![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
USB is likely the most successful communication interface in the history of computer systems, and is the de-facto standard for connecting computer peripherals. Micri m's C/USB-Device is a USB device stack designed specifically for embedded systems. Built from the ground up with Micri m's quality, scalability and reliability, it has gone through a rigorous validation process to comply with the USB 2.0 specification. The first part of this book describes the inner-workings of USB using Micri m's C/USB-Device stack as a reference. The second part demonstrates how the Renesas YRDKRX63N Demonstration Kit (sold separately) and Micri m's C/USB-Device stack can be used as the foundation to build a USB device that relies on a combination of proven hardware and software platforms. Renesas' ultra-low-power RX63N MCU is at the core of the YRDKRX63N board, which incorporates communication functions such as USB 2.0 full-speed (host or device) among others. The examples featured in this book include USB devices with the most basic functionality that will allow you to understand the USB concepts covered in the first part of the book and at the same time, they provide a framework to quickly build devices such as: - USB-to-serial adapter (Communications Device Class) - Mouse or keyboard (Human Interface Device Class) - Removable storage device (Mass Storage Class) - USB medical device (Personal Healthcare Device Class) - Custom device (Vendor Class)
Relational databases place heavy demands on their underlying hardware and many of these databases are mission-critical resources for multiple applications, where performance bottlenecks are immediately noticeable and often very costly to the business. Despite this, many database administrators are not very knowledgeable about server hardware. Many medium-to-large companies have completely separate departments that are responsible for hardware selection, configuration, and maintenance, and the DBA with no knowledge of hardware is often completely at their mercy. Likewise, many DBAs are also unaware of the performance implications of the various options and configurations for SQL Server, and the Operating System on which it is installed. Glenn Berry is a highly experienced Database Architect, teacher and SQL Server MVP, and his book is designed to provide the fundamental knowledge and resources you need to make intelligent choices about optimal installation and configuration of SQL Server hardware, operating system and the SQL Server RDBMS. With what you learn in this book, you'll be able to ensure that your SQL Server instances can handle gracefully the CPU, memory and IO workload generated by your applications, and that the operating system and SQL Server itself are installed, patched, and configured for maximum performance and reliability.
ICS (International Conference on Supercomputing) is the premier international forum for the presentation of research results in high-performance computing systems. Papers are solicited on all aspects of research, development, and application of large-scale, high-performance experimental and commercial systems. The list of topics includes (but not limited to): * Computationally challenging scientific and commercial applications, particularly studies and experiences on large-scale systems;* Computer architecture and hardware, including multicore and multiprocessor systems, accelerators, memory, interconnection networks and storage and file systems;* High-performance computational and programming models, including new languages and middleware for high performance computing, autotuning and function-specific code generators;* High performance system software, including compilers, runtime systems, programming and expand
This MCITP Windows 7 Exam Study Guide has excellent coverage of all the exam objectives in a systematic approach. So you can be confident that you're getting the instruction you need to take Microsoft's new MCITP exam (70-685) called the Windows 7 Enterprise Desktop Support Technician (EDST7). This book is packed with practical guidance and step-by-step exercises to reinforce critical skills. Over 350 screenshots and figures, as well as oustanding authors who brings real-world scenarios, comprehensive self assessments tests, and step-by-step instructions to put what you've learned in the context of actual job roles. Also includes a challenging Self Assessment tests at the end of the book to prepare you for exam day.
