0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (138)
  • R250 - R500 (480)
  • R500+ (2,524)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)

Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021,... Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part I (Paperback, 1st ed. 2021)
Kazue Sako, Nils Ole Tippenhauer
R1,259 Discovery Miles 12 590 Ships in 9 - 15 working days

The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.

The Real MCTS/MCITP Exam 70-649 Upgrading Your MCSE on Windows Server 2003 to Windows Server 2008 Prep Kit with CDROM... The Real MCTS/MCITP Exam 70-649 Upgrading Your MCSE on Windows Server 2003 to Windows Server 2008 Prep Kit with CDROM (Paperback)
Brien Posey
R1,031 Discovery Miles 10 310 Ships in 12 - 17 working days

This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSEs) AD, Network Infrastructure, and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSE skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exams 70-640, 70-642, and 70-643.
The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers.
MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management.
In addition MCTS candidates must understant connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.
* THE independent source of exam day tips, techniques, and warnings not available from Microsoft
* Comprehensive study guide guarantees 100% coverage of all Microsoft's exam objectives
* Interactive FastTrack e-learning modules help simplify difficult exam topics
* Two full-function ExamDay practice exams guarantee double coverage of all exam objectives
* Free download of audio FastTracks for use with iPods or other MP3 players
* 1000 page "DRILL DOWN" reference for comprehensive topic review

Red Hat Enterprise Linux  6 Administration - Real World Skills for Red Hat Administrators (Paperback, New): S. van Vugt Red Hat Enterprise Linux 6 Administration - Real World Skills for Red Hat Administrators (Paperback, New)
S. van Vugt
R1,416 R1,054 Discovery Miles 10 540 Save R362 (26%) Ships in 12 - 17 working days

The definitive guide to administering a Red Hat Enterprise Linux 6 network

Linux professionals who need a go-to guide on version 6 of Red Hat Enterprise Linux (RHEL) will find what they need in this comprehensive Sybex book. It covers RHEL administration in detail, including how to set up and manage web and mail services, use RHEL in enterprise environments, secure it, optimize storage, configure for virtualization and high availability, and much more. It also provides a great study aid for those preparing for either the RHCSA or RHCE certification exam.Red Hat is the Linux market leader, and Red Hat administrators are in demandThis Sybex guide is a comprehensive resource on Red Hat Enterprise Linux administration and useful for those preparing for one of the Red Hat certification examsCovers setting up and managing web and mail services, using RHEL in enterprise environments, securing RHEL, and optimizing storage to fit your environmentExplores advanced RHEL configurations, including virtualization and high availability

"Red Hat Enterprise Linux 6 Administration" is the guide Linux professionals and Red Hat administrators need to stay current on the newest version.

Lion's Commentary on UNIX with Source Code (Paperback, 6th Revised edition): John Lions Lion's Commentary on UNIX with Source Code (Paperback, 6th Revised edition)
John Lions
R949 Discovery Miles 9 490 Ships in 9 - 15 working days

The most famous suppressed book in computer history * Used as an Operating System textbook at MIT"After 20 years, this is still the best expostion of the workings of a 'real' operating system." --- Ken Thompson (Developer of the UNIX operating system)After years of suppression (as trade secrets) by various owners of the UNIX code, this tome has been re-released, and we owe a debt to all involved in making this happen. I consider this to be the single most important book of 1996. Unix Review, June 1997"The Lions book," cherished by UNIX hackers and widely circulated as a photocopied bootleg document since the late 1970's, is again available in an unrestricted edition. This legendary underground classic, reproduced without modification, is really two works in one: the complete source code to an early version (Edition 6) of the UNIX operating system, a treasure in itself a brilliant commentary on that code by John Lionswith additional historical perspective essays added in 1996.Lions' marriage of source code with commentary was originally used as an operating systems textbook, a purpose for which it remains superbly well-suited (as evidenced by it's ongoing use at MIT).

