0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (25)
  • R250 - R500 (76)
  • R500+ (1,125)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General

Mac for Linux Geeks (Paperback, 1st ed.): Tony Steidler-Dennison Mac for Linux Geeks (Paperback, 1st ed.)
Tony Steidler-Dennison
R967 R814 Discovery Miles 8 140 Save R153 (16%) Ships in 10 - 15 working days

Some might say we all want Linux with an OS X graphical user interface. Mac for Linux Geeks will assist you step by step in migrating from Linuxbased systems to OS X. Dual booting, virtualization, and building out the Linux environment on OS X are discussed in detail, along with a comparative view of wellknown Mac tools and their open source equivalents. Written for daily use, this concise and dependable guide will steer you across the technical landscape from your chosen Linux flavor to the OS X promised land.Live with OS X, but work with Linux toolsMake the OS XLinux hybrid a realityUse Mac tools where possible and free software where appropriate What you'll learn Dual booting Linux on the Mac Creating a virtual Linux system on the Mac Understanding the OS X graphical user interfaceLeveraging free and open sourcetools to meet the traditional Apple strengths of graphics and multimedia Performing routine OS X system administration for Linux administrators Hybridizing the Linux/Mac experience Who this book is for

Whether developer, system administrator or hobbyist geek, this book guides all who want to migrate from Linux to OS X, helping to integrate both operating system experiences.

Architecture of Computing Systems - ARCS 2009 - 22nd International Conference, Delft, The Netherlands, March 10-13, 2009,... Architecture of Computing Systems - ARCS 2009 - 22nd International Conference, Delft, The Netherlands, March 10-13, 2009, Proceedings (Paperback, 2009 ed.)
Mladen Berekovic, Christian Muller-Schloer, Christian Hochberger, Stephan Wong
R1,534 Discovery Miles 15 340 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 22nd International Conference on Architecture of Computing Systems, ARCS 2009, held in Delft, The Netherlands, in March 2009.

The 21 revised full papers presented together with 3 keynote papers were carefully reviewed and selected from 57 submissions. This year's special focus is set on energy awareness. The papers are organized in topical sections on compilation technologies, reconfigurable hardware and applications, massive parallel architectures, organic computing, memory architectures, enery awareness, Java processing, and chip-level multiprocessing.

Provenance and Annotation of Data and Processes - Second International Provenance and Annotation Workshop, IPAW 2008, Salt Lake... Provenance and Annotation of Data and Processes - Second International Provenance and Annotation Workshop, IPAW 2008, Salt Lake City, UT, USA, June 17-18, 2008 (Paperback, 2008 ed.)
Juliana Freire, David Koop
R1,554 Discovery Miles 15 540 Ships in 10 - 15 working days

Computinghasbeenanenormousacceleratortoscienceandindustryalikeandit has led to an information explosion in many di?erent ?elds. The unprecedented volume of data acquired from sensors, derived by simulations and data analysis processes, accumulated in warehouses, and often shared on the Web, has given risetoanew?eldofresearch: provenancemanagement.Provenance(alsoreferred to as audit trail, lineage, and pedigree) captures information about the steps used to generate a given data product. Such information provides important documentation that is key to preserving data, to determining the data's quality and authorship, to understanding, reproducing, as well as validating results. Provenancemanagement has become an active ?eld of research, as evidenced byrecentspecializedworkshops, surveys, andtutorials.Provenancesolutionsare needed in many di?erent domains and applications, from environmental science and physics simulations, to business processes and data integration in wa- houses. Not surprisingly, di?erent techniques and provenance models have been proposed in many areas such as work?ow systems, visualization, databases, d- ital libraries, and knowledge representation. An important challenge we face - dayishowtointegratethesetechniquesandmodelssothatcompleteprovenance can be derived for complex data products. The InternationalProvenanceand AnnotationWorkshop(IPAW 2008)wasa follow-up to previous workshopsin Chigago (2006, 2002)and Edinburgh (2003). It was held during June 17-18, in Salt Lake City, at the University of Utah campus. IPAW 2008 brought together computer scientists from di?erent areas and provenance users to discuss open problems related to the provenance of computational and non-computational artifacts. A total of 55 people attended the workshop.

