![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
Covering all the essential components of Unix/Linux, including process management, concurrent programming, timer and time service, file systems and network programming, this textbook emphasizes programming practice in the Unix/Linux environment. Systems Programming in Unix/Linux is intended as a textbook for systems programming courses in technically-oriented Computer Science/Engineering curricula that emphasize both theory and programming practice. The book contains many detailed working example programs with complete source code. It is also suitable for self-study by advanced programmers and computer enthusiasts. Systems programming is an indispensable part of Computer Science/Engineering education. After taking an introductory programming course, this book is meant to further knowledge by detailing how dynamic data structures are used in practice, using programming exercises and programming projects on such topics as C structures, pointers, link lists and trees. This book provides a wide range of knowledge about computer systemsoftware and advanced programming skills, allowing readers to interface with operatingsystem kernel, make efficient use of system resources and develop application software.It also prepares readers with the needed background to pursue advanced studies inComputer Science/Engineering, such as operating systems, embedded systems, databasesystems, data mining, artificial intelligence, computer networks, network security,distributed and parallel computing.
Make your PCs as secure as possible and limit the routes of attack and safely and completely remove all traces of malware and viruses should an infection take place. Whatever version of Windows you're using, the threat of virus and malware infection is always a common danger. From key loggers and Trojans, intent on stealing passwords and data, to malware that can disable individual PCs or even a company network, the cost to business in downtime and loss of productivity can be enormous. What You'll Learn: Recognize malware and the problems it can cause Defend a PC against malware and viruses Configure advanced Windows features to prevent attack Identify types of malware and virus attack Discover third-party tools and resources available to help remove malware Manually remove malware and viruses from a PC Who This Book Is For IT pros, Windows expert and power users and system administrators
This slightly revised 4th edition includes two example projects from the earlier editions not found in the third edition but is otherwise unchanged. As before it includes a massive amount of information about the 8051-family of microcontrollers and techniques for programming them in the C language. There is a strong emphasis on interrupt-driven programming and operating systems as well as many algorithms related to typical microcontroller interfacing. There is extensive ground-up coverage of serial interfacing and small-area networks.
Das vorliegende Buch bietet erstmalig eine fundierte Gesamtdarstellung uber den Aufbau, den Betrieb und die Funktionsweise von SAP auf Linux. Dabei werden die grundlegenden Konzepte, die Systemarchitektur und deren Implementierung von SAP auf Linux von langjahrigen Kennern der Materie praxisnah, fundiert und technisch detailliert dargestellt. Dem erfahrenen Linux-Fachmann wird damit das notige Rustzeug an die Hand gegeben, um einen soliden Einstieg in die SAP-Welt zu finden, und der SAP-Administrator findet zuverlassige Informationen, um ein SAP-System auf Linux sicher installieren und optimal betreiben zu konnen. "
In modern computing a program is usually distributed among several processes. The fundamental challenge when developing reliable and secure distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail. Failures may range from crashes to adversarial attacks by malicious processes. Cachin, Guerraoui, and Rodrigues present an introductory description of fundamental distributed programming abstractions together with algorithms to implement them in distributed systems, where processes are subject to crashes and malicious attacks. The authors follow an incremental approach by first introducing basic abstractions in simple distributed environments, before moving to more sophisticated abstractions and more challenging environments. Each core chapter is devoted to one topic, covering reliable broadcast, shared memory, consensus, and extensions of consensus. For every topic, many exercises and their solutions enhance the understanding This book represents the second edition of "Introduction to Reliable Distributed Programming". Its scope has been extended to include security against malicious actions by non-cooperating processes. This important domain has become widely known under the name "Byzantine fault-tolerance".
