![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
This book teaches system programming with the latest versions of C through a set of practical examples and problems. It covers the development of a handful of programs, implementing efficient coding examples. Practical System Programming with C contains three main parts: getting your hands dirty with multithreaded C programming; practical system programming using concepts such as processes, signals, and inter-process communication; and advanced socket-based programming which consists of developing a network application for reliable communication. You will be introduced to a marvelous ecosystem of system programming with C, from handling basic system utility commands to communicating through socket programming. With the help of socket programming you will be able to build client-server applications in no time. The "secret sauce" of this book is its curated list of topics and solutions, which fit together through a set of different pragmatic examples; each topic is covered from scratch in an easy-to-learn way. On that journey, you'll focus on practical implementations and an outline of best practices and potential pitfalls. The book also includes a bonus chapter with a list of advanced topics and directions to grow your skills. What You Will Learn Program with operating systems using the latest version of C Work with Linux Carry out multithreading with C Examine the POSIX standards Work with files, directories, processes, and signals Explore IPC and how to work with it Who This Book Is For Programmers who have an exposure to C programming and want to learn system programming. This book will help them to learn about core concepts of operating systems with the help of C programming. .
Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support equipment on which lives depend. News reports inform us how hackers strike hospitals with ransomware that prevents staff from accessing patient records or scheduling appointments. Unfortunately, medical equipment also can be hacked and shut down remotely as a form of extortion. Criminal hackers will not ask for a $500 payment to unlock an MRI, PET or CT scan, or X-ray machine-they will ask for much more. Litigation is bound to follow and the resulting punitive awards will drive up hospital insurance costs and healthcare costs in general. This will undoubtedly result in increased regulations for hospitals and higher costs for compliance. Unless hospitals and other healthcare facilities take the steps necessary to secure their medical-grade networks, they will be targeted for cyber-physical attack, possibly with life-threatening consequences. Cybersecurity for Hospitals and Healthcare Facilities is a wake-up call explaining what hackers can do, why hackers would target a hospital, the way hackers research a target, ways hackers can gain access to a medical-grade network (cyber-attack vectors), and ways hackers hope to monetize their cyber-attack. By understanding and detecting the threats, you can take action now-before your hospital becomes the next victim. What You Will Learn: Determine how vulnerable hospital and healthcare building equipment is to cyber-physical attack Identify possible ways hackers can hack hospital and healthcare facility equipment Recognize the cyber-attack vectors-or paths by which a hacker or cracker can gain access to a computer, a medical-grade network server, or expensive medical equipment in order to deliver a payload or malicious outcome Detect and prevent man-in-the-middle or denial-of-service cyber-attacks Find and prevent hacking of the hospital database and hospital web application Who This Book Is For: Hospital administrators, healthcare professionals, hospital & healthcare facility engineers and building managers, hospital & healthcare facility IT professionals, and HIPAA professionals
This open access book constitutes the refereed proceedings of the 6th Asian Supercomputing Conference, SCFA 2020, which was planned to be held in February 2020, but unfortunately, the physical conference was cancelled due to the COVID-19 pandemic.The 8 full papers presented in this book were carefully reviewed and selected from 22 submissions. They cover a range of topics including file systems, memory hierarchy, HPC cloud platform, container image configuration workflow, large-scale applications, and scheduling.
This two-volume set (CCIS 1229 and CCIS 1230) constitutes the refereed proceedings of the 5th International Conference on Recent Developments in Science, Engineering and Technology, REDSET 2019, held in Gurugram, India, in November 2019. The 74 revised full papers presented were carefully reviewed and selected from total 353 submissions. The papers are organized in topical sections on data centric programming; next generation computing; social and web analytics; security in data science analytics; big data analytics.
The book presents a succession of RISC-V processor implementations in increasing difficulty (non pipelined, pipelined, deeply pipelined, multithreaded, multicore). Each implementation is shown as an HLS (High Level Synthesis) code in C++ which can really be synthesized and tested on an FPGA based development board (such a board can be freely obtained from the Xilinx University Program targeting the university professors). The book can be useful for three reasons. First, it is a novel way to introduce computer architecture. The codes given can serve as labs for a processor architecture course. Second, the book content is based on the RISC-V Instruction Set Architecture, which is an open-source machine language promised to become the machine language to be taught, replacing DLX and MIPS. Third, all the designs are implemented through the High Level Synthesis, a tool which is able to translate a C program into an IP (Intellectual Property). Hence, the book can serve to engineers willing to implement processors on FPGA and to researchers willing to develop RISC-V based hardware simulators.
