Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer software packages > Utilities & tools > General
Automate your computing systems with Puppet, the popular configuration management framework. Through code samples and real-world examples, this concise introduction shows you how to use Puppet tools and templates to organize and execute configuration plans on your *nix servers. Learn how to manage pools of servers and virtual instances, and discover how Puppet helps you administer access control. If you're familiar with system administration and Ruby language basics, this book is the ideal way to get up to speed on this open source framework. Install Puppet and learn its manifest syntax and built-in functions Store configurations in a central location with Puppet Master, and define which configurations apply to which nodes Build a framework to create user accounts in place of LDAP or Kerberos KDC Apply techniques to execute and manage server configurations with MCollective Use Puppet as an auditing tool to ensure that configurations are correct Gather information on the nodes you manage with the Facter library
COM025000
This title shows readers how to create amazing images easily and professionally with one of the best free photo editors available. It features quick and simple tutorials designed to help you master Paint.NET in minutes. The book teaches you everything you need to know to edit and manipulate images. Written with very clear walkthroughs, hands-on tutorials, and amazing resources, it will turn you into a photo wizard with Paint.NET
Presenting information in a dense, compact way that appeals to the experienced developer, this book is ideal as a technologist's desk reference and is not meant to be read from cover to cover. Throughout, it takes a new approach, focusing on practical tasks like connecting to the database, retrieving data, and working with transactions, rather than rehashing much of the MSDN documentation.
Laser printer down and don't know where to begin? Convinced that the local repair shop is not being completely honest? Avoid the hassle of having to reinvent the wheel when trying to troubleshoot and repair monochrome laser printers without the necessary guide. With "Fix Your Laser Printer and Save a Bundle," confidently diagnose those repairs or have the peace of mind that what the repair shop is saying is correct. "Fix Your Laser and Save a Bundle" includes:
Paul Lapsansky has accumulated over ten years of experience servicing laser printers and has amassed this experience into a wealth of troubleshooting tips to bring to you in "Fix Your Laser Printer and Save a Bundle."
In depth guide to implementing antispam solutions using SpamAssassin Features At A Glance Implement the right antispam solution for your network and your business requirements; Learn how to detect and prevent spam; Optimize SpamAssassin for all major mail servers and clients; Discover how to use SpamAssassin as a service; Spam has become a serious problem for businesses, wasting employees' time and costing millions of dollars. To combat this growing problem, a number of applications and services have been developed, and SpamAssassin is one of the most effective and popular Open Source solutions. Free to use, flexible, and effective, SpamAssassin has become the most popular Open Source antispam application. Its unique combination of power and flexibility make it the right choice. This book will now help you set up and optimize SpamAssassin for your network. As a system administrator, it's down to you to implement, configure and adapt SpamAssassin to fight the Spam War. Fortunately, in SpamAssassin you chose well. Its power and flexibility make it a potent tool. However you also know that any flexible application is only as good as how it's set up and configured. This book is a compr
The annoyance factor for individual users whose email is crammed with pitches for pornography, absurd moneymaking schemes, and dubious health products is fierce. But for organizations, the cost of spam in lost productivity and burned bandwidth is astronomical. While society is grappling with a solution to the burgeoning crisis of spam proliferation, the pressure is on system administrators to find a solution to this massive problem in-house. And fast. Sys admins can field scores of complaints and spend months testing software suites that turn out to be too aggressive, too passive, or too complicated to setup only to discover that SpamAssassin (SA), the leading open source spam-fighting tool, is free, flexible, powerful, highly-regarded, and remarkably effective. The drawback? SpamAssassin's lack of published documentation. "SpamAssassin" by Alan Schwartz, is the only published resource devoted to SpamAssassin and how to integrate it effectively into your networks. This clear, concise guide clarifies the installation, configuration, and use of the SpamAssassin spam-checking system (versions 2.63 and 3.0) for Unix system administrators using the Postfix, Sendmail, Exim, or qmail mail servers, helping administrators make the right integration decision for their particular environments. It covers concrete advice on how to: Customize SpamAssassin's rules, and even create new ones Train SpamAssassin's Bayesian classifier, a statistical engine for detecting spam, to optimize it for the sort of email that you typically receive Block specific addresses, hosts, and domains using third-party blacklists like the one maintained by Spamcop.net. Whitelist known good sources ofemail, so that messages from clients, coworkers, and friends aren't inadvertently lost. Configure SpamAssassin to work with newer spam-filtering methods such as Hashcash (www.hashcash.org) and Sender Policy Framework (SPF). Sys admins, network administrators, and ISPs pay for spam with hours of experimentation and tedious junk email management, frayed user tempers, and their sanity. SpamAssassin, together with this essential book, give you the tools you need to take back your organization's inboxes. "Detailed, accurate and informative--recommended for spam-filtering beginners and experts alike." --Justin Mason, SpamAssassin development team
This book shows PeopleSoft developers and administrators how to integrate PeopleSoft ERP systems with third party software.
