0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (26)
  • R250 - R500 (78)
  • R500+ (1,124)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General

Security in Pervasive Computing - Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings... Security in Pervasive Computing - Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Paperback, 2005 ed.)
Dieter Hutter, Markus Ullmann
R1,609 Discovery Miles 16 090 Ships in 10 - 15 working days

This volume contains the papers presented at the 2nd International Conference on Se- rityinPervasiveComputing(SPC2005)heldApril6-8,2005inBoppard, Germany.The objective of this second conference was to develop new security concepts for complex application scenarios based on systems like handhelds, phones, smartcards, RFID-chips andsmartlabelshandinhandwiththeemergingtechnologyofubiquitousandpervasive computing. In particular the conference focused on methods and technologies conce- ing the identi?cation of risks, the de?nition of security policies, and the development of security and privacy measures, especially cryptographic protocols that are related to speci?c aspects of ubiquitous and pervasive computing like mobility, location-based services, adhocnetworking, resourceallocation/restriction, invisibility, andsecureha- ware/software platforms. We received 48 submissions. Each submission was reviewed by three independent reviewers and an electronic Program Committee meeting was held via the Internet. We are very grateful to the Program Committee members for their ef?ciency in processing the work and also for the quality of their reviews and discussions. Finally the Program Committee decided to accept 14 long papers and 3 short papers. Apart from the Program Committee, we would like to thank also the other persons who contributed to the success of this conference: the additional referees for revi- ing the papers, the authors for submitting the papers, and the local organizers, and in particular Hans-Peter Wagner, for the local organization of the conference in Boppard. SPC 2005 was hosted by the Bundesakademie fur ] of ] fentlicheVerwaltung of the Federal Ministry of the Interior, and was sponsored by the DFKI and BS

Embedded Systems Design - The ARTIST Roadmap for Research and Development (Paperback, 2005 ed.): Bruno Bouyssounouse, Joseph... Embedded Systems Design - The ARTIST Roadmap for Research and Development (Paperback, 2005 ed.)
Bruno Bouyssounouse, Joseph Sifakis
R3,154 Discovery Miles 31 540 Ships in 10 - 15 working days

Embedded systems now include a very large proportion of the advanced products designed in the world, spanning transport (avionics, space, automotive, trains), electrical and electronic appliances (cameras, toys, televisions, home appliances, audio systems, and cellular phones), process control (energy production and distribution, factory automation and optimization), telecommunications (satellites, mobile phones and telecom networks), and security (e-commerce, smart cards), etc. The extensive and increasing use of embedded systems and their integration in everyday products marks a significant evolution in information science and technology. We expect that within a short timeframe embedded systems will be a part of nearly all equipment designed or manufactured in Europe, the USA, and Asia. There is now a strategic shift in emphasis for embedded systems designers: from simply achieving feasibility, to achieving optimality. Optimal design of embedded systems means targeting a given market segment at the lowest cost and delivery time possible. Optimality implies seamless integration with the physical and electronic environment while respecting real-world constraints such as hard deadlines, reliability, availability, robustness, power consumption, and cost. In our view, optimality can only be achieved through the emergence of embedded systems as a discipline in its own right.

Human Interactive Proofs - Second International Workshop, HIP 2005, Bethlehem, PA, USA, May 19-20, 2005, Proceedings... Human Interactive Proofs - Second International Workshop, HIP 2005, Bethlehem, PA, USA, May 19-20, 2005, Proceedings (Paperback, 2005 ed.)
Henry S. Baird, Daniel P. Lopresti
R1,551 Discovery Miles 15 510 Ships in 10 - 15 working days

E-commerce services are su?ering abuse by programs (bots, spiders, etc.) m- querading as legitimate human users. E?orts to defend against such attacks have, over the past several years, stimulated investigations into a new family of security protocols - "Human Interactive Proofs" (HIPs) - which allow a person to authenticate herself as a member of a given group: e.g., as a human (vs. a machine), as herself (vs. anyoneelse), as an adult (vs. a child). Most commercial usesofHIPstodayareCAPTCHAs,"CompletelyAutomaticPublicTuringtests to tell Computers and Humans Apart," which exploit the gap in ability between humans and machine vision systems in reading images of text. HIP challenges can also be non-graphical, e.g., requiring recognition of speech, solving puzzles, etc. Wearepleasedtopresentthe?rstrefereedandarchivallypublishedcollection of state-of-the-art papers on HIPs and CAPTCHAs. Each paper was reviewed by three members of the Program Committee, judged by the Co-chairs to be of su?cient relevance and quality, and revised by the authors in response to the referees' suggestions. The papers investigate performance analysis of novel CAPTCHAs, HIP - chitectures, and the role of HIPs within security systems. Kumar Chellapilla, Kevin Larson, Patrice Simard, and Mary Czerwinski describe user trials of a CAPTCHA designed to resist segmentation attacks, including a systematic evaluation of its tolerance by human users. Henry Baird, Michael Moll, and Sui- Yu Wang analyze data from a human legibility trial of another segmentati- resistantCAPTCHAandlocateahighlylegibleengineeringregime.AmaliaRusu and Venu Govindaraju describe research towards CAPTCHAs based on reading synthetically damaged images of real images of unconstrained handwritten text.

