![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
Building on the successful first and second volumes, this book is the third volume of the Springer book on the Robot Operating System (ROS): The Complete Reference. The Robot Operating System is evolving from year to year with a wealth of new contributed packages and enhanced capabilities. Further, the ROS is being integrated into various robots and systems and is becoming an embedded technology in emerging robotics platforms. The objective of this third volume is to provide readers with additional and comprehensive coverage of the ROS and an overview of the latest achievements, trends and packages developed with and for it. Combining tutorials, case studies, and research papers, the book consists of sixteen chapters and is divided into five parts. Part 1 presents multi-robot systems with the ROS. In Part 2, four chapters deal with the development of unmanned aerial systems and their applications. In turn, Part 3 highlights recent work related to navigation, motion planning and control. Part 4 discusses recently contributed ROS packages for security, ROS2, GPU usage, and real-time processing. Lastly, Part 5 deals with new interfaces allowing users to interact with robots. Taken together, the three volumes of this book offer a valuable reference guide for ROS users, researchers, learners and developers alike. Its breadth of coverage makes it a unique resource.
Exam 70-646, Windows Server 2008 Administrator. The newest iteration of the Microsoft Official Academic Course (MOAC) program for network administration courses using Windows Server 2008 and mapping to the Microsoft Certified Information Technology Professional (MCITP) 70-646 certification exam. The MOAC IT Professional series is the Official from Microsoft, turn-key Workforce training program that leads to professional certification and was authored for college instructors and college students. MOAC gets instructors ready to teach and students ready for work by delivering essential resources in 5 key areas: Instructor readiness, student software, student assessment, instruction resources, and learning validation. With the Microsoft Official Academic course program, you are getting instructional support from Microsoft; materials that are current, accurate, and technologically innovative to make course delivery easy. Call one of our MOAC Sales Consultants and request your sample materials today.
Learn the essentials of Networking and Embedded TCP/IP stacks. Part I of this comprehensive book provides a thorough explanation of Micri m's C/TCP-IP stack including its implementation and usage. Part II describes practical, working applications for embedded medical devices built on C/OS-III, C/TCP-IP and Freescale's TWR-K53N512 medical board (ARM Cortex -M4) using IAR developments tools. Each of the included examples feature hands-on working projects, which allow you to get your application running quickly, and can serve as a reference design to develop an embedded system connected to the Internet of Things. This book is the perfect complement to C/OS-III: The Real-Time Kernel for the ARM Cortex -M4 by Jean Labrosse (ISBN 978-0-9823375-2-3), as it uses the same medical application examples but connects them via TCP/IP. This book is written for serious embedded systems programmers, consultants, hobbyists, and students interested in understanding the inner workings of a TCP/IP stack. C/TCP-IP is more than just a great learning platform. It is a full commercial-grade software package, ready to serve as the foundation for a wide range of products. Some of the key topics covered in this book are: Ethernet technology and device drivers IP connectivity Client and Server architecture Socket programming UDP and TCP performance tuning
Prepare for Microsoft Exam AZ-801 and demonstrate your real-world mastery of configuring and managing Windows Server on-premises, hybrid, and Infrastructure as a Service (IaaS) platform workloads. Designed for professionals with Windows Server and Azure experience, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified: Windows Server Hybrid Administrator Associate level. Focus on the expertise measured by these objectives: Secure Windows Server on-premises and hybrid infrastructures Implement and manage Windows Server high availability Implement disaster recovery Migrate servers and workloads Monitor and troubleshoot Windows Server environments This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you have significant experience with Windows Server operating systems About the Exam Exam AZ-801 focuses on knowledge needed to secure Windows Server operating systems, networking, and storage; secure hybrid Active Directory infrastructures; use Azure Services to identify and remediate Windows Server security issues; implement and manage Windows Server failover clusters and Storage Spaces Direct; manage Windows Server backup and recovery; use Azure Site Recovery to implement disaster recovery; protect VMs with Hyper-V replicas; migrate on-premises storage and services; move workloads and AD DS infrastructure to Windows Server 2022 from previous versions; migrate IIS workloads to Azure; use Windows Server tools