0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (18)
  • R250 - R500 (75)
  • R500+ (1,097)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General

Code Generation in Microsoft .NET (Paperback, Softcover reprint of the original 1st ed.): Kathleen Dollard Code Generation in Microsoft .NET (Paperback, Softcover reprint of the original 1st ed.)
Kathleen Dollard
R1,364 R1,167 Discovery Miles 11 670 Save R197 (14%) Ships in 18 - 22 working days

Code generation has the potential to revolutionize application development. Rather than handcrafting each piece of code, enterprises will increasingly turn to code generation, based on templates and application of business logic, to automatically generate code to perform a variety of tasks. Code Generation in Microsoft . NET presents the fundamentals of code generation. Code generation is already used extensively in Visual Studio . NET - every form-based application contains potentially hundreds of lines of wizard created code, which is modified as the developer sets various properties. Strongly typed datasets, XML schemas and web service proxies are also generated automatically by Visual Studio. This results in a huge cost savings and improvement in software reliability. Developers need both the technical details of how to accomplish code generation in . NET as well as a coherent series of steps to follow to incorporate code generation into their development. Code Generation in Microsoft . NET teaches developers how to adopt these techniques in their own development efforts. code generation both within and between projects in the organization. The mechanics of code generation introduced in the book are organized around these steps, and provide the tools to leverage code generation for significant payback on the very first application where it is used.

Multiparadigm Programming in Mozart/Oz - Second International Conference, MOZ 2004, Charleroi, Belgium, October 7-8, 2004,... Multiparadigm Programming in Mozart/Oz - Second International Conference, MOZ 2004, Charleroi, Belgium, October 7-8, 2004, Revised Selected Papers (Paperback, 2005 ed.)
Peter Van Roy
R1,523 Discovery Miles 15 230 Ships in 18 - 22 working days

To many readers, Mozart/Oz represents a new addition to the pantheon of p- gramming systems. One way of evaluating a newcomer is through the eyes of the classics, for example Kernighan and Pike's "The Practice of Programming," a bookthatconcludeswithsix"lastingconcepts" simplicityandclarity, generality, evolution, interfaces, automation, andnotation.KernighanandPikeconcentrate on using standard languages such as C and Java to implement these concepts, but it is instructive to see how a multiparadigm language such as Oz changes the outlook. Oz's concurrency model yields simplicity and clarity (because Oz makes it easier to express complex programs with many interacting components), g- erality, and better interfaces (because the data?ow model automatically makes interfaces more lightweight). Constraint programming in Oz again yields simplicity and clarity (because theprogrammercanexpresswhatneedstobetrueratherthanthemorecomplex issue of how to make it true), and o?ers a powerful mathematical notation that is di?cult to implement on top of languages that do not support it natively. Mozart's distributed computing model makes for improved interfaces and eases the evolution of systems. In my own work, one of the most important concernsistobeabletoquicklyscaleupaprototypeimplementationintoalar- scale service that can run reliably on thousands of computers, serving millions of users. The ?eld of computer science needs more research to discover the best ways of facilitating this, but Mozart provides one powerful approach. Altogether, Mozart/Ozhelpswithallthelastingconceptsexceptautomation, and it plays a particularly strong role in notation, which Kernighan and Pike pointoutisanunderappreciatedarea.Ibelievethatprovidingtherightnotation isthemostimportantofthesixconcepts, onethatsupportsalltheothers.Mul- paradigm systems such as Oz provide more choices for notation than sing- paradigm languages.

The Definitive Guide to Samba 3 (Paperback, Softcover reprint of the original 1st ed.): Roderick Smith The Definitive Guide to Samba 3 (Paperback, Softcover reprint of the original 1st ed.)
Roderick Smith
R1,207 R1,035 Discovery Miles 10 350 Save R172 (14%) Ships in 18 - 22 working days

* Covers the new, forthcoming release of Samba 3. * Demonstrates how to integrate Samba with other network protocols, such as NFS, AppleTalk, LPD, IPP, DNS, and NTP. * Clear and concise, the books describes the inner working of SMB/CIFS, and how to configure and maintain the Samba software on many platforms, including Linux, Unix, FreeBSD, Mac OS X (Jaguar and Panther), and Windows.

