![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
Palm OS Programming: The Developer's Guide , Second Edition shows intermediate to experienced C and C++ programmers how to build a Palm application from the ground up. The book follows up the success of our best-selling first edition with expanded coverage of the Palm OS, up to and including the latest version, 4.0. This book will set the standard for the next generation of Palm developers.
The GIMP Pocket Reference explains the numerous features of the GNU Image Manipulation Program--and is the essential guide for designers working in a Linux/Unix environment. This handy reference covers GIMP version 1.2. It explains the function of every menu item and offers tips for everyday use.
Networks continue to grow in size, complexity, and importance, most businesses want their networks to be flexible, reliable, and cost efficient. Network operators need to avoid downtime due to human error, and they need to manage growing networks without increasing network support staff. How can you balance these competing realities? With automation!This practical guide will help you understand the automation features of Junos, show you the tools available to program Junos, and explain which tool is best for your particular network requirement.This book covers: The Junos management architectureAPIs for interacting with JunosLibraries for simplifying the interaction with JunosOn-device automation scripts to modify and extend Junos behaviorExamples of automating network provisioning, monitoring, and troubleshootingMechanisms for performing high-speed changes (SDN)
Using csh & tcsh describes from the beginning how to use these shells interactively to get your work done faster with less typing. You'll learn how to make your prompt tell you where you are (no more pwd); use what you've typed before (history); type long command lines with very few keystrokes (command and filename completion); remind yourself of filenames when in the middle of typing a command; and edit a botched command without retyping it.
Make your PCs as secure as possible and limit the routes of attack and safely and completely remove all traces of malware and viruses should an infection take place. Whatever version of Windows you're using, the threat of virus and malware infection is always a common danger. From key loggers and Trojans, intent on stealing passwords and data, to malware that can disable individual PCs or even a company network, the cost to business in downtime and loss of productivity can be enormous. What You'll Learn: Recognize malware and the problems it can cause Defend a PC against malware and viruses Configure advanced Windows features to prevent attack Identify types of malware and virus attack Discover third-party tools and resources available to help remove malware Manually remove malware and viruses from a PC Who This Book Is For IT pros, Windows expert and power users and system administrators
Written by the author of Expect, this is the first book to explain how this part of the UNIX toolbox can be used to automate Telnet, FTP, passwd, rlogin, and hundreds of other interactive applications. Based on Tcl (Tool Command Language), Expect lets you automate interactive applications that have previously been extremely difficult to handle with any scripting language.
Das vorliegende Buch bietet erstmalig eine fundierte Gesamtdarstellung uber den Aufbau, den Betrieb und die Funktionsweise von SAP auf Linux. Dabei werden die grundlegenden Konzepte, die Systemarchitektur und deren Implementierung von SAP auf Linux von langjahrigen Kennern der Materie praxisnah, fundiert und technisch detailliert dargestellt. Dem erfahrenen Linux-Fachmann wird damit das notige Rustzeug an die Hand gegeben, um einen soliden Einstieg in die SAP-Welt zu finden, und der SAP-Administrator findet zuverlassige Informationen, um ein SAP-System auf Linux sicher installieren und optimal betreiben zu konnen. "
Since Test-Driven Infrastructure with Chef first appeared in mid-2011, infrastructure testing has begun to flourish in the web ops world. In this revised and expanded edition, author Stephen Nelson-Smith brings you up to date on this rapidly evolving discipline, including the philosophy driving it and a growing array of tools. You'll get a hands-on introduction to the Chef framework, and a recommended toolchain and workflow for developing your own test-driven production infrastructure. Several exercises and examples throughout the book help you gain experience with Chef and the entire infrastructure-testing ecosystem. Learn how this test-first approach provides increased security, code quality, and peace of mind. Explore the underpinning philosophy that infrastructure can and should be treated as code Become familiar with the MASCOT approach to test-driven infrastructure Understand the basics of test-driven and behavior-driven development for managing change Dive into Chef fundamentals by building an infrastructure with real examples Discover how Chef works with tools such as Virtualbox and Vagrant Get a deeper understanding of Chef by learning Ruby language basics Learn the tools and workflow necessary to conduct unit, integration, and acceptance tests
As Linux continues its rapid expansion into Corporate America, the demand for qualified administrators has grown. As the Cisco, Microsoft, A+ and other certifications have shown, professional certifications are often a deciding factor when an individual is considered for a job. The Linux Professional Institute Certification 1 offers the validation of skill level beyond the power-user and helpdesk level, at an entry-level admin base. LPIC 1 Certification Bible is organized around the exam objectives.It includes self-assessment questions with each chapter as well as an inclusive practice exam at the end of the book. Plus, you'll find plenty of exam-taking tips and hints based on the live exams. Covers: Exam LPI-101