Wired/Wireless Internet Communications - Third International Conference, WWIC 2005, Xanthi, Greece, May 11-13, 2005,... Wired/Wireless Internet Communications - Third International Conference, WWIC 2005, Xanthi, Greece, May 11-13, 2005, Proceedings (Paperback, 2005 ed.)
Torsten Braun, Georg Carle, Yevgeni Koucheryavy, Vassilis Tsaoussidis
R1,690 Discovery Miles 16 900 Ships in 10 - 15 working days

Welcome to the 3rd International Conference on Wired/Wireless Internet C- munications (WWIC). After a successful start in Las Vegas and a selective c- ference in Germany, this year s WWIC demonstrated the event s maturity. The conference was supported by several sponsors, both international and local, and became the o?cial venue for COST Action 290. That said, WWIC has now been established as a top-quality conference to promote research on the convergence of wired and wireless networks. This year we received 117 submissions, which allowed us to organize an - citing program with excellent research results, but required more e?ort from the 54 members of the international Program Committee and the 51 additional reviewers. For each of the 117 submitted papers we asked three independent - viewers to provide their evaluation. Based on an online ballot phase and a TPC meeting organized in Colmar (France), we selected 34 high-quality papers for presentation at the conference. Thus, the acceptance rate for this year was 29%."

Digital Watermarking - Third International Workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected... Digital Watermarking - Third International Workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected Papers (Paperback, 2005 ed.)
Ingemar J. Cox, Ton Kalker, Heung-Kyu Lee
R1,650 Discovery Miles 16 500 Ships in 10 - 15 working days

We are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since its modern reappearance in the academic community in the early 1990s, great progress has been made in understanding both the capabilities and the weaknesses of digital watermarking. On the theoretical side, we all are now well aware of the fact that digital watermarking is best viewed as a form of communication using side information. In the case of digital watermarking the side information in question is the document to be watermarked. This insight has led to a better understanding of the limits of the capacity and robustness of digital watermarking algorithms. It has also led to new and improved watermarking algorithms, both in terms of capacity and imperceptibility. Similarly, the role of human perception, and models thereof, has been greatly enhanced in the study and design of digital watermarking algorithms and systems. On the practical side, applications of watermarking are not yet abundant. The original euphoria on the role of digital watermarking in copy protection and copyright protection has not resulted in widespread use in practical systems. With hindsight, a number of reasons can be given for this lack of practical applications.

Systems Aspects in Organic and Pervasive Computing - ARCS 2005 - 18th International Conference on Architecture of Computing... Systems Aspects in Organic and Pervasive Computing - ARCS 2005 - 18th International Conference on Architecture of Computing Systems, Innsbruck, Austria, March 14-17, 2005, Proceedings (Paperback, 2005 ed.)
Michael Beigl, Paul Lukowicz
R1,625 Discovery Miles 16 250 Ships in 10 - 15 working days

The keychallengeforfuture computersystemis dealingwithcomplexity.Onone hand this involves internal system complexity which has increased exponentially over recent years. Here the main objectives are to maintain system reliability and to keep the design and maintenance e?ort manageable, while at the same timecontinuingtoprovidenewfunctionalityandincreasingsystemperformance. This hasbeenthe focus ofso-calledautonomouscomputing, whichaimsto bring self-con?guration and repair to a wide range of computing systems. On the other hand future computer systems are more and more becoming integrated into the fabric of everyday life and thus have to deal with the c- plexities of the real world. They will become smaller, more appropriate for their use, integrated into everyday objects, and often virtually or physically invisible to the users.They will alsobe deployedin a muchhigher quantity andpenetrate many moreapplicationareasthan traditional notionsof computer systems.This requirescomputersystemstobeadaptablewithinamuchwiderrangeofpossible tasks, subjected to much harsher conditions. To provide such features and functionality, computer devices will become tinieryetstillincreaseinsystemcomplexity;theymustconsumelesspower, while still supporting advanced computation and communications, such that they are highlyconnectedyetstilloperateasautonomousunits.Pervasiveandubiquitous computing researchaddressessuchissues by developingconcepts and technology for interweaving computers into our everyday life. The principal approach is to enhance system functionality and adaptability by recognizing context and situations in the environment