Severless Apps w/Node and Claudia.ja_p1 (Paperback): Slobodan Stojanovic, Aleksandar Simovic Severless Apps w/Node and Claudia.ja_p1 (Paperback)
Slobodan Stojanovic, Aleksandar Simovic
R1,063 Discovery Miles 10 630 Ships in 9 - 15 working days

Description A new generation of serverless tools, including Claudia.js, make it radically easier to set up serverless web applications so users can focus on what their app does instead of meddling with infrastructure configuration and deployment. Serverless Apps with Node and Claudia.js walks readers through building serverless apps on AWS using JavaScript. They'll learn to simplify the design and development process so they can focus on getting their application deployed as fast as possible without sacrificing quality. Key features * Create a serverless API using AWS Lambda and Claudia.js * Build a voice assistant with Amazon Alexa * Develop microservices with Node.js, AWS Lambda, S3, and more * Create a chatbot for multiple platforms Audience Written for beginner and intermediate web developers comfortable with JavaScript and Node.js. Some prior experience with AWS is required. About the technology Serverless computing services like AWS Lambda and API Gateway can be tedious to set up, aren't designed to work well with JavaScript and Node, and most of the quirks and gotchas aren't well documented. Claudia doesn't alter your project layout or abstract away the core AWS services; it just makes it easier to get started with them!

Evaluating Children's Interactive Products - Principles and Practices for Interaction Designers (Paperback): Panos... Evaluating Children's Interactive Products - Principles and Practices for Interaction Designers (Paperback)
Panos Markopoulos, Janet C. Read, Stuart Macfarlane, Johanna Hoysniemi
R1,180 Discovery Miles 11 800 Ships in 12 - 17 working days

Interactive products designed for children-whether toys, games, educational products, or websites-are increasingly embedded in children's lives and school experiences. Making these products safe, effective, and entertaining requires new methodologies for carrying out sound and unbiased evaluations for these users with unique requirements, environments, and ethical considerations.
This book directly addresses this need by thoroughly covering the evaluation of all types of interactive technology for children. Based on the authors' workshops, conference courses, and own design experience and research, this highly practical book reads like a handbook, while being thoroughly grounded in the latest research. Throughout, the authors illustrate techniques and principles with numerous mini case studies and highlight practical information in tips and exercises and conclude with three in-depth case studies. Essential reading for usability experts, product developers, and researchers in the field.
* Presents an essential background in child development and child psychology, particularly as they relate to technology.
* Captures best practices for observing and surveying children, training evaluators, and capturing the child user experience using audio and visual technology.
* Examines ethical and legal issues involved in working with children and offers guidelines for effective risk management.

Check Point NGX R65 Security Administration (Paperback): Ralph Bonnell Check Point NGX R65 Security Administration (Paperback)
Ralph Bonnell
R1,220 Discovery Miles 12 200 Ships in 12 - 17 working days

Check Point NGX R65 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and management solutions. It enables enterprises of all sizes to reduce the cost and complexity of security management and ensure that their security systems can be easily extended to adapt to new and emerging threats. This title is a continuation of Syngress' best-selling references on Check Point's market leading Firewall and VPN products.
* First book to market covering Check Point's new, flagship NGX R65 Firewall/VPN.
* Provides bonus coverage for Check Point's upcoming NGX R65 Certification exams.
* Companion Web site offers customized scripts for managing log files.

Tcl/Tk for Programmers - With Solved Exercises that Work with Unix & Windows (Paperback): J.A. Zimmer Tcl/Tk for Programmers - With Solved Exercises that Work with Unix & Windows (Paperback)
J.A. Zimmer
R2,641 Discovery Miles 26 410 Ships in 12 - 17 working days

This introduction to Tcl/Tk bridges the gaps between introductions, comprehensive manuals, and collections of scripts that solve particular problems. There are over 200 exercises with solutions for both Unix and Windows platforms.
Tcl/Tk for Programmers introduces high-level Tcl/Tk scripting language to experienced programmers with either Unix or Windows backgrounds. It includes a short introduction to TCP/IP, introductions on writing client-side scripts and GUI interfaces as well as integrating scripts with C/C++. In addition to covering version 8.0/8.0, the book describes the major differences between version 8.0/8.0, 7.6/4.2, and the experimental alpha version 8.1/8.1. Zimmer has extensive knowledge of Tcl/Tk programming and currently runs a consulting and training company based on his experience.

