![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
With today's hardware and chips, 90% of the time, interpreted unix scripts will perform as efficiently as code written in higher level languages - such as java. The difference is that, with unix scripts, you cut out about 80-90% of the lines of code, and have something that can easily be maintained and supported. Even if you still want to code in a higher level language, unix shell scripting is invaluable for support functions - such as moving around files, parsing log files, etc. An analyst or support person who uses the topics and examples in this book to master scripting can save him or herself literally hundreds of hours - especially when dealing with repetitive tasks with many lines of data.
The Mono Project is the much talked-about open source initiative to create a Unix implementation of Microsoft's .NET Development Framework. Its purpose is to allow Unix developers to build and deploy cross-platform .NET applications. The project has also sparked interest in developing components, libraries and frameworks with C#, the programming language of .NET. The controversy? Some say Mono will become the preferred platform for Linux development, empowering Linux/Unix developers. Others say it will allow Microsoft to embrace, extend, and extinguish Linux. The controversy rages on, but--like many developers--maybe you've had enough talk and want to see what Mono is really all about. There's one way to find out: roll up your sleeves, get to work, and see what you Mono can do. How do you start? You can research Mono at length. You can play around with it, hoping to figure things out for yourself. Or, you can get straight to work with "Mono: A Developer's Notebook"--a hands-on guide and your trusty lab partner as you explore Mono 1.0. Light on theory and long on practical application, "Mono: A Developer's Notebook" bypasses the talk and theory, and jumps right into Mono 1.0. Diving quickly into a rapid tour of Mono, you'll work through nearly fifty mini-projects that will introduce you to the most important and compelling aspects of the 1.0 release. Using the task-oriented format of this new series, you'll learn how to acquire, install, and run Mono on Linux, Windows, or Mac OS X. You'll work with the various Mono components: Gtk#, the Common Language Runtime, the class libraries (both .NET and Mono-provided class libraries), IKVM and the Mono C# compiler. No other resourcewill take you so deeply into Mono so quickly or show you as effectively what Mono is capable of. The new Developer's Notebooks series from O'Reilly covers important new tools for software developers. Emphasizing example over explanation and practice over theory, they focus on learning by doing--you'll get the goods straight from the masters, in an informal and code-intensive style that suits developers. If you've been curious about Mono, but haven't known where to start, this no-fluff, lab-style guide is the solution.
qmail has quietly become one of the most widely used applications on the Internet today. It's powerful enough to handle mail for systems with millions of users--Like Yahoo! Mail and Hotmail, while remaining compact and manageable enough for the smallest Unix- and Linux-based PC systems. Its component design makes it easy to extend and customize while keeping its key functions secure, so it's no wonder that adoption of qmail continues at a rapid pace. The downside? Apparently none. Except that qmail's unique design can be disorienting to those familiar with other popular MTAs (Mail Transfer Agents). If you're coming from sendmail, for instance, you might have trouble recasting your problems and solutions in qmail terms. qmail first helps you establish a "qmail frame of mind," then explores the installation, configuration, administration, and extension of this powerful MTA. Whether you're installing from scratch or managing mailing lists with thousands of users, qmail provides detailed information about how to make qmail do precisely what you want qmail concentrates on common tasks like moving a sendmail setup to qmail, or setting up a "POP toaster," a system that provides mail service to a large number of users on other computers sending and retrieving mail remotely. The book also fills crucial gaps in existing documentation, detailing exactly what the core qmail software does. Topics covered include: Installation and configuration, including patching qmail Moving from sendmail to qmail Handling locally and remotely originated messages Managing virtual domains Logging qmail activity Tuning qmail performance Running multiple copies of qmail on thesame computer Mailing list setup and management Integrating the qmail MTA with POP and IMAP delivery Filtering out spam and viruses If you need to manage mailing lists, large volumes of mail, or simply find sendmail and other MTAs too complicated, qmail may be exactly what's called for. Our new guide, qmail, will provide the guidance you need to build an email infrastructure that performs well, makes sense, and is easy to maintain.
