![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
This book constitutes the refereed proceedings of the 10th International Conference on Model Transformation, ICMT 2017, held as part of STAF 2017, in Marburg, Germany, in July 2017. The 9 full papers and 2 short papers were carefully reviewed and selected from 31 submissions. The papers are organized in the following topical sections: transformation paradigms, languages, algorithms and strategies; development of transformations; and applications and case studies.
This book constitutes the refereed proceedings of the 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2017, held in Bonn, Germany, in July 2017. The 18 revised full papers included in this book were carefully reviewed and selected from 67 submissions. They present topics such as enclaves and isolation; malware analysis; cyber-physical systems; detection and protection; code analysis; and web security.
This book constitutes the refereed proceedings of the 22nd Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2017, held in Vienna, Austria, in June 2017. The revised 15 full papers presented were carefully reviewed and selected from 37 submissions. They are organized in topical sections on runtimes, safety and security, timing verification, programming models, the future of safety-minded languages, mixed criticality.
This book constitutes the thoroughly refereed post-conference proceedings of the 29th International Workshop on Languages and Compilers for Parallel Computing, LCPC 2016, held in Rochester, NY, USA, in September 2016. The 20 revised full papers presented together with 4 short papers were carefully reviewed. The papers are organized in topical sections on large scale parallelism, resilience and persistence, compiler analysis and optimization, dynamic computation and languages, GPUs and private memory, and runt-time and performance analysis.
Die ausfuhrliche Erklarung aller Funktionen, die dem Benutzer im TSO und seinem Umfeld zur Verfugung stehen, unter Berucksichtigung der ganzen Vielfalt der Datenverarbeitung, der Datenverwaltung und des Datenschutzes."
The LNCS Transactions on Modularity and Composition are devoted to all aspects of software modularity and composition methods, tools, and techniques, covering requirement analysis, design, implementation, maintenance, and evolution. The focus of the journal also includes modelling techniques, new paradigms and languages, development tools, measurement, novel verification and testing approaches, theoretical foundations, and understanding interactions between modularity and composition. This, the first issue of the Transactions on Modularity and Composition, consists of two sections. The first one, guest edited by Patrick Eugster, Mario Sudholt, and Lukasz Ziarek, is entitled "Aspects, Events, and Modularity" and includes papers focusing on context-oriented software development, specifications for even-based systems, and development of modular software. The second section, guest edited by Gary T. Leavens, contains journal versions of selected papers from Modularity 2015, which was held in March 2015, in Fort Collins, Colorado, USA. Topics covered by the papers in this section include software unbundling, layer activation in context-oriented programming, modular reasoning in event-based languages, and dynamic dispatch for method contracts using abstract predicates. The paper 'Dynamic Dispatch for Method Contracts Through Abstract Predicates' is published open access under a CC BY 4.0 license at link.springer.com.
This book constitutes the refereed proceedings of the 23rd International Conference on Analytical and Stochastic Modelling Techniques and Applications, ASMTA 2016, held in Cardiff, UK, in August 2016. The 21 full papers presented in this book were carefully reviewed and selected from 30 submissions. The papers discuss the latest developments in analytical, numerical and simulation algorithms for stochastic systems, including Markov processes, queueing networks, stochastic Petri nets, process algebras, game theory, etc.
This book constitutes the thoroughly refereed post-conference proceedings of the 28th International Workshop on Languages and Compilers for Parallel Computing, LCPC 2015, held in Raleigh, NC, USA, in September 2015. The 19 revised full papers were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on programming models, optimizing framework, parallelizing compiler, communication and locality, parallel applications and data structures, and correctness and reliability.
Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The revised full papers focus on the theory, technologies and applications of trusted systems and cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;}
Understand the concepts, processes and technologies that will aid in your professional development as a new system administrator. While every information technology culture is specific to its parent organization, there are commonalities that apply to all organizations. The Accidental SysAdmin Handbook, Second Edition looks at those commonalities and provides a general introduction to critical aspects associated with system administration. It further acts to provide definitions and patterns for common computer terms and acronyms. What You Will Learn Build and manage home networking and plan more complex network environments Manage the network layer and service architectures as well as network support plans Develop a server hardware strategy and understand the physical vs. virtual server ecosystem Handle data storage, data strategies and directory services, and central account management Work with DNS, DHCP, IP v4 and IP v6 Deploy workstations and printers Manage and use antivirus and security management software Build, manage and work with intranets and Internet support services Who This Book Is For It is assumed that the reader has little to no experience in a professional information technology environment.
This book constitutes the refereed proceedings of the 21st International Conference on Parallel and Distributed Computing, Euro-Par 2015, held in Vienna, Austria, in August 2015. The 51 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 190 submissions. The papers are organized in the following topical sections: support tools and environments; performance modeling, prediction and evaluation; scheduling and load balancing; architecture and compilers; parallel and distributed data management; grid, cluster and cloud computing; distributed systems and algorithms; parallel and distributed programming, interfaces and languages; multi- and many-core programming; theory and algorithms for parallel computation; numerical methods and applications; and accelerator computing.
Review topics ranging from Intel x64 assembly language instructions and writing programs in assembly language, to pointers, live debugging, and static binary analysis of compiled C and C++ code. This book is ideal for Linux desktop and cloud developers. Using the latest version of Debian, you'll focus on the foundations of the diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems, memory forensics, malware, and vulnerability analysis. This requires an understanding of x64 Intel assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the back ground knowledge and practical foundations you'll need in order to master internal Linux program structure and behavior. It consists of practical step-by-step exercises of increasing complexity with explanations and ample diagrams. You'll also work with the GDB debugger and use it for disassembly and reversing. By the end of the book, you will have a solid understanding of how Linux C and C++ compilers generate binary code. In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct original C/C++ code. Foundations of Linux Debugging, Disassembling, and Reversing is the perfect companion to Foundations of ARM64 Linux Debugging, Disassembling, and Reversing for readers interested in the cloud or cybersecurity. What You'll Learn Review the basics of x64 assembly language Examine the essential GDB debugger commands for debugging and binary analysis Study C and C++ compiler code generation with and without compiler optimizations Look at binary code disassembly and reversing patterns See how pointers in C and C++ are implemented and used Who This Book Is ForSoftware support and escalation engineers, cloud security engineers, site reliability engineers, DevSecOps, platform engineers, software testers, Linux C/C++ software engineers and security researchers without Intel x64 assembly language background, beginners learning Linux software reverse engineering techniques, and engineers coming from non-Linux environments.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Job Scheduling Strategies for Parallel Processing, JSSPP 2014, held in Phoenix, AZ, USA, in May 2014. The 9 revised full papers presented were carefully reviewed and selected from 24 submissions. The papers cover the following topics: single-core parallelism; moving to distributed-memory, larger-scale systems, scheduling fairness; and parallel job scheduling.
In modern computing a program is usually distributed among several processes. The fundamental challenge when developing reliable and secure distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail. Failures may range from crashes to adversarial attacks by malicious processes. Cachin, Guerraoui, and Rodrigues present an introductory description of fundamental distributed programming abstractions together with algorithms to implement them in distributed systems, where processes are subject to crashes and malicious attacks. The authors follow an incremental approach by first introducing basic abstractions in simple distributed environments, before moving to more sophisticated abstractions and more challenging environments. Each core chapter is devoted to one topic, covering reliable broadcast, shared memory, consensus, and extensions of consensus. For every topic, many exercises and their solutions enhance the understanding This book represents the second edition of "Introduction to Reliable Distributed Programming". Its scope has been extended to include security against malicious actions by non-cooperating processes. This important domain has become widely known under the name "Byzantine fault-tolerance".
This open access book constitutes the refereed proceedings of the 7th Asian Conference Supercomputing Conference, SCFA 2022, which took place in Singapore in March 2022. The 8 full papers presented in this book were carefully reviewed and selected from 21 submissions. They cover a range of topics including file systems, memory hierarchy, HPC cloud platform, container image configuration workflow, large-scale applications, and scheduling.