Microsoft Vista for IT Security Professionals (Paperback): Anthony Piltzecker Microsoft Vista for IT Security Professionals (Paperback)
Anthony Piltzecker
R1,011 R916 Discovery Miles 9 160 Save R95 (9%) Ships in 12 - 17 working days

This book is designed for the professional system administrators who need to securely deploy Microsoft Vista in their networks. Readers will not only learn about the new security features of Vista, but they will learn how to safely integrate Vista with their existing wired and wireless network infrastructure and safely deploy with their existing applications and databases. The book begins with a discussion of Microsoft's Trustworthy Computing Initiative and Vista's development cycle, which was like none other in Microsoft's history. Expert authors will separate the hype from the reality of Vista s preparedness to withstand the 24 x 7 attacks it will face from malicious attackers as the world s #1 desktop operating system. The book has a companion CD which contains hundreds of working scripts and utilities to help administrators secure their environments.
. Microsoft Windows operating systems run more than 90% of the desktop PCs in the world and Vista is the first major Windows release in more than 5 years
. This is currently the only book on Windows Vista Security
. The companion CD contains hundreds of working scripts and utilities to help administrators secure their environments."

Structural Information and Communication Complexity - 29th International Colloquium, SIROCCO 2022, Paderborn, Germany, June... Structural Information and Communication Complexity - 29th International Colloquium, SIROCCO 2022, Paderborn, Germany, June 27-29, 2022, Proceedings (Paperback, 1st ed. 2022)
Merav Parter
R2,194 Discovery Miles 21 940 Ships in 10 - 15 working days

This book constitutes the refereed conference proceedings of the 29th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2022, held in Paderborn, Germany, in June 2022. The 16 full papers presented in this book were carefully reviewed and selected from 30 submissions. SIROCCO is devoted to the study of the interplay between structural knowledge, communication, and computing in decentralized systems of multiple communicating entities. Special emphasis is given to innovative approaches leading to better understanding of the relationship between computing and communication.

The Best Damn Exchange, SQL and IIS Book Period (Paperback): Henrik Walther, Mark Horninger, Chris Adams The Best Damn Exchange, SQL and IIS Book Period (Paperback)
Henrik Walther, Mark Horninger, Chris Adams
R1,224 Discovery Miles 12 240 Ships in 12 - 17 working days

Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support "anywhere access" present IT professionals with a steep learning curve. Making certain that these products are configured to meet regulatory compliance requirements adds addtionaly complexity to day-to-day management network management.
The Best Damn Exchange, SQL and IIS Book Period delivers an all-in-one reference for Windows System Administrators deploying the 2007 releases of these core Microsoft servers. The coverage is comprehensive, and provides users with just about everything they need to manage a Windows enterprise server. Special Bonus coverage includes how to gather and analyze the many log files generated by these servers.
Key Features:
* All-in-one coverage includes Exchange, SQL, and IIS Servers
* Integrated coverage on all key security features
* Bonus coverage includes analyzing server logs and integrating Communicator 2007

C & Unix - Tools for Software Design (WSE) (Paperback): M.L. Barrett C & Unix - Tools for Software Design (WSE) (Paperback)
M.L. Barrett
R4,287 Discovery Miles 42 870 Ships in 12 - 17 working days