This book is the formal proceedings of the Eurographics Workshop on Design, Specifi cation and Verification ofInteractive Systems, DSV-IS'99, which was held at the Uni versity of Minho, Braga, Portugal from June 2 to June 4, 1999. The previous events of this series were held at Pisa, Toulouse, Namur, Granada, and Abingdon; the theme this year was "Engaging the Mind by Enriching the Senses," emphasising the importance of the interface in making interaction both effective and enjoyable. Presentations and discussions covered topics that included specification methods and their use in design, model-based tool support, task and dialogue models, distributed col laboration, and models for VR input. As in previous years, there was a strong emphasis on formal representations and modelling techniques, and their use in understanding in teraction and informing the design of artefacts. However, the aim of the workshop is to encourage an exchange of views within a broad community, and other approaches, in particular tool support for model-based design, were also represented. This book includes the papers of the two invited speakers (one as an abstract only), the fourteen full papers accepted for publication, two shorter position papers, and the reports from the working group discussions. The format of the workshop aimed to mix formal paper presentations with informal discussion sessions, with the two invited talks setting the tone for the meeting."
Much more than a quick list of commands and options, the CVS Pocket Reference, 2nd Edition, is packed with a surprising amount of detail-- including an overview of background concepts, thorough descriptions on how to use and administer a CVS repository, and discussions of CVS-related files and how to manage them-- all in a convenient reference format. It's an absolute must for developers who need an on-the-job guide for quick answers to CVS dilemmas.
'A Concise Windows 8 Guide for Homes and Corporates' is a
screenshots enriched 'Must-Have' guide book especially written for
Home Users.
Palm OS Programming: The Developer's Guide , Second Edition shows intermediate to experienced C and C++ programmers how to build a Palm application from the ground up. The book follows up the success of our best-selling first edition with expanded coverage of the Palm OS, up to and including the latest version, 4.0. This book will set the standard for the next generation of Palm developers.
Learning the Korn Shell is the key to gaining control of the Korn shell and becoming adept at using it as an interactive command and scripting language. Readers will learn how to write many applications more easily and quickly than with other high-level languages. A solid offering for many years, this newly revised title inherits a long tradition of trust among computer professionals who want to learn or refine an essential skill.
Covering all the essential components of Unix/Linux, including process management, concurrent programming, timer and time service, file systems and network programming, this textbook emphasizes programming practice in the Unix/Linux environment. Systems Programming in Unix/Linux is intended as a textbook for systems programming courses in technically-oriented Computer Science/Engineering curricula that emphasize both theory and programming practice. The book contains many detailed working example programs with complete source code. It is also suitable for self-study by advanced programmers and computer enthusiasts. Systems programming is an indispensable part of Computer Science/Engineering education. After taking an introductory programming course, this book is meant to further knowledge by detailing how dynamic data structures are used in practice, using programming exercises and programming projects on such topics as C structures, pointers, link lists and trees. This book provides a wide range of knowledge about computer systemsoftware and advanced programming skills, allowing readers to interface with operatingsystem kernel, make efficient use of system resources and develop application software.It also prepares readers with the needed background to pursue advanced studies inComputer Science/Engineering, such as operating systems, embedded systems, databasesystems, data mining, artificial intelligence, computer networks, network security,distributed and parallel computing.
The GIMP Pocket Reference explains the numerous features of the GNU Image Manipulation Program--and is the essential guide for designers working in a Linux/Unix environment. This handy reference covers GIMP version 1.2. It explains the function of every menu item and offers tips for everyday use.
Over the past two years, Simple-Talk has published articles on a variety of SysAdmin topics, from Exchange to Virtualization, and including everything from Powershell to Unifi ed Messaging. We have brought the best of these articles together to form The SysAdmin Handbook. With over fi fty articles packed into this book, it will be an essential reference for any Systems Administrator, whether you have years of experience or are just starting out.