This book constitutes the proceedings of the 19th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2020, held in Bialystok, Poland, in October 2020. Due to the COVID-19 pandemic the conference has been postponed to October 2020. The 40 full papers presented together with 5 abstracts of keynotes were carefully reviewed and selected from 62 submissions. The main topics covered by the chapters in this book are biometrics, security systems, multimedia, classification and clustering, industrial management. Besides these, the reader will find interesting papers on computer information systems as applied to wireless networks, computer graphics, and intelligent systems. The papers are organized in the following topical sections: biometrics and pattern recognition applications; computer information systems and security; industrial management and other applications; machine learning and high performance computing; modelling and optimization.
This book constitutes extended, revised and selected papers from the 9th International Conference on Cloud Computing and Services Science, CLOSER 2019, held in Heraklion, Greece, in May 2019.The 11 papers presented in this volume were carefully reviewed and selected from a total of 102 submissions. CLOSER 2019 focuses on the emerging area of Cloud Computing, inspired by some latest advances that concern the infrastructure, operations, and available servicesthrough the global network.
This open access State-of-the-Art Survey presents the main recent scientific outcomes in the area of reversible computation, focusing on those that have emerged during COST Action IC1405 "Reversible Computation - Extending Horizons of Computing", a European research network that operated from May 2015 to April 2019. Reversible computation is a new paradigm that extends the traditional forwards-only mode of computation with the ability to execute in reverse, so that computation can run backwards as easily and naturally as forwards. It aims to deliver novel computing devices and software, and to enhance existing systems by equipping them with reversibility. There are many potential applications of reversible computation, including languages and software tools for reliable and recovery-oriented distributed systems and revolutionary reversible logic gates and circuits, but they can only be realized and have lasting effect if conceptual and firm theoretical foundations are established first.
This book constitutes the refereed proceedings of the Second CCF China Blockchain Conference, CBCC 2019, held in Chengdu, China, in October 2019. The 16 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers deal with research results and development activities in all aspects of blockchain science and technology.
This book constitutes the 13th edition of the annual Multi-Agent Programming Contest, MAPC 2018, and presents its participants. The 2018 scenario and all its changes from previous competitions are described in the first contribution, together with a brief description and analysis of the five participating teams and a closer look at the matches. It is followed by a contribution from each team, introducing their methods and tools used to create their agent team and analyzing their performance and the contest.
This book constitutes the refereed proceedings of the 10th International Conference on Supercomputing, ISUM 2019, held in Monterrey, Mexico, in March 2019.The 25 revised full papers presented were carefully reviewed and selected from 78 submissions. The papers are organized in topical sections on HPC architecture, networks, system software, algorithmic techniques, modeling and system tools, clouds, distributed computing, big data, data analytics, visualization and storage, applications for science and engineering, and emer- ging technologies.
The two-volume set LNCS 11944-11945 constitutes the proceedings of the 19th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2019, held in Melbourne, Australia, in December 2019. The 73 full and 29 short papers presented were carefully reviewed and selected from 251 submissions. The papers are organized in topical sections on: Parallel and Distributed Architectures, Software Systems and Programming Models, Distributed and Parallel and Network-based Computing, Big Data and its Applications, Distributed and Parallel Algorithms, Applications of Distributed and Parallel Computing, Service Dependability and Security, IoT and CPS Computing, Performance Modelling and Evaluation.
This Open Access book explores questions such as why and how did the first biological cells appear? And then complex organisms, brains, societies and -now- connected human societies? Physicists have good models for describing the evolution of the universe since the Big Bang, but can we apply the same concepts to the evolution of aggregated matter -living matter included? The Amazing Journey analyzes the latest results in chemistry, biology, neuroscience, anthropology and sociology under the light of the evolution of intelligence, seen as the ability of processing information. The main strength of this book is using just two concepts used in physics -information and energy- to explain: The emergence and evolution of life: procaryotes, eukaryotes and complex organisms The emergence and evolution of the brain The emergence and evolution of societies (human and not) Possible evolution of our "internet society" and the role that Artificial Intelligence is playing
This book constitutes the refereed post-conference proceedings of the 5th Russian Supercomputing Days, RuSCDays 2019, held in Moscow, Russia, in September 2019. The 60 revised full papers presented were carefully reviewed and selected from 127 submissions. The papers are organized in the following topical sections: parallel algorithms; supercomputer simulation; HPC, BigData, AI: architectures, technologies, tools; and distributed and cloud computing.
In this book, the interrupt handling models used by several operating systems are introduced and compared. We begin with an analysis of the classical interrupt management model used by Unix, followed by the schemes used by modern networked environments. We highlight the key challenges of each of these models and how these have been solved by modern operating systems and the research community. Then we analyze the architectures used for general purpose and embedded real-time operating systems.
This book constitutes the proceedings of the 30th International Workshop on Languages and Compilers for Parallel Computing, LCPC 2017, held in College Station, TX, USA, in October 2017. The 17 full papers presented together with abstracts of 5 keynote talks, 11 invited speakers and 4 poster papers in this volume were carefully reviewed and selected from 26 submissions. LCPC encourages submissions that go outside its original scope of scientific computing to diverse areas that are enable or enhanced by the power of parallel systems such as mobile computing, big data, relevant aspects of machine learning, data centers, cognitive computing, etc. LCPC strongly encourages personal interaction and technical discussions along the initial material.