The first motivation for writing this book is to teach my
colleagues about RTOS (Real-Time Operating System) concepts and the
proprietary RTOS developed for our project by me. I realized that
the same material with some extension can be useful to most
embedded engineers who are beginners in learning about RTOS. I came
across many embedded engineers who are not comfortable to use
real-time operating system. A significant fraction of these people
have taken operating systems course during their undergraduate or
graduate studies The unease obviously even more aggravated for
those embedded engineers who do not take operating systems course
during their college level studies. I think this is the main reason
that some companies still use tricky, messy workarounds to solve
their scheduling problems in their simple and moderately complex
projects. The operating systems course the engineers studied during
their undergraduation is too broad which only cover theoretical
aspects of all kinds of systems, and mostly devoid of practical
training that students can not gain the ability to develop one
This book gives an overview of Cloud Computing and Virtualization. It discusses the issues in Computational Resource Allocation and does an extensive experiments to evaluate the performance of web servers hosted on virtual operating systems. As multiple operating systems run on a single physical server, and multiple servers are running in the data center all connected via high speed network links, at some point of time, one of the servers may be overloaded, while others may remain underutilized. This poses challenges related to distributing the load and to carry out the work perfectly by using load balancing algorithm over the virtual machines. This book tries to find out the insights to balance the load based on computational time parameter of the virtual machines. We have also tried to evaluate and compare the performance of the web servers on different virtualization softwares including Xen, OpenVZ and Linux Operating Systems. It also discusses few algorithms related to resource allocation using control theory concepts and distributed computing algorithms.
The goal of workload modeling is to predict a computer's workload well enough to design it correctly. A poor model will lead to degraded performance and user satisfaction. Analyzing logs from multiple real parallel computers uncovers several statistical features - locality of sampling, daily cycles, weekly cycles, self similarity and flurries - that are missing from current workload models. Their practical importance is demonstrated by two new kinds of scheduling algorithms - adaptive scheduling and shortest job backfill first scheduling - which achieve an average 10% bottom- line performance gain and 35% stability gain on the production workloads. The second part of this book presents a user based workload model. It identifies four stable user types and five stable session types. It then deduces model parameters, the distributions of the arrival and activity patterns for both users and sessions, their dependencies and temporal structure. The methodology and statistical toolset is explained to make it easier to reuse in other domains. The insights and practical advice provided will be of use to anyone building or operating a large-scale parallel computer.
Over the past two years, Simple-Talk has published articles on a variety of SysAdmin topics, from Exchange to Virtualization, and including everything from Powershell to Unifi ed Messaging. We have brought the best of these articles together to form The SysAdmin Handbook. With over fi fty articles packed into this book, it will be an essential reference for any Systems Administrator, whether you have years of experience or are just starting out.
Sexy Web Design is an easy-to-follow guide that reveals the secrets of how to build your own breathtaking web interfaces from scratch. You'll be guided through the entire process of creating a gorgeous, usable web site by applying the timeless principles of user-centered design. Even if you're short on design skills, with this book you'll be creating your own stunning web sites in no time at all. Throughout, the focus is on simple and practical techniques that anyone can use - you don't need to have gone to art school or have artistic flair to create stunning designs using the methods outlined in this book. The book's full-color layout and large format (8" x 10") make Sexy Web Design a pleasure to read. Master key web interface design principles Design amazing web interfaces from scratchCreate beautiful, yet functional, web sitesUnleash your artistic talentsAnd much more Who should read this book? Whether you're completely new to web design, a seasoned pro looking for inspiration, or a developer wanting to improve your sites' aesthetics, there's something for everyone here. How? Because instead of trying to cover every possible area of creating a web site, we've focused purely on the design stage; that is, everything that happens before a single line of code is written. However, great design is more than just aesthetics. Long before we open our graphics program of choice, we'll be conducting research, dealing with clients, responding to briefs, sketching out sitemaps, planning information architecture, moving from doodles to diagrams, exploring different ways of interactivity, and building upon design traditions. But ultimately, you'll be finding out how to create web sites that look drop-dead gorgeous.
For any organisation to be successful in an increasingly competitive and global working environment, it is essential that there is a clear understanding of all aspects of the business. Given that no two organisations are exactly alike, there is no definitive understanding of exactly what these aspects are as they will depend on the organisation's nature, size and so on. Some of the aspects of the business that must be considered include: process models, process descriptions, competencies, standards, methodologies, infrastructure, people and business goals. It is important that these different aspects of the business are not only understood, but also that they are consistent and congruent with one another. The creation of an effective Enterprise Architecture (EA) provides a means by which an organisation can obtain such an understanding. This book looks at the practical needs of creating and maintaining an effective EA within a twenty-first-century business through the use of pragmatic modelling. The book introduces the concepts behind enterprise architectures, teaches the modelling notation needed to effectively realise an enterprise architecture and explores the concepts more fully through a real-life enterprise architecture.