Human Interactive Proofs - Second International Workshop, HIP 2005, Bethlehem, PA, USA, May 19-20, 2005, Proceedings... Human Interactive Proofs - Second International Workshop, HIP 2005, Bethlehem, PA, USA, May 19-20, 2005, Proceedings (Paperback, 2005 ed.)
Henry S. Baird, Daniel P. Lopresti
R1,418 Discovery Miles 14 180 Ships in 18 - 22 working days

E-commerce services are su?ering abuse by programs (bots, spiders, etc.) m- querading as legitimate human users. E?orts to defend against such attacks have, over the past several years, stimulated investigations into a new family of security protocols - "Human Interactive Proofs" (HIPs) - which allow a person to authenticate herself as a member of a given group: e.g., as a human (vs. a machine), as herself (vs. anyoneelse), as an adult (vs. a child). Most commercial usesofHIPstodayareCAPTCHAs,"CompletelyAutomaticPublicTuringtests to tell Computers and Humans Apart," which exploit the gap in ability between humans and machine vision systems in reading images of text. HIP challenges can also be non-graphical, e.g., requiring recognition of speech, solving puzzles, etc. Wearepleasedtopresentthe?rstrefereedandarchivallypublishedcollection of state-of-the-art papers on HIPs and CAPTCHAs. Each paper was reviewed by three members of the Program Committee, judged by the Co-chairs to be of su?cient relevance and quality, and revised by the authors in response to the referees' suggestions. The papers investigate performance analysis of novel CAPTCHAs, HIP - chitectures, and the role of HIPs within security systems. Kumar Chellapilla, Kevin Larson, Patrice Simard, and Mary Czerwinski describe user trials of a CAPTCHA designed to resist segmentation attacks, including a systematic evaluation of its tolerance by human users. Henry Baird, Michael Moll, and Sui- Yu Wang analyze data from a human legibility trial of another segmentati- resistantCAPTCHAandlocateahighlylegibleengineeringregime.AmaliaRusu and Venu Govindaraju describe research towards CAPTCHAs based on reading synthetically damaged images of real images of unconstrained handwritten text.

Karl Moore's Visual Basic .NET - The Tutorials (Paperback, Softcover reprint of the original 1st ed.): Karl Moore Karl Moore's Visual Basic .NET - The Tutorials (Paperback, Softcover reprint of the original 1st ed.)
Karl Moore
R1,224 R1,053 Discovery Miles 10 530 Save R171 (14%) Ships in 18 - 22 working days

Most programming books are about as exciting as Bill Gates' left ear. But with this latest eye-opening release, technology author--> Karl Moore--> shows it doesn't have to be quite so dull and uninspiring. Split into eight dynamic parts, Karl Moore's Visual Basic .NET covers every key area of real-life computer developmentand promises to turn even newbie programmers into VB .NET wizards, quicker than anyone else. It's a perfect tutorial guide for those learning VB .NET from scratch or moving from VB6.

"Karl Moore's Visual Basic .NET: The Tutorials" consists of a number of key tutorials, each dealing with a specific, "real-life" area of programming. The tutorials are broken down into easily digestible 10-page installments, with an accompanying FAQ and review sheet at the close. Numerous "top tips" are also distributed throughout the texts to aid understanding.

Information Networking - Convergence in Broadband and Mobile Networking. International Conference, ICOIN 2005, Jeju Island,... Information Networking - Convergence in Broadband and Mobile Networking. International Conference, ICOIN 2005, Jeju Island, Korea, January 31 - February 2, 2005, Proceedings (Paperback, 2005 ed.)
Cheeha Kim
R4,186 Discovery Miles 41 860 Ships in 18 - 22 working days

