing, debugging, and profiling applications and drivers in embedded Linux, and for understanding Linux BSP architecture. It enables you to understand: various drivers such as serial, I2C and USB gadgets; uClinux architecture and its programming model; and the embedded Linux graphics subsystem. The text also promotes learning of methods to reduce system boot time, optimize memory and storage, and find memory leaks and corruption in applications. This volume benefits IT managers in planning to choose an embedded Linux distribution and in creating a roadmap for OS transition. It also describes the application of the Linux licensing model in commercial products.
The conventional wisdom was that biology influenced mathematics and computer science. But a new approach has taken hold: that of transferring methods and tools from computer science to biology. The reverse trend is evident in Grammars and Automata for String Processing: From Mathematics and Computer Science to Biology and Back. The contributors address the structural (syntactical) view of the domain. Mathematical linguistics and computer science can offer various tools for modeling complex macromolecules and for analyzing and simulating biological issues. This collection is valuable for students and researchers in biology, computer science, and applied mathematics. |
You may like...
Network Science - Complexity in Nature…
Ernesto Estrada, Maria Fox, …
Hardcover
R2,788
Discovery Miles 27 880
Mem-elements for Neuromorphic Circuits…
Christos Volos, Viet-Thanh Pham
Paperback
R3,613
Discovery Miles 36 130
Towards the Internet of Things…
Mohammad Ali Jabraeil Jamali, Bahareh Bahrami, …
Hardcover
R2,532
Discovery Miles 25 320
Streetcar Named Desire: York Notes…
Tennessee Williams
Paperback
(2)
Statistics and Probability in Forensic…
Zuzana Obertova, Alistair Stewart, …
Paperback
R2,555
Discovery Miles 25 550
|