and Azure services to monitor Windows Server; troubleshoot on-premises networking, hybrid networking, virtual machines in Azure, and Active Directory. About Microsoft Certification Passing this exam and Exam AZ-800 Administering Windows Server Hybrid Core Infrastructure fulfills your requirements for the Microsoft Certified: Windows Server Hybrid Administrator Associate credential. This demonstrates your expertise in configuring and managing Windows Server on-premises, hybrid, and IaaS platform workloads; integrating Windows Server environments with Azure services; managing and maintaining Windows Server IaaS workloads in Azure, and moving workloads to Azure. This certification supports your goals as an IT, cloud, identity/access, or information protection administrator; a network, security, or support engineer, and a technology manager. See full details at: microsoft.com/learn
This book will attempt to give a first synthesis of recent works con cerning reactive system design. The term "reactive system" has been introduced in order to at'oid the ambiguities often associated with by the term "real-time system," which, although best known and more sugges tive, has been given so many different meanings that it is almost in evitably misunderstood. Industrial process control systems, transporta tion control and supervision systems, signal-processing systems, are ex amples of the systems we have in mind. Although these systems are more and more computerized, it is sur prising to notice that the problem of time in computer science has been studied only recently by "pure" computer scientists. Until the early 1980s, time problems were regarded as the concern of performance evalu ation, or of some (unjustly scorned) "industrial computer engineering," or, at best, of operating systems. A second surprising fact, in contrast, is the growth of research con cerning timed systems during the last decade. The handling of time has suddenly become a fundamental goal for most models of concurrency. In particular, Robin Alilner 's pioneering works about synchronous process algebras gave rise to a school of thought adopting the following abstract point of view: As soon as one admits that a system can instantaneously react to events, i. e."
((keine o-Punkte, sondern 2 accents aigus auf dem o in Szokefalvi, s. auch Titel )) In August 1999, an international conference was held in Szeged, Hungary, in honor of Bela Szokefalvi-Nagy, one of the founders and main contributors of modern operator theory. This volume contains some of the papers presented at the meeting, complemented by several papers of experts who were unable to attend. These 35 refereed articles report on recent and original results in various areas of operator theory and connected fields, many of them strongly related to contributions of Sz.-Nagy. The scientific part of the book is preceeded by fifty pages of biographical material, including several photos."
Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way. Investigating Windows Systems will not address topics which have been covered in other books, but will expect the reader to have some ability to discover the detailed usage of tools and to perform their own research. The focus of this volume is to provide a walk-through of the analysis process, with descriptions of the thought process and the analysis decisions made along the way. A must-have guide for those in the field of digital forensic analysis and incident response.
This book is the fifth volume in the successful book series Robot Operating System: The Complete Reference. The objective of the book is to provide the reader with comprehensive coverage on the Robot Operating System (ROS), which is currently considered to be the primary development framework for robotics applications, and the latest trends and contributing systems. The content is divided into six parts. Pat I presents for the first time the emerging ROS 2.0 framework, while Part II focuses on multi-robot systems, namely on SLAM and Swarm coordination. Part III provides two chapters on autonomous systems, namely self-driving cars and unmanned aerial systems. In turn, Part IV addresses the contributions of simulation frameworks for ROS. In Part V, two chapters explore robotic manipulators and legged robots. Finally, Part VI presents emerging topics in monocular SLAM and a chapter on fault tolerance systems for ROS. Given its scope, the book will offer a valuable companion for ROS users and developers, helping them deepen their knowledge of ROS capabilities and features.
The book describes state-of-the-art advances in simulators and emulators for quantum computing. It introduces the main concepts of quantum computing, defining q-bits, explaining the parallelism behind any quantum computation, describing measurement of the quantum state of information and explaining the process of quantum bit entanglement, collapsed state and cloning. The book reviews the concept of quantum unitary, binary and ternary quantum operators as well as the computation implied by each operator. It provides details of the quantum processor, providing its architecture, which is validated via execution simulation of some quantum instructions.