Welcome to ICOIN 2005,the International Conference on Information Netwo- ing, held at Ramada Plaza Jeju Hotel, Jeju Island, Korea during January 31- February2,2005.ICOIN2005followedthesuccessofpreviousconferences.Since 1986, the conference has provided a technical forum for various issues in inf- mation networking. The theme of each conference re?ects the historic events in the computer communication industry. (Please refer to www.icoin2005.or.kr for details.) The theme of ICOIN 2004, "Convergence in Broadband and Mobile Networking," was used again for ICOIN 2005 since we believed it was ongoing. This year we received 427 submissions in total, which came from 22 co- tries. Upon submission, authors were asked to select one of the categories listed in the Call for Papers. The most popular category chosen was network se- rity, followed by mobile networks and wireless LANs. Other areas with strong showings included QoS and resource management, ad hoc and sensor networks, and wireless multimedia systems. From the outset, we could see where recent research interest lay and could make sure that the theme was still going in the right direction.

Software and Compilers for Embedded Systems - 7th International Workshop, SCOPES 2003, Vienna, Austria, September 24-26, 2003,... Software and Compilers for Embedded Systems - 7th International Workshop, SCOPES 2003, Vienna, Austria, September 24-26, 2003, Proceedings (Paperback, 2003 ed.)
Andreas Krall
R1,559 Discovery Miles 15 590 Ships in 18 - 22 working days

This volume contains the proceedings of the 7th International Workshop on Software and Compilers for Embedded Systems, SCOPES 2003, held in Vienna, Austria, September 24-26, 2003. Initially, the workshop was referred to as the International Workshop on Code Generation for Embedded Systems. The ?rst workshop took place in 1994 in Schloss Dagstuhl, Germany. From its beg- nings, the intention of the organizers was to create an atmosphere in which the researcherscould participateactively in dynamic discussionsand pro't from the assembly of international experts in the ?eld. It was at the fourth workshop, in St. Goar, Germany, in 1999, that the spectrum of topics of interest for the workshop was extended, and not only code generation, but also software and compilers for embedded systems, were considered. The change in ?elds of interest led to a change of name, and this is when the present name was used for the ?rst time. Since then, SCOPES has been held again in St. Goar, Germany, in 2001; Berlin, Germany, in 2002; and this year, 2003, in Vienna, Austria. In response to the call for papers, 43 very strong papers from all over the world were submitted. The program committee selected 26 papers for pres- tation at SCOPES 2003. All submitted papers were reviewed by at least three experts in order to ensure the quality of the work presented at the workshop.

Knoppix Pocket Reference (Paperback): Kyle Rankin Knoppix Pocket Reference (Paperback)
Kyle Rankin
R376 Discovery Miles 3 760 Ships in 18 - 22 working days

Knoppix is a portable Linux distribution replete with hundreds of valuable programs and utilities -- a veritable Swiss Army knife in bootable CD form. It includes Linux software and desktop environments, automatic hardware detection and hundreds of other quality open source programs.

Whether you're a system administrator or power user, you can use Knoppix for many different purposes. Knoppix boots and runs completely from a single CD so you don't need to install anything to your hard drive. Due to on-the-fly decompression, the CD can have up to 2 GB of executable software installed on it.

What you do need, however, is a comprehensive reference guide so you can benefit from all that Knoppix has to offer. The "Knoppix Pocket Reference" from O'Reilly fits the bill. This handy book shows you how to use Knoppix to troubleshoot and repair your computer, how to customize the Knoppix CD, running RAM memory checks, recovering data from a damaged hard drive, cloning hard drives, using Knoppix as a Terminal Server, using Knoppix as a kiosk OS, scanning for viruses on a Windows system, editing the Registry of a Windows system, and much more.

If you want more information than the average Knoppix user, "Knoppix Pocket Reference" is an absolutely essential addition to your personal library.

