![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Job Scheduling Strategies for Parallel Processing, JSSPP 2014, held in Phoenix, AZ, USA, in May 2014. The 9 revised full papers presented were carefully reviewed and selected from 24 submissions. The papers cover the following topics: single-core parallelism; moving to distributed-memory, larger-scale systems, scheduling fairness; and parallel job scheduling.
In modern computing a program is usually distributed among several processes. The fundamental challenge when developing reliable and secure distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail. Failures may range from crashes to adversarial attacks by malicious processes. Cachin, Guerraoui, and Rodrigues present an introductory description of fundamental distributed programming abstractions together with algorithms to implement them in distributed systems, where processes are subject to crashes and malicious attacks. The authors follow an incremental approach by first introducing basic abstractions in simple distributed environments, before moving to more sophisticated abstractions and more challenging environments. Each core chapter is devoted to one topic, covering reliable broadcast, shared memory, consensus, and extensions of consensus. For every topic, many exercises and their solutions enhance the understanding This book represents the second edition of "Introduction to Reliable Distributed Programming". Its scope has been extended to include security against malicious actions by non-cooperating processes. This important domain has become widely known under the name "Byzantine fault-tolerance".
This book constitutes the refereed proceedings of the 5th International Workshop on Software Engineering for Resilient Systems, SERENE 2013, held in Kiev, Ukraine, in October 2013. The 13 revised full papers were carefully reviewed and selected from 21 submissions. The papers are organized in topical sections on resilient software and design, rigorous reasoning, applications, concepts, and analysis.
This book constitutes the refereed proceedings of the 15th
International Conference on Coordination Models and Languages,
COORDINATION 2013, held in Firenze, Italy, in June 2013, within the
8th International Federated Conference on Distributed Computing
Techniques (DisCoTec 2013).
Object-oriented inheritance has been in widespread use for a decade, and it is now realised that although inheritance is a powerful modelling tool with many associated advantages, its benefits are not automatically conferred on systems that simply use it. This book introduces a model of inheritance based around five fundamental inheritance relationships. Each relationship has a clear conceptual basis, representing a fundamental, specialised use of inheritance. The resulting model replaces a confused notion of inheritance with five distinct conceptual relationships supporting more precise modelling of systems and capturing the semantic intent of each use of inheritance within a system.
Die Entwicklung hochkomplexer automotiver Infotainmentsysteme bestehend aus einer Headunit und weiteren Komponenten wie Audio- und Videoelementen, Kommunikationseinheiten, Navigationssystemen und Sensorik erfordert solides Dom nenwissen und umfassendes Know-how im Software-Engineering. Das vorliegende Buch gibt eine fundierte Darstellung der softwareseitigen Implementierung dieser Komponenten innerhalb eines komplexen Frameworks. Im ersten Teil des Buches werden wichtige Grundlagen zu Eingebetteten Systemen und den f r diese Systeme charakteristischen Methoden des Software-Engineerings vermittelt. Insbesondere werden dabei die Themen Speichermanagement und Systemperformance sowie grundlegende Mechanismen von Betriebssystemen betrachtet. Im zweiten Teil wird eine konkrete, objektorientierte Implementierung eines Frameworks dargestellt. Diese Implementierung zeigt die Umsetzung besonders effizienter Sychronisations- und Kommunikationsprozesse innerhalb einer kompakten und hochperformanten Systemarchitektur.
Much more than a quick list of commands and options, the CVS Pocket Reference, 2nd Edition, is packed with a surprising amount of detail-- including an overview of background concepts, thorough descriptions on how to use and administer a CVS repository, and discussions of CVS-related files and how to manage them-- all in a convenient reference format. It's an absolute must for developers who need an on-the-job guide for quick answers to CVS dilemmas.
The DNS & BIND Cookbook presents solutions to the many problems faced by network administrators responsible for a name server. This title is an indispensable companion to DNS & BIND, 4th Edition, the definitive guide to the critical task of name server administration. The cookbook contains dozens of code recipes showing solutions to everyday problems, ranging from simple questions, like, "How do I get BIND?" to more advanced topics like providing name service for IPv6 addresses.
