![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
Whether you are a professional new to the user-centered design
field, or an experienced designer who needs to learn the
fundamentals of user interface design and evaluation, this book can
lead the way.
Almost all of the messages that are received by the cerebral cortex
from the environment or from the body's internal receptors come
through the thalamus and much current thought about perceptual
processing is based on sensory pathways that relay in the thalamus.
This volume focuses on three major areas: the role of
thalamocortical communication in cognition and attention; the role
of the thalamus in communication between cortical areas; the
hypothesis that much or all of the information relayed by thalamus,
even to classical, pure "sensory" areas of cortex, represents a
corollary message being sent simultaneously to motor centers. It
presents a broad overview of important recent advances in these
areas.
Appropriate for all courses in Tcl/Tk scripting, and many courses in Unix shell scripting. Practical Programming in Tcl/Tk, Fourth Edition is the definitive guide to Tcl/Tk programming for developers at all levels—including experienced Perl and Python programmers who want to use Tk to build high-quality, cross-platform user interfaces. Thoroughly updated for Tcl/Tk 8.4, this book brings together comprehensive, authoritative coverage of every Tcl and Tk command in the core toolkits, along with detailed examples that demonstrate the best ways to use the Tcl/Tk toolkit. Extensive new Tcl/Tk 8.4 coverage includes: the Tcl/Tk virtual filesystem (VFS); spinbox, panedwindow, labelframe, and other new widgets; and improved internationalization support. The book includes an exceptionally clear introduction to the unique Tcl programming model, as well as practical coverage of cross-platform development for Unix, Windows, and Macintosh; Web application development with the TclHttpd web server; and much more. The accompanying CD-ROM contains all sample code from the book, as well as the latest binary distributions of Tcl/Tk, Tcl extensions, and an extensive collection of Tcl/Tk freeware.
A clear, comprehensive guide to VMware's latest virtualization solution Mastering VMware NSX for vSphere is the ultimate guide to VMware's network security virtualization platform. Written by a rock star in the VMware community, this book offers invaluable guidance and crucial reference for every facet of NSX, with clear explanations that go far beyond the public documentation. Coverage includes NSX architecture, controllers, and edges; preparation and deployment; logical switches; VLANS and VXLANS; logical routers; virtualization; edge network services; firewall security; and much more to help you take full advantage of the platform's many features. More and more organizations are recognizing both the need for stronger network security and the powerful solution that is NSX; usage has doubled in the past year alone, and that trend is projected to grow--and these organizations need qualified professionals who know how to work effectively with the NSX platform. This book covers everything you need to know to exploit the platform's full functionality so you can: Step up security at the application level Automate security and networking services Streamline infrastructure for better continuity Improve compliance by isolating systems that handle sensitive data VMware's NSX provides advanced security tools at a lower cost than traditional networking. As server virtualization has already become a de facto standard in many circles, network virtualization will follow quickly--and NSX positions VMware in the lead the way vSphere won the servers. NSX allows you to boost security at a granular level, streamline compliance, and build a more robust defense against the sort of problems that make headlines. Mastering VMware NSX for vSphere helps you get up to speed quickly and put this powerful platform to work for your organization.
MATLAB®, now the industry-standard engineering language for computation, analysis, and visualization, continues to evolve in its capabilities. Version 6.x incorporated several major improvements, including significant enhancements to its graphics features, such as transparencies, increased 3-D visualization, and an improved rendering engine.
The conventional wisdom was that biology influenced mathematics and computer science. But a new approach has taken hold: that of transferring methods and tools from computer science to biology. The reverse trend is evident in Grammars and Automata for String Processing: From Mathematics and Computer Science to Biology and Back. The contributors address the structural (syntactical) view of the domain. Mathematical linguistics and computer science can offer various tools for modeling complex macromolecules and for analyzing and simulating biological issues. This collection is valuable for students and researchers in biology, computer science, and applied mathematics.
Mastering cluster technology-the linking of servers-is becoming increasingly important for application and system programmers and network designers, administrators, and managers. With Microsoft's Windows NT cluster server being the first to tie cluster technology with a major operating system, it appears destined to take a leadership position in the industry. Introduction to Microsoft Windows NT Cluster Server provides all you need to know to develop your abilities for this essential technology. The author provides both introductory and advanced material focused on the three basic functions: fault tolerant computing (failover), load balancing, and centralized administration and monitoring. He guides the reader from the basics of cluster servers, through Microsoft's cluster server set-up, communication, programming, and administration. Written for professionals who are familiar with the Windows NT operating system and have programming experience, Introduction to Microsoft Windows NT Cluster Server contains information instrumental in helping you achieve zero downtime.
Although numerous sources document aspects of user-centered design, there are few references that consider how a designer transforms the information gathered about users and their work into an effective user interface design. This book explains just how designers bridge that gap. A group of leading experts in GUI design describe their methods in the context of specific design projects, and while the projects, processes, and methods vary considerably, the common theme is building a bridge between user requirements and user interface design.