Information Networking - Convergence in Broadband and Mobile Networking. International Conference, ICOIN 2005, Jeju Island,... Information Networking - Convergence in Broadband and Mobile Networking. International Conference, ICOIN 2005, Jeju Island, Korea, January 31 - February 2, 2005, Proceedings (Paperback, 2005 ed.)
Cheeha Kim
R4,635 Discovery Miles 46 350 Ships in 10 - 15 working days

Welcome to ICOIN 2005,the International Conference on Information Netwo- ing, held at Ramada Plaza Jeju Hotel, Jeju Island, Korea during January 31- February2,2005.ICOIN2005followedthesuccessofpreviousconferences.Since 1986, the conference has provided a technical forum for various issues in inf- mation networking. The theme of each conference re?ects the historic events in the computer communication industry. (Please refer to www.icoin2005.or.kr for details.) The theme of ICOIN 2004, "Convergence in Broadband and Mobile Networking," was used again for ICOIN 2005 since we believed it was ongoing. This year we received 427 submissions in total, which came from 22 co- tries. Upon submission, authors were asked to select one of the categories listed in the Call for Papers. The most popular category chosen was network se- rity, followed by mobile networks and wireless LANs. Other areas with strong showings included QoS and resource management, ad hoc and sensor networks, and wireless multimedia systems. From the outset, we could see where recent research interest lay and could make sure that the theme was still going in the right direction.

Grid Computing in Life Science - First International Workshop on Life Science Grid, LSGRID 2004 Kanazawa, Japan, May 31-June 1,... Grid Computing in Life Science - First International Workshop on Life Science Grid, LSGRID 2004 Kanazawa, Japan, May 31-June 1, 2004, Revised Selected and Invited Papers (Paperback, 2005 ed.)
Akihiko Konagaya
R1,512 Discovery Miles 15 120 Ships in 10 - 15 working days

Researchers in the ?eld of life sciences rely increasingly on information te- nology to extract and manage relevant knowledge. The complex computational and data management needs of life science research make Grid technologies an attractive support solution. However, many important issues must be addressed before the Life Science Grid becomes commonplace. The 1st International Life Science Grid Workshop (LSGRID 2004) was held in Kanazawa Japan, May 31-June 1, 2004. This workshop focused on life s- ence applications of grid systems especially for bionetwork research and systems biology which require heterogeneous data integration from genome to phenome, mathematical modeling and simulation from molecular to population levels, and high-performance computing including parallel processing, special hardware and grid computing. Fruitful discussions took place through 18 oral presentations, including a keynote address and ?ve invited talks, and 16 poster and demonstration p- sentations in the ?elds of grid infrastructure for life sciences, systems biology, massive data processing, databases and data grids, grid portals and pipelines for functional annotation, parallel and distributed applications, and life science grid projects. The workshop emphasized the practical aspects of grid techno- gies in terms of improving grid-enabled data/information/knowledge sharing, high-performance computing, and collaborative projects. There was agreement among the participants that the advancement of grid technologies for life science research requires further concerted actions and promotion of grid applications. We therefore concluded the workshop with the announcement of LSGRID 2005.

Multiparadigm Programming in Mozart/Oz - Second International Conference, MOZ 2004, Charleroi, Belgium, October 7-8, 2004,... Multiparadigm Programming in Mozart/Oz - Second International Conference, MOZ 2004, Charleroi, Belgium, October 7-8, 2004, Revised Selected Papers (Paperback, 2005 ed.)
Peter Van Roy
R1,668 Discovery Miles 16 680 Ships in 10 - 15 working days

To many readers, Mozart/Oz represents a new addition to the pantheon of p- gramming systems. One way of evaluating a newcomer is through the eyes of the classics, for example Kernighan and Pike's "The Practice of Programming," a bookthatconcludeswithsix"lastingconcepts" simplicityandclarity, generality, evolution, interfaces, automation, andnotation.KernighanandPikeconcentrate on using standard languages such as C and Java to implement these concepts, but it is instructive to see how a multiparadigm language such as Oz changes the outlook. Oz's concurrency model yields simplicity and clarity (because Oz makes it easier to express complex programs with many interacting components), g- erality, and better interfaces (because the data?ow model automatically makes interfaces more lightweight). Constraint programming in Oz again yields simplicity and clarity (because theprogrammercanexpresswhatneedstobetrueratherthanthemorecomplex issue of how to make it true), and o?ers a powerful mathematical notation that is di?cult to implement on top of languages that do not support it natively. Mozart's distributed computing model makes for improved interfaces and eases the evolution of systems. In my own work, one of the most important concernsistobeabletoquicklyscaleupaprototypeimplementationintoalar- scale service that can run reliably on thousands of computers, serving millions of users. The ?eld of computer science needs more research to discover the best ways of facilitating this, but Mozart provides one powerful approach. Altogether, Mozart/Ozhelpswithallthelastingconceptsexceptautomation, and it plays a particularly strong role in notation, which Kernighan and Pike pointoutisanunderappreciatedarea.Ibelievethatprovidingtherightnotation isthemostimportantofthesixconcepts, onethatsupportsalltheothers.Mul- paradigm systems such as Oz provide more choices for notation than sing- paradigm languages.