This state-of-the-art monograph presents a coherent survey of a variety of methods and systems for formal hardware verification. It emphasizes the presentation of approaches that have matured into tools and systems usable for the actual verification of nontrivial circuits. All in all, the book is a representative and well-structured survey on the success and future potential of formal methods in proving the correctness of circuits. The various chapters describe the respective approaches supplying theoretical foundations as well as taking into account the application viewpoint. By applying all methods and systems presented to the same set of IFIP WG10.5 hardware verification examples, a valuable and fair analysis of the strenghts and weaknesses of the various approaches is given.
Every day managers wish they could open their desks, pull out a power tool, and fix a knotty problem for good. Now they can reach for Power Tools. In what has been called "their inimitable, cut-to-the-core style," Deep and Sussman chop through the biggest challenges of management. Having consulted for organizations ranging from Alcoa to the Pittsburgh Symphony, from General Electric to Southwestern Bell, Deep and Sussman know the responsibilities managers face. And they know what works. Power Tools shows how to fix problems like these: Friction keeps team members from working well together? You'll make permanent improvements with Team Builder and Team Links. Setting strategy? You'll find half a dozen tools to help, from analyzing trends with Vista to Deep and Sussman's ten-step Strategic Planner. Employees complain it's hard to get useful customer feedback? Teach them the power of One-Finger Questions. Want to make your idea shine? Take five minutes and learn to Sell It. Here you'll find the techniques, tips, and tactical advice that consultants might provide, presented so clearly that they can be do-it-yourself projects with minimal costs. Power Tools is the toolbox that all managers should have in their desks.
This book constitutes the refereed proceedings of the Third
International Workshop on Tools and Algorithms for the Construction
and Analysis of Systems, TACAS '97, held in Enschede, The
Netherlands, in April 1997.
This book presents a coherent description of the theoretical and practical aspects of Coloured Petri Nets (CP-nets or CPN). It shows how CP-nets have been de veloped - from being a promising theoretical model to being a full-fledged lan guage for the design, specification, simulation, validation and implementation of large software systems (and other systems in which human beings and/or com puters communicate by means of some more or less formal rules). The book contains the formal definition of CP-nets and the mathematical theory behind their analysis methods. However, it has been the intention to write the book in such a way that it also becomes attractive to readers who are more interested in applications than the underlying mathematics. This means that a large part of the book is written in a style which is closer to an engineering textbook (or a users' manual) than it is to a typical textbook in theoretical computer science. The book consists of three separate volumes. The first volume defines the net model (i. e. , hierarchical CP-nets) and the basic concepts (e. g. , the different behavioural properties such as deadlocks, fair ness and home markings). It gives a detailed presentation of many small exam ples and a brief overview of some industrial applications. It introduces the for mal analysis methods. Finally, it contains a description of a set of CPN tools which support the practical use of CP-nets.
This coherently written book is the final report on the IPSEN
project on Integrated Software Project Support Environments devoted
to the integration of tools for the development and maintenance of
large software systems.
This book presents 12 revised refereed papers selected as the best
from 32 submissions for the First International Workshop on Tools
and Algorithms for the Construction and Analysis of Systems, TACAS
'95, held in Aarhus, Denmark, in May 1995.
Mosaic for Windows is an informative book on how to use the most popular Internet navigation tool ever developed. By focussing on the PC Windows version of Mosaic (NCSA, AIR Mosaic, and Spyglass), including Web browsers like NetScape, WinWeb and WebSurfer, this book will provide an easy-to-follow guide to using a PC and Mosaic to browse, collect, and discover information and resources across the entire electronic world.