Martin L. Barrett and Clifford Wagner combine the efficiency of C with the productivity of UNIX, and give you the foundation to build stronger programming skills! This clear, concise book is written for experienced programmers, as well as those with a background in mathematics, engineering, and science. Five principles guide you through a complete course in programming: . Emphasis on software design via program and data structure design, the design of tables, data encapsulation, and the use of abstract data types solidifies all aspects of the design process. The development of C and UNIX simultaneously, yet independently of one another, allows you to develop skills in both languages, or focus on them individually. Chapter summaries, review problems, and numerous practical programming problems enable you to tie several different concepts together in a coherent scheme. Extensive examples covering scientific problems, applied mathematics, and floating point arithmetic broaden the spectrum of computer science and programming. Problems feature the ideal gas law, the accuracy of summations, root finding, the future value of an annuity, simulation, time series smoothing, image processing, integrals, descriptive statistics, fuzzy sets, and sparse arrays. A focus on basic principles gives you the groundwork for understanding data structures, analysis of algorithms, numerical analysis, computer graphics, and compiler design.

Keeping Found Things Found: The Study and Practice of Personal Information Management (Paperback): William Jones Keeping Found Things Found: The Study and Practice of Personal Information Management (Paperback)
William Jones
R1,362 Discovery Miles 13 620 Ships in 12 - 17 working days

WE ARE ADRIFT IN A SEA OF INFORMATION. We need information to make good decisions, to get things done, to learn, and to gain better mastery of the world around us. But we do not always have good control of our information - not even in the "home waters" of an office or on the hard drive of a computer. Instead, information may be controlling us - keeping us from doing the things we need to do, getting us to waste money and precious time. The growth of available information, plus the technologies for its creation, storage, retrieval, distribution and use, is astonishing and sometimes bewildering. Can there be a similar growth in our understanding for how best to manage information and informational tools?
This book provides a comprehensive overview of personal information management (PIM) as both a study and a practice of the activities people do and need to be doing so that information can work for them in their daily lives.
Introductory chapters of "Keeping Found Things Found: The Study and Practice of Personal Information Management" provide an overview of PIM and a sense for its many facets. The next chapters look more closely at the essential challenges of PIM, including finding, keeping, organizing, maintaining, managing privacy, and managing information flow. The book also contains chapters on search, email, mobile PIM, web-based support, and other technologies relevant to PIM.
*For more information and author blog visit http: //www.keepingthingsfound.com/.
* Focuses exclusively on one of the most interesting and challenging problems in today's world
* Explores what good and better PIM looks like, and how to measure improvements
* Presents key questions to consider when evaluating any new PIM informational tools or systems

VMware vSphere Design 2nd Edition (Paperback, 2nd Edition): F Guthrie VMware vSphere Design 2nd Edition (Paperback, 2nd Edition)
F Guthrie
R1,142 R865 Discovery Miles 8 650 Save R277 (24%) Ships in 12 - 17 working days

Achieve the performance, scalability, and ROI your business needs

What can you do at the start of a virtualization deployment to make things run more smoothly? If you plan, deploy, maintain, and optimize vSphere solutions in your company, this unique book provides keen insight and solutions. From hardware selection, network layout, and security considerations to storage and hypervisors, this book explains the design decisions you'll face and how to make the right choices.

Written by two virtualization experts and packed with real-world strategies and examples, "VMware vSphere Design, Second Edition" will help you design smart design decisions.Shows IT administrators how plan, deploy, maintain, and optimize vSphere virtualization solutions Explains the design decisions typically encountered at every step in the process and how to make the right choices Covers server hardware selection, network topology, security, storage, virtual machine design, and more Topics include ESXi hypervisors deployment, vSwitches versus dvSwitches, and FC, FCoE, iSCSI, or NFS storage

Find out the "why" behind virtualization design decisions and make better choices, with "VMware vSphere Design, Second Edition," which has been fully updated for vSphere 5.x.