Design of System on a Chip is the first of two volumes addressing the design challenges associated with new generations of the semiconductor technology. The various chapters are the compilations of tutorials presented at workshops in Brazil in the recent years by prominent authors from all over the world. In particular the first book deals with components and circuits. Device models have to satisfy the conditions to be computationally economical in addition to be accurate and to scale over various generations of technology. In addition the book addresses issues of the parasitic behavior of deep sub-micron components, such as parameter variations and sub-threshold effects. Furthermore various authors deal with items like mixed signal components and memories. We wind up with an exposition of the technology problems to be solved if our community wants to maintain the pace of the "International Technology Roadmap for Semiconductors" (ITRS).
This book is an introduction to the design and implementation of operating systems using OSP 2, the next generation of the highly popular OSP courseware for undergraduate operating system courses. Coverage details process and thread management; memory, resource and I/0 device management; and interprocess communication. The book allows students to practice these skills in a realistic operating systems programming environment. An Instructors Manual details how to use the OSP Project Generator and sample assignments. Even in one semester, students can learn a host of issues in operating system design.
The control and data flow of a program can be represented using continuations, a concept from denotational semantics that has practical application in real compilers. This book shows how continuation-passing style is used as an intermediate representation on which to perform optimisations and program transformations. Continuations can be used to compile most programming languages. The method is illustrated in a compiler for the programming language Standard ML. However, prior knowledge of ML is not necessary, as the author carefully explains each concept as it arises. This is the first book to show how concepts from the theory of programming languages can be applied to the producton of practical optimising compilers for modern languages like ML. This book will be essential reading for compiler writers in both industry and academe, as well as for students and researchers in programming language theory.
Innovations are adopted when users integrate them in meaningful ways into existing social practices. Histories of major technological innovations show that often the creative initiative of users and user communities becomes the determining factor in the evolution of particular innovations. The evolutionary routes of the telephone, the Internet, the World Wide Web, email, and the Linux operating system all took their developers by surprise. Articulation of these technologies as meaningful products and systems was made possible by innovative users and unintended resources. Iterative and interactive models have replaced the traditional linear model of innovation during the last decade. Yet, heroic innovators and entrepreneurs, unambiguous functionality of products, and a focus on the up-stream aspects of innovation still underlie much discussion on innovation, intellectual property rights, technology policy, and product development. Coherent conceptual, theoretical and practical conclusions from research on knowledge creation, theory of learning, history of technology, and the social basis of innovative change have rarely been made. This book argues that innovation is about creating meaning; that it is inherently social; and is grounded in existing social practices. To understand the social basis of innovation and technology development we have to move beyond the traditional product-centric view on innovations. Integrating concepts from several disciplinary perspectives and detailed analyses of the evolution of Internet-related innovations, including packet-switched computer networks, World Wide Web, and the Linux open source operating system, the book develops foundations for a new theoretical and practical understanding of innovation. For example, it shows that innovative development can occur in two qualitatively different ways, one based on evolving specialization and the other based on recombination of existing socially produced resources. The expanding communication and collaboration networks have increased the importance of the recombinatory mode making mobility of resources, sociotechnical translation mechanisms, and meaning creation in communities of practice increasingly important for innovation research and product development.
Knoppix is a portable Linux distribution replete with hundreds of valuable programs and utilities -- a veritable Swiss Army knife in bootable CD form. It includes Linux software and desktop environments, automatic hardware detection and hundreds of other quality open source programs. Whether you're a system administrator or power user, you can use Knoppix for many different purposes. Knoppix boots and runs completely from a single CD so you don't need to install anything to your hard drive. Due to on-the-fly decompression, the CD can have up to 2 GB of executable software installed on it. What you do need, however, is a comprehensive reference guide so you can benefit from all that Knoppix has to offer. The "Knoppix Pocket Reference" from O'Reilly fits the bill. This handy book shows you how to use Knoppix to troubleshoot and repair your computer, how to customize the Knoppix CD, running RAM memory checks, recovering data from a damaged hard drive, cloning hard drives, using Knoppix as a Terminal Server, using Knoppix as a kiosk OS, scanning for viruses on a Windows system, editing the Registry of a Windows system, and much more. If you want more information than the average Knoppix user, "Knoppix Pocket Reference" is an absolutely essential addition to your personal library.