The purpose of this book is to present a project from the ESPRIT Specific Programme of European Research and Development in Information Technology, project number 6310, known as MMTCA: Multimedia Toolbox for Cooperative Applications. This project ran from 1992 to 1994, and concluded with a product which is probably of great usefulness to all business organisations. MMTCA enables managers to set up arrangements or to delegate tasks involving cooperation between people in different places using standard Windows software tools for what-you-see-is-what-I-see (wySIWIS) cooperation. MMTCA is the only product that delivers all of these points. Several trends in 1994 lead the authors to believe that MMTCA will become more important over the coming months: * the continuing popularity of personal computers and Microsoft's Windows operating system, * the growing importance of computer-supported cooperative work, and * the availability of powerful networks and satellites for wide-area communica tions. In MMTCA it is not necessary for the manager to know anything about com puter programming, but merely to have a user's working knowledge of the appli cation software (spreadsheets etc.) that is used in his office. The MMTCA approach envisages two stages where MMTCA's facilities are used: * by the manager: setting up or organising work to be done, * by the participants: carrying out the resulting tasks.
The Software Engineering and Knowledgebase Systems (SOFfEKS) Research Group of the Department of Computer Science, Concordia University, Canada, organized a workshop on Incompleteness and Uncertainty in Information Systems from October 8-9, 1993 in Montreal. A major aim of the workshop was to bring together researchers who share a concern for issues of incompleteness and uncertainty. The workshop attracted people doing fundamental research and industry oriented research in databases, software engineering and AI from North America, Europe and Asia. The workshop program featured six invited talks and twenty other presentations. The invited speakers were: Martin Feather (University of Southern CalifornialInformation Systems Institute) Laks V. S. Lakshmanan (Concordia University) Ewa Orlowska (Polish Academy of Sciences) z. Pawlak (Warsaw Technical University and Academy of Sciences) F. Sadri (Concordia University) A. Skowron (Warsaw University) The papers can be classified into four groups: rough sets and logic, concept analysis, databases and information retrieval, and software engineering. The workshop opened with a warm welcome speech from Dr. Dan Taddeo, Dean, Faculty of Engineering and Computer Science. The first day's presentations were in rough sets, databases and information retrieval. Papers given on the second day centered around software engineering and concept analysis. Sufficient time was given in between presentations to promote active interactions and numerous lively discussions. At the end of two days, the participants expressed their hope that this workshop would be continued."
Jumpstarting books provide an avenue for makers to quickly master topical knowledge! Each book starts with instructions on how to install or initialize the hardware or software needed to reach the "Hello, World" stage of getting started! The second project in the book builds on the first to use more of the hardware or software's capabilities. Later projects expand the user's knowledge into lesser-known aspects of the topic. All Jumpstarting projects are for Makers -- they provide hands-on, real-world experience in making the hardware or software do what you want it to do!
This book contains the revised selected papers of 4 workshops held in conjunction with the International Conference on High Performance Computing, Networking, Storage and Analysis (SC) in November 2017 in Denver, CO, USA, and in November 2018 in Dallas, TX, USA: the 6th and 7th International Workshop on Extreme-Scale Programming Tools, ESPT 2017 and ESPT 2018, and the 4th and 5th International Workshop on Visual Performance Analysis, VPA 2017 and VPA 2018. The 11 full papers of ESPT 2017 and ESPT 2018 and the 6 full papers of VPA 2017 and VPA 2018 were carefully reviewed and selected for inclusion in this book. The papers discuss the requirements for exascale-enabled tools as well as new approaches of applying visualization and visual analytic techniques to large-scale applications. Topics of interest include: programming tools; methodologies for performance engineering; tool technologies for extreme-scale challenges (e.g., scalability, resilience, power); tool support for accelerated architectures and large-scale multi-cores; tool infrastructures and environments; evolving/future application requirements for programming tools and technologies; application developer experiences with programming and performance tools; scalable displays of performance data; case studies demonstrating the use of performance visualization in practice; data models to enable scalable visualization; graph representation of unstructured performance data; presentation of high-dimensional data; visual correlations between multiple data sources; human-computer interfaces for exploring performance data; and multi-scale representations of performance data for visual exploration. |
You may like...
|