Postfix is a Mail Transfer Agent (MTA): software that mail servers use to route email. Postfix is highly respected by experts for its secure design and tremendous reliability. And new users like it because it's so simple to configure. In fact, Postfix has been adopted as the default MTA on Mac OS X. It is also compatible with sendmail, so that existing scripts and programs continue to work seamlessly after it is installed. Postfix was written by well-known security expert Wietse Venema, who reviewed this book intensively during its entire development. Author Kyle Dent covers a wide range of Postfix tasks, from virtual hosting to controls for unsolicited commercial email. While basic configuration of Postfix is easy, every site has unique needs that call for a certain amount of study. This book, with careful background explanations and generous examples, eases readers from the basic configuration to the full power of Postfix. It discusses the Postfix interfaces to various tools that round out a fully scalable and highly secure email system. These tools include POP, IMAP, LDAP, MySQL, Simple Authentication and Security Layer (SASL), and Transport Layer Security (TLS, an upgrade of SSL). A reference section for Postfix configuration parameters and an installation guide are included. Topics include: Basic installation and configuration DNS configuration for email Working with POP/IMAP servers Hosting multiple domains (virtual hosting) Mailing lists Handling unsolicited email (spam blocking) Security through SASL and TLS From compiling and installing Postfix to troubleshooting, "Postfix: The Definitive Guide" offers system administrators and anyonewho deals with Postfix an all-in-one, comprehensive tutorial and reference to this MTA.
Networks continue to grow in size, complexity, and importance, most businesses want their networks to be flexible, reliable, and cost efficient. Network operators need to avoid downtime due to human error, and they need to manage growing networks without increasing network support staff. How can you balance these competing realities? With automation!This practical guide will help you understand the automation features of Junos, show you the tools available to program Junos, and explain which tool is best for your particular network requirement.This book covers: The Junos management architectureAPIs for interacting with JunosLibraries for simplifying the interaction with JunosOn-device automation scripts to modify and extend Junos behaviorExamples of automating network provisioning, monitoring, and troubleshootingMechanisms for performing high-speed changes (SDN)
This book constitutes the thoroughly refereed conference proceedings of the First International Workshop on Design and Architecture for Signal and Image Processing, DASIP 2022, held in Budaypest, Hungary in June 2022. The 13 full included in the volume were carefully reviewed and selected from 32 submissions. They are organized in the following topical sections: leading signal, image and video processing and machine learning in custom embedded, edge and cloud computing architectures and systems.
The Ada 2012 Reference Manual is an enhanced version of the text of International Standard ISO/IEC 8652/2012(E) for the programming language Ada. The Ada 2012 Reference Manual combines all of the previous corrections of Technical Corrigendum 1 and Amendment 1 with changes and additions that improve the capabilities of the language and the reliability of programs written in the language. The Ada 2012 Reference Manual will replace the former versions as an indispensable working companion for anybody using Ada professionally or learning and studying the language systematically.
This book constitutes the proceedings of the 27th International Conference on Architecture of Computing Systems, ARCS 2014, held in Lubeck, Germany, in February 2014. The 20 papers presented in this volume were carefully reviewed and selected from 44 submissions. They are organized in topical sections named: parallelization: applications and methods; self-organization and trust; system design; system design and sensor systems; and virtualization: I/O, memory, cloud; dependability: safety, security, and reliability aspects."
This book constitutes the refereed proceedings of the 5th International Workshop on Software Engineering for Resilient Systems, SERENE 2013, held in Kiev, Ukraine, in October 2013. The 13 revised full papers were carefully reviewed and selected from 21 submissions. The papers are organized in topical sections on resilient software and design, rigorous reasoning, applications, concepts, and analysis. |
You may like...
Iterative Learning Control for Systems…
Dong Shen, Xuefang Li
Hardcover
R3,807
Discovery Miles 38 070
Imperfect Bifurcation in Structures and…
Kiyohiro Ikeda, Kazuo Murota
Hardcover
R2,200
Discovery Miles 22 000
|