Financial Cryptography - 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised... Financial Cryptography - 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers (Paperback, 2003 ed.)
Rebecca N. Wright
R1,514 Discovery Miles 15 140 Ships in 18 - 22 working days

The 7th Annual Financial Cryptography Conference was held January 27-30, 2003, in Guadeloupe, French West Indies. Financial Cryptography is organized by the International Financial Cryptography Association. Financial Cryptography 2003 received 54 paper submissions, of which one was withdrawn. The remaining papers were carefully reviewed by at least three members of the program committee. The program committee selected 17 papers for inclusion in the conference, revised versions of which are included in this proceedings. In addition to the submitted papers, the program included interesting and entertaining invited talks by Tim Jones on digital cash and by Richard Field on the interactions between technology and the United Nations. There were also several panels, on micropayments, economics of security, and trusted computing platforms, some of which are represented by contributions in these proceedings, and a rump session chaired by Juan Garay. We thank the program committee (listed on the next page) for their hard work in selecting the program from these papers. We also thank the external referees who helped with the reviewing task: N. Asokan, Danny Bickson, - manuel Bresson, Dario Catalano, Xuhua Ding, Louis Granboulan, Stuart Haber, Amir Herzberg, Bill Horne, Russ Housley, Yongdae Kim, Brian LaMacchia, Phil MacKenzie, Maithili Narasimha, Phong Nguyen, Kaisa Nyberg, David Poi- cheval, Tomas Sander, Yaron Sella, Mike Szydlo, Anat Talmy, Ahmed Tew?k, Susanne Wetzel, Shouhuai Xu, and Jeong Yi. (Apologies for any omissions - advertent.

Introduction to 3D Game Engine Design Using DirectX 9 and C# (Paperback, Softcover reprint of the original 1st ed.): Marshall... Introduction to 3D Game Engine Design Using DirectX 9 and C# (Paperback, Softcover reprint of the original 1st ed.)
Marshall Harrison
R1,055 R908 Discovery Miles 9 080 Save R147 (14%) Ships in 18 - 22 working days

"Introduction to 3D Game Engine Design Using DirectX 9 and C#" illustrates the process of creating a simple 3D game engine. During this process, author Lynn Harrison demonstrates many facets of the DirectX 9 software through clear-cut explanations and examples.

Throughout the course of the book, you'll develop an off-road driving game that brings such features as management of large scenes, environmental effects, and physics into play. To write the game, you'll use cutting-edge technologiesC# and DirectX, and the .NET Frameworkand you'll go beyond simple graphics to explore audio, user input, artificial intelligence, and multiplayer design. Table of Contents Overview User Interface Hanging Ten: A Ride Through the Rendering Pipeline Basic 3D Objects Complex 3D Objects Camera: The Player's View of the World Adding Some Atmosphere: Lighting and Fog Artificial Intelligence: Adding the Competition Game Audio: Let's Make Some Noise Game Physics: Keeping It Real Tools of the Trade

Advanced Distributed Systems - Third International School and Symposium, ISSADS 2004, Guadalajara, Mexico, January 24-30, 2004,... Advanced Distributed Systems - Third International School and Symposium, ISSADS 2004, Guadalajara, Mexico, January 24-30, 2004, Revised Papers (Paperback, 2004 ed.)
Felix F Ramos, Herwig Unger, Victor Larios
R1,492 Discovery Miles 14 920 Ships in 18 - 22 working days

This volume contains the accepted papers from the 3rd International School andSymposium onAdvanced Distributed Systems heldin Guadalajara, Mexico, January24-30,2004.Thiseventwasorganizedbytheteamsmadeupofmembers of CINVESTAV Guadalajara, CUCEI, the Computer Science Department of the Centre of Research and Advances Studies at the CUCEA campus of the University of Guadalajara, Mexico, the University of Rostock, Germany and ITESO, Guadalajara. The ISSADS symposium provides a forum for scientists and people from industry to discuss the progress of applications and theory of distributedsystems.Thisyeartherewereover300participantsfrom3continents, among which about 20 percent came from industry. Theconferenceprogramconsistedof25acceptedpapersoutof46submissions and covered several aspects of distributed systems from hardware and system level up to di?erent applications. These papers were selected by a peer review process, in which each paper was evaluated by at least three members of the international program committee. Inaddition, thethreeinvitedspeakers, AdolfoGuzmanArenas, YakupParker and Joaquin Vila, presented interesting overviews to current development and research directions in distributed systems. Furthermore, eight tutorials and four industrial forums from IBM, INTEL, HP and SUN enabled the participants to extend their knowledge in selected areas. A panel, which was organized by a team composed of researchersfrom the Universidadde Guadalajaraand focused on tra?c control and simulation, also demonstrated the practical application of recent research in distributed systems to the problems of Guadalaj