As Linux continues its rapid expansion into Corporate America, the demand for qualified administrators has grown. As the Cisco, Microsoft, A+ and other certifications have shown, professional certifications are often a deciding factor when an individual is considered for a job. The Linux Professional Institute Certification 1 offers the validation of skill level beyond the power-user and helpdesk level, at an entry-level admin base. LPIC 1 Certification Bible is organized around the exam objectives.It includes self-assessment questions with each chapter as well as an inclusive practice exam at the end of the book. Plus, you'll find plenty of exam-taking tips and hints based on the live exams. Covers: Exam LPI-101
Mobile commerce transactions continue to soar, driven largely by the ever-increasing adoption and use of smartphones and tablets. The use of this technology gives consumers the flexibility to shop whenever and wherever they want. Mobile Electronic Commerce: Foundations, Development, and Applications addresses the role of industry, academia, scientists, engineers, professionals, and students in developing innovative new mobile commerce technologies and systems to further improve the consumer experience. It also discusses the impact of mobile commerce on society, economics, culture, organizations, government, industry, and our daily lives.
th Thisvolumecontainsthepaperspresentedatthe14 workshoponJobSched- ing Strategies for ParallelProcessing.The workshop was held in Rome, Italy, on May 29, 2009, in conjunction with the IEEE International Parallel Processing Symposium 2009. This year 25 papers were submitted to the workshop. All submitted - pers went through a complete review process, with the full version being read and evaluated by an average of four reviewers. We would like to especially thank the program committee members and additional referees for their wi- ingness to participate in this e?ort and their excellent, detailed reviews: Su-Hui Chiang, Walfredo Cirne, Allen Downey, DrorFeitelson, Alexander Fo ]lling, Allan Gottlieb, Christian Grimme, Andrew Grimshaw, Moe Jette, Joachim Lepping, Raquel Lopes, Reagan Moore, Jose Moreira, Bill Nitzberg, Alexander Papas- rou, Lars Schley, Mark Squillante, John Towns, Dan Tsafrir, Jon Weissman, and Philipp Wieder. Asaresultofthereviewprocess14paperswereacceptedfororalpresentation at the workshop. One additional paper is included in these proceedings after making substantial improvements based on the comments of the referees. The ?nal versions of the papers in this volume have addressed the comments of the referees and partially re?ect the discussions held during the work
Formal methods have been applied successfully to the verification of medium-sized programs in protocol and hardware design. However, their application to the development of large systems requires more emphasis on specification, modelling and validation techniques supporting the concepts of reusability and modifiability, and their implementation in new extensions of existing programming languages like Java. The 6th International Symposium on Formal Methods for Components and Objects, FMCO 2007, was held in Amsterdam, The Netherlands, in October 2007. This book presents 12 revised papers submitted after the symposium by the speakers of each of the following European IST projects: the IST-FP6 project Mobius, developing the technology for establishing trust and security for the next generation of global computers; the IST-FP6 project SelfMan on self management for large-scale distributed systems based on structured overlay networks and components; the IST-FP6 project GridComp and the FP6 CoreGRID Network of Excellence on grid programming with components; the Real-time component cluster of the Network of Excellence on Embedded System Design ARTIST, focussing on design processes, and architectures for real-time embedded systems; and the IST-FP6 project CREDO on modeling and analysis of evolutionary structures for distributed services.
This open access book was prepared as a Final Publication of the COST Action IC1406 "High-Performance Modelling and Simulation for Big Data Applications (cHiPSet)" project. Long considered important pillars of the scientific method, Modelling and Simulation have evolved from traditional discrete numerical methods to complex data-intensive continuous analytical optimisations. Resolution, scale, and accuracy have become essential to predict and analyse natural and complex systems in science and engineering. When their level of abstraction raises to have a better discernment of the domain at hand, their representation gets increasingly demanding for computational and data resources. On the other hand, High Performance Computing typically entails the effective use of parallel and distributed processing units coupled with efficient storage, communication and visualisation systems to underpin complex data-intensive applications in distinct scientific and technical domains. It is then arguably required to have a seamless interaction of High Performance Computing with Modelling and Simulation in order to store, compute, analyse, and visualise large data sets in science and engineering. Funded by the European Commission, cHiPSet has provided a dynamic trans-European forum for their members and distinguished guests to openly discuss novel perspectives and topics of interests for these two communities. This cHiPSet compendium presents a set of selected case studies related to healthcare, biological data, computational advertising, multimedia, finance, bioinformatics, and telecommunications.
