Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
Control-Based Operating System Design describes the application of system- and control-theoretical methods to the design of computer operating system components. It argues that computer operating system components should not be first 'designed' and then 'endowed with control', but rather when possible conceived from the outset as controllers, synthesised and assessed in the system-theoretical world of dynamic models, and then realised as control algorithms. Doing so is certainly a significant perspective shift with respect to current practices in operating system design, but the payoff is significant too. In some sense, adopting the suggested attitude means viewing computing systems as cyber-physical ones, where the operating system plays the computational role, the physical elements are the managed resources, and the various (control) functionalities to be realised, interact and co-operate as a network. The book includes both a theoretical treatment of the usefulness of the approach, and the description of a complete implementation in the form of Miosix, a microcontroller kernel made available as free software.
Hyper-V Security is intended for administrators with a solid working knowledge of Hyper-V Server, Windows Server, and Active Directory. An administrator with a functional environment will be able to use the knowledge and examples present in this book to enhance security.
This book is aimed at Java developers, system administrators, application testers using WildFly, and anyone who performs a DevOps role. Whether you are completely new to WildFly or just require an understanding of WildFly's new features, this book is for you.
If you've ever said to yourself, "There has to be a better way to
do this," then read on.
A practical and fast-paced guide that gives you all the information you need to get up and running with Opsview. This book is for anyone interested in using Opsview as a potential monitoring solution or for those who are already running Opsview Core and who would like to improve on their setup by exploring the features of Pro and Enterprise. Some working knowledge of monitoring and Linux is assumed, and it is recommended to have an Opsview system at hand while reading, allowing you to immediately try out the features discussed.
Google's ChromeBook has been around for a couple of years now, but it has mostly taken a backseat to the company's stable of Android devices. With the recent release of the next generation of ChromeBooks, Google is finally giving this new computing platform the attention it deserves. No longer are people forced to choose between Windows and Mac - and if Google has anything to say about it, the ChromeBook platform will grow by leaps and bounds in the years to come. The concept behind these devices is both simple and revolutionary. Since most of our computer use takes place within a browser, why not eliminate the need for standalone programs altogether? The ChromeBook is a not only a new series of devices, but a new computing paradigm. Automatically updated and free from viruses and malware, it's the most secure operating system available today. By harnessing the power of the Internet, the ChromeBook can do pretty much anything that more expensive PCs are capable of. It's everything you need, and none of what you don't. Over the course of this guide, we'll introduce you to the concepts that make the ChromeBook a unique solution for you and your family. Whether you're bogged down with endless term papers or just browsing eBay for a bargain, we'll show you the ins and outs of the system, giving you the knowledge you need to make the ChromeBook a big part of your digital life. Ready to get started? Let's do this
A step-by-step guide to learn how to set up security on Linux servers by taking SELinux policies into your own hands. Linux administrators will enjoy the various SELinux features that this book covers and the approach used to guide the admin into understanding how SELinux works. The book assumes that you have basic knowledge in Linux administration, especially Linux permission and user management.
A step-by-step tutorial that will teach you, through real world examples, how to configure and use zsh and its various features. If you are a system administrator, developer, or computer professional involved with UNIX who are looking to improve on their daily tasks involving the UNIX shell, "Learning Shell Scripting with zsh" will be great for you. It's assumed that you have some familiarity with an UNIX command line interface and feel comfortable with editors such as Emacs or vi.
ACL Made Simple is a book/CD-ROM combination that educates orthopedic residents, athletic trainers, and various medical support staff about the fundamentals of ACL injuries. The content is both thorough and practical. Readers will benefit from comprehensive discussions of diagnosis, partial tears, treatment options, operative techniques, and complications. This definitive guide also outlines a six-month rehabilitation program complete with goals, stages, and exercises. More than 150 photographs and diagrams illuminate key concepts. A CD-ROM keyed to each chapter complements the text and makes it easy for users to locate sections of particular interest. The numerous graphics and narrated video clips are dynamic tools that highlight topics including the mechanism of injury, physical examination, and surgical techniques.