From Bash to Z Shell - Conquering the Command Line (Paperback, 1st Corrected ed., Corr. 2nd printing): Oliver Kiddle, Peter... From Bash to Z Shell - Conquering the Command Line (Paperback, 1st Corrected ed., Corr. 2nd printing)
Oliver Kiddle, Peter Stephenson, Jerry Peek
R1,734 R1,402 Discovery Miles 14 020 Save R332 (19%) Ships in 10 - 15 working days

* In-depth, unique coverage of ZSH, one of most modern and powerful of all shells. Also covers Bash, the preferred shell for most serious Linux and Unix users. * Very strong author and tech review team: Co-author Peter Stephenson has been involved in the development of Zsh since the 1990s when he started to write the FAQ. For the last few years, he has served as coordinator of the shell's development. Tech Reviewers: Ed Schaefer is the "Shell Corner" columnist for SysAdmin Magazine and Bart Schaefer is one of the lead developers of Zsh development. * Book is immediately useful, packed with short example and suggestions that the reader can put to use in their shell environment. * Extensive coverage of interactive and advanced shell features, including shell extensions, completion functions, and shortcuts. * Great book for users of all expertise; perennial seller.

Linux-Systemadministration - Grundlagen, Konzepte, Anwendung (German, Hardcover, 2005 ed.): Christine Wolfinger, Jurgen... Linux-Systemadministration - Grundlagen, Konzepte, Anwendung (German, Hardcover, 2005 ed.)
Christine Wolfinger, Jurgen Gulbins, Carsten Hammer
R1,979 Discovery Miles 19 790 Ships in 12 - 17 working days

Linux ist eine fest etablierte, fur vielfaltige Rechnerarchitekturen verfugbare Plattform und zeichnet sich insbesondere durch die hohe Stabilitat und Sicherheit des Systems aus. Dieses Buch bietet einen fundierten Einstieg in die Linux-Systemadministration unter besonderer Berucksichtigung von SuSE-Linux. Dabei werden systematisch die Installation, Konfiguration und Aktualisierung des Systems, der Umgang mit Dateisystemen sowie die Konfiguration wichtiger Netzwerkdienste dargestellt. Ferner werden zentrale Client/Server-Funktionen und andere fur die Systemadministration wichtige Aufgaben, wie Benutzerverwaltung, Sicherung von Daten und die Lokalisierung von Fehlfunktionen, detailliert erlautert.

Der Text enthalt viele praktische Hinweise zur kompetenten Administration von Linux-Systemen, geht aber auch auf grundlegende Mechanismen von UNIX/Linux-Systemen ein. Eine Kurzreferenz gibt Auskunft uber haufig verwendete Befehle, und ein Glossar erlautert wichtige Stichworte an zentraler Stelle."

Architecting Dependable Systems II (Paperback, 2004 ed.): Rogerio De Lemos, Cristina Gacek, Alexander Romanovsky Architecting Dependable Systems II (Paperback, 2004 ed.)
Rogerio De Lemos, Cristina Gacek, Alexander Romanovsky
R1,678 Discovery Miles 16 780 Ships in 10 - 15 working days

As software systems become ubiquitous, the issues of dependability become more and more critical. Given that solutions to these issues must be taken into account from the very beginning of the design process, it is appropriate that dependability is addressed at the architectural level.

This book results from an effort to bring together the research communities of software architectures and dependability. Inspired by the ICSE 2003 Workshop on Software Architectures for Dependable Systems, the book focuses on topics relevant to improving the state of the art in architecting dependable systems. The 15 thoroughly reviewed papers originate partly from the workshop; others were solicited in order to achieve complete coverage of all relevant aspects. The papers are organized into topical sections on architectures for dependability, fault-tolerance in software architectures, dependability analysis in software architectures, and industrial experience.

