![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
This book constitutes the refereed proceedings of the 23rd International Conference on Analytical and Stochastic Modelling Techniques and Applications, ASMTA 2016, held in Cardiff, UK, in August 2016. The 21 full papers presented in this book were carefully reviewed and selected from 30 submissions. The papers discuss the latest developments in analytical, numerical and simulation algorithms for stochastic systems, including Markov processes, queueing networks, stochastic Petri nets, process algebras, game theory, etc.
This book constitutes the refereed proceedings of the 9th International Symposium on Search-Based Software Engineering, SSBSE 2017, held in Paderborn, Germany, in September 2017. The 7 full papers and 5 short papers presented together with 4 challenge track and 2 students student track papers were carefully reviewed and selected from 26 submissions. SSBSE welcomes not only applications from throughout the software engineering lifecycle but also a broad range of search methods ranging from exact Operational Research techniques to nature-inspired algorithms and simulated annealing.
Get introduced to the world of artificial intelligence with this accessible and practical guide. Build applications that make intelligent use of language and user interaction to better compete in today's marketplace. Discover how your application can deeply understand and interpret content on the web or a user's machine, intelligently react to direct user interaction through speech or text, or make smart recommendations on products or services that are tailored to each individual user. With Microsoft Cognitive Services, you can do all this and more utilizing a set of easy-to-use APIs that can be consumed on the desktop, web, or mobile devices. Developers normally think of AI implementation as a tough task involving writing complex algorithms. This book aims to remove the anxiety by creating a cognitive application with a few lines of code. There is a wide range of Cognitive Services APIs available. This book focuses on some of the most useful and powerful ways that your application can make intelligent use of language. Artificial Intelligence for .NET: Speech, Language, and Search will show you how you can start building amazing capabilities into your applications today. What You'll Learn Understand the underpinnings of artificial intelligence through practical examples and scenarios Get started building an AI-based application in Visual Studio Build a text-based conversational interface for direct user interaction Use the Cognitive Services Speech API to recognize and interpret speech Look at different models of language, including natural language processing, and how to apply them in your Visual Studio application Reuse Bing search capabilities to better understand a user's intention Work with recommendation engines and integrate them into your apps Who This Book Is For Developers working on a range of platforms, from .NET and Windows to mobile devices. Examples are given in C#. No prior experience with AI techniques or theory is required.
This book constitutes the refereed proceedings of the 20th International Conference on Theory and Applications of Satisfiability Testing, SAT 2017, held in Melbourne, Australia, in August/September 2017. The 22 revised full papers, 5 short papers, and 3 tool papers were carefully reviewed and selected from 64 submissions. The papers are organized in the following topical sections: algorithms, complexity, and lower bounds; clause learning and symmetry handling; maximum satisfiability and minimal correction sets; parallel SAT solving; quantified Boolean formulas; satisfiability modulo theories; and SAT encodings.
This book constitutes the refereed proceedings of the 9th International Symposium on Engineering Secure Software and Systems, ESSoS 2017, held in Bonn, Germany in July 2017. The 12 full papers presented together with 3 short papers were carefully reviewed and selected from 32 submissions. The goal of this symposium is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering.
This book constitutes the refereed proceedings of the 10th International Conference on Model Transformation, ICMT 2017, held as part of STAF 2017, in Marburg, Germany, in July 2017. The 9 full papers and 2 short papers were carefully reviewed and selected from 31 submissions. The papers are organized in the following topical sections: transformation paradigms, languages, algorithms and strategies; development of transformations; and applications and case studies.
This book constitutes the refereed proceedings of the 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2017, held in Bonn, Germany, in July 2017. The 18 revised full papers included in this book were carefully reviewed and selected from 67 submissions. They present topics such as enclaves and isolation; malware analysis; cyber-physical systems; detection and protection; code analysis; and web security.
This book constitutes the refereed proceedings of the 22nd Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2017, held in Vienna, Austria, in June 2017. The revised 15 full papers presented were carefully reviewed and selected from 37 submissions. They are organized in topical sections on runtimes, safety and security, timing verification, programming models, the future of safety-minded languages, mixed criticality.