This book is the formal proceedings of the Eurographics Workshop on Design, Specifi cation and Verification ofInteractive Systems, DSV-IS'99, which was held at the Uni versity of Minho, Braga, Portugal from June 2 to June 4, 1999. The previous events of this series were held at Pisa, Toulouse, Namur, Granada, and Abingdon; the theme this year was "Engaging the Mind by Enriching the Senses," emphasising the importance of the interface in making interaction both effective and enjoyable. Presentations and discussions covered topics that included specification methods and their use in design, model-based tool support, task and dialogue models, distributed col laboration, and models for VR input. As in previous years, there was a strong emphasis on formal representations and modelling techniques, and their use in understanding in teraction and informing the design of artefacts. However, the aim of the workshop is to encourage an exchange of views within a broad community, and other approaches, in particular tool support for model-based design, were also represented. This book includes the papers of the two invited speakers (one as an abstract only), the fourteen full papers accepted for publication, two shorter position papers, and the reports from the working group discussions. The format of the workshop aimed to mix formal paper presentations with informal discussion sessions, with the two invited talks setting the tone for the meeting."
This is "the Word" -- one man's word, certainly -- about the art (and artifice) of the state of our computer-centric existence. And considering that the "one man" is Neal Stephenson, "the hacker Hemingway" (Newsweek) -- acclaimed novelist, pragmatist, seer, nerd-friendly philosopher, and nationally bestselling author of groundbreaking literary works (Snow Crash, Cryptonomicon, etc., etc.) -- the word is well worth hearing. Mostly well-reasoned examination and partial rant, Stephenson's In the Beginning... was the Command Line is a thoughtful, irreverent, hilarious treatise on the cyber-culture past and present; on operating system tyrannies and downloaded popular revolutions; on the Internet, Disney World, Big Bangs, not to mention the meaning of life itself.
Does modelling, formal or otherwise, play a role in designing interactive systems? A proliferation of interactive devices and technologies is used in an ever increasing diversity of contexts and combinations in professional and every-day life. This development poses a significant challenge to modelling approaches used for the design of interactive systems. The papers in this volume discuss a range of modelling approaches, the representations they use, the strengths and weaknesses of their associated specification and analysis techniques and their role in supporting the design of interactive systems.
The GIMP Pocket Reference explains the numerous features of the GNU Image Manipulation Program--and is the essential guide for designers working in a Linux/Unix environment. This handy reference covers GIMP version 1.2. It explains the function of every menu item and offers tips for everyday use.
Learning the Korn Shell is the key to gaining control of the Korn shell and becoming adept at using it as an interactive command and scripting language. Readers will learn how to write many applications more easily and quickly than with other high-level languages. A solid offering for many years, this newly revised title inherits a long tradition of trust among computer professionals who want to learn or refine an essential skill.
Make your PCs as secure as possible and limit the routes of attack and safely and completely remove all traces of malware and viruses should an infection take place. Whatever version of Windows you're using, the threat of virus and malware infection is always a common danger. From key loggers and Trojans, intent on stealing passwords and data, to malware that can disable individual PCs or even a company network, the cost to business in downtime and loss of productivity can be enormous. What You'll Learn: Recognize malware and the problems it can cause Defend a PC against malware and viruses Configure advanced Windows features to prevent attack Identify types of malware and virus attack Discover third-party tools and resources available to help remove malware Manually remove malware and viruses from a PC Who This Book Is For IT pros, Windows expert and power users and system administrators
Postfix is a Mail Transfer Agent (MTA): software that mail servers use to route email. Postfix is highly respected by experts for its secure design and tremendous reliability. And new users like it because it's so simple to configure. In fact, Postfix has been adopted as the default MTA on Mac OS X. It is also compatible with sendmail, so that existing scripts and programs continue to work seamlessly after it is installed. Postfix was written by well-known security expert Wietse Venema, who reviewed this book intensively during its entire development. Author Kyle Dent covers a wide range of Postfix tasks, from virtual hosting to controls for unsolicited commercial email. While basic configuration of Postfix is easy, every site has unique needs that call for a certain amount of study. This book, with careful background explanations and generous examples, eases readers from the basic configuration to the full power of Postfix. It discusses the Postfix interfaces to various tools that round out a fully scalable and highly secure email system. These tools include POP, IMAP, LDAP, MySQL, Simple Authentication and Security Layer (SASL), and Transport Layer Security (TLS, an upgrade of SSL). A reference section for Postfix configuration parameters and an installation guide are included. Topics include: Basic installation and configuration DNS configuration for email Working with POP/IMAP servers Hosting multiple domains (virtual hosting) Mailing lists Handling unsolicited email (spam blocking) Security through SASL and TLS From compiling and installing Postfix to troubleshooting, "Postfix: The Definitive Guide" offers system administrators and anyonewho deals with Postfix an all-in-one, comprehensive tutorial and reference to this MTA.