Programming Languages and Systems - 6th Asian Symposium, APLAS 2008, Bangalore, India, December 9-11, 2008, Proceedings... Programming Languages and Systems - 6th Asian Symposium, APLAS 2008, Bangalore, India, December 9-11, 2008, Proceedings (Paperback, 2008 ed.)
G. Ramalingam
R1,558 Discovery Miles 15 580 Ships in 10 - 15 working days

This volume contains the proceedings of the 6th Asian Symposium on Progr- ming Languages and Systems (APLAS 2008), which took place in Bangalore, December 9 - December 11, 2008. The symposium was sponsored by the Asian Association for Foundation of Software (AAFS) and the Indian Institute of S- ence. It was held at the Indian Institute of Science, as part of the institute's centenary celebrations, and was co-located with FSTTCS (Foundations of So- ware Technology and Theoretical Computer Science) 2008, organized by the Indian Association for Research in Computer Science (IARCS). In response to the call for papers, 41 full submissions were received. Each submission was reviewed by at least four Program Committee members with the help of external reviewers. The ProgramCommittee meeting was conducted electronically over a 2-week period. After careful discussion, the Program C- mittee selected 20 papers. I would like to sincerely thank all the members of the APLAS 2008 Program Committee for their excellent job, and all the external reviewers for their invaluable contribution. The submission and review process was managed using the EasyChair system. In addition to the 20 contributed papers, the symposium also featured three invitedtalksbyDinoDistefano(QueenMary, UniversityofLondon, UK), Radha Jagadeesan (DePaul University, USA), and Simon Peyton-Jones (Microsoft - search Cambridge, UK). Many people have helped to promote APLAS as a high-quality forum in Asia to serveprogramminglanguageresearchersworldwide.Following a seriesof well-attendedworkshopsthatwereheldinSingapore(2000), Daejeon(2001), and Shanghai (2002), the ?rst ?ve formal symposiums were held in Beijing (2003), Taipei (2004), Tsukuba (2005), Sydney (2006), and Singapore (2007).

Computer Supported Cooperative Work in Design IV - 11th International Conference, CSCWD 2007, Melbourne, Australia, April... Computer Supported Cooperative Work in Design IV - 11th International Conference, CSCWD 2007, Melbourne, Australia, April 26-28, 2007. Revised Selected Papers (Paperback, 2008 ed.)
Weiming. Shen, Jianming Yong, Yun Yang, Jean-Paul A. Barthes, Junzhou Luo
R3,046 Discovery Miles 30 460 Ships in 10 - 15 working days

Design of complex artifacts and systems requires the cooperation of multidisciplinary design teams using multiple sophisticated commercial and non-commercial engine- ing tools such as CAD tools, modeling, simulation and optimization software, en- neering databases, and knowledge-based systems. Individuals or individual groups of multidisciplinary design teams usually work in parallel and independently with various engineering tools, which are located on different sites, often for quite a long period of time. At any moment, individual members may be working on different versions of a design or viewing the design from various perspectives, at different levels of details. In order to meet these requirements, it is necessary to have efficient comput- supported collaborative design systems. These systems should not only automate in- vidual tasks, in the manner of traditional computer-aided engineering tools, but also enable individual members to share information, collaborate, and coordinate their activities within the context of a design project. Based on close international collaboration between the University of Technology of Compiegne in France and the Institute of Computing Technology of the Chinese Ac- emy of Sciences in the early 1990s, a series of international workshops on CSCW in Design started in 1996. In order to facilitate the organization of these workshops, an International Working Group on CSCW in Design (CSCWD) was established and an International Steering Committee was formed in 1998. The series was converted to int- national conferences in 2000 building on the success of the four previous workshops."