Information Hiding - 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers... Information Hiding - 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers (Paperback, 2003 ed.)
Fabien A. P. Petitcolas
R1,574 Discovery Miles 15 740 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Information Hiding, IH 2002, held in Noordwijkerhout, The Netherlands, in October 2002. The 27 revised full papers presented were carefully selected during two rounds of reviewing and revision from 78 submissions. The papers are organized in topical sections on information hiding and networking, anonymity, fundamentals of watermarking, watermarking algorithms, attacks on watermarking algorithms, steganography algorithms, steganalysis, and hiding information in unusual content.

Windows Server Hacks (Paperback): Mitch Tulloch Windows Server Hacks (Paperback)
Mitch Tulloch
R698 R627 Discovery Miles 6 270 Save R71 (10%) Ships in 18 - 22 working days

One of the secrets to the ever-increasing popularity of Windows Server can be found in the simplicity its administration. The easy-to-use GUI, consistent set of tools, and wizards that walk you through complex tasks allow you to install, configure and maintain Windows servers without any knowledge of programming or scripting languages or learning complicated command-line syntax. It's possible, in fact, to accomplish about 90 per cent of all Windows administration without ever opening a command prompt or running a script common, day-to-day tasks of Windows administration can be performed from the GUI, it's not always the best way, especially with complex or repetitive tasks Scripts and command-line tools often provide a faster, more flexible approach. Windows Server Hacks reveals techniques that go well beyond basic management tasks found in most handbooks to help busy system administrators master the more powerful features of Windows Server. life as an administrator much easier. These tools, or hacks--quick and dirty solutions to problems, or clever ways of doing things--were created by other professionals who've also had to struggle to find solutions to administering Windows environments. You'll save valuable time using their scripts, tools, tips, and advice. Plus, you can easily learn to customize the scripts to create even more powerful tools for your own, specific needs. User Management, Group Policy, DNS and DHCP, File and Print, IIS, performance and security. The hundred, industrial strength hacks in the book range from those that deal with general administration to more esoteric hacks in the areas of network deployment, patch management, and backup and recovery. put the knowledge and expertise of veteran system administrators and hackers to work for you. Windows Server Hacks will make your life easier while expanding your understanding of the capabilities of Windows Server.

Visual Interfaces to Digital Libraries (Paperback, 2002 ed.): Chaomei Chen Visual Interfaces to Digital Libraries (Paperback, 2002 ed.)
Chaomei Chen
R1,394 Discovery Miles 13 940 Ships in 18 - 22 working days

Visual Interfaces to Digital Libraries exploit the power of human vision and spatial cognition to help individuals mentally organize and electronically access and manage large and complex information spaces. They draw on progress in the field of information visualization and seek to shift the users' mental load from slow reading to faster perceptual processes such as visual pattern recognition.Based on two workshops, the book presents an introductory overview as well as a closing listing of the top ten problems in the area by the volume editors. Also included are 16 thoroughly reviewed and revised full papers organized in topical sections on visual interfaces to documents, document parts, document variants, and document usage data; visual interfaces to image and video documents; visualization of knowledge domains; cartographic interfaces to digital libraries; and a general framework.

Writing Perl Modules for CPAN (Paperback, Softcover reprint of the original 1st ed.): Sam Tregar Writing Perl Modules for CPAN (Paperback, Softcover reprint of the original 1st ed.)
Sam Tregar
R816 R720 Discovery Miles 7 200 Save R96 (12%) Ships in 18 - 22 working days

"Writing Perl Modules for CPAN" offers Perl developers a comprehensive guide to using and contributing to the Comprehensive Perl Archive Network (CPAN). Starting with a general overview of CPAN's history, network topology, and navigational mechanisms, the book quickly brings you up-to-speed regarding how to search out and install available modules. However, in the true open source spirit, author and experienced Perl developer Sam Tregar teaches you how to not only use, but also contribute to CPAN via an in-depth discussion of module creation, submission, and maintenance.