This thesis investigates the efficiency of extent-based allocator design to satisfy file allocation requests in a CDN proxy cache. The allocator is based on the method inspired by the memory allocators, where free space is managed in chunks of varying size, or extents. The design is tested in a simulation, where a trace of allocation and deallocation events from a content server was submitted to the allocator. The bottleneck for content retrieval often lies on data transfer rates of the hard disks used in the server. To facilitate fastest possible transfer of a file, it must be read sequentially. At the same time, given the large quantity of files, space wastage due to incomplete utilisation of large allocation units is not desirable. Our allocator design tries to achieve both mutually exclusive goals. The design was implemented and the results we obtained in the course of simulation, show that we managed to achieve these goals, creating an allocator that displays properties, favourable for contiguous file placement, while keeping space wastage at its minimum.
Using csh & tcsh describes from the beginning how to use these shells interactively to get your work done faster with less typing. You'll learn how to make your prompt tell you where you are (no more pwd); use what you've typed before (history); type long command lines with very few keystrokes (command and filename completion); remind yourself of filenames when in the middle of typing a command; and edit a botched command without retyping it.
Make your PCs as secure as possible and limit the routes of attack and safely and completely remove all traces of malware and viruses should an infection take place. Whatever version of Windows you're using, the threat of virus and malware infection is always a common danger. From key loggers and Trojans, intent on stealing passwords and data, to malware that can disable individual PCs or even a company network, the cost to business in downtime and loss of productivity can be enormous. What You'll Learn: Recognize malware and the problems it can cause Defend a PC against malware and viruses Configure advanced Windows features to prevent attack Identify types of malware and virus attack Discover third-party tools and resources available to help remove malware Manually remove malware and viruses from a PC Who This Book Is For IT pros, Windows expert and power users and system administrators
Written by the author of Expect, this is the first book to explain how this part of the UNIX toolbox can be used to automate Telnet, FTP, passwd, rlogin, and hundreds of other interactive applications. Based on Tcl (Tool Command Language), Expect lets you automate interactive applications that have previously been extremely difficult to handle with any scripting language.
Das vorliegende Buch bietet erstmalig eine fundierte Gesamtdarstellung uber den Aufbau, den Betrieb und die Funktionsweise von SAP auf Linux. Dabei werden die grundlegenden Konzepte, die Systemarchitektur und deren Implementierung von SAP auf Linux von langjahrigen Kennern der Materie praxisnah, fundiert und technisch detailliert dargestellt. Dem erfahrenen Linux-Fachmann wird damit das notige Rustzeug an die Hand gegeben, um einen soliden Einstieg in die SAP-Welt zu finden, und der SAP-Administrator findet zuverlassige Informationen, um ein SAP-System auf Linux sicher installieren und optimal betreiben zu konnen. "
As Linux continues its rapid expansion into Corporate America, the demand for qualified administrators has grown. As the Cisco, Microsoft, A+ and other certifications have shown, professional certifications are often a deciding factor when an individual is considered for a job. The Linux Professional Institute Certification 1 offers the validation of skill level beyond the power-user and helpdesk level, at an entry-level admin base. LPIC 1 Certification Bible is organized around the exam objectives.It includes self-assessment questions with each chapter as well as an inclusive practice exam at the end of the book. Plus, you'll find plenty of exam-taking tips and hints based on the live exams. Covers: Exam LPI-101
th Thisvolumecontainsthepaperspresentedatthe14 workshoponJobSched- ing Strategies for ParallelProcessing.The workshop was held in Rome, Italy, on May 29, 2009, in conjunction with the IEEE International Parallel Processing Symposium 2009. This year 25 papers were submitted to the workshop. All submitted - pers went through a complete review process, with the full version being read and evaluated by an average of four reviewers. We would like to especially thank the program committee members and additional referees for their wi- ingness to participate in this e?ort and their excellent, detailed reviews: Su-Hui Chiang, Walfredo Cirne, Allen Downey, DrorFeitelson, Alexander Fo ]lling, Allan Gottlieb, Christian Grimme, Andrew Grimshaw, Moe Jette, Joachim Lepping, Raquel Lopes, Reagan Moore, Jose Moreira, Bill Nitzberg, Alexander Papas- rou, Lars Schley, Mark Squillante, John Towns, Dan Tsafrir, Jon Weissman, and Philipp Wieder. Asaresultofthereviewprocess14paperswereacceptedfororalpresentation at the workshop. One additional paper is included in these proceedings after making substantial improvements based on the comments of the referees. The ?nal versions of the papers in this volume have addressed the comments of the referees and partially re?ect the discussions held during the work