This book shows you how to build your own Linux Web server with Ubuntu Linux and host your own website at home for free without having to pay a web hosting company like GoDaddy or Web.com. Whether you are ten years old or 80, even if you have never worked with Linux before and you are not that good with computers, you can setup a Linux Web Server by following the simple, easy-to-follow steps in this book. Setup an Ubuntu Linux Server from scratch. Create your own domain name. Make a simple web page. Get your server to be seen by the Internet. Use FTP to edit your web pages. Process HTML form submissions. Program a MySQL database to store a guest book. Use PHP to integrate your web page with MySQL. Add a visitor counter to your web page. Setup Free Dynamic DNS Forwarding Backup your MySQL Databases Use Linux, MySQL and PHP security features. Accept payment with PayPal buttons.
As a network or system administrator, your primary responsibility is to ensure high availability of all managed IT services. There are a number of monitoring tools available; but these can be complicated and expensive, and may only monitor certain areas of your network. SolarWinds Server & Application Monitor is an intuitive, all-encompassing, yet cost effective, enterprise-level network monitoring service. A concise and practical, hands-on guide that will teach you how utilize SolarWinds SAM. It provides step-by-step tutorials to walk you through every feature, while teaching you how to tailor the product to your own network environment. This book will guide you through equipping your network devices and servers for SolarWinds SAM utilization. It will provide a sequential, hands-on overview of the product, and is suited for networks of all sizes, ranging from small businesses to larger enterprises. You will learn how to populate SolarWinds SAM with nodes, then classify and group nodes to tailor the product to your network environment. By doing so, you will benefit from key features such as automated alerts, traps, and reports. Each feature is explained in a practical and useful manner via tutorials and real-world examples to help you start monitoring your network quickly and efficiently, while keeping security implications in mind by applying enterprise-level best practices.
This book will give beginners an introduction to building voice-based applications on Android. It will begin by covering the basic concepts and will build up to creating a voice-based personal assistant. By the end of this book, you should be in a position to create your own voice-based applications on Android from scratch in next to no time. Voice Application Development for Android is for all those who are interested in speech technology and for those who, as owners of Android devices, are keen to experiment with developing voice apps for their devices. It will also be useful as a starting point for professionals who are experienced in Android application development but who are not familiar with speech technologies and the development of voice user interfaces. Some background in programming in general, particularly in Java, is assumed.
A concise and practical guide to using SolarWinds Server & Application Monitor. If you are an IT professionals ranging from an entry-level technician to a more advanced network or system administrator who is new to network monitoring services and/or SolarWinds SAM, this book is ideal for you.
This book is a tutorial guide for new users that aims to help you understand the basics of and become accomplished with the use of R for quantitative finance. If you are looking to use R to solve problems in quantitative finance, then this book is for you. A basic knowledge of financial theory is assumed, but familiarity with R is not required. With a focus on using R to solve a wide range of issues, this book provides useful content for both the R beginner and more experience users.
Backup and recovery are mission-critical DBA tasks, and it is critical that every Oracle professional develop a RMAN strategy that guarantees recoverability while minimizing unplanned downtime. RMAN is one of the world's most sophisticated backup and recovery tools. It is robust and complex with thousands of options. This landmark book demonstrates, by example, how to create a successful backup and recovery infrastructure using RMAN. This book also contains links to RMAN video tutorials and a download of working RMAN scripts to guide users through full automation of a backup strategy. Together, backup and recovery are the single most important combined DBA activity, and it is crucial that you master the RMAN and Data Pump Import utilities to protect against catastrophic data loss. Written by practicing Oracle DBAs with years of RMAN experience, this is a pragmatic approach to RMAN, focusing less on theory and more on real-world, practical RMAN tools, tips and techniques. This Oracle backup and recovery book is unique because it provides real-world examples on how to use RMAN and other tools to protect your mission critical data. Even with reliable mirrored disks, your important Oracle database is still at-risk from from software corruption, user error and hardware failures. This book details Oracle RMAN best practices and shows the best ways to minimize backup and recovery time, which is critical for maximizing system availability This is the definitive RMAN reference that guides you, step-by-step, through all of the techniques for Oracle backup and recovery, from simple cold backups to complex incremental backups. Experienced RMAN experts guide you through the installation, setup and configuration for a complete RMAN backup and recovery infrastructure using proven techniques and Oracle best practices. Best of all, you be given the opportunity to learn from supplemental video tutorials and working examples how to recover from every possible data scenario. This book has step-by-step checklists that you can follow to guide you through a complex recovery with minimal unplanned system outages. This is an indispensible RMAN reference for every professional DBA who needs to ensure that they understand every possible backup and recovery strategy. It also contains a download of working RMAN scripts to help you easily automate and monitor your RMAN backups.