Basiswissen Soa - Bi - Crm - Ecm (German, Hardcover): Tredition Basiswissen Soa - Bi - Crm - Ecm (German, Hardcover)
Tredition
R1,488 Discovery Miles 14 880 Ships in 12 - 17 working days

Dieses Buch erlautert, was hinter den aktuellen Buzzwords aus der Business-IT wirklich steckt. Dabei konzentriert es sich auf die vier wichtigen Kernthemen SOA (Service Orientierte Architekturen), BI (Business Intelligence), CRM (Customer Relationship Management) und ECM (Enterprise Content Management). Sie erfahren, welche Ziele mit diesen Technologien erreicht werden sollen, welche Komponenten daran beteiligt sind, welche Produkte der Markt anbietet und worauf Sie bei einer Einfuhrung unbedingt achten sollten. Dabei richtet sich das Buch an technisch orientierte Leser, die diese Themen von der IT-Seite her angehen. Nach einer kurzen Einfuhrung folgen die technischen Grundlagen und dazu passende praxisrelevante Beispiele. So werden etwa Datamining-Verfahren fur Business Intelligence erlautert, die mehr liefern als die banale Aussage Wer Bier kauft, kauft auch Chips." Zudem bietet dieses Buch auch einen Uberblick uber die wichtigsten Hersteller und Losungsanbieter in den jeweiligen Produktkategorien. Entscheidungshilfen und konkrete, praxisbezogenen Produktempfehlungen runden die jeweiligen Schwerpunktthemen ab.

The Colorful Guide to MacOS Monterey - A Guide to the 2021 MacOS Monterey Update (Version 12) with Full Color Graphics and... The Colorful Guide to MacOS Monterey - A Guide to the 2021 MacOS Monterey Update (Version 12) with Full Color Graphics and Illustrations (Paperback)
Scott La Counte
R551 Discovery Miles 5 510 Ships in 10 - 15 working days
Microsoft Azure Sentinel - Planning and implementing Microsoft's cloud-native SIEM solution (Paperback, 2nd edition): Yuri... Microsoft Azure Sentinel - Planning and implementing Microsoft's cloud-native SIEM solution (Paperback, 2nd edition)
Yuri Diogenes, Nicholas DiCola, Tiander Turpijn
R880 R781 Discovery Miles 7 810 Save R99 (11%) Ships in 9 - 15 working days

Build next-generation security operations with Microsoft Sentinel Microsoft Sentinel is the scalable, cloud-native, security information and event management (SIEM) solution for automating and streamlining threat identification and response across your enterprise. Now, three leading experts guide you step-by-step through planning, deployment, and operations, helping you use Microsoft Sentinel to escape the complexity and scalability challenges of traditional solutions. Fully updated for the latest enhancements, this edition introduces new use cases for investigation, hunting, automation, and orchestration across your enterprise and all your clouds. The authors clearly introduce each service, concisely explain all new concepts, and present proven best practices for maximizing Microsoft Sentinel's value throughout security operations. Three of Microsoft's leading security operations experts show how to: Review emerging challenges that make better cyberdefense an urgent priority See how Microsoft Sentinel responds by unifying alert detection, threat visibility, proactive hunting, and threat response Explore components, architecture, design, and initial configuration Ingest alerts and raw logs from all sources you need to monitor Define and validate rules that prevent alert fatigue Use threat intelligence, machine learning, and automation to triage issues and focus on high-value tasks Add context with User and Entity Behavior Analytics (UEBA) and Watchlists Hunt sophisticated new threats to disrupt cyber kill chains before you're exploited Enrich incident management and threat hunting with Jupyter notebooks Use Playbooks to automate more incident handling and investigation tasks Create visualizations to spot trends, clarify relationships, and speed decisions Simplify integration with point-and-click data connectors that provide normalization, detection rules, queries, and Workbooks About This Book For cybersecurity analysts, security administrators, threat hunters, support professionals, engineers, and other IT professionals concerned with security operations For both Microsoft Azure and non-Azure users at all levels of experience

Applied Cryptography  and Network Security - 20th International Conference, ACNS 2022, Rome, Italy, June 20-23, 2022,... Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Rome, Italy, June 20-23, 2022, Proceedings (Paperback, 1st ed. 2022)
Giuseppe Ateniese, Daniele Venturi
R3,694 Discovery Miles 36 940 Ships in 10 - 15 working days

The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022. The 44 full papers together with 5 short papers presented in this proceeding were carefully reviewed and selected from a total of 185 submissions. They were organized in topical sections as follows: Encryption, Attacks, Cryptographic Protocols, System Security., Cryptographic Primitives, MPC, Blockchain, Block-Cyphers, and Post-Quantum Cryptography.