Self-Sustaining Systems - First Workshop, S3 2008 Potsdam, Germany, May 15-16, 2008, Proceedings (Paperback, 2008 ed.): Robert... Self-Sustaining Systems - First Workshop, S3 2008 Potsdam, Germany, May 15-16, 2008, Proceedings (Paperback, 2008 ed.)
Robert Hirschfeld, Kim Rose
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

The Workshop on Self-sustaining Systems (S3) is a forum for the discussion of topics relating to computer systems and languages that are able to bootstrap, implement, modify, and maintain themselves. One property of these systems is that their implementation is based onsmall but powerfulabstractions;examples include (amongst others) Squeak/Smalltalk, COLA, Klein/Self, PyPy/Python, Rubinius/Ruby, andLisp.Suchsystemsaretheenginesoftheirownreplacement, giving researchers and developers great power to experiment with, and explore future directions from within, their own small language kernels. S3 took place on May 15-16, 2008 at the Hasso-Plattner-Institute (HPI) in Potsdam, Germany. It was an exciting opportunity for researchers and prac- tioners interested in self-sustaining systems to meet and share their knowledge, experience, and ideas for future research and development. S3 provided an - portunity for a community to gather and discuss the need for self-sustainability in software systems, and to share and explore thoughts on why such systems are needed and how they can be created and deployed. Analogies were made, for example, with evolutionary cycles, and with urban design and the subsequent inevitable socially-driven change. TheS3participantsleftwithagreatersenseofcommunityandanenthusiasm for probing more deeply into this subject. We see the need for self-sustaining systems becoming critical not only to the developer's community, but to e- users in business, academia, learning and play, and so we hope that this S3 workshop will become the ?rst of many.

Secure Data Management - 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings (Paperback, 2008... Secure Data Management - 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings (Paperback, 2008 ed.)
Willem Jonker, Milan Petkovic
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

Information and communication technologies are advancing fast. Processing speed is still increasing at a high rate, followed by advances in digital storage technology, which double storage capacity every year. Furthermore, communication techno- gies do not lag behind. The Internet has been widely used, as well as wireless te- nologies. With a few mouse clicks, people can communicate with each other around the world. All these advances have great potential to change the way people live, introducing new concepts like ubiquitous computing and ambient intelligence. Technology is becoming present everywhere in the form of smart and sensitive c- puting devices. They are nonintrusive, transparent and hidden in the background, but they collect, process, and share all kinds of information, including user beh- ior, in order to act in an intelligent and adaptive way. These emerging technologies put new requirements on security and data m- agement. As data are accessible anytime anywhere, it becomes much easier to get unauthorized data access. Furthermore, the use of new technologies has brought about some privacy concerns. It becomes simpler to collect, store, and search personal information, thereby endangering people's privacy. Therefore, research in secure data management is gaining importance, attracting the attention of both the data management and the security research communities. The intere- ing problems range from traditional topics, such as, access control and general database security, via privacy protection to new research directions, such as cryptographically enforced access control.

Secure Transaction Protocol Analysis - Models and Applications (Paperback, 2008 ed.): Qingfeng Chen, Chengqi Zhang, Shichao... Secure Transaction Protocol Analysis - Models and Applications (Paperback, 2008 ed.)
Qingfeng Chen, Chengqi Zhang, Shichao Zhang
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

The application of formal methods to security protocol analysis has attracted increasing attention in the past two decades, and recently has been sh- ing signs of new maturity and consolidation. The development of these formal methodsismotivatedbythehostilenatureofsomeaspectsofthenetworkand the persistent e?orts of intruders, and has been widely discussed among - searchers in this ?eld. Contributions to the investigation of novel and e?cient ideas and techniques have been made through some important conferences and journals, such asESORICS, CSFW andACM Transactions in Computer Systems. Thus, formal methods have played an important role in a variety of applications such as discrete system analysis for cryptographic protocols, - lief logics and state exploration tools. A complicated security protocol can be abstractedasamanipulationofsymbolsandstructurescomposedbysymbols. The analysis of e-commerce (electronic commerce) protocols is a particular case of such symbol systems. There have been considerable e?orts in developing a number of tools for ensuring the security of protocols, both specialized and general-purpose, such as belief logic and process algebras. The application of formal methods starts with the analysis of key-distribution protocols for communication between two principals at an early stage. With the performance of transactions - coming more and more dependent on computer networks, and cryptography becoming more widely deployed, the type of application becomes more varied and complicated. The emerging complex network-based transactions such as ?nancial transactionsand secure groupcommunication have not only brought innovationstothecurrentbusinesspractice, butthey alsoposeabigchallenge to protect the information transmitted over the open network from malicious attack