Learn the basics of how to use Windows 7 with easy to follow directions and color pictures guiding you through each step.
Learn the basics of how to use Windows 7 with easy to follow directions and pictures guiding you through each step.
Step by step guide to Install, upgrade, and troubleshoot Microsoft Windows Vista operating system
This book contains 36 chapters and is structured to facilitate readers to grasp concepts, understand implementation procedures, learn command syntax, configuration files and daemons involved, and understand basic troubleshooting. The 36 chapters are divided into three key areas: UNIX Fundamentals, HP-UX System Administration and HP-UX Network Administration. These chapters cover topics that are on HP s recommended certification courses UNIX Fundamentals, System and Network Administration I, System and Network Administration II, and HP-UX for Experienced UNIX System Administrators as well as on official exam objectives list. 1.UNIX Fundamentals (chapters 1 to 6, and 22) covers the basics of UNIX and HP-UX. Most information is not specific to a particular UNIX flavor, rather, includes general UNIX concepts, file manipulation and security techniques, vi editor, shell and awk programming, basic commands and other essential topics. Unlike many other similar books, a chapter on shell scripting is presented after covering HP-UX System Administration area. This is done purposely to provide readers with practical examples based on the knowledge they gain from UNIX Fundamentals and HP-UX System Administration chapters. 2.HP-UX System Administration (chapters 7 to 21) covers the HP-UX-specific system administration concepts and topics including server hardware information and mass storage stack; virtualization technologies and HP-UX installation; software and patch management; user and group administration; LVM and file system administration; EVFS and swap management; system shutdown and startup procedures; kernel configuration and management techniques; backup and restore functions; printer and print request management, job automation and process control; and system logging and performance monitoring. 3.HP-UX Network Administration (chapters 23 to 36) covers HP-UX network and security administration concepts and topics such as OSI and TCP/IP reference models; network hardware overview and LAN interface administration; IP subnetting and routing techniques; basic network testing and troubleshooting; internet services and sendmail; time synchronization (NTP) and resource sharing (NFS, AutoFS and CIFS) services; naming (DNS, NIS and LDAP) services and automated installation techniques; and high-availability concepts and system security tools and practices. Throughout the book figures, tables, screen shots and examples are given for explanation purposes. The book includes 863 exam review questions with answers.
This practical introduction to OpenLDAP for Application Developers emphasizes how to get things done, going into Lightweight Directory Access Protocol (LDAP) theory only to answer practical questions. It demystifies OpenLDAP, providing a solid understanding of how to use its directory and covering building directory services, integrating directory services, and developing directory-enabled PHP or Python applications. Readers need only basic Linux system administration experience, not LDAP experience. Open-source OpenLDAP directory server is included in all major Linux distributions; many open-source and proprietary applications can use OpenLDAP's services. Client applications use LDAP to connect to OpenLDAP, search the directory, and (if authorized) modify and manipulate records. Most often used to provide network-based authentication services for users, LDAP servers have many other uses: address book, DNS database, organizational tool, even network object store for applications.