Written by the author of Expect, this is the first book to explain how this part of the UNIX toolbox can be used to automate Telnet, FTP, passwd, rlogin, and hundreds of other interactive applications. Based on Tcl (Tool Command Language), Expect lets you automate interactive applications that have previously been extremely difficult to handle with any scripting language.
Since Test-Driven Infrastructure with Chef first appeared in mid-2011, infrastructure testing has begun to flourish in the web ops world. In this revised and expanded edition, author Stephen Nelson-Smith brings you up to date on this rapidly evolving discipline, including the philosophy driving it and a growing array of tools. You'll get a hands-on introduction to the Chef framework, and a recommended toolchain and workflow for developing your own test-driven production infrastructure. Several exercises and examples throughout the book help you gain experience with Chef and the entire infrastructure-testing ecosystem. Learn how this test-first approach provides increased security, code quality, and peace of mind. Explore the underpinning philosophy that infrastructure can and should be treated as code Become familiar with the MASCOT approach to test-driven infrastructure Understand the basics of test-driven and behavior-driven development for managing change Dive into Chef fundamentals by building an infrastructure with real examples Discover how Chef works with tools such as Virtualbox and Vagrant Get a deeper understanding of Chef by learning Ruby language basics Learn the tools and workflow necessary to conduct unit, integration, and acceptance tests
Das vorliegende Buch bietet erstmalig eine fundierte Gesamtdarstellung uber den Aufbau, den Betrieb und die Funktionsweise von SAP auf Linux. Dabei werden die grundlegenden Konzepte, die Systemarchitektur und deren Implementierung von SAP auf Linux von langjahrigen Kennern der Materie praxisnah, fundiert und technisch detailliert dargestellt. Dem erfahrenen Linux-Fachmann wird damit das notige Rustzeug an die Hand gegeben, um einen soliden Einstieg in die SAP-Welt zu finden, und der SAP-Administrator findet zuverlassige Informationen, um ein SAP-System auf Linux sicher installieren und optimal betreiben zu konnen. "
The Most Comprehensive Apache Server 2.0 Resource Available Install, configure, administer, and secure Apache Server 2.0 using this practical guide. You'll find all the information you need to successfully run Apache in various environments--including Windows, UNIX, and Mac OS X. Expert Ryan Bloom offers you insightful advice for avoiding common errors and reveals valuable debugging techniques. From basic topics such as downloading and installing Apache to more advanced topics that include daily administration, virtual hosting, and proxy configuration, this all-inclusive resource is ideal--even if you're a newcomer to this powerful, reliable, and scalable Web server.Configure, compile, and install Apache on Windows, UNIX, and Mac OS X Learn the standard module structure and write simple modules Set up a basic HTTP server and customize error pages Discover where to store password information and learn how passwords are stored and checked Build a Web site with DAV clients Run CGI scripts and write a content generator Understand how input/output filters work Know how to load balance one site across multiple machines Deal with logs as well as name-based and IP-based virtual hosts Write protocol modules and learn how protocols get mapped to a request Debug your Apache setup and avoid common mistakes and errors Optimize site performance and learn advanced administration techniques |
![]() ![]() You may like...
The Continuing Arms Race - Code-Reuse…
Per Larsen, Ahmad-Reza Sadeghi
Hardcover
R2,736
Discovery Miles 27 360
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,038
Discovery Miles 10 380
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, …
Hardcover
R1,317
Discovery Miles 13 170
Uncertainty-aware Integration of Control…
Vassilis M. Charitopoulos
Hardcover
R2,960
Discovery Miles 29 600
|