Architecting Dependable Systems V (Paperback, 2008 ed.): Rogerio De Lemos, Felicita Giandomenico, Cristina Gacek, Henry... Architecting Dependable Systems V (Paperback, 2008 ed.)
Rogerio De Lemos, Felicita Giandomenico, Cristina Gacek, Henry Muccini, Marlon Vieira
R1,559 Discovery Miles 15 590 Ships in 10 - 15 working days

As software systems become ubiquitous, the issues of dependability become more and more crucial. Given that solutions to these issues must be considered from the very beginning of the design process, it is reasonable that dependability is addressed at the architectural level. This book was born of an effort to bring together the research communities of software architectures and dependability.

This state-of-the-art survey contains expanded and peer-reviewed papers based on the carefully selected contributions to two workshops: the Workshop on Architecting Dependable Systems (WADS 2007), organized at the 2007 International Conference on Dependable Systems and Networks (DSN 2007), held in Edinburgh, UK in June 2007 and the Third Workshop on the Role of Software Architecture for Testing and Analysis (ROSATEA 2007) organized as part of a federated conference on Component-Based Software Engineering and Software Architecture (CompArch 2007), held in Medford, MA, USA in July 2007. It also contains a number of invited papers written by recognized experts in the area. The 14 papers are organized in topical sections on critical infrastructures, rigorous design/fault tolerance, and verification and validation.

Formal Methods for Open Object-Based Distributed Systems - 10th IFIP WG 6.1 International Conference, FMOODS 2008, Oslo,... Formal Methods for Open Object-Based Distributed Systems - 10th IFIP WG 6.1 International Conference, FMOODS 2008, Oslo, Norway, June 4-6, 2008 Proceedings (Paperback, 2008 ed.)
Gilles Barthe
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This volume contains the proceedings of the 10th IFIP Working Group 6.1 - ternational Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS 2008).The conference was part of the Third Federated c- ferences on Distributed Computing Techniques (DisCoTec), together with the 10th International Conference on Coordination Models and Languages (COOR- DINATION 2008) and the 8th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS 2008). We are grateful to Frank Eliassen and Einar Broch Johnsen of the University of Oslo for the excellent organization of this event in Olso, Norway, June 4-6, 2008. The goal of the FMOODS conferences is to bring together researchers and practitioners whose work encompasses three important and related ?elds: - Formal methods - Distributed systems - Object-based technology The 14 papers presented at FMOODS 2008 and included in this volume were selected by the Program Committee among 35 submissions. Each submission was reviewed by at least three Program Committee members. They all re?ect thescopeoftheconferenceandcoverthe following topics: semantics of obje- oriented programming; formal techniques for speci?cation, analysis, and re?- ment; model checking; theorem proving and deductive veri?cation;type systems and behavioral typing; formal methods for service-oriented computing; integ- tion of quality of service requirements into formal models; formal approaches to component-based design; and applications of formal methods.

Formal Techniques for Networked and Distributed Systems - FORTE 2008 - 28th IFIP WG 6.1 International Conference Tokyo, Japan,... Formal Techniques for Networked and Distributed Systems - FORTE 2008 - 28th IFIP WG 6.1 International Conference Tokyo, Japan, June 10-13, 2008 Proceedings (Paperback, 2008 ed.)
Kenji Suzuki, Teruo Higashino, Keiichi Yasumoto, Khaled El-Fakih
R1,559 Discovery Miles 15 590 Ships in 10 - 15 working days

This volume contains the proceedings of FORTE 2008, 28th IFIP WG6.1 - ternational Conference on Formal Techniques for Networked and Distributed Systems. FORTE 2008 was held at the Campus Innovation Center in Tokyo, Japan during June 10-13, 2008. FORTE denotes a series of international wo- ing conferences on formal description techniques applied to computer networks and distributed systems. The conference series started in 1981 under the name PSTV. In 1988 a second series under the name FORTE was set up. Both - ries were united to FORTE/PSTV in 1996. In 2001 the conference changed the name to its current form. Recent conferences of this long series were held in Berlin (2003), Madrid(2004), Taipei(2005), Paris(2006), and Tallinn(2007). As in the previous year, FORTE 2008 was collocated with TESTCOM/ FATES 2008: the 20th IFIP International Conference on Testing of Com- nicating Systems (TESTCOM) and the 8th International Workshop on Formal Approaches to Testing of Software (FATES). The co-location of FORTE and TESTCOM/FATES fostered the collaboration between their communities. The commonspiritofboth conferenceswasunderpinnedby jointopening andclosing sessions, invited talks, as well as joint social events.