Windows Vista: Beyond the Manual is a comprehensive guide to installing, configuring, exploiting, and using the richest Microsoft client operating system on the market. It guides you through the complexities of configuring and running a successful Windows Vista client computer. It also takes an in-depth look at the wealth of features and functions comprising the various flavors of the software. Windows Vista provides a range of new capabilities and features, many of which are apparent through a totally redesigned interface, and many more that are hidden just beneath the surface. With the help of Windows Vista: Beyond the Manual, IT professionals and home PC enthusiasts alike will become expert users, taking full advantage of the myriad functions and features that make up this release.
The 8th International Conference on Principles of Distributed Systems (OPODIS 2004) was held during December 15-17, 2004 at Grenoble, France. It continued a tradition of successful conferences with friendly and pleasant - mospheres. The earlier organizationsof OPODIS were held in Luzarches(1997), Amiens (1998), Hanoi (1999), Paris (2000), Mexico (2001), Reims (2002) and La Martinique (2003). OPODIS is an open forum for exchange of state-of-the-art knowledge on distributed computing and systems among researchers from around the world. Followingthetraditionofthepreviousorganizations,the2004programwasc- posed of high-quality contributed and invited papers by experts of international caliberinthisscienti?carea. Thetopics ofinterestwerethetheory,speci?cation, design and implementation of distributed systems, which include: - peer-to-peer systems, cluster and grid-based computing - fault tolerance and self-stabilizing systems -real-timeandembeddedsystems - coordination and consistency protocols - distributed and multiprocessor algorithms - communication and synchronization protocols - self-stabilization, reliability and fault tolerance - performance analysis of distributed algorithms and systems - speci? cation and veri?cation of distributed systems - security issues in distributed computing and systems - distributed collaborative environments - location- and context-aware systems - overlay network architectures In response to the call for papers for OPODIS 2004, in total 102 papers in the above areas were submitted from 28 countries from over the world. Each paper was reviewed by three reviewers, and judged according to scienti?c and presentationquality,originality andrelevance to the conference topics. Then the ProgramCommitteeselected30papers. Theacceptanceratiowaslessthan30%. Besides the technical contributed papers, the program included two exciting invited talks: Prof. David Lee (Ohio State University, USA) and Dr.
Thema dieser fundierten Einfuhrung ist der Einsatz von Linux in rechnergestutzten technischen Geraten, wie z.B. PDAs (Personal Digital Assistants) oder Handhelds. Der Autor erlautert zunachst die Spezifika eingebetteter Systeme und erklart dann, welche Besonderheiten beim Einsatz von Linux als zugrundeliegendem Betriebssystem zu beachten sind. Anschliessend werden die zentralen Komponenten eines Linux-Systems vorgestellt und die Programmierung unter Linux mithilfe gangiger Werkzeuge im Detail dargelegt. Die Code-Beispiele orientieren sich dabei am Einsatz von Linux-Systemen auf PDAs und mobilen Endgeraten.
Mit dem "Internet der Dinge" zeichnet sich ein fundamentaler Technik-Trend ab, dessen betriebswirtschaftliche Konsequenzen und Chancen hier erstmals erlAutert werden. Das Buch stellt dabei nicht nur eine klare technologisch wie Akonomisch begrA1/4ndete Vision des Ubiquitous Computing dar, sondern beschreibt darA1/4ber hinaus in mehreren Fallstudien auch deren Umsetzung in die Unternehmenspraxis unterschiedlichster Branchen, skizziert die wichtigsten Technologien und leitet unmittelbar anwendbare Handlungsanleitungen ab. Es liefert eine fundierte, in sich geschlossene und A1/4bersichtlich dargestellte Analyse fA1/4r Praktiker, Forscher und Studierende, die sich mit Gestaltung, Chancen und Risiken von RFID-Anwendungen und Ubiquitous-Computing-Szenarien auseinandersetzen.