Beginning with a survey of basic design principles, Tregar takes care to discuss all issues relevant to developers wishing to create great Perl modules, including choosing a proper name, properly using Perl's POD (plain old documentation) feature, concepts surrounding functional and object-oriented API development, and much more. Tregar then proceeds with a complete dissertation of how modules should conform to CPAN module specifications, covering required distribution files and coding considerations, in addition to offering advice regarding proper module testing. After demonstrating how to create a module and prepare it for release, Tregar guides you through the CPAN module submission process and discusses module maintenance once the module has been contributed to the CPAN service.

"Writing Perl Modules for CPAN" is an indispensable guide for anyone wishing to make the most of the CPAN service.

Designing Collaborative Systems - A Practical Guide to Ethnography (Paperback, 2003 ed.): Andy Crabtree Designing Collaborative Systems - A Practical Guide to Ethnography (Paperback, 2003 ed.)
Andy Crabtree
R3,985 Discovery Miles 39 850 Ships in 18 - 22 working days

Designing Collaborative Systems: A Practical Guide to Ethnography introduces a new 'ethnographic' approach that will enable designers to create collaborative and interactive systems, which are employed successfully in real-world settings. This new approach, adapted from the field of social research, considers both the social circumstances and the level and type of human interaction involved, thereby ensuring that future ethnographic systems are as user-friendly and as effective as possible. This book provides the practitioner with an invaluable introduction to this approach, and presents a unique set of practical strategies for incorporating it into the design process. Divided into four distinct sections with practical examples throughout, the book covers:- the requirements problem; - ethnographic practices for describing and analysing cooperative work; - the design process; and - the role of ethnography when evaluating systems supporting cooperative work. "Of the various perspectives that jostle together under the rubric of ethnography, ethnomethodology has often held the most appeal for designers. Yet, surprisingly, there has not been a systematic explication of ethnography and ethnomethodology for the purposes of system design. Andy Crabtree puts this to rights in a comprehensive, informative, and accessible practical guide which will be of great value to not only designers but also the ethnographers who work with them." (Graham Button, Lab. Director, Xerox Research Centre, Europe) "Not only is the book a must for those interested in bringing a social dimension to the system design process, it also makes a significant contribution to ethnomethodology." (Professor John A. Hughes, Lancaster University, UK)

Topics in Cryptology - CT-RSA 2002 - The Cryptographer's Track at the RSA Conference 2002, San Jose, CA, USA, February... Topics in Cryptology - CT-RSA 2002 - The Cryptographer's Track at the RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings (Paperback, 2002 ed.)
Bart Preneel
R1,510 Discovery Miles 15 100 Ships in 18 - 22 working days

This volume continues the tradition established in 2001 of publishing the c- tributions presented at the Cryptographers' Track (CT-RSA) of the yearly RSA Security Conference in Springer-Verlag's Lecture Notes in Computer Science series. With 14 parallel tracks and many thousands of participants, the RSA - curity Conference is the largest e-security and cryptography conference. In this setting, the Cryptographers' Track presents the latest scienti?c developments. The program committee considered 49 papers and selected 20 for presen- tion. One paper was withdrawn by the authors. The program also included two invited talks by Ron Rivest ("Micropayments Revisited" - joint work with Silvio Micali) and by Victor Shoup ("The Bumpy Road from Cryptographic Theory to Practice"). Each paper was reviewed by at least three program committee members; paperswrittenbyprogramcommitteemembersreceivedsixreviews.Theauthors of accepted papers made a substantial e?ort to take into account the comments intheversionsubmittedtotheseproceedings.Inalimitednumberofcases, these revisions were checked by members of the program committee. I would like to thank the 20 members of the program committee who helped to maintain the rigorous scienti?c standards to which the Cryptographers' Track aims to adhere. They wrote thoughtful reviews and contributed to long disc- sions; more than 400 Kbyte of comments were accumulated. Many of them - tended the program committee meeting, while they could have been enjoying the sunny beaches of Santa Barbara.