Systems and Virtualization Management - Standards and New Technologies (Paperback, 2009 ed.): Latifa Boursas, Mark Carlson,... Systems and Virtualization Management - Standards and New Technologies (Paperback, 2009 ed.)
Latifa Boursas, Mark Carlson, Wolfgang Hommel, Michelle Sibilla, Kes Wold
R1,496 Discovery Miles 14 960 Ships in 10 - 15 working days

This volume contains the proceedings of the Second International DMTF Ac- emic Alliance Workshopon Systems and Virtualization Management:Standards and New Technologies (SVM 2008) held in Munich, Germany, during October 21-22, 2008. The SVM 2008 proceedings are intended for use by students of systems and virtualization management. The reader is presumed to have a basic knowledge of systems management technologies and standards at the level provided, for example, the Common Information Model (CIM) standard for modeling m- agement resources. The student of systems management will ?nd here material that could be included in anadvanced study program.These proceedings should furthermoreallowstudents to acquireanappreciationofthe breadthandvariety of systems and virtualization management research. The proceedings also illuminate related standards and research issues, - swering questions such as:what are the implications of virtualizationfor distr- uted systems management, which advances in information models and protocols aidinmanagingvirtualization,whatnewproblemswillweincur whenmanaging virtualized systems and services, and how might management itself bene?t from virtualization? Topics related to managing distributed systems, virtualization of distributed resources/servicesand workin management standardizationare also highlighted. There were 15 regular paper submissions. These went through an active - view process, with each submission reviewed by at least three members of the Program Committee. We also sought external reviews from experts in certain areas. All these inputs were used by the ProgramCommittee in selecting a ?nal program with 13 regular papers.

Task Models and Diagrams for User Interface Design - 6th International Workshop, TAMODIA 2007, Toulouse, France, November 7-9,... Task Models and Diagrams for User Interface Design - 6th International Workshop, TAMODIA 2007, Toulouse, France, November 7-9, 2007, Proceedings (Paperback, 2007 ed.)
Marco Winckler, Hilary Johnson, Philippe Palanque
R1,547 Discovery Miles 15 470 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Workshop on Task Models and Diagrams for User Interface Design, TAMODIA 2007, held in Toulouse, France, in November 2007. The workshop features current research and gives some indication of the new directions in which task analysis theories, methods, techniques and tools are progressing. The papers are organized in topical sections.

Secure Data Management - 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings (Paperback, 2007... Secure Data Management - 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings (Paperback, 2007 ed.)
Willem Jonker, Milan Petkovic
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Fourth VLDB 2007 International Workshop on Secure Data Management, SDM 2007, held in Vienna, Austria, September 23-24, 2007 in conjunction with VLDB 2007.

The 11 revised full papers presented were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Access Control, Database Security, Privacy Protection and Positon Papers.

Formal Aspects in Security and Trust - Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canda, August 26-27, 2006,... Formal Aspects in Security and Trust - Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canda, August 26-27, 2006, Revised Selected Papers (Paperback, 2007 ed.)
Theo Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve Schneider
R1,540 Discovery Miles 15 400 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the Fourth International Workshop on Formal Aspects in Security and Trust, FAST 2006, held in Hamilton, Ontario, Canada, August 26-27, 2006.

The 18 revised papers presented were carefully reviewed and selected from 47 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and ID issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, GRID security, security risk assessment, and case studies.