OS X for Hackers at Heart (Paperback): Bruce Potter, Chris Hurley, Johnny Long, Tom Owad, Russ Rogers OS X for Hackers at Heart (Paperback)
Bruce Potter, Chris Hurley, Johnny Long, Tom Owad, Russ Rogers
R1,011 Discovery Miles 10 110 Ships in 12 - 17 working days

The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hacker s eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the world s foremost true hackers unleash the power of OS X for everything form cutting edge research and development to just plain old fun.
OS X 10.4 Tiger is a major upgrade for Mac OS X for running Apple s Macintosh computers and laptops. This book is not a reference to every feature and menu item for OS X. Rather, it teaches hackers of all types from software developers to security professionals to hobbyists, how to use the most powerful (and often obscure) features of OS X for wireless networking, WarDriving, software development, penetration testing, scripting administrative tasks, and much more.
* Analyst reports indicate that OS X sales will double in 2005. OS X Tiger is currently the #1 selling software product on Amazon and the 12-inch PowerBook is the #1 selling laptop
* Only book on the market directly appealing to groundswell of hackers migrating to OS X
* Each chapter written by hacker most commonly associated with that topic, such as Chris Hurley (Roamer) organizer of the World Wide War Drive"

Practical Forensic Analysis of Artifacts on iOS and Android Devices - Investigating Complex Mobile Devices (Paperback, 1st... Practical Forensic Analysis of Artifacts on iOS and Android Devices - Investigating Complex Mobile Devices (Paperback, 1st ed.)
Mohammed Moreb
R1,584 R1,263 Discovery Miles 12 630 Save R321 (20%) Ships in 10 - 15 working days

Leverage foundational concepts and practical skills in mobile device forensics to perform forensically sound criminal investigations involving the most complex mobile devices currently available on the market. Using modern tools and techniques, this book shows you how to conduct a structured investigation process to determine the nature of the crime and to produce results that are useful in criminal proceedings. You'll walkthrough the various phases of the mobile forensics process for both Android and iOS-based devices, including forensically extracting, collecting, and analyzing data and producing and disseminating reports. Practical cases and labs involving specialized hardware and software illustrate practical application and performance of data acquisition (including deleted data) and the analysis of extracted information. You'll also gain an advanced understanding of computer forensics, focusing on mobile devices and other devices not classifiable as laptops, desktops, or servers. This book is your pathway to developing the critical thinking, analytical reasoning, and technical writing skills necessary to effectively work in a junior-level digital forensic or cybersecurity analyst role. What You'll Learn Acquire and investigate data from mobile devices using forensically sound, industry-standard tools Understand the relationship between mobile and desktop devices in criminal and corporate investigations Analyze backup files and artifacts for forensic evidence Who This Book Is For Forensic examiners with little or basic experience in mobile forensics or open source solutions for mobile forensics. The book will also be useful to anyone seeking a deeper understanding of mobile internals.

Linux in a Windows World (Paperback): Roderick W Smith Linux in a Windows World (Paperback)
Roderick W Smith
R1,075 R758 Discovery Miles 7 580 Save R317 (29%) Out of stock