This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for both experienced and new IPCop users. IPCop is a powerful, open source, Linux based firewall distribution for primarily Small Office Or Home (SOHO) networks, although it can be used in larger networks. It provides most of the features that you would expect a modern firewall to have, and what is most important is that it sets this all up for you in a highly automated and simplified way. This book is an easy introduction to this popular application. After introducing and explaining the foundations of firewalling and networking and why they're important, the book moves on to cover using IPCop, from installing it, through configuring it, to more advanced features, such as configuring IPCop to work as an IDS, VPN and using it for bandwidth management. While providing necessary theoretical background, the book takes a practical approach, presenting sample configurations for home users, small businesses, and large businesses. The book contains plenty of illustrative examples. Chapter 1 briefly introduces some firewall and networking concepts. The chapter introduces the roles of several common networking devices and explains how firewalls fit into this. Chapter 2 introduces the IPCop package itself, discussing how IPCop's red/orange/blue/green interfaces fit into a network topology. It then covers the configuration of IPCop in other common roles, such as those of a web proxy, DHCP, DNS, time, and VPN server. Chapter 3 covers three sample scenarios where we learn how to deploy IPCop, how IPCop interfaces connect to each other and to the network as a whole. Chapter 4 covers installing IPCop. It outlines the system configuration required to run IPCop, and explains the configuration required to get IPCop up and running. In Chapter 5, we will learn how to employ the various tools IPCop provides us with to administrate, operate, troubleshoot, and monitor our IPCop firewall Chapter 6 starts off with explaining the need for an IDS in our system and then goes on to explain how to use the SNORT IDS with IPCop. Chapter 7 introduces the VPN concept and explains how to set up an IPSec VPN configuration for a system. Special focus is laid on configuring the blue zone - a secured wireless network augmenting the security of a wireless segment, even one already using WEP or WPA. Chapter 8 demonstrates how to manage bandwidth using IPCop making use of traffic shaping techniques and cache management. The chapter also covers the configuration of the Squid web proxy and caching system. Chapter 9 focuses on the vast range of add-ons available to configure IPCop to suit our needs. We see how to install add-ons and then learn more about common add-ons like SquidGuard, Enhanced Filtering, Blue Access, LogSend, and CopFilter. Chapter 10 covers IPCop security risks, patch management and some security and auditing tools and tests. Chapter 11 outlines the support IPCop users have in the form of mailing lists and IRC. The book is suitable for anyone interested in securing their networks with IPCop - from those new to networking and firewalls, to networking and IT Professionals with previous experience of IPCop. No knowledge of Linux or IPCop is required.
Like the first edition of this book, the second edition also covers three main objectives to provide a comprehensive resource to individuals, including novice, IT/Non-HP-UX administrators, and HP-UX administrators who intend to take the new HP Certified Systems Administrator exam HP0-095 and pass it; to provide a quick and valuable on-the-job resource to HP-UX administrators, administrators of other UNIX operating systems, IT managers, programmers, and DBAs working in the HP-UX environment; and to provide an easy-to-understand guide to novice and IT/non-HP-UX administrators who intend to learn HP-UX from the beginning. This book contains 38 chapters and is structured to facilitate readers to grasp concepts, understand implementation procedures, understand basic troubleshooting, learn command syntax, configuration files, and daemons involved. The 38 chapters are divided into three key areas: UNIX Fundamentals, HP-UX System Administration, and HP-UX Network Administration. 1. UNIX Fundamentals (chapters 1 to 6 and 23) covers the basics of UNIX. Most information is not specific to a particular UNIX flavor, rather includes general UNIX concepts, file manipulation and security techniques, vi editor, shell and awk programming, basic commands, and other essential topics. Unlike many other similar books, a chapter on shell scripting is presented after covering HP-UX System Administration area. This is done purposely to supply readers with practical examples based on the knowledge they gain from UNIX Fundamentals and HP-UX System Administration chapters. 2. HP-UX System Administration (chapters 7 to 22) covers the HP-UX-specific system administration concepts and topics, including system partitioning and HP-UX installation; software and patch management; user and group administration; LVM and VxVM management; file system and swap administration; system shutdown and startup procedures; kernel configuration and reconfiguration techniques; backup and restore functions; printer and print request management, job automation and process control; and system logging and performance monitoring. 3. HP-UX Network Administration (chapters 24 to 38) covers HP-UX network administration concepts and topics, such as OSI and TCP/IP reference models; network hardware overview and LAN card administration; IP subnetting and routing techniques; basic network testing and troubleshooting; internet services and sendmail; time synchronization (NTP) and resource sharing (NFS, AutoFS, and CIFS) services; naming (DNS, NIS, and LDAP) and boot services; automated installation techniques and high-availability concepts; and system security and hardening. Each chapter begins with a list of major topics to be covered in the chapter and ends with a summary. Throughout the book, tables, figures, screen shots, and examples are given for explanation purposes. The output generated because of running commands and shell scripts is highlighted in light grey background to differentiate from surrounding text. The book includes several appendices, one of which contains 672 practice exam questions. Answers to practice exam questions and tables of commands, important files, and service daemons are included in appendix area as well.