This book focuses on key simulation and evaluation technologies for 5G systems. Based on the most recent research results from academia and industry, it describes the evaluation methodologies in depth for network and physical layer technologies. The evaluation methods are discussed in depth. It also covers the analysis of the 5G candidate technologies and the testing challenges, the evolution of the testing technologies, fading channel measurement and modeling, software simulations, software hardware cosimulation, field testing and other novel evaluation methods. The fifth-generation (5G) mobile communications system targets highly improved network performances in terms of the network capacity and the number of connections. Testing and evaluation technologies is widely recognized and plays important roles in the wireless technology developments, along with the research on basic theory and key technologies. The investigation and developments on the multi-level and comprehensive evaluations for 5G new technologies, provides important performance references for the 5G technology filtering and future standardizations. Students focused on telecommunications, electronic engineering, computer science or other related disciplines will find this book useful as a secondary text. Researchers and professionals working within these related fields will also find this book useful as a reference.
"This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run's on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can see this book siting on the shelves of Cyber Security Professionals, and those working in the world of Digital Forensics - it is a recommended read, and is in my opinion a very valuable asset to those who are interested in the landscape of unknown unknowns. This is a book which may well help to discover more about that which is not in immediate view of the onlooker, and open up the mind to expand its imagination beyond its accepted limitations of known knowns." - John Walker, CSIRT/SOC/Cyber Threat Intelligence Specialist Featured in Digital Forensics Magazine, February 2017 In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files. Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows (R) machine to conceal their private data. Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques. Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world. Computer forensic investigators, law enforcements officers, intelligence services and IT security professionals need a guide to tell them where criminals can conceal their data in Windows (R) OS & multimedia files and how they can discover concealed data quickly and retrieve it in a forensic way. Data Hiding Techniques in Windows OS is a response to all these concerns. Data hiding topics are usually approached in most books using an academic method, with long math equations about how each hiding technique algorithm works behind the scene, and are usually targeted at people who work in the academic arenas. This book teaches professionals and end users alike how they can hide their data and discover the hidden ones using a variety of ways under the most commonly used operating system on earth, Windows (R). This is your hands-on guide to understand, detect and use today's most popular techniques in hiding and exploring hidden data under Windows (R) machines, covering all Windows (R) versions from XP till Windows (R) 10. Starting with the Roman Emperor, Julius Caesar, and his simple cipher method to the surveillance programs deployed by NSA, to monitor communication and online traffic, this book will teach you everything you need to know to protect your digital data using steganographic & anonymity cryptographic techniques. Written in a simple style and requiring only basic knowledge of main Windows (R) functions, techniques are presented in a way to easily implement them directly on your computer.
Core Data is Apple's data storage framework: it's powerful, built-in, and can integrate with iCloud. Discover all of Core Data's powerful capabilities, learn fundamental principles including thread and memory management, and add Core Data to both your iOS and OS X projects. All examples in this edition are based on Objective-C and are up-to-date for the latest versions of OS X El Capitan and iOS 9. Core Data expert Marcus Zarra walks you through a fully developed application based around the Core Data APIs. You'll build on this application throughout the book, learning key Core Data principles such as NSPredicate, NSFetchRequest, thread management, and memory management. Start with the basics of Core Data and learn how to use it to develop your application. Then delve deep into the API details. Explore how to get Core Data integrated into your application properly, and work with this flexible API to create convenience methods to improve your application's maintainability. Reduce your migration difficulties, integrate your Core Data app with iCloud and Watch Kit, and use Core Data in a queue-based environment. By the end of the book, you'll have built a full-featured application, gained a complete understanding of Core Data, and learned how to integrate your application into the iPhone/iPad platform. This third edition updates all examples for OS X El Capitan and iOS 9, and gets you up to speed on changes in multithreading and batch processing. There's a new chapter on efficiently importing data from a network location, and a new discussion of how best to pre-load data into your application. What You Need: Mac OS X El Capitan and iOS 9 and a basic working knowledge of Objective-C
Parallel Language and Compiler Research in Japan offers the international community an opportunity to learn in-depth about key Japanese research efforts in the particular software domains of parallel programming and parallelizing compilers. These are important topics that strongly bear on the effectiveness and affordability of high performance computing systems. The chapters of this book convey a comprehensive and current depiction of leading edge research efforts in Japan that focus on parallel software design, development, and optimization that could be obtained only through direct and personal interaction with the researchers themselves.