Selected Areas in Cryptography - 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001.... Selected Areas in Cryptography - 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001. Revised Papers (Paperback, 2001 ed.)
Serge Vaudenay, Amr M. Youssef
R1,537 Discovery Miles 15 370 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Selected Areas in Cryptology, SAC 2001, held in Toronto, Ontario, Canada in August 2001.The 25 revised full papers presented together with the abstracts of two invited talks were carefully reviewed and selected during two rounds of refereeing and revision. The papers are organized in topical sections on cryptanalysis, Boolean functions, Rijndael, elliptic curves and efficient implementation, public key systems, and protocols and MAC.

Embedded Software - Second International Conference, EMSOFT 2002, Grenoble, France, October 7-9, 2002. Proceedings (Paperback,... Embedded Software - Second International Conference, EMSOFT 2002, Grenoble, France, October 7-9, 2002. Proceedings (Paperback, 2002 ed.)
Alberto Sangiovanni-Vincentelli, Joseph Sifakis
R1,574 Discovery Miles 15 740 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Conference on Embedded Software, EMSOFT 2002, held in Grenoble, France in October 2002.The book presents 13 invited papers by leading researchers and 17 revised full papers selected during a competitive round of reviewing. The book spans the whole range of embedded software, including operating systems and middleware, programming languages and compilers, modeling and validation, software engineering and programming methodologies, scheduling and execution-time analysis, formal methods, and communication protocols and fault-tolerance

Selected Areas in Cryptography - 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August... Selected Areas in Cryptography - 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002, Revised Papers (Paperback, 2003 ed.)
Kaisa Nyberg, Howard Heys
R1,563 Discovery Miles 15 630 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 9th Annual International Workshop on Selected Areas in Cryptology, SAC 2002, held in St. John's, Newfoundland, Canada, in August 2002. The 25 revised full papers presented were carefully selected from 90 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on elliptic curve enhancements, SNOW, encryption schemes, differential attacks, Boolean functions and stream ciphers, block cipher security, signatures and secret sharing, MAC and hash constructions, and RSA and XTR enhancements.

Middleware 2001 - IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, Germany, November 12-16, 2001,... Middleware 2001 - IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, Germany, November 12-16, 2001, Proceedings (Paperback, 2001 ed.)
Rachid Guerraoui
R1,557 Discovery Miles 15 570 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms, Middleware 2001, held in Heidelberg, Germany, in November 2001.
The 20 revised full papers presented were carefully reviewed and selected from a total of 116 submissions. The papers are organized in topical sections on Java, mobility, distributed abstractions, reliability, home and office, scalability, and quality of service.

User Interfaces in VB .NET - Windows Forms and Custom Controls (Paperback, Softcover reprint of the original 1st ed.): Matthew... User Interfaces in VB .NET - Windows Forms and Custom Controls (Paperback, Softcover reprint of the original 1st ed.)
Matthew MacDonald
R1,215 R1,044 Discovery Miles 10 440 Save R171 (14%) Ships in 18 - 22 working days

"User Interfaces in VB. NET: Windows Forms and Custom Controls" goes beyond simple coverage of the Windows Forms and GDI+ namespaces by combining a careful treatment of the API with a detailed discussion of good user-interface design principles. After reading "User Interfaces in VB. NET: Windows Forms and Custom Controls," you'll know how to design state-of-the-art application interfaces, program graphics, and much more.

This book contains the following: An overview of how to design elegant user interfaces the average user can understand A comprehensive examination of the user interface controls and classes in .NET Best practices and design tips for coding user interfaces and integrating help

Although this book isn't a reference, it does contain detailed discussions about every user interface element you'll use on a regular basis. But you won't just learn how to use .NET controlsyou'll learn how and why to extend them with your own custom controls. As a developer, you need to know more than how to add a control to a window. You also need to know how to create an entire user interface framework that's scalable, flexible, and reusable.