Software and Compilers for Embedded Systems - 8th International Workshop, SCOPES 2004, Amsterdam, The Netherlands, September... Software and Compilers for Embedded Systems - 8th International Workshop, SCOPES 2004, Amsterdam, The Netherlands, September 2-3, 2004, Proceedings (Paperback, 2004 ed.)
Henk Schepers
R1,621 Discovery Miles 16 210 Ships in 10 - 15 working days

This volume contains the proceedings of the 8th International Workshop on Software and Compilers for Embedded Systems (SCOPES 2004) held in A- terdam, The Netherlands, on September 2 and 3, 2004. Initially, the workshop was referred to as the International Workshop on Code Generation for Emb- ded Systems. The ?rst took place in 1994 in Schloss Dagstuhl, Germany. From its beginnings, the intention of the organizers has been to create an interactive atmosphere in which the participants can discuss and pro't from the assembly of international experts in the ?eld. The name SCOPES has been used since the fourth edition in St. Goar, G- many, in1999whenthescopeoftheworkshopwasextendedtoalsocovergeneral issues in embedded software design. Since then SCOPES has been held again in St. Goar in 2001; Berlin, Germany in 2002; Vienna, Austria in 2003; and now in Amsterdam, The Netherlands. In response to the call for papers, almost 50 very strong papers were s- mitted from all over the world. All submitted papers were reviewed by at least three experts to ensure the quality of the workshop. In the end, the program committee selected 17 papers for presentation at the workshop. These papers are divided into the following categories: application-speci?c (co)design, system and application synthesis, data ?ow analysis, data partitioning, task scheduling and code generation. In addition to the selected contributions, the keynote address was delivered by Mike Uhler from MIPS Technologies. An abstract of his talk is also included in this volume.

Secure Data Management - VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Paperback, 2004 ed.):... Secure Data Management - VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Paperback, 2004 ed.)
Willem Jonker, Milan Petkovic
R1,595 Discovery Miles 15 950 Ships in 10 - 15 working days

Concepts like ubiquitous computing and ambient intelligence that exploit - creasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data access. Furthermore, it will become easier to collect, store, and search personal information and endanger people's privacy. As a result security and privacy of data becomes more and more of an issue. Therefore, secure data management, which is also privacy-enhanced, turns out to be a challenging goal that will also seriously in?uence the acceptance of ub- uitous computing and ambient intelligence concepts by society. With the above in mind, we organized the SDM 2004 workshop to initiate and promote secure data management as one of the important interdisciplinary - search ?elds that brings together people from the security research community and the data management research community. The call for papers attracted 28 submissions both from universities and industry. The program committee selected 15 researchpapers for presentation at the workshop.The technical c- tributions presented at the SDM workshop are collected in this volume, which, wehope, willserveasavaluableresearchandreferencebookinyourprofessional life.

Karl Moore's Visual Basic .NET - The Tutorials (Paperback, Softcover reprint of the original 1st ed.): Karl Moore Karl Moore's Visual Basic .NET - The Tutorials (Paperback, Softcover reprint of the original 1st ed.)
Karl Moore
R1,364 R1,144 Discovery Miles 11 440 Save R220 (16%) Ships in 10 - 15 working days

Most programming books are about as exciting as Bill Gates' left ear. But with this latest eye-opening release, technology author--> Karl Moore--> shows it doesn't have to be quite so dull and uninspiring. Split into eight dynamic parts, Karl Moore's Visual Basic .NET covers every key area of real-life computer developmentand promises to turn even newbie programmers into VB .NET wizards, quicker than anyone else. It's a perfect tutorial guide for those learning VB .NET from scratch or moving from VB6.

"Karl Moore's Visual Basic .NET: The Tutorials" consists of a number of key tutorials, each dealing with a specific, "real-life" area of programming. The tutorials are broken down into easily digestible 10-page installments, with an accompanying FAQ and review sheet at the close. Numerous "top tips" are also distributed throughout the texts to aid understanding.

Code Generation in Microsoft .NET (Paperback, Softcover reprint of the original 1st ed.): Kathleen Dollard Code Generation in Microsoft .NET (Paperback, Softcover reprint of the original 1st ed.)
Kathleen Dollard
R1,520 R1,271 Discovery Miles 12 710 Save R249 (16%) Ships in 10 - 15 working days

Code generation has the potential to revolutionize application development. Rather than handcrafting each piece of code, enterprises will increasingly turn to code generation, based on templates and application of business logic, to automatically generate code to perform a variety of tasks. Code Generation in Microsoft . NET presents the fundamentals of code generation. Code generation is already used extensively in Visual Studio . NET - every form-based application contains potentially hundreds of lines of wizard created code, which is modified as the developer sets various properties. Strongly typed datasets, XML schemas and web service proxies are also generated automatically by Visual Studio. This results in a huge cost savings and improvement in software reliability. Developers need both the technical details of how to accomplish code generation in . NET as well as a coherent series of steps to follow to incorporate code generation into their development. Code Generation in Microsoft . NET teaches developers how to adopt these techniques in their own development efforts. code generation both within and between projects in the organization. The mechanics of code generation introduced in the book are organized around these steps, and provide the tools to leverage code generation for significant payback on the very first application where it is used.