th Thisvolumecontainsthepaperspresentedatthe14 workshoponJobSched- ing Strategies for ParallelProcessing.The workshop was held in Rome, Italy, on May 29, 2009, in conjunction with the IEEE International Parallel Processing Symposium 2009. This year 25 papers were submitted to the workshop. All submitted - pers went through a complete review process, with the full version being read and evaluated by an average of four reviewers. We would like to especially thank the program committee members and additional referees for their wi- ingness to participate in this e?ort and their excellent, detailed reviews: Su-Hui Chiang, Walfredo Cirne, Allen Downey, DrorFeitelson, Alexander Fo ]lling, Allan Gottlieb, Christian Grimme, Andrew Grimshaw, Moe Jette, Joachim Lepping, Raquel Lopes, Reagan Moore, Jose Moreira, Bill Nitzberg, Alexander Papas- rou, Lars Schley, Mark Squillante, John Towns, Dan Tsafrir, Jon Weissman, and Philipp Wieder. Asaresultofthereviewprocess14paperswereacceptedfororalpresentation at the workshop. One additional paper is included in these proceedings after making substantial improvements based on the comments of the referees. The ?nal versions of the papers in this volume have addressed the comments of the referees and partially re?ect the discussions held during the work
Formal methods have been applied successfully to the verification of medium-sized programs in protocol and hardware design. However, their application to the development of large systems requires more emphasis on specification, modelling and validation techniques supporting the concepts of reusability and modifiability, and their implementation in new extensions of existing programming languages like Java. The 6th International Symposium on Formal Methods for Components and Objects, FMCO 2007, was held in Amsterdam, The Netherlands, in October 2007. This book presents 12 revised papers submitted after the symposium by the speakers of each of the following European IST projects: the IST-FP6 project Mobius, developing the technology for establishing trust and security for the next generation of global computers; the IST-FP6 project SelfMan on self management for large-scale distributed systems based on structured overlay networks and components; the IST-FP6 project GridComp and the FP6 CoreGRID Network of Excellence on grid programming with components; the Real-time component cluster of the Network of Excellence on Embedded System Design ARTIST, focussing on design processes, and architectures for real-time embedded systems; and the IST-FP6 project CREDO on modeling and analysis of evolutionary structures for distributed services.
This open access book was prepared as a Final Publication of the COST Action IC1406 "High-Performance Modelling and Simulation for Big Data Applications (cHiPSet)" project. Long considered important pillars of the scientific method, Modelling and Simulation have evolved from traditional discrete numerical methods to complex data-intensive continuous analytical optimisations. Resolution, scale, and accuracy have become essential to predict and analyse natural and complex systems in science and engineering. When their level of abstraction raises to have a better discernment of the domain at hand, their representation gets increasingly demanding for computational and data resources. On the other hand, High Performance Computing typically entails the effective use of parallel and distributed processing units coupled with efficient storage, communication and visualisation systems to underpin complex data-intensive applications in distinct scientific and technical domains. It is then arguably required to have a seamless interaction of High Performance Computing with Modelling and Simulation in order to store, compute, analyse, and visualise large data sets in science and engineering. Funded by the European Commission, cHiPSet has provided a dynamic trans-European forum for their members and distinguished guests to openly discuss novel perspectives and topics of interests for these two communities. This cHiPSet compendium presents a set of selected case studies related to healthcare, biological data, computational advertising, multimedia, finance, bioinformatics, and telecommunications.
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep ScreenOS systems on track. ScreenOS Cookbook gives you real-world fixes, techniques, and configurations that save time -- not hypothetical situations out of a textbook. The book comes directly from the experience of engineers who have seen and fixed every conceivable ScreenOS network topology, from small branch office firewalls to appliances for large core enterprise and government, to the heavy duty protocol driven service provider network. Its easy-to-follow format enables you to find the topic and specific recipe you need right away and match it to your network and security issue. Topics include: * Configuring and managing ScreenOS firewalls * NTP (Network Time Protocol) * Interfaces, Zones, and Virtual Routers * Mitigating Denial of Service Attacks * DDNS, DNS, and DHCP * IP Routing * Policy-Based Routing * Elements of Policies * Authentication * Application Layer Gateway (SIP, H323, RPC, RTSP, etc.,) * Content Security * Managing Firewall Policies * IPSEC VPN * RIP, OSPF, BGP, and NSRP * Multicast -- IGPM, PIM, Static Mroutes * Wireless Along with the usage and troubleshooting recipes, you will also find plenty of tricks, special considerations, ramifications, and general discussions of interesting tangents and network extrapolation. For the accurate, hard-nosed information you require to get your ScreenOS firewall network secure and operating smoothly , no book matches ScreenOS Cookbook.