The utility simply known as "make" is one of the most enduring features of both Unix and other operating systems. First invented in the 1970s, "make" still turns up to this day as the central engine in most programming projects; it even builds the Linux kernel. In the third edition of the classic "Managing Projects with GNU make," readers will learn why this utility continues to hold its top position in project build software, despite many younger competitors. The premise behind "make" is simple: after you change source files and want to rebuild your program or other output files, "make" checks timestamps to see what has changed and rebuilds just what you need, without wasting time rebuilding other files. But on top of this simple principle, "make" layers a rich collection of options that lets you manipulate multiple directories, build different versions of programs for different platforms, and customize your builds in other ways. This edition focuses on the GNU version of "make," which has deservedly become the industry standard. GNU make contains powerful extensions that are explored in this book. It is also popular because it is free software and provides a version for almost every platform, including a version for Microsoft Windows as part of the free Cygwin project. "Managing Projects with GNU make," 3rd Edition provides guidelines on meeting the needs of large, modern projects. Also added are a number of interesting advanced topics such as portability, parallelism, and use with Java. Robert Mecklenburg, author of the third edition, has used "make" for decades with a variety of platforms and languages. In this book he zealously lays forth how to get your builds to be asefficient as possible, reduce maintenance, avoid errors, and thoroughly understand what "make" is doing. Chapters on C++ and Java provide makefile entries optimized for projects in those languages. The author even includes a discussion of the makefile used to build the book.
Master operating system development. FreeDOS Kernel explains the construction and operation of Pat Villani's DOS-C - a highly portable, single threaded operating system. Written in C and with system calls similar to MS-DOS, the FreeDOS kernel provides an excellent source code base for experimentation. Study it, modify it and use it without getting lost in the complexity of most microkernels. The book and companion disk include the full source code for an 80X86 kernel and support files. Achieve real platform independence with DOS compatibility. FreeDOS uses the de facto DOS hardware standards and provides binary compatibility for MS-DOS applications, compiles with Borland C, Microsoft C and other C cross-compilers without using their run-time libraries, and is the kernel provided by the FreeDOS community on the Internet. Provide embedded systems with full OS functionality. The FreeDOS kernel provides embedded systems applications with the functionality of larger operating systems, including file storage, embedded databases, and sophisticated device control. Simplify the design of your embedded systems by using your PC for development and then linking your own version of FreeDOS to create the application ROM.
Validation of Computerized Analytical and Networked Systems provides the definitive rationales, logic, and methodology for validation of computerized analytical systems. Whether you are involved with formulation or analytical development laboratories, chemical or microbiological quality control laboratories, LIMS installations, or any aspect of robotic in a healthcare laboratory, this book furnishes complete validation details. International and FDA regulations and requirements are discussed and juxtaposed with numerous practical examples that show you how to cost-effectively and efficiently accomplish validation acceptable to FDA GCP/GLP/GMP, NAMAS, and EN45001 standards. The templates included provide documentation examples and the many checklists found throughout the book assure that all aspects of covered in a logical sequence. The chapters describe and explain such topics as the Product Life Cycle revalidation, change control, documentation requirements, qualifications, testing, data validation and traceability, inspection, SOPs, and many other that help streamline the validation process.
Designed as a self-study guide, the book describes the real-world tradeoffs encountered in building a production-quality, platform-retargetable compiler. The authors examine the implementation of lcc, a production-quality, research-oriented retargetable compiler, designed at AT&T Bell Laboratories for the ANSI C programming language. The authors' innovative approach-a "literate program" that intermingles the text with the source code-uses a line-by-line explanation of the code to demonstrate how lcc is built.
The number of security countermeasures against user-land
exploitation is on the rise. Because of this, kernel exploitation
is becoming much more popular among exploit writers and attackers.
Playing with the heart of the operating system can be a dangerous
game: This book covers the theoretical techniques and approaches
needed to develop reliable and effective kernel-level exploits and
applies them to different operating systems (Linux, Solaris, Mac OS
X, and Windows). Kernel exploits require both art and science to
achieve. Every OS has its quirks and so every exploit must be
molded to fully exploit its target. This book discusses the most
popular OS families-UNIX derivatives, Mac OS X, and Windows-and how
to gain complete control over them. Concepts and tactics are
presented categorically so that even when a specifically detailed
exploit has been patched, the foundational information that you
have read will help you to write a newer, better attack or a more
concrete design and defensive structure.
The fields of computer-assisted instruction and intelligent tutoring systems have had few vehicles for sharing ideas or programs. Different backgrounds and settings meant reading different journals and attending different conferences. The purpose of this book is to foster a mutual understanding of shared issues and contemporary approaches so as to further powerful educational applications of computing. It is unique in drawing on both the intelligent tutoring systems and computer assisted instruction communities. Each chapter provides an in-depth discussion by leaders in these fields of current work, focusing on instructional programs -- their design, use, and evaluation. The editors and authors have made extensive efforts to ensure each chapter's clarity and readability for both communities.