Formal methods have been applied successfully to the verification of medium-sized programs in protocol and hardware design. However, their application to the development of large systems requires more emphasis on specification, modelling and validation techniques supporting the concepts of reusability and modifiability, and their implementation in new extensions of existing programming languages like Java. The 6th International Symposium on Formal Methods for Components and Objects, FMCO 2007, was held in Amsterdam, The Netherlands, in October 2007. This book presents 12 revised papers submitted after the symposium by the speakers of each of the following European IST projects: the IST-FP6 project Mobius, developing the technology for establishing trust and security for the next generation of global computers; the IST-FP6 project SelfMan on self management for large-scale distributed systems based on structured overlay networks and components; the IST-FP6 project GridComp and the FP6 CoreGRID Network of Excellence on grid programming with components; the Real-time component cluster of the Network of Excellence on Embedded System Design ARTIST, focussing on design processes, and architectures for real-time embedded systems; and the IST-FP6 project CREDO on modeling and analysis of evolutionary structures for distributed services.
This open access book was prepared as a Final Publication of the COST Action IC1406 "High-Performance Modelling and Simulation for Big Data Applications (cHiPSet)" project. Long considered important pillars of the scientific method, Modelling and Simulation have evolved from traditional discrete numerical methods to complex data-intensive continuous analytical optimisations. Resolution, scale, and accuracy have become essential to predict and analyse natural and complex systems in science and engineering. When their level of abstraction raises to have a better discernment of the domain at hand, their representation gets increasingly demanding for computational and data resources. On the other hand, High Performance Computing typically entails the effective use of parallel and distributed processing units coupled with efficient storage, communication and visualisation systems to underpin complex data-intensive applications in distinct scientific and technical domains. It is then arguably required to have a seamless interaction of High Performance Computing with Modelling and Simulation in order to store, compute, analyse, and visualise large data sets in science and engineering. Funded by the European Commission, cHiPSet has provided a dynamic trans-European forum for their members and distinguished guests to openly discuss novel perspectives and topics of interests for these two communities. This cHiPSet compendium presents a set of selected case studies related to healthcare, biological data, computational advertising, multimedia, finance, bioinformatics, and telecommunications.
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep ScreenOS systems on track. ScreenOS Cookbook gives you real-world fixes, techniques, and configurations that save time -- not hypothetical situations out of a textbook. The book comes directly from the experience of engineers who have seen and fixed every conceivable ScreenOS network topology, from small branch office firewalls to appliances for large core enterprise and government, to the heavy duty protocol driven service provider network. Its easy-to-follow format enables you to find the topic and specific recipe you need right away and match it to your network and security issue. Topics include: * Configuring and managing ScreenOS firewalls * NTP (Network Time Protocol) * Interfaces, Zones, and Virtual Routers * Mitigating Denial of Service Attacks * DDNS, DNS, and DHCP * IP Routing * Policy-Based Routing * Elements of Policies * Authentication * Application Layer Gateway (SIP, H323, RPC, RTSP, etc.,) * Content Security * Managing Firewall Policies * IPSEC VPN * RIP, OSPF, BGP, and NSRP * Multicast -- IGPM, PIM, Static Mroutes * Wireless Along with the usage and troubleshooting recipes, you will also find plenty of tricks, special considerations, ramifications, and general discussions of interesting tangents and network extrapolation. For the accurate, hard-nosed information you require to get your ScreenOS firewall network secure and operating smoothly , no book matches ScreenOS Cookbook.