This slightly revised 4th edition includes two example projects from the earlier editions not found in the third edition but is otherwise unchanged. As before it includes a massive amount of information about the 8051-family of microcontrollers and techniques for programming them in the C language. There is a strong emphasis on interrupt-driven programming and operating systems as well as many algorithms related to typical microcontroller interfacing. There is extensive ground-up coverage of serial interfacing and small-area networks.
"Operating System" is the most essential program of all, without which it becomes cumbersome to work with a computer. It is the interface between the hardware and computer users making the computer a pleasant device to use. "The Operating System: Concepts and Techniques" clearly defines and explains the concepts: process (responsibility, creation, living, and termination), thread (responsibility, creation, living, and termination), multiprogramming, multiprocessing, scheduling, memory management (non-virtual and virtual), interprocess communication/synchronization (busy-wait-based, semaphore-based, and message-based), deadlock, and starvation. Real-life techniques presented are based on UNIX, Linux, and contemporary Windows. The book has briefly discussed agent-based operating systems, macro-kernel, microkernel, extensible kernels, distributed, and real-time operating systems. The book is for everyone who is using a computer but is still not at ease with the way the operating system manages programs and available resources in order to perform requests correctly and speedily. High school and university students will benefit the most, as they are the ones who turn to computers for all sorts of activities, including email, Internet, chat, education, programming, research, playing games etc. It is especially beneficial for university students of Information Technology, Computer Science and Engineering. Compared to other university textbooks on similar subjects, this book is downsized by eliminating lengthy discussions on subjects that only have historical value.
Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process. Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and developing rootkits under the FreeBSD operating system. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD. Kongs liberal use of examples assumes no prior kernel-hacking experience but doesn't water down the information. All code is thoroughly described and analyzed, and each chapter contains at least one real-world application.Included: The fundamentals of FreeBSD kernel module programming Using call hooking to subvert the FreeBSD kernel Directly manipulating the objects the kernel depends upon for its internal record-keeping Patching kernel code resident in main memory; in other words, altering the kernel's logic while it's still running How to defend against the attacks described Hack the FreeBSD kernel for yourself
Penguin in the Pew clears up the confusion about the terms "free" and "open source," addresses the challenges of hardware compatibility, software interoperability, and whether a migration is really more expensive than an upgrade. Readers will learn why and how they should migrate to the GNU/Linux operating system. Additionally, Penguin in the Pew connects readers to the growing community of Christians who use, develop and provide technical support for GNU/Linux and other free and open source applications. The book's author, Don Parris, invites fellow Christians to join in a dialogue where the GNU/Linux "philosophy" and Christian values intersect. |
You may like...
3D Printing of Sensors, Actuators, and…
Rupinder Singh, Balwinder Singh Dhaliwal, …
Hardcover
R2,486
Discovery Miles 24 860
Fixed-Time Cooperative Control of…
Zongyu Zuo, Qinglong Han, …
Hardcover
R3,106
Discovery Miles 31 060
Informatics in Control, Automation and…
Jean-Louis Ferrier, Oleg Gusikhin, …
Hardcover
R6,455
Discovery Miles 64 550
Indian Hill Minor - Asian Art Cross…
Kathleen George, Cross Stitch Collectibles
Paperback
R426
Discovery Miles 4 260
Additive Manufacturing and 3D Printing…
Vishwjeet Ambade, G K Awari, …
Hardcover
R3,582
Discovery Miles 35 820
Artificial Intelligence for Future…
Rabindra Nath Shaw, Ankush Ghosh, …
Paperback
R3,864
Discovery Miles 38 640
Dragon - Asian Art Cross Stitch Pattern
Kathleen George, Cross Stitch Collectibles
Paperback
R434
Discovery Miles 4 340
|