It began simply enough. A young Finnish student at the University of Helsinki named Linus Torvalds decided to develop his own computer operating system merely as a hobby. More than a decade later, this same operating system has caused nothing short of a revolution in the world of computers. Now known as Linux, Torvalds' creation was largely dismissed in the 1990s by tech pundits who claimed that it was unsuitable for the general public's computing needs. If they only knew how wrong they were! After a series of tweaks from excited developers around the world, Linux's unparalleled functionality and adaptability have now made it the main alternative to Unix and Microsoft Windows operating systems. And with good reason. System administrators realize that this robust alternative can greatly improve their operating system's reliability - and save them money, too. Linux systems are even less vulnerable to attacks by computer viruses and worms. Not surprisingly, businesses, government agencies, schools, and a wealth of other institutions are all looking to Linux to replace the Windows desktop for these same benefits. Linux in a Windows World takes an in-depth look at exactly how Linux can be brought into an organization that's currently based on Microsoft Windows systems. Featuring a litany of insider tips and techniques, Linux in a Windows World dispenses all the practical advice you need to migrate to this revolutionary open source software. Author Roderick W. Smith, himself a renowned system administrator and Linux convert, understands that the skills required to install, deploy, and maintain Linux are not easy to find. That's why he has tapped the absolute best source of information available: the Linux server experts who have made it their life's work to build and manage the Linux system. The latest in O'Reilly's line of bestselling Linux titles, Linux in a Windows World is an invaluable companion for any system administrator interested in integrating Linux into their Windows environment.

Linux Kernel Programming - - A practical guide to kernel internals, writing kernel modules, and synchronization (Paperback, 2nd... Linux Kernel Programming - - A practical guide to kernel internals, writing kernel modules, and synchronization (Paperback, 2nd Revised edition)
Kaiwan Billimoria
R1,166 Discovery Miles 11 660 Ships in 10 - 15 working days

Gain a firm practical understanding of the fundamentals of Linux kernel internals, learn to write high-quality kernel module code, and kernel synchronization Key Features * Discover how to write Linux kernel and module code for real-world products * Implement industry-grade techniques in real-world scenarios for fast, efficient memory allocation and data synchronization * Understand and exploit kernel architecture, CPU scheduling, and kernel synchronization techniques Book Description The 2nd Edition of Linux Kernel Programming is an updated, comprehensive introduction for new programmers to the Linux kernel. This book uses the recent 5.10 Long-Term Support (LTS) Linux kernel series, which will be maintained until 2026, showing 5.X/6.X new features. In this new edition, you'll start the journey by learning how to build the kernel from source, including doing a kernel build for the popular Raspberry Pi. You'll then learn, step by step, how to write your first kernel module by leveraging the kernel's powerful Loadable Kernel Module (LKM) framework. You'll then get to delve into key kernel internals topics including Linux kernel architecture, memory management, and CPU scheduling. You'll understand the deep issues of concurrency, and gain insight into how they can be addressed with various locking technologies (mutexes, spinlocks, atomic / refcount operators and even lock-free technologies). By the end of this 2nd Edition book, you'll have a better understanding of the fundamentals of writing Linux kernel and kernel module code that can be used in real-world projects and products. What you will learn * Configure and build the 5.10 / 6.x kernels from source * Write high-quality modular kernel code (LKM framework) for 5.10 / 6.x kernels * Explore the Linux kernel architecture * Get to grips with key internals details regarding memory management within the kernel * Understand and work with various dynamic kernel memory alloc/dealloc APIs * Discover key internals aspects regarding CPU scheduling within the kernel * Gain a deeper understanding of kernel concurrency issues * Learn how to work with key kernel synchronization primitives Who This Book Is For This book is for beginner Linux programmers and developers looking to get started with Linux kernel, providing a knowledge base to understand required kernel internal topics and overcome frequent and common development issues. A basic understanding of Linux CLI and C programming is assumed

VMware vSphere For Dummies (Paperback): D Mitchell VMware vSphere For Dummies (Paperback)
D Mitchell
R858 R680 Discovery Miles 6 800 Save R178 (21%) Ships in 12 - 17 working days

A plain-English guide to the market-leading virtualization and cloud computing technology