Windows Vista: Beyond the Manual is a comprehensive guide to installing, configuring, exploiting, and using the richest Microsoft client operating system on the market. It guides you through the complexities of configuring and running a successful Windows Vista client computer. It also takes an in-depth look at the wealth of features and functions comprising the various flavors of the software. Windows Vista provides a range of new capabilities and features, many of which are apparent through a totally redesigned interface, and many more that are hidden just beneath the surface. With the help of Windows Vista: Beyond the Manual, IT professionals and home PC enthusiasts alike will become expert users, taking full advantage of the myriad functions and features that make up this release.
The 8th International Conference on Principles of Distributed Systems (OPODIS 2004) was held during December 15-17, 2004 at Grenoble, France. It continued a tradition of successful conferences with friendly and pleasant - mospheres. The earlier organizationsof OPODIS were held in Luzarches(1997), Amiens (1998), Hanoi (1999), Paris (2000), Mexico (2001), Reims (2002) and La Martinique (2003). OPODIS is an open forum for exchange of state-of-the-art knowledge on distributed computing and systems among researchers from around the world. Followingthetraditionofthepreviousorganizations,the2004programwasc- posed of high-quality contributed and invited papers by experts of international caliberinthisscienti?carea. Thetopics ofinterestwerethetheory,speci?cation, design and implementation of distributed systems, which include: - peer-to-peer systems, cluster and grid-based computing - fault tolerance and self-stabilizing systems -real-timeandembeddedsystems - coordination and consistency protocols - distributed and multiprocessor algorithms - communication and synchronization protocols - self-stabilization, reliability and fault tolerance - performance analysis of distributed algorithms and systems - speci? cation and veri?cation of distributed systems - security issues in distributed computing and systems - distributed collaborative environments - location- and context-aware systems - overlay network architectures In response to the call for papers for OPODIS 2004, in total 102 papers in the above areas were submitted from 28 countries from over the world. Each paper was reviewed by three reviewers, and judged according to scienti?c and presentationquality,originality andrelevance to the conference topics. Then the ProgramCommitteeselected30papers. Theacceptanceratiowaslessthan30%. Besides the technical contributed papers, the program included two exciting invited talks: Prof. David Lee (Ohio State University, USA) and Dr.
This easy-to-follow reference shows a variety of professionals how to use the Concurrent Versions System (CVS), the open source tool that lets you manage versions of anything stored in files. Ideal for software developers tracking different versions of the same code, this new edition has been expanded to explain common usages of CVS for system administrators, project managers, software architects, user-interface (UI) specialists, graphic designers and others. Current for version 1.12, "Essential CVS, 2nd Edition" offers an overview of CVS, explains the core concepts, and describes the commands that most people use on a day-to-day basis. For those who need to get up to speed rapidly, the book's Quickstart Guide shows you how to build and use a basic CVS repository with the default settings and a minimum of extras. You'll also find: a full command reference that details all aspects of customizing CVS for automation, logging, branching, merging documents, and creating alerts; examples and descriptions of the most commonly used options for each command; why and when to tag or branch your project, tagging before releases, and using branching to create a bugfix version of a project; and, details on the systems used in CVS to permit multiple developers to work on the same project without loss of data. An entire section devoted to document version management and project management includes ways to import and export projects, work with remote repositories, and shows how to fix things that can go wrong when using CVS. You'll find more screenshots in this edition as well as examples of using graphical CVS clients to run CVS commands. "Essential CVS" also includes a FAQ that answers common queries in the CVS mailing list to get you up and running with this system quickly and painlessly.
Thema dieser fundierten Einfuhrung ist der Einsatz von Linux in rechnergestutzten technischen Geraten, wie z.B. PDAs (Personal Digital Assistants) oder Handhelds. Der Autor erlautert zunachst die Spezifika eingebetteter Systeme und erklart dann, welche Besonderheiten beim Einsatz von Linux als zugrundeliegendem Betriebssystem zu beachten sind. Anschliessend werden die zentralen Komponenten eines Linux-Systems vorgestellt und die Programmierung unter Linux mithilfe gangiger Werkzeuge im Detail dargelegt. Die Code-Beispiele orientieren sich dabei am Einsatz von Linux-Systemen auf PDAs und mobilen Endgeraten.