DNS for Dummies (Paperback): BR Rampling DNS for Dummies (Paperback)
BR Rampling
R846 R740 Discovery Miles 7 400 Save R106 (13%) Ships in 18 - 22 working days

* Unique entry-level guide to Domain Name System (DNS), which translates Internet host names into IP addresses and is used with all Internet servers
* Shows how to install, configure, and troubleshoot DNS on both Windows and UNIX servers
* Helps people seeking technology certifications bone up on DNS theory, terminology, and architecture-a requirement in several popular exams
* Includes real-world examples based on the author's daily experience with both large and small networks

User Modeling 2001 - 8th International Conference, UM 2001, Sonthofen, Germany, July 13-17, 2001. Proceedings (Paperback, 2001... User Modeling 2001 - 8th International Conference, UM 2001, Sonthofen, Germany, July 13-17, 2001. Proceedings (Paperback, 2001 ed.)
Mathias Bauer, Piotr J. Gmytrasiewicz, Julita Vassileva
R1,517 Discovery Miles 15 170 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Conference on User Modeling, UM 2001, held in Sonthofen, Germany in July 2001.The 19 revised full papers and 20 poster summaries presented together with summaries of 12 selected student presentations were carefully reviewed and selected from 79 submissions. The book offers topical sections on acquiring user models from multi-modal user input; learning interaction models; user models for natural language interpretation, processing, and generation; adaptive interviewing for acquiring user preferences and product customization; supporting user collaboration through adaptive agents; student modeling; and adaptive information filtering, retrieval, and browsing.

Types in Compilation - Third International Workshop, TIC 2000, Montreal, Canada, September 21, 2000. Revised Selected Papers... Types in Compilation - Third International Workshop, TIC 2000, Montreal, Canada, September 21, 2000. Revised Selected Papers (Paperback, 2001 ed.)
Robert Harper
R1,454 Discovery Miles 14 540 Ships in 18 - 22 working days

The importance of typed languages for building robust software systems is, by now, an undisputed fact. Years of research have led to languages with richly expressive, yet easy to use, type systems for high-level programming languages. Types provide not only a conceptual framework for language designers, but also a ord positive bene ts to the programmer, principally the ability to express and enforce levels of abstraction within a program. Early compilers for typed languages followed closely the methods used for their untyped counterparts. The role of types was limited to the earliest s- ges of compilation, and they were thereafter ignored during the remainder of the translation process. More recently, however, implementors have come to - cognize the importance of types during compilation and even for object code. Several advantages of types in compilation have been noted to date: { They support self-checking by the compiler. By tracking types during c- pilation it is possible for an internal type checker to detect translation errors at an early stage, greatly facilitating compiler development. { They support certi cation of object code. By extending types to the ge- rated object code, it becomes possible for a code user to ensure the basic integrity of that code by checking its type consistency before execution. { They support optimized data representations and calling conventions, even in the presence of modularity. By passing types at compile-, link-, and even run-time, it is possible to avoid compromises of data representation imposed by untyped compilation techniques.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Networknomicon, or SNMP Mastery
Michael W Lucas, Abdul Alhazred Hardcover R1,436 R1,247 Discovery Miles 12 470
Intelligent Systems for Automated…
Raymond Chiong Hardcover R4,585 Discovery Miles 45 850
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,018 Discovery Miles 10 180
How to Cheat at Managing Windows Server…
B. Barber Paperback R879 R734 Discovery Miles 7 340
How to Cheat at Configuring VmWare ESX…
David Rule Paperback R1,084 R842 Discovery Miles 8 420
Frameworks for Developing Efficient…
John Krogstie Hardcover R4,974 Discovery Miles 49 740
Microsoft Forefront Security…
Jesse Varsalone Paperback R1,129 R878 Discovery Miles 8 780
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright Paperback R1,491 Discovery Miles 14 910
UC/OS-III - The Real-Time Kernel and the…
Jean J. Labrosse, Juan P. Benavides, … Hardcover R2,203 Discovery Miles 22 030
Mike Meyers' CompTIA A+ Guide to 802…
Mike Meyers Paperback R1,201 Discovery Miles 12 010

 

Partners