Learn the fundamental elements of the new Swift 3 programming language as applied to game development for new iOS 10. In Part 1 of this book, you'll start with a basic 2D game idea and build the game throughout the book introducing each SpriteKit topic as you add new functionality to the game. By the end of the book, you'll have experience with all the important SpriteKit topics and have a fully functional game as a result. In Part 2, you'll learn 3D game development using Apple's SceneKit framework and the Swift programming language, following the same pattern used for Part 1. Game apps are one of the most popular categories in the Apple iTunes App Store. In response, James Goodwill and Wesley Matlock bring you Beginning Swift Games Development for iOS, Third Edition an update to their best-selling work. After reading and using this book, you'll have the skills and the code to build your first 2D and then 3D game app that you can run on any iOS-enabled device. What you'll learn Discover what's in the new Swift 3 programming language Apply Swift 3 to iOS 10 and 9 game development Build a 2D game app using SpriteKit and Swift Build a 3D game from 2D using SceneKit and Swift Who this book is for iOS app developers new to Swift or for those thinking of trying iOS game app development for the very first time.
Graphite has become one of the most powerful monitoring tools available today, due to its ease of use, rapid graph prototyping abilities, and a friendly rendering API. With this practical guide, system administrators and engineers will learn how to use this open source tool to track operational data you need to monitor your systems, as well as application-level metrics for profiling your services. Author Jason Dixon, member of the Graphite project, provides a thorough introduction of Graphite from the basics to the skills and tools you need for troubleshooting and scaling out its software components. If you want to learn more about monitoring systems, services, or applications, this is the book you need. Get an introduction to monitoring, including important concepts and terminology Examine the features and functionality of key Graphite components, including Carbon and Whisper Learn the typical user workflow necessary to create a basic line chart Build complex charts with chained functions and multiple axes that interact directly with the rendering API Understand how to use the native Graphite dashboard, as well as the more popular third-party dashboards Master the art of scaling and troubleshooting high-performance or highly available Graphite clusters
Enterprise Mac Security is a definitive, expert-driven update of the popular, slash-dotted first edition which was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing systems, including the new 10.11 operating system. A common misconception in the Mac community is that Mac's operating system is more secure than others. While this might be have been true in certain cases, security on the Mac has always still been a crucial issue. With the release of OS X 10.11, the operating system is taking large strides in getting even more secure. Even still, when sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats, whether these have been exploited or not. This book caters to both the beginning home user and the seasoned security professional not accustomed to the Mac, establishing best practices for Mac OS X for a wide audience. The authors of this book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DEFCON and Black Hat on OS X security. What You Will Learn The newest security techniques on Mac OS X from the best and brightest Security details of Mac OS X for the desktop and server, and how to secure these systems The details of Mac forensics and Mac hacking How to tackle Apple wireless security Who This Book Is For This book is for new users, switchers, power users, and administrators that need to make sure their Mac systems are secure.
Implement a SOHO or SMB Linux infrastructure to expand your business and associated IT capabilities. Backed by the expertise and experienced guidance of the authors, this book provides everything you need to move your business forward. Pro Linux System Administration makes it easy for small- to medium-sized businesses to enter the world of zero-cost software running on Linux and covers all the distros you might want to use, including Red Hat, Ubuntu, Debian, and CentOS. Pro Linux System Administration takes a layered, component-based approach to open source business systems, while training system administrators as the builders of business infrastructure. Completely updated for this second edition, Dennis Matotek takes you through an infrastructure-as-code approach, seamlessly taking you through steps along the journey of Linux administration with all you need to master complex systems. This edition now includes Jenkins, Ansible, Logstash and more. What You'll Learn: Understand Linux architecture Build, back up, and recover Linux servers Create basic networks and network services with Linux Build and implement Linux infrastructure and services including mail, web, databases, and file and print Implement Linux security Resolve Linux performance and capacity planning issues Who This Book Is For: Small to medium-sized business owners looking to run their own IT, system administrators considering migrating to Linux, and IT systems integrators looking for an extensible Linux infrastructure management approach.
This book constitutes the thoroughly refereed post-conference proceedings of the 28th International Workshop on Languages and Compilers for Parallel Computing, LCPC 2015, held in Raleigh, NC, USA, in September 2015. The 19 revised full papers were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on programming models, optimizing framework, parallelizing compiler, communication and locality, parallel applications and data structures, and correctness and reliability.
Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The revised full papers focus on the theory, technologies and applications of trusted systems and cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;}
This book constitutes the thoroughly refereed post-conference proceedings of the 29th International Workshop on Languages and Compilers for Parallel Computing, LCPC 2016, held in Rochester, NY, USA, in September 2016. The 20 revised full papers presented together with 4 short papers were carefully reviewed. The papers are organized in topical sections on large scale parallelism, resilience and persistence, compiler analysis and optimization, dynamic computation and languages, GPUs and private memory, and runt-time and performance analysis.