With virtualization, a single server can host dozens or hundreds of virtual machines running a variety of operating systems, and even hook them together in a virtual network or cloud infrastructure. This practical guide shows you how to create a virtual system using the VMware VSphere environment. You'll find all the information you need to understand, design, and deploy one--without getting overwhelmed with technical detail. And once you're up and running, this book is the perfect reference for maintenance and troubleshooting issues.Introduces you to virtualization and VMware's virtualization/cloud computing technology, the most recent version is VMware vSphere Shows you how to design a vSphere environmentCovers installation, deployment, management, maintenance, and troubleshootingProvides what IT managers and system administrators need to roll out their first virtualized or cloud infrastructure, or to get up to speed on VMware's technology

Get up and running on the cloud with "VMware vSphere For Dummies"

Creating Apps with React Native - Deliver Cross-Platform 0 Crash, 5 Star Apps (Paperback, 1st ed.): M. Holmes He Creating Apps with React Native - Deliver Cross-Platform 0 Crash, 5 Star Apps (Paperback, 1st ed.)
M. Holmes He
R1,556 R1,235 Discovery Miles 12 350 Save R321 (21%) Ships in 10 - 15 working days

Produce high-quality, cross-platform apps with user experiences almost identical to pure native apps. When evaluating cross-platform frameworks, developers make an assumption that quality will be compromised. But that doesn't have to be true. The principles in this book will show you how to meet quality expectations both from engineering and consumer standpoints. You'll also realize the ideal of a greater front end. That means your whole front-end team, including app side and web side, will be optimized. The shared knowledge base as well as mobilization potential give more flexibility and strength in all front-end facets without the need of increasing team sizes. The market has seen a large amount of high quality React Native apps and successful stories about them. Nevertheless, under optimized apps and unsuccessful stories shadow. The fundamental difference between the two opposing groups is understanding. Discover the critical points in the React and React Native architecture, and develop general best practices that can lead to consistently developing 0 crash, 5 star apps based on an understanding of fundamentals. What You'll Learn Measure and define successful app design Create animation based on user need Reduce performance bottleneck throughout your apps Who This Book Is For Mobile developers who want to expand their front end skill set, and web developers who want to enter mobile development.

High Performance Computing - 8th Latin American Conference, CARLA 2021, Guadalajara, Mexico, October 6-8, 2021, Revised... High Performance Computing - 8th Latin American Conference, CARLA 2021, Guadalajara, Mexico, October 6-8, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Isidoro Gitler, Carlos Jaime Barrios Hernandez, Esteban Meneses
R2,185 Discovery Miles 21 850 Ships in 10 - 15 working days

This book constitutes revised selected papers of the 8th Latin American High Performance Computing Conference, CARLA 2021, held in Guadalajara, Mexico, in October 2021. Due to the COVID-19 pandemic the conference was held in a virtual mode. The 16 revised full papers and 2 short papers presented were carefully reviewed and selected out of 45 submissions. The papers included in this book are organized according to the topics on high performance computing; high performance computing and artificial intelligence; high performance computing applications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Vincent Van Duysen Works 2009-2018
Helene Binet Hardcover R1,695 R1,203 Discovery Miles 12 030
Listening to Stone - The Art and Life of…
Hayden Herrera Paperback R658 R556 Discovery Miles 5 560
Readings from the Architecture of Louis…
Jeffry Kieffer Hardcover R807 Discovery Miles 8 070
Light Space Life - Houses By SAOTA
Reni Folawiyo Hardcover  (1)
R1,195 Discovery Miles 11 950
Three Dialogues Between Hylas and…
George Berkeley Paperback R391 Discovery Miles 3 910
Haworth Tompkins
Paperback R1,206 Discovery Miles 12 060
The Works of George Berkeley
George Berkeley Paperback R631 Discovery Miles 6 310
The Short Works of John Habraken - Ways…
Stephen H. Kendall, John R. Dale Hardcover R2,314 Discovery Miles 23 140
The True Intellectual System of the…
Ralph Cudworth Paperback R778 Discovery Miles 7 780
The Communist Manifesto
Karl Marx, Friedrich Engels Hardcover R591 Discovery Miles 5 910

 

Partners