With 28 new chapters, the third edition of The Practice of System and Network Administration innovates yet again! Revised with thousands of updates and clarifications based on reader feedback, this new edition also incorporates DevOps strategies even for non-DevOps environments. Whether you use Linux, Unix, or Windows, this new edition describes the essential practices previously handed down only from mentor to protege. This wonderfully lucid, often funny cornucopia of information introduces beginners to advanced frameworks valuable for their entire career, yet is structured to help even experts through difficult projects. Other books tell you what commands to type. This book teaches you the cross-platform strategies that are timeless! DevOps techniques: Apply DevOps principles to enterprise IT infrastructure, even in environments without developers Game-changing strategies: New ways to deliver results faster with less stress Fleet management: A comprehensive guide to managing your fleet of desktops, laptops, servers and mobile devices Service management: How to design, launch, upgrade and migrate services Measurable improvement: Assess your operational effectiveness; a forty-page, pain-free assessment system you can start using today to raise the quality of all services Design guides: Best practices for networks, data centers, email, storage, monitoring, backups and more Management skills: Organization design, communication, negotiation, ethics, hiring and firing, and more Have you ever had any of these problems? Have you been surprised to discover your backup tapes are blank? Ever spent a year launching a new service only to be told the users hate it? Do you have more incoming support requests than you can handle? Do you spend more time fixing problems than building the next awesome thing? Have you suffered from a botched migration of thousands of users to a new service? Does your company rely on a computer that, if it died, can't be rebuilt? Is your network a fragile mess that breaks any time you try to improve it? Is there a periodic "hell month" that happens twice a year? Twelve times a year? Do you find out about problems when your users call you to complain? Does your corporate "Change Review Board" terrify you? Does each division of your company have their own broken way of doing things? Do you fear that automation will replace you, or break more than it fixes? Are you underpaid and overworked? No vague "management speak" or empty platitudes. This comprehensive guide provides real solutions that prevent these problems and more!
This book constitutes the proceedings of the 26th International Conference on Information Processing in Medical Imaging, IPMI 2019, held at the Hong Kong University of Science and Technology, Hong Kong, China, in June 2019. The 69 full papers presented in this volume were carefully reviewed and selected from 229 submissions. They were organized in topical sections on deep learning and segmentation; classification and inference; reconstruction; disease modeling; shape, registration; learning motion; functional imaging; and white matter imaging. The book also includes a number of post papers.
This book constitutes the proceedings of the 15th International Symposium on Applied Reconfigurable Computing, ARC 2019, held in Darmstadt, Germany, in April 2019. The 20 full papers and 7 short papers presented in this volume were carefully reviewed and selected from 52 submissions. In addition, the volume contains 1 invited paper. The papers were organized in topical sections named: Applications; partial reconfiguration and security; image/video processing; high-level synthesis; CGRAs and vector processing; architectures; design frameworks and methodology; convolutional neural networks.
This book constitutes revised selected papers from the 10th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2019, held in Darmstadt, Germany, in April 2019. The 14 papers presented together with one keynote and one invited talk in this volume were carefully reviewed and selected from 34 submissions. They were organized in topical sections named: Side-Channel Attacks; Fault-Injection Attacks; White-Box Attacks; Side-Channel Analysis Methodologies; Security Aspects of Post-Quantum Schemes; and Countermeasures Against Implementation Attacks.
Mit seinem Workshop 2018 zum Thema Echtzeit und Sicherheit bietet der GI/GMA/ITG-Fachausschuss Echtzeitsysteme Wissenschaftlern, Nutzern und Herstellern ein Forum, auf dem neue Trends und Entwicklungen zu folgenden Programmschwerpunkten vorgestellt werden: Eingebettete Systeme, Echtzeitkommunikation, Leistungssteuerung und -bewertung, Logistik und Echtzeit sowie funktionale Sicherheit. Berichte zu aktuellen Anwendungen und zur Ausbildung runden die Publikation ab.
This book constitutes the refereed proceedings of the 14th World Congress on Services, SERVICES 2018, held as part of the Services Conference Federation, SCF 2018, in Seattle, USA, in June 2018. The 10 full papers and 3 short papers presented were carefully reviewed and selected from 22 submissions. The papers cover topics in the field of software foundations and applications with a focus on novel approaches for engineering requirements, design and architectures, testing, maintenance and evolution, model-driven development, software processes, metrics, quality assurance and new software economics models, search-based software engineering, benefiting day-to-day services sectors and derived through experiences, with appreciation to scale, pragmatism, transparency, compliance and/or dependability.