With today's hardware and chips, 90% of the time, interpreted unix scripts will perform as efficiently as code written in higher level languages - such as java. The difference is that, with unix scripts, you cut out about 80-90% of the lines of code, and have something that can easily be maintained and supported. Even if you still want to code in a higher level language, unix shell scripting is invaluable for support functions - such as moving around files, parsing log files, etc. An analyst or support person who uses the topics and examples in this book to master scripting can save him or herself literally hundreds of hours - especially when dealing with repetitive tasks with many lines of data.
USB is likely the most successful communication interface in the history of computer systems, and is the de-facto standard for connecting computer peripherals. Micri m's C/USB-Device is a USB device stack designed specifically for embedded systems. Built from the ground up with Micri m's quality, scalability and reliability, it has gone through a rigorous validation process to comply with the USB 2.0 specification. The first part of this book describes the inner-workings of USB using Micri m's C/USB-Device stack as a reference. The second part demonstrates how the Renesas YRDKRX63N Demonstration Kit (sold separately) and Micri m's C/USB-Device stack can be used as the foundation to build a USB device that relies on a combination of proven hardware and software platforms. Renesas' ultra-low-power RX63N MCU is at the core of the YRDKRX63N board, which incorporates communication functions such as USB 2.0 full-speed (host or device) among others. The examples featured in this book include USB devices with the most basic functionality that will allow you to understand the USB concepts covered in the first part of the book and at the same time, they provide a framework to quickly build devices such as: - USB-to-serial adapter (Communications Device Class) - Mouse or keyboard (Human Interface Device Class) - Removable storage device (Mass Storage Class) - USB medical device (Personal Healthcare Device Class) - Custom device (Vendor Class)
Fault-tolerance becomes an important key to establish dependability in Real Time Distributed Systems (RTDS). In fault-tolerant Real Time Distributed systems, detection of fault and its recovery should be executed in timely manner so that in spite of fault occurrences the intended output of real-time computations always take place on time. Hardware and software redundancy are well-known effective methods for fault tolerance, where extra hard ware (e.g., processors, communication links) and software (e.g., tasks, messages) are added into the system to deal with faults. Performances of RTDS are mostly guided by efficiency of scheduling algorithm and schedulability analyses are performed on the system to ensure the timing constrains. Fault tolerance can be achieved by scheduling additional ghost copies in addition to the primary copy of the task. The method proposed here extends the traditional distributed recovery block (DRB) based fault tolerant scheduling approach for real time tasks. Our algorithms are mostly based on software redundancy, and ensures that the parallel updating of backup task works better in case of transient overload and handles permanent, transient and timing fau
Android is an operating system specially designed to run on mobile devices. It's derived from the Linux operating system -- the free, open-source operating system that runs a significant percentage of the servers that contain the World Wide Web. We're not going to go into a history lesson here. We just want to point out that Android is a small, elegant interpretation of a powerful operating system, designed for a device with limited memory and battery power. Your Android device is a full-blown computer, capable of incredible things. But it also deals with limitations that computers don't have to deal with -- what to do if the battery runs down, or how to stop your application if a phone call comes in. Android answers these questions with its powerful technology, but it also has an attractive interface, and it's very stable (avoiding freeze-ups and crashes). Your Android phone is a tool that can make your professional life more efficient and smoother. But Android can be fun -- offering games, movies, music and social networking. If you're new to Android, you probably want to start exploring right away. This guide is here to help you quickly understand all of the major aspects of operating your Android phone, as well as to show you some exciting areas to explore.
Learn the basics of how to use Windows 7 with easy to follow directions and pictures guiding you through each step. |
You may like...
The Continuing Arms Race - Code-Reuse…
Per Larsen, Ahmad-Reza Sadeghi
Hardcover
R2,609
Discovery Miles 26 090
UC/OS-III - The Real-Time Kernel and the…
Jean J. Labrosse, Freddy Torres
Hardcover
R1,769
Discovery Miles 17 690
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R996
Discovery Miles 9 960
|