Learning PowerShell is a custom-built, handcrafted, painstakingly curated book designed to get you from total PowerShell newbie to confident PowerShell user in as little as four weeks. This book assumes no prior knowledge, perfect for non-developers and GUI addicts who recognize that PowerShell is the future but need a good bit of handholding to achieve mastery. It is also a simple guide for the hundreds of thousands of PowerShell users who have not attained the level of PowerShell knowledge that they really need. With Learning PowerShell at your side, you will see that you don't have to be a developer to use PowerShell and you don't need to be a scripting wizard to derive value from integrating PowerShell into your daily administrative activities. The book is a learning resource that covers every topic worth discussing for a PowerShell beginner, with a depth of explanation unparalleled by any book currently on the market. With this book, you don't have to have a lot of time to learn the language and you can begin applying what you master almost immediately. Even skeptics of PowerShell, and command lines in general, will come away with a renewed sense of respect for the language and ideas on how to put it to use.
Understand and solve many different kinds of iPhone and iPad problems. This book covers both general troubleshooting techniques applicable in a wide variety of situations as well as specific fixes for topics such as networking, apps, photos, the battery, and syncing. Glitches, hiccups, and crashes just aren't supposed to happen with iOS, but alas, all too often they do. It is these non-obvious fixes, workarounds, and preventative measures that form the core of iOS Troubleshooting. With clear, straightforward prose, this book will take the reader through hundreds of iOS problems, explain the reasons for them, and provide easy to understand solutions to get the device (and you) back in business. What you'll learn: Fix cellular and networking connections Incorporate accessories effectively Solve battery and charging issues Clear up syncing and iCloud glitches Who this book is for:Any person who uses an iOS device.
Learn to set up the latest CentOS Linux network services including DNS, DHCP, SSH and VNC, Web, FTP, Mail, Firewall, and LDAP, enabling you to provide these services on your own network. CentOS continues to be a popular Linux distribution choice, and setting up your own services is a key skill for anyone maintaining a CentOS network. You will learn how to install CentOS, and manage basic administration. You'll then move onto understanding networking, and how to set up your required services. Each chapter is written in an easy-to-digest format and teaches you how set up, manage, and troubleshoot each service. You'll be running your own network in no time at all. What You Will Learn Install and set up the latest version of CentOS Configure and manage a wide range of network services Solve problems remotely and manage your network efficiently Who This Book Is For Anyone who wants to learn how to set up and manage CentOS Linux network services. Some previous Linux experience is beneficial, but this book is designed to be used by beginners.
Die ausfuhrliche Erklarung aller Funktionen, die dem Benutzer im TSO und seinem Umfeld zur Verfugung stehen, unter Berucksichtigung der ganzen Vielfalt der Datenverarbeitung, der Datenverwaltung und des Datenschutzes."
This book is your complete guide to studying for the Linux Professional Institute's Server Professional (LPIC-1) certification. Every concept, principle, process, and resource that might make an appearance on the exam is fully represented. You will understand every concept by rolling up your sleeves, opening up a terminal, and trying it all yourself. You will find suggestions for practical tasks along with "test-yourself" quizzes at the end of each chapter. Whether you've decided to earn the Linux Professional Institute's Server Professional certification or you simply want to learn more about Linux administration, this book is a great choice. Right now, Linux administration skills are opening doors to some of the hottest job markets. And with the ongoing explosive growth of the cloud computing world - the vast majority of which is being built with Linux - the scope of the opportunities will only increase. Whether or not you end up taking the exam, if you manage to learn this material, you'll have done yourself a real favor. What You Will Learn Basic Linux system administration and package management Device and desktop management Bash scripting Networking fundamentals Security administration Who This Book Is For Most potential readers will already have a decent idea of what Linux is and what kinds of things can be done with it, and are looking to acquire or formalize a more structured and complete ability to confidently administrate Linux systems.