Foundations of Qt Development (Paperback, 1st ed.): Johan Thelin Foundations of Qt Development (Paperback, 1st ed.)
Johan Thelin
R1,751 R1,419 Discovery Miles 14 190 Save R332 (19%) Ships in 10 - 15 working days

As the standard for KDE desktop environment, Trolltech's Qt is a necessary basis for all programmers who want to develop cross-platform applications on Windows, Mac OS, Linux, and FreeBSD. A multitude of popular applications have been written in Qt, including Adobe Photoshop Elements, Google Earth, Perforce Visual Client, and Skype.

"Foundations of Qt Development" is based on Qt 4.2, and is aimed at C++ programmers who want to become proficient using this excellent toolkit to create graphical applications that can be ported to all major platforms. The book is focused on teaching you to write your own code in addition to using existing code. Common areas of confusion are identified, addressed, and answered.

Human Interface and the Management of Information. Methods, Techniques and Tools in Information Design - Symposium on Human... Human Interface and the Management of Information. Methods, Techniques and Tools in Information Design - Symposium on Human Interface 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part I (Paperback, 2007 ed.)
Michael J. Smith, Gavriel Salvendy
R4,669 Discovery Miles 46 690 Ships in 10 - 15 working days

This is the first of a two-volume set that constitutes the refereed proceedings of the Symposium on Human Interface 2007, held in Beijing, China in July 2007. It covers design and evaluation methods and techniques, visualizing information, retrieval, searching, browsing and navigation, development methods and techniques, as well as advanced interaction technologies and techniques.

Distributed Applications and Interoperable Systems - 7th IFIP WG 6.1 International Conference, DAIS 2007, Paphos, Cyprus, June... Distributed Applications and Interoperable Systems - 7th IFIP WG 6.1 International Conference, DAIS 2007, Paphos, Cyprus, June 6-8, 2007, Proccedings (Paperback, 2007 ed.)
Jadwiga Indulska, Kerry Raymond
R1,670 Discovery Miles 16 700 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems, DAIS 2007, held in Paphos, Cyprus in June 2007. The DAIS conference was held as a joint event in federation with the 9th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS 2007) and the 9th International Conference on Coordination Models and Languages (Coordination 2007).

The 24 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers address current research in context-awareness, adaptation, mobility, distributed applications and peer-to-peer computing, all of which relate to the sustainability of distributed applications and integrated systems. The papers are organized in topical sections on context-awareness, distributed applications, adaptation, peer-to-peer, and mobility.

Usability and Internationalization. HCI and Culture - Second International Conference on Usability and Internationalization,... Usability and Internationalization. HCI and Culture - Second International Conference on Usability and Internationalization, UI-HCII 2007, held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part I (Paperback, 2007 ed.)
Nuray Aykin
R1,656 Discovery Miles 16 560 Ships in 10 - 15 working days

This is the first of a two-volume set that constitutes the refereed proceedings of the Second International Conference on Usability and Internationalization, UIHCII 2007, held in Beijing, China in July 2007. The papers of this first volume cover HCI and culture and are organized in topical sections on cross-cultural design, internationalization and intercultural usability, as well as user studies.

Architecture of Computing Systems - ARCS 2007 - 20th International Conference, Zurich, Switzerland, March 12-15, 2007,... Architecture of Computing Systems - ARCS 2007 - 20th International Conference, Zurich, Switzerland, March 12-15, 2007, Proceedings (Paperback, 2007 ed.)
Paul Lukowicz, Lothar Thiele, Gerhard Troester
R1,546 Discovery Miles 15 460 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 20th International Conference on Architecture of Computing Systems, ARCS 2007, held in Zurich, Switzerland in March 2007.

The 20 revised full papers presented together with 1 invited paper were carefully reviewed and selected from 83 submissions. The papers cover a broad range of research topics related to basic technology, architecture, and application of computing systems with a strong focus on system aspects of pervasive computing and self organization techniques in both organic and autonomic computing.