The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analysis; and responding to human resource violations. The authors lead readers through the importance of Windows CLI, as well as optimal configuration and usage. Readers will then learn the importance of maintaining evidentiary integrity, evidence volatility, and gain appropriate insight into methodologies that limit the potential of inadvertently destroying or otherwise altering evidence. Next, readers will be given an overview on how to use the proprietary software that accompanies the book as a download from the companion website. This software, called Proactive Incident Response Command Shell (PIRCS), developed by Harris Corporation provides an interface similar to that of a Windows CLI that automates evidentiary chain of custody and reduces human error and documentation gaps during incident response.
Discover everything you want to know about Mac basics in this easy-to-use guide, from the most essential tasks that you'll want to perform, to solving the most common problems you'll encounter.
This open access book constitutes the refereed post-conference proceedings of the First IFIP International Cross-Domain Conference on Internet of Things, IFIPIoT 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018. The 12 full papers presented were carefully reviewed and selected from 24 submissions. Also included in this volume are 4 WCC 2018 plenary contributions, an invited talk and a position paper from the IFIP domain committee on IoT. The papers cover a wide range of topics from a technology to a business perspective and include among others hardware, software and management aspects, process innovation, privacy, power consumption, architecture, applications.
This book focuses on mathematical modeling, describes the process of constructing and evaluating models, discusses the challenges and delicacies of the modeling process, and explicitly outlines the required rules and regulations so that the reader will be able to generalize and reuse concepts in other problems by relying on mathematical logic.Undergraduate and postgraduate students of different academic disciplines would find this book a suitable option preparing them for jobs and research fields requiring modeling techniques. Furthermore, this book can be used as a reference book for experts and practitioners requiring advanced skills of model building in their jobs.
Device drivers literally drive everything you're interested in--disks, monitors, keyboards, modems--everything outside the computer chip and memory. And writing device drivers is one of the few areas of programming for the Linux operating system that calls for unique, Linux-specific knowledge. For years now, programmers have relied on the classic "Linux Device Drivers" from O'Reilly to master this critical subject. Now in its third edition, this bestselling guide provides all the information you'll need to write drivers for a wide range of devices. Over the years the book has helped countless programmers learn: how to support computer peripherals under the Linux operating system how to develop and write software for new hardware under Linux the basics of Linux operation even if they are not expecting to write a driver The new edition of "Linux Device Drivers" is better than ever. The book covers all the significant changes to Version 2.6 of the Linux kernel, which simplifies many activities, and contains subtle new features that can make a driver both more efficient and more flexible. Readers will find new chapters on important types of drivers not covered previously, such as consoles, USB drivers, and more. Best of all, you don't have to be a kernel hacker to understand and enjoy this book. All you need is an understanding of the C programming language and some background in Unix system calls. And for maximum ease-of-use, the book uses full-featured examples that you can compile and run without special hardware. Today Linux holds fast as the most rapidly growing segment of the computer market and continues to win over enthusiastic adherents in many applicationareas. With this increasing support, Linux is now absolutely mainstream, and viewed as a solid platform for embedded systems. If you're writing device drivers, you'll want this book. In fact, you'll wonder how drivers are ever written without it.
The agile transformation is an act of transforming an organization's form or nature gradually to one that can embrace and thrive in a flexible, collaborative, self-organizing, and fast-changing environment. It seems like most of the companies starting an agile transformation never reach the goal of agility, but there are those few that truly become agile and reap incredible benefits by utilizing DevOps as well. This book introduces the theory and practice of the "double-flywheels model" of Continuous Delivery 2.0: Discovery Loop, which allows information technology (IT) organizations to help businesses figure out the most efficacious ways to develop. Additionally, it explores applications of the Verification Loop that allows IT organizations to deliver value quickly and safely with high quality. Along the way, the book provides an array of insights and case studies that dive into all the aspects of software delivery, and how to implement Continuous Delivery in the most economical way for long-