Windows Vista: Beyond the Manual is a comprehensive guide to installing, configuring, exploiting, and using the richest Microsoft client operating system on the market. It guides you through the complexities of configuring and running a successful Windows Vista client computer. It also takes an in-depth look at the wealth of features and functions comprising the various flavors of the software. Windows Vista provides a range of new capabilities and features, many of which are apparent through a totally redesigned interface, and many more that are hidden just beneath the surface. With the help of Windows Vista: Beyond the Manual, IT professionals and home PC enthusiasts alike will become expert users, taking full advantage of the myriad functions and features that make up this release.
The 8th International Conference on Principles of Distributed Systems (OPODIS 2004) was held during December 15-17, 2004 at Grenoble, France. It continued a tradition of successful conferences with friendly and pleasant - mospheres. The earlier organizationsof OPODIS were held in Luzarches(1997), Amiens (1998), Hanoi (1999), Paris (2000), Mexico (2001), Reims (2002) and La Martinique (2003). OPODIS is an open forum for exchange of state-of-the-art knowledge on distributed computing and systems among researchers from around the world. Followingthetraditionofthepreviousorganizations,the2004programwasc- posed of high-quality contributed and invited papers by experts of international caliberinthisscienti?carea. Thetopics ofinterestwerethetheory,speci?cation, design and implementation of distributed systems, which include: - peer-to-peer systems, cluster and grid-based computing - fault tolerance and self-stabilizing systems -real-timeandembeddedsystems - coordination and consistency protocols - distributed and multiprocessor algorithms - communication and synchronization protocols - self-stabilization, reliability and fault tolerance - performance analysis of distributed algorithms and systems - speci? cation and veri?cation of distributed systems - security issues in distributed computing and systems - distributed collaborative environments - location- and context-aware systems - overlay network architectures In response to the call for papers for OPODIS 2004, in total 102 papers in the above areas were submitted from 28 countries from over the world. Each paper was reviewed by three reviewers, and judged according to scienti?c and presentationquality,originality andrelevance to the conference topics. Then the ProgramCommitteeselected30papers. Theacceptanceratiowaslessthan30%. Besides the technical contributed papers, the program included two exciting invited talks: Prof. David Lee (Ohio State University, USA) and Dr.
This easy-to-follow reference shows a variety of professionals how to use the Concurrent Versions System (CVS), the open source tool that lets you manage versions of anything stored in files. Ideal for software developers tracking different versions of the same code, this new edition has been expanded to explain common usages of CVS for system administrators, project managers, software architects, user-interface (UI) specialists, graphic designers and others. Current for version 1.12, "Essential CVS, 2nd Edition" offers an overview of CVS, explains the core concepts, and describes the commands that most people use on a day-to-day basis. For those who need to get up to speed rapidly, the book's Quickstart Guide shows you how to build and use a basic CVS repository with the default settings and a minimum of extras. You'll also find: a full command reference that details all aspects of customizing CVS for automation, logging, branching, merging documents, and creating alerts; examples and descriptions of the most commonly used options for each command; why and when to tag or branch your project, tagging before releases, and using branching to create a bugfix version of a project; and, details on the systems used in CVS to permit multiple developers to work on the same project without loss of data. An entire section devoted to document version management and project management includes ways to import and export projects, work with remote repositories, and shows how to fix things that can go wrong when using CVS. You'll find more screenshots in this edition as well as examples of using graphical CVS clients to run CVS commands. "Essential CVS" also includes a FAQ that answers common queries in the CVS mailing list to get you up and running with this system quickly and painlessly. |
You may like...
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright
Paperback
R1,491
Discovery Miles 14 910
|