This book constitutes the proceedings of the Research School on Statistics and Data Science, RSSDS 2019, held in Melbourne, VIC, Australia, in July 2019. The 11 papers presented in this book were carefully reviewed and selected from 23 submissions. The volume also contains 7 invited talks. The workshop brought together academics, researchers, and industry practitioners of statistics and data science, to discuss numerous advances in the disciplines and their impact on the sciences and society. The topics covered are data analysis, data science, data mining, data visualization, bioinformatics, machine learning, neural networks, statistics, and probability.
Das Buch liefert eine Charakterisierung und Abgrenzung der Plattformen Windows 3.x, Windows NT, OS/2 und UNIX. Dabei werden sowohl anwenderspezifische Aspekte als auch wichtige programmtechnische Punkte erlautert. Damit kann der Leser zum einen die Frage der Notwendigkeit einer Portierung analysieren, zum anderen erhalt er Einblick in die erweiterten technischen Moeglichkeiten und kann, falls sinnvoll, seine Applikation entsprechend erweitern. Brauchbare Abschatzungen zum Aufwand einer Portierung werden ermoeglicht, indem die grundlegenden Portierungsschritte beschrieben werden. Auch UEberlegungen zur richtigen Strategie (insbesondere fur grosse Projekte sehr bedeutsam) werden angestellt. Daneben werden zahlreiche allgemeine Regeln und Hinweise zur Gestaltung portabler Programme gegeben. Der umfangreichste Teil geht schliesslich konkret und im Detail auf die zahlreichen grossen und kleinen AEnderungen ein, die zur Portierung einer Windows-Applikation auf Windows 4.0 oder Windows NT erforderlich sind. Dabei ist der Text gleichermassen zum Durchlesen wie als Nachschlagewerk konzipiert. Erreicht wird dies durch eine klare Strukturierung und ein ausfuhrliches Funktions- und Nachrichtenregister. Das Buch geht von C/C++ als Entwicklungssprache aus, ein Anhang gibt jedoch die notwendigen Hinweise, damit auch Pascal- und Modula-2-Programmierer zu ihrem Recht kommen.
In vielen Organisationen steht die Abloesung bestehender EDV-Netzwerke durch Windows 2000 bevor. Dieser praxisorientierte Leitfaden unterstutzt Sie bei der Durchfuhrung eines solchen Projektes. - Neben den Grundregeln fur erfolgreiches Projekt- und Teammanagement und Tips zur Zusammenarbeit mit externen Beratern lernen Sie die neuen Dienste und Features von Windows 2000 und deren Auswirkungen auf ein Migrationsprojekt kennen. - Die einzelnen Phasen eines Projektes - von der Bestandsaufnahme uber die Bedarfsanalyse, Grob- und Feinplanung bis zur Umsetzung und Abnahme - werden Ihnen anhand von zwei unterschiedlichen Fallbeispielen detailliert vorgestellt. - Bewahrte Checklisten erfolgreicher Windows-NT-Migrationsprojekte helfen Ihnen bei der Konzeptionierung eigener Vorhaben. Paulette Feller ist Microsoft Certified Professional Trainer (MCT), Microsoft Certified Professional Systems Engineer (MCSE) sowie Novell Certified Network Engineer (CNE) und seit mehreren Jahren als Tainerin und Beraterin im Bereich Netzwerke tatig.
This, the 39th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains extended and revised versions of seven papers selected from the 37 contributions presented at the 28th International Conference on Database and Expert Systems Applications, DEXA 2017, held in Lyon, France, in August 2017. Topics covered include knowledge bases, clustering algorithms, parallel frequent itemset mining, model-driven engineering, virtual machines, recommendation systems, and federated SPARQL query processing. |
You may like...
Resilience Assessment and Evaluation of…
Katinka Wolter, Alberto Avritzer, …
Hardcover
R2,738
Discovery Miles 27 380
Wild Catalina Island - Natural Secrets…
Frank J. Hein, Carlos de La Rosa
Paperback
|