This book provides an overview of modern boot firmware, including the Unified Extensible Firmware Interface (UEFI) and its associated EFI Developer Kit II (EDKII) firmware. The authors have each made significant contributions to developments in these areas. The reader will learn to use the latest developments in UEFI on modern hardware, including open source firmware and open hardware designs. The book begins with an exploration of interfaces exposed to higher-level software and operating systems, and commences to the left of the boot timeline, describing the flow of typical systems, beginning with the machine restart event. Software engineers working with UEFI will benefit greatly from this book, while specific sections of the book address topics relevant for a general audience: system architects, pre-operating-system application developers, operating system vendors (loader, kernel), independent hardware vendors (such as for plug-in adapters), and developers of end-user applications. As a secondary audience, project technical leaders or managers may be interested in this book to get a feel for what their engineers are doing. The reader will find: An overview of UEFI and underlying Platform Initialization (PI) specifications How to create UEFI applications and drivers Workflow to design the firmware solution for a modern platform Advanced usages of UEFI firmware for security and manageability
Learn the HomeKit platform structure and how it supports devices-existing and planned-and get a thorough grounding on new and useful apps that deliver a new generation of home automation in a secure and innovative environment. Let your imagination run wild as you design compatible devices with unlimited capabilities. Learn Apple HomeKit on iOS shows you how to move to secure, home automation projects that integrate with your digital world automatically-after you set them up as described in the book. Having your calendar and appointments control your lights, locks, thermostat, and other home devices is the heart of home automation. In homes and small offices, you can banish notes taped to switches and controls that say, "Do not turn off this switch" or "Leave the thermostat alone." The book gets you up to speed on HomeKit, and it also answers some of the pesky questions, such as "What happens when the power goes out?" Along the way there are tips and suggestions for app developers, hardware manufacturers, interior designers, and real estate professionals. For programmers, there's an entire chapter (plus sections in other chapters) dedicated to the core coding issues. For non-programmers, this book is the perfect resource mastering the amazing potential of Apple HomeKit. What You Will Learn: For device developers, understanding the structure of HomeKit-homes, rooms, and accessories-enables you to build devices that are easily managed by a single, simple source and interface. For DIY home networking users, gain a thorough knowledge of how they can adapt HomeKit to their existing spaces. For programmers, there's an entire chapter plus sections in other chapters dedicated to the core coding issues you'll need to learn. For non-programmers, this book is your perfect resource for easily getting your mind around the amazing potential of Apple HomeKit. Author Jesse Feiler develops, consults, and writes about Apple technologies with an emphasis on mobile and location-based apps. Who This Book Is For: Device developers, DIY home networking users, programmers, and those interested in integrating their iOS devices with their IoT devices.
The LNCS Transactions on Modularity and Composition are devoted to all aspects of software modularity and composition methods, tools, and techniques, covering requirement analysis, design, implementation, maintenance, and evolution. The focus of the journal also includes modelling techniques, new paradigms and languages, development tools, measurement, novel verification and testing approaches, theoretical foundations, and understanding interactions between modularity and composition. This, the first issue of the Transactions on Modularity and Composition, consists of two sections. The first one, guest edited by Patrick Eugster, Mario Sudholt, and Lukasz Ziarek, is entitled "Aspects, Events, and Modularity" and includes papers focusing on context-oriented software development, specifications for even-based systems, and development of modular software. The second section, guest edited by Gary T. Leavens, contains journal versions of selected papers from Modularity 2015, which was held in March 2015, in Fort Collins, Colorado, USA. Topics covered by the papers in this section include software unbundling, layer activation in context-oriented programming, modular reasoning in event-based languages, and dynamic dispatch for method contracts using abstract predicates. The paper 'Dynamic Dispatch for Method Contracts Through Abstract Predicates' is published open access under a CC BY 4.0 license at link.springer.com.
Understand, troubleshoot and repair issues with local Windows installations, automating the OS deployment and configuring updates via WSUS and Windows Intune. When tasked with deploying Windows operating systems, there can seem to be an overwhelming amount of tools and techniques to learn to master this process. Whether you are installing a new Windows operating system locally, or looking to deploy a customized build to 1000s of devices in your network, you will need to understand how to do this successfully and reliably. This book steps up through local installations and upgrades through to Lite Touch deployments using WDS and MDT, and then to Zero Touch installations using Microsoft System Center. Management of updates to Windows is also covered, using both on-premises technologies and cloud-based services. In this book you'll learn how to decide between local installation types, perform upgrades, use automation techniques to deploy images and how to maintain Windows throughout the operational phase of the lifecycle. What You'll Learn Install Windows 7, 8.1, or 10 locally Perform upgrades locally on a Windows PC, including migrating data and user profiles Deploy operating systems using Lite Touch techniques Deploy operating systems using Zero Touch technologies Maintain on-premises and devices not connected to the company network by using WSUS and Windows Intune Who This Book Is For IT pros including IT support personnel and system administrators. This book will also be of interest to Windows experts and power users. |
You may like...
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright
Paperback
R1,491
Discovery Miles 14 910
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,018
Discovery Miles 10 180
|