Advanced Distributed Systems - Third International School and Symposium, ISSADS 2004, Guadalajara, Mexico, January 24-30, 2004,... Advanced Distributed Systems - Third International School and Symposium, ISSADS 2004, Guadalajara, Mexico, January 24-30, 2004, Revised Papers (Paperback, 2004 ed.)
Felix F Ramos, Herwig Unger, Victor Larios
R1,633 Discovery Miles 16 330 Ships in 10 - 15 working days

This volume contains the accepted papers from the 3rd International School andSymposium onAdvanced Distributed Systems heldin Guadalajara, Mexico, January24-30,2004.Thiseventwasorganizedbytheteamsmadeupofmembers of CINVESTAV Guadalajara, CUCEI, the Computer Science Department of the Centre of Research and Advances Studies at the CUCEA campus of the University of Guadalajara, Mexico, the University of Rostock, Germany and ITESO, Guadalajara. The ISSADS symposium provides a forum for scientists and people from industry to discuss the progress of applications and theory of distributedsystems.Thisyeartherewereover300participantsfrom3continents, among which about 20 percent came from industry. Theconferenceprogramconsistedof25acceptedpapersoutof46submissions and covered several aspects of distributed systems from hardware and system level up to di?erent applications. These papers were selected by a peer review process, in which each paper was evaluated by at least three members of the international program committee. Inaddition, thethreeinvitedspeakers, AdolfoGuzmanArenas, YakupParker and Joaquin Vila, presented interesting overviews to current development and research directions in distributed systems. Furthermore, eight tutorials and four industrial forums from IBM, INTEL, HP and SUN enabled the participants to extend their knowledge in selected areas. A panel, which was organized by a team composed of researchersfrom the Universidadde Guadalajaraand focused on tra?c control and simulation, also demonstrated the practical application of recent research in distributed systems to the problems of Guadalaj

The Definitive Guide to Samba 3 (Paperback, Softcover reprint of the original 1st ed.): Roderick Smith The Definitive Guide to Samba 3 (Paperback, Softcover reprint of the original 1st ed.)
Roderick Smith
R1,344 R1,124 Discovery Miles 11 240 Save R220 (16%) Ships in 10 - 15 working days

* Covers the new, forthcoming release of Samba 3. * Demonstrates how to integrate Samba with other network protocols, such as NFS, AppleTalk, LPD, IPP, DNS, and NTP. * Clear and concise, the books describes the inner working of SMB/CIFS, and how to configure and maintain the Samba software on many platforms, including Linux, Unix, FreeBSD, Mac OS X (Jaguar and Panther), and Windows.

Operating Systems - Internals and Design Principles (Paperback, 9th edition): William Stallings Operating Systems - Internals and Design Principles (Paperback, 9th edition)
William Stallings
R6,677 Discovery Miles 66 770 Ships in 10 - 15 working days

For one- or two-semester undergraduate courses in operating systems for computer science, computer engineering, and electrical engineering majors An introduction to operating systems with up-to-date and comprehensive coverage Now in its 9th Edition, Operating Systems: Internals and Design Principles provides a comprehensive, unified introduction to operating systems topics for readers studying computer science, computer engineering, and electrical engineering. Author William Stallings emphasizes both design issues and fundamental principles in contemporary systems, while providing readers with a solid understanding of the key structures and mechanisms of operating systems. He discusses design trade-offs and the practical decisions affecting design, performance and security. The text illustrates and reinforces design concepts, tying them to real-world design choices with case studies in Linux, UNIX, Android, and Windows 10. With an unparalleled degree of support for project integration, plus comprehensive coverage of the latest trends and developments in operating systems, including cloud computing and the Internet of Things (IoT), the text provides everything readers need to keep pace with a complex and rapidly changing field. The 9th Edition has been extensively revised and contains new material, new projects, and updated chapters.

Windows Server Hacks (Paperback): Mitch Tulloch Windows Server Hacks (Paperback)
Mitch Tulloch
R715 R524 Discovery Miles 5 240 Save R191 (27%) Out of stock

One of the secrets to the ever-increasing popularity of Windows Server can be found in the simplicity its administration. The easy-to-use GUI, consistent set of tools, and wizards that walk you through complex tasks allow you to install, configure and maintain Windows servers without any knowledge of programming or scripting languages or learning complicated command-line syntax. It's possible, in fact, to accomplish about 90 per cent of all Windows administration without ever opening a command prompt or running a script common, day-to-day tasks of Windows administration can be performed from the GUI, it's not always the best way, especially with complex or repetitive tasks Scripts and command-line tools often provide a faster, more flexible approach. Windows Server Hacks reveals techniques that go well beyond basic management tasks found in most handbooks to help busy system administrators master the more powerful features of Windows Server. life as an administrator much easier. These tools, or hacks--quick and dirty solutions to problems, or clever ways of doing things--were created by other professionals who've also had to struggle to find solutions to administering Windows environments. You'll save valuable time using their scripts, tools, tips, and advice. Plus, you can easily learn to customize the scripts to create even more powerful tools for your own, specific needs. User Management, Group Policy, DNS and DHCP, File and Print, IIS, performance and security. The hundred, industrial strength hacks in the book range from those that deal with general administration to more esoteric hacks in the areas of network deployment, patch management, and backup and recovery. put the knowledge and expertise of veteran system administrators and hackers to work for you. Windows Server Hacks will make your life easier while expanding your understanding of the capabilities of Windows Server.

User Interface Design and Evaluation (Paperback, Revised of "The Miracle of Col ed.): Debbie Stone, Caroline Jarrett, Mark... User Interface Design and Evaluation (Paperback, Revised of "The Miracle of Col ed.)
Debbie Stone, Caroline Jarrett, Mark Woodroffe, Shailey Minocha
R1,779 Discovery Miles 17 790 Ships in 12 - 17 working days

Whether you are a professional new to the user-centered design field, or an experienced designer who needs to learn the fundamentals of user interface design and evaluation, this book can lead the way.
What will you get from this book? Based on a course from the Open University, UK which has been taught to over a thousand professionals and students, this book presents an overview of the field. It illustrates the benefits of a user-centered approach to the design of software, computer systems, and web sites, and provides a clear and practical discussion of requirements gathering; developing interaction design from user requirements; and user interface evaluation. The book's coverage includes established HCI topics for example, visibility, affordance, feedback, metaphors, mental models, and the like combined with practical guidelines for contemporary designs and current trends, which makes for a winning combination. You get a clear presentation of ideas, illustrations of concepts, using real-world applications.
This book will help you develop all the skills necessary for iterative user-centered design, and provides a firm foundation for user interface design and evaluation on which to build.
* Co-published by the Open University, UK.
* Covers the design of graphical user interfaces, web sites, and interfaces for embedded systems.
* Full color production, with activities, projects, hundreds of illustrations, and industrial applications.
* A supporting web site includes sample exam paper, numerous activities to practice the concepts learned, and a set of review questions to test your own learning plus web resources."

Software and Compilers for Embedded Systems - 7th International Workshop, SCOPES 2003, Vienna, Austria, September 24-26, 2003,... Software and Compilers for Embedded Systems - 7th International Workshop, SCOPES 2003, Vienna, Austria, September 24-26, 2003, Proceedings (Paperback, 2003 ed.)
Andreas Krall
R1,708 Discovery Miles 17 080 Ships in 10 - 15 working days

This volume contains the proceedings of the 7th International Workshop on Software and Compilers for Embedded Systems, SCOPES 2003, held in Vienna, Austria, September 24-26, 2003. Initially, the workshop was referred to as the International Workshop on Code Generation for Embedded Systems. The ?rst workshop took place in 1994 in Schloss Dagstuhl, Germany. From its beg- nings, the intention of the organizers was to create an atmosphere in which the researcherscould participateactively in dynamic discussionsand pro't from the assembly of international experts in the ?eld. It was at the fourth workshop, in St. Goar, Germany, in 1999, that the spectrum of topics of interest for the workshop was extended, and not only code generation, but also software and compilers for embedded systems, were considered. The change in ?elds of interest led to a change of name, and this is when the present name was used for the ?rst time. Since then, SCOPES has been held again in St. Goar, Germany, in 2001; Berlin, Germany, in 2002; and this year, 2003, in Vienna, Austria. In response to the call for papers, 43 very strong papers from all over the world were submitted. The program committee selected 26 papers for pres- tation at SCOPES 2003. All submitted papers were reviewed by at least three experts in order to ensure the quality of the work presented at the workshop.

Financial Cryptography - 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised... Financial Cryptography - 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers (Paperback, 2003 ed.)
Rebecca N. Wright
R1,658 Discovery Miles 16 580 Ships in 10 - 15 working days

The 7th Annual Financial Cryptography Conference was held January 27-30, 2003, in Guadeloupe, French West Indies. Financial Cryptography is organized by the International Financial Cryptography Association. Financial Cryptography 2003 received 54 paper submissions, of which one was withdrawn. The remaining papers were carefully reviewed by at least three members of the program committee. The program committee selected 17 papers for inclusion in the conference, revised versions of which are included in this proceedings. In addition to the submitted papers, the program included interesting and entertaining invited talks by Tim Jones on digital cash and by Richard Field on the interactions between technology and the United Nations. There were also several panels, on micropayments, economics of security, and trusted computing platforms, some of which are represented by contributions in these proceedings, and a rump session chaired by Juan Garay. We thank the program committee (listed on the next page) for their hard work in selecting the program from these papers. We also thank the external referees who helped with the reviewing task: N. Asokan, Danny Bickson, - manuel Bresson, Dario Catalano, Xuhua Ding, Louis Granboulan, Stuart Haber, Amir Herzberg, Bill Horne, Russ Housley, Yongdae Kim, Brian LaMacchia, Phil MacKenzie, Maithili Narasimha, Phong Nguyen, Kaisa Nyberg, David Poi- cheval, Tomas Sander, Yaron Sella, Mike Szydlo, Anat Talmy, Ahmed Tew?k, Susanne Wetzel, Shouhuai Xu, and Jeong Yi. (Apologies for any omissions - advertent.

Introduction to 3D Game Engine Design Using DirectX 9 and C# (Paperback, Softcover reprint of the original 1st ed.): Marshall... Introduction to 3D Game Engine Design Using DirectX 9 and C# (Paperback, Softcover reprint of the original 1st ed.)
Marshall Harrison
R1,175 R983 Discovery Miles 9 830 Save R192 (16%) Ships in 10 - 15 working days

"Introduction to 3D Game Engine Design Using DirectX 9 and C#" illustrates the process of creating a simple 3D game engine. During this process, author Lynn Harrison demonstrates many facets of the DirectX 9 software through clear-cut explanations and examples.

Throughout the course of the book, you'll develop an off-road driving game that brings such features as management of large scenes, environmental effects, and physics into play. To write the game, you'll use cutting-edge technologiesC# and DirectX, and the .NET Frameworkand you'll go beyond simple graphics to explore audio, user input, artificial intelligence, and multiplayer design. Table of Contents Overview User Interface Hanging Ten: A Ride Through the Rendering Pipeline Basic 3D Objects Complex 3D Objects Camera: The Player's View of the World Adding Some Atmosphere: Lighting and Fog Artificial Intelligence: Adding the Competition Game Audio: Let's Make Some Noise Game Physics: Keeping It Real Tools of the Trade

Designing Collaborative Systems - A Practical Guide to Ethnography (Paperback, 2003 ed.): Andy Crabtree Designing Collaborative Systems - A Practical Guide to Ethnography (Paperback, 2003 ed.)
Andy Crabtree
R4,411 Discovery Miles 44 110 Ships in 10 - 15 working days

Designing Collaborative Systems: A Practical Guide to Ethnography introduces a new 'ethnographic' approach that will enable designers to create collaborative and interactive systems, which are employed successfully in real-world settings. This new approach, adapted from the field of social research, considers both the social circumstances and the level and type of human interaction involved, thereby ensuring that future ethnographic systems are as user-friendly and as effective as possible. This book provides the practitioner with an invaluable introduction to this approach, and presents a unique set of practical strategies for incorporating it into the design process. Divided into four distinct sections with practical examples throughout, the book covers:- the requirements problem; - ethnographic practices for describing and analysing cooperative work; - the design process; and - the role of ethnography when evaluating systems supporting cooperative work. "Of the various perspectives that jostle together under the rubric of ethnography, ethnomethodology has often held the most appeal for designers. Yet, surprisingly, there has not been a systematic explication of ethnography and ethnomethodology for the purposes of system design. Andy Crabtree puts this to rights in a comprehensive, informative, and accessible practical guide which will be of great value to not only designers but also the ethnographers who work with them." (Graham Button, Lab. Director, Xerox Research Centre, Europe) "Not only is the book a must for those interested in bringing a social dimension to the system design process, it also makes a significant contribution to ethnomethodology." (Professor John A. Hughes, Lancaster University, UK)

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Biometric Technologies and Verification…
John Vacca Paperback R1,717 R1,630 Discovery Miles 16 300
HCI Beyond the GUI - Design for Haptic…
Philip Kortum Paperback R1,276 Discovery Miles 12 760
How to Cheat at Configuring VmWare ESX…
David Rule Paperback R1,130 R855 Discovery Miles 8 550
Robot Operating System (ROS) - The…
Anis Koubaa Hardcover R5,148 Discovery Miles 51 480
OS X for Hackers at Heart
Bruce Potter, Chris Hurley, … Paperback R1,033 Discovery Miles 10 330
Certified System Administrator for HP-UX
Asghar Ghori Hardcover R1,404 Discovery Miles 14 040
Computer Programming for Beginners and…
Alan Grid Hardcover R1,088 Discovery Miles 10 880
SNMP Mastery
Michael W Lucas Hardcover R999 R879 Discovery Miles 8 790
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,038 Discovery Miles 10 380
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,317 Discovery Miles 13 170

 

Partners