Microsoft Operations Manager 2005 Field Guide (Paperback, 1st ed.): Andy Dominey, Garry Meaburn Microsoft Operations Manager 2005 Field Guide (Paperback, 1st ed.)
Andy Dominey, Garry Meaburn
R1,013 R849 Discovery Miles 8 490 Save R164 (16%) Ships in 10 - 15 working days

Microsoft Operations Manager (MOM) allows administrators to troubleshoot - and prevent - problems in Microsoft server networks. The text offers everything from a review of MOM 2005 architecture and internals to planning and deployment guidelines, advanced troubleshooting, and integration with popular management frameworks like Tivoli. Appendices include custom upgrade guides. The approach is strictly practical and real-world, based on the authors' own experience. The book is written for an audience familiar with MOM but not expert at administering it. The solutions and troubleshooting tips are concise, and to the point. The chapters are standalone and can be referenced in any order.

Advanced .NET Remoting (Paperback, 2nd Corrected ed., Corr. 3rd printing): Mario Szpuszta, Ingo Rammer Advanced .NET Remoting (Paperback, 2nd Corrected ed., Corr. 3rd printing)
Mario Szpuszta, Ingo Rammer
R1,561 R1,285 Discovery Miles 12 850 Save R276 (18%) Ships in 10 - 15 working days

* Proven best-seller and award winner on the market. Insiders highly recommended this title. * More than 150 pages of new material plus a preview of changes for Whidbey (Visual Studio 2005). * Goes far beyond any documentation, white papers and specialist documents available on the subject.

Financial Cryptography and Data Security - 10th International Conference, FC 2006 Anguilla, British West Indies, February 27 -... Financial Cryptography and Data Security - 10th International Conference, FC 2006 Anguilla, British West Indies, February 27 - March 2, 2006, Revised Selected Papers (Paperback, 2006 ed.)
Giovanni Di Crescenzo, Avi Rubin
R1,664 Discovery Miles 16 640 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography and Data Security, FC 2006, held in Anguilla, British West Indies in February/March 2006. The 19 revised full papers and six revised short papers presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections.

Data and Applications Security XX - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia... Data and Applications Security XX - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings (Paperback, 2006 ed.)
Ernesto Damiani, Peng Liu
R1,550 Discovery Miles 15 500 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 20th Annual Working Conference on Data and Applications Security held in Sophia Antipolis, France, in July/August 2006.

The 22 revised full papers presented were carefully reviewed and selected from 56 submissions. The papers present theory, technique, applications, and practical experience of data and application security covering a number of diverse research topics such as access control, privacy, and identity management.

Formal Methods for Open Object-Based Distributed Systems - 8th IFIP WG 6.1 International Conference, FMOODS 2006, Bologna,... Formal Methods for Open Object-Based Distributed Systems - 8th IFIP WG 6.1 International Conference, FMOODS 2006, Bologna, Italy, June 14-16, 2006, Proceedings (Paperback, 2006 ed.)
Roberto Gorrieri, Heike Wehrheim
R1,627 Discovery Miles 16 270 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems, FMOODS 2006, held in Bologna, Italy, June 2006. The book presents 16 revised full papers together with an invited paper and abstracts of 2 invited talks. Coverage includes component- and model-based design, service-oriented computing, software quality, modeling languages implementation, formal specification, verification, validation, testing, and service-oriented systems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Microsoft Forefront Security…
Jesse Varsalone Paperback R1,177 R892 Discovery Miles 8 920
Intelligent Systems for Automated…
Raymond Chiong Hardcover R4,988 Discovery Miles 49 880
UC/OS-III - The Real-Time Kernel and the…
Jean J. Labrosse Hardcover R1,853 Discovery Miles 18 530
How to Cheat at Managing Windows Server…
B. Barber Paperback R916 R741 Discovery Miles 7 410
The Continuing Arms Race - Code-Reuse…
Per Larsen, Ahmad-Reza Sadeghi Hardcover R2,736 Discovery Miles 27 360
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,317 Discovery Miles 13 170
How to Cheat at Configuring VmWare ESX…
David Rule Paperback R1,130 R855 Discovery Miles 8 550
Robot Operating System (ROS) - The…
Anis Koubaa Hardcover R5,148 Discovery Miles 51 480
Biometric Technologies and Verification…
John Vacca Paperback R1,717 R1,630 Discovery Miles 16 300
HCI Beyond the GUI - Design for Haptic…
Philip Kortum Paperback R1,276 Discovery Miles 12 760

 

Partners