The fields of computer-assisted instruction and intelligent
tutoring systems have had few vehicles for sharing ideas or
programs. Different backgrounds and settings meant reading
different journals and attending different conferences. The purpose
of this book is to foster a mutual understanding of shared issues
and contemporary approaches so as to further powerful educational
applications of computing. It is unique in drawing on both the
intelligent tutoring systems and computer assisted instruction
communities.
Master operation system development. FreeDOS Kernel explains the construction and operation of Pat Villani's DOS-C - a highly portable, single threaded operating system. Written in C and with system calls similar to MS-DOS, the FreeDOS kernel provides an
This book describes the internal algorithms and the structures that form the basis of the UNIX® operating system and their relationship to the programmer interface. The system description is based on UNIX System V Release 2 supported by AT&T, with some features from Release 3.
Whatever your programming language, whatever your platform, you
probably tap into linker and loader functions all the time. But do
you know how to use them to their greatest possible advantage? Only
now, with the publication of Linkers & Loaders, is there an
authoritative book devoted entirely to these deep-seated
compile-time and run-time processes.
sed & awk describes two text manipulation programs that are mainstays of the UNIX programmer's toolbox. This edition covers the sed and awk programs as they are mandated by the POSIX standard and includes discussion of the GNU versions of these programs.
How can we provide guarantees of behaviours for autonomous systems such as driverless cars? This tutorial text, for professionals, researchers and graduate students, explains how autonomous systems, from intelligent robots to driverless cars, can be programmed in ways that make them amenable to formal verification. The authors review specific definitions, applications and the unique future potential of autonomous systems, along with their impact on safer decisions and ethical behaviour. Topics discussed include the use of rational cognitive agent programming from the Beliefs-Desires-Intentions paradigm to control autonomous systems and the role model-checking in verifying the properties of this decision-making component. Several case studies concerning both the verification of autonomous systems and extensions to the framework beyond the model-checking of agent decision-makers are included, along with complete tutorials for the use of the freely-available verifiable cognitive agent toolkit Gwendolen, written in Java.
Packed with hands-on applications, Tomsho's GUIDE TO OPERATING SYSTEMS, 6th Edition equips learners with fundamental theory and technical information as they work with today's most popular operating systems, including Windows, macOS and Linux platforms. Learners examine how general operating systems are organized and function. Hands-on scenarios give them practical experience in OS installation, upgrading and configuration. Processors, file systems, networking, virtualization, security, device management, storage, OS maintenance and troubleshooting are covered in detail. Content also includes Windows 10 and earlier Windows client OSs, Windows Server 2019 and earlier Windows server OSs, Fedora Linux, and macOS Mojave and earlier. Easily understood and highly practical, the sixth edition is an excellent resource for training across different operating systems.
This new and fully updated edition provides the practical course text to the Operating Systems required by the majority of degree and HND courses in Computing. It uses as a basis the familiar operating systems of UNIX, MSDOS and Windows. Colin Ritchie provides a clear introduction of all the terminology and concepts involved, and enables the reader to gain a thorough knowledge of the subject by blending technical discussion with real-practice issues, supported by practical exercises.
MicroC/OS II Second Edition describes the design and implementation of the MicroC/OS-II real-time operating system (RTOS). In addition to its value as a reference to the kernel, it is an extremely detailed and highly readable design study particularly useful to the embedded systems student. While documenting the design and implementation of the kernel, the book also walks the reader through the many related development issues: how to adapt the kernel for a new microprocessor, how to install the kernel, and how to structure the applications that run on the kernel. This edition features documentation for several important new features of the software, including new real-time services, floating points, and coding conventions. The accompanying downloadable resources include complete code for the MicroC/OS-II kernel.
This illustrative compendium analyzes the load balancing problem in distributed stream processing systems and explores a set of high-performance real-time processing scheme based on key-based balancing strategy, join-matrix model and fault tolerance mechanisms.The volume succinctly provides the theoretical support for the proposed techniques. Through a rich set of experiments and comparisons with the other state-of-the-art techniques using both standard benchmarks and real data sets, the book comprehensively verifies the correctness and effectiveness of the proposed methods.This unique title is an excellent reference text for researchers in the fields of distributed stream processing, parallel system, cloud computing, etc.
System Integration presents the systems approach to complex problem solving and provides a powerful base for both product and process integration. This unique reference describes 27 kinds of integration work, primarily obtained through human communications. Simple computer applications-already in place in most companies-have the resources to encourage the availability and sharing of current team knowledge, which results in an intense, cooperative experience leading rapidly to sound design solutions. |
You may like...
The Continuing Arms Race - Code-Reuse…
Per Larsen, Ahmad-Reza Sadeghi
Hardcover
R2,482
Discovery Miles 24 820
|