More often than not, the words "sendmail configuration" strike dread in the hearts of sendmail and system administrators--and not without reason. sendmail configuration languages are as complex as any other programming languages, but used much more infrequently--only when sendmail is installed or configured. The average system administrator doesn't get enough practice to truly master this inscrutable technology. Fortunately, there's help. The "sendmail Cookbook" provides step-by-step solutions for the administrator who needs to solve configuration problems fast. Say you need to configure sendmail to relay mail for your clients without creating an open relay that will be abused by spammers. A recipe in the Cookbook shows you how to do just that. No more wading through pages of dense documentation and tutorials and creating your own custom solution--just go directly to the recipe that addresses your specific problem. Each recipe in the "sendmail Cookbook" outlines a configuration problem, presents the configuration code that solves that problem, and then explains the code in detail. The discussion of the code is critical because it provides the insight you need to tweak the code for your own circumstances. The "sendmail Cookbook" begins with an overview of the configuration languages, offering a quick how-to for downloading and compiling the sendmail distribution. Next, you'll find a baseline configuration recipe upon which many of the subsequent configurations, or recipes, in the book are based. Recipes in the following chapters stand on their own and offer solutions for properly configuring important sendmail functions such as: Delivering and forwarding mail Relaying Masquerading Routing mail Controlling spam Strong authentication Securing the mail transport Managing the queue Securing sendmail "sendmail Cookbook" is more than just a new approach to discussing sendmail configuration. The book also provides lots of new material that doesn't get much coverage elsewhere--STARTTLS and AUTH are given entire chapters, and LDAP is covered in recipes throughout the book. But most of all, this book is about saving time--something that most system administrators have in short supply. Pick up the "sendmail Cookbook" and say good-bye to sendmail dread.
Any programmer working with text files today needs a way to deal with Microsoft® Word documents and their underlying Rich Text Format. RTF is notoriously difficult to work with, and our handy quick reference is the only book available on what many developers call "this maddeningly unstructured format." Small and easy to use on the job, RTF Pocket Guide focuses on the "workhorse" codes that programmers can't do without, including text style codes, paragraph formatting codes, and page formatting codes-- all with many examples of real use.
The current edition of Samba Pocket Reference covers Samba 2.x and the most important features of 3.0, which was under development as this book went to print. New options pertain to Samba's acting as a primary domain controller and as a domain member server, its support for the use of Windows NT/2000/XP authentication and filesystem security on the host Unix system, and access to shared files and printers from Unix clients.
The DNS & BIND Cookbook presents solutions to the many problems faced by network administrators responsible for a name server. This title is an indispensable companion to DNS & BIND, 4th Edition, the definitive guide to the critical task of name server administration. The cookbook contains dozens of code recipes showing solutions to everyday problems, ranging from simple questions, like, "How do I get BIND?" to more advanced topics like providing name service for IPv6 addresses.
System Performance Tuning covers two distinct areas: performance tuning, or the art of increasing performance for a specific application, and capacity planning, or deciding what hardware best fulfills a given role. Underpinning both subjects is the science of computer architecture. This book focuses on the operating system, the underlying hardware, and their interactions. For system administrators who want a hands-on introduction to system performance, this is the book to recommend.
Mit dem "Internet der Dinge" zeichnet sich ein fundamentaler Technik-Trend ab, dessen betriebswirtschaftliche Konsequenzen und Chancen hier erstmals erlAutert werden. Das Buch stellt dabei nicht nur eine klare technologisch wie Akonomisch begrA1/4ndete Vision des Ubiquitous Computing dar, sondern beschreibt darA1/4ber hinaus in mehreren Fallstudien auch deren Umsetzung in die Unternehmenspraxis unterschiedlichster Branchen, skizziert die wichtigsten Technologien und leitet unmittelbar anwendbare Handlungsanleitungen ab. Es liefert eine fundierte, in sich geschlossene und A1/4bersichtlich dargestellte Analyse fA1/4r Praktiker, Forscher und Studierende, die sich mit Gestaltung, Chancen und Risiken von RFID-Anwendungen und Ubiquitous-Computing-Szenarien auseinandersetzen.
Mobile commerce transactions continue to soar, driven largely by the ever-increasing adoption and use of smartphones and tablets. The use of this technology gives consumers the flexibility to shop whenever and wherever they want. Mobile Electronic Commerce: Foundations, Development, and Applications addresses the role of industry, academia, scientists, engineers, professionals, and students in developing innovative new mobile commerce technologies and systems to further improve the consumer experience. It also discusses the impact of mobile commerce on society, economics, culture, organizations, government, industry, and our daily lives.
|
You may like...
Information Security - Foundations…
Ali Ismail Awad, Michael Fairhurst
Hardcover
Trusted Information - The New Decade…
Michel Dupuy, Pierre Paradinas
Hardcover
R5,414
Discovery Miles 54 140
Intrusion Detection Systems
Roberto Di Pietro, Luigi V. Mancini
Hardcover
R4,237
Discovery Miles 42 370
|