This book constitutes the refereed proceedings of the 21st International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2019, held in Pisa, Italy, in October 2019.The 21 full papers presented were carefully reviewed and selected from 45 submissions. The papers deal with the design and development of distributed systems with a focus on systems that are able to provide guarantees on their structure, performance, and/or security in the face of an adverse operational environment.
This book contains extended versions of the best papers presented at the First International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2019, held in Hammamet, Tunisia, in October 2019. The 9 revised full papers included in this volume were carefully reviewed and selected from 24 initial submissions. The papers are organized in the following topical sections: intelligent transportation systems; distributed computing for networking and communication; articial intelligence applied to cyber physical systems.
The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high scalability. Current decentralized systems still focus on data and knowledge as their main resource. Feasibility of these systems relies basically on P2P (peer-to-peer) techniques and the support of agent systems with scaling and decentralized control. Synergy between grids, P2P systems, and agent technologies is the key to data- and knowledge-centered systems in large-scale environments. This, the 42nd issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, consists of five revised selected regular papers, presenting the following topics: Privacy-Preserving Top-k Query Processing in Distributed Systems; Trust Factors and Insider Threats in Permissioned Distributed Ledgers: An Analytical Study and Evaluation of Popular DLT Frameworks; Polystore and Tensor Data Model for Logical Data Independence and Impedance Mismatch in Big Data Analytics; A General Framework for Multiple Choice Question Answering Based on Mutual Information and Reinforced Co-occurrence; Rejig: A Scalable Online Algorithm for Cache Server Configuration Changes.
This volume constitutes the proceedings of the 13th International Conference on Combinatorial Optimization and Applications, COCOA 2019, held in Xiamen, China, in December 2019. The 49 full papers presented in this volume were carefully reviewed and selected from 108 submissions. The papers cover the various topics, including cognitive radio networks, wireless sensor networks, cyber-physical systems, distributed and localized algorithm design and analysis, information and coding theory for wireless networks, localization, mobile cloud computing, topology control and coverage, security and privacy, underwater and underground networks, vehicular networks, information processing and data management, programmable service interfaces, energy-efficient algorithms, system and protocol design, operating system and middleware support, and experimental test-beds, models and case studies.
This book constitutes the proceedings of the 16th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2019, held in Hohhot, China, in August 2019. The 22 full and 11 short papers presented in this volume were carefully reviewed and selected from 107 submissions. They were organized in topical sections named: graph computing; NOC and networks; neural networks; big data and cloud; HPC; emerging topics; memory and file system.
This two-volume set constitutes the proceedings of the Third Conference on Creativity in Intellectual Technologies and Data Science, CIT&DS 2019, held in Volgograd, Russia, in September 2019.The 67 full papers, 1 short paper and 3 keynote papers presented were carefully reviewed and selected from 231 submissions. The papers are organized in topical sections in the two volumes. Part I: cyber-physical systems and Big Data-driven world. Part II: artificial intelligence and deep learning technologies for creative tasks; intelligent technologies in social engineering.
This book constitutes the proceedings of the 15th International Workshop on Open MP, IWOMP 2019, held in Auckland, New Zealand, in September 2019. The 22 full papers presented in this volume were carefully reviewed and selected for inclusion in this book. The papers are organized in topical sections named: best paper; tools, accelerators, compilation, extensions, tasking, and using OpenMP.
This book constitutes the proceedings of the 13th International Symposium on Advanced Parallel Processing Technologies, APPT 2019, held in Tianjin, China, in August 2019. The 11 full papers presented in this volume were carefully reviewed and selected from 35 submissions. The papers are organized in topical sections named: System Support for Neural Networks; Scheduling and File Systems; Optimization and Parallelization; Security and Algorithms.
The two-volume set LNCS 11944-11945 constitutes the proceedings of the 19th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2019, held in Melbourne, Australia, in December 2019. The 73 full and 29 short papers presented were carefully reviewed and selected from 251 submissions. The papers are organized in topical sections on: Parallel and Distributed Architectures, Software Systems and Programming Models, Distributed and Parallel and Network-based Computing, Big Data and its Applications, Distributed and Parallel Algorithms, Applications of Distributed and Parallel Computing, Service Dependability and Security, IoT and CPS Computing, Performance Modelling and Evaluation. |
You may like...
Evaluating Children's Interactive…
Panos Markopoulos, Janet C. Read, …
Paperback
R1,178
Discovery Miles 11 780
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,018
Discovery Miles 10 180
The Continuing Arms Race - Code-Reuse…
Per Larsen, Ahmad-Reza Sadeghi
Hardcover
R2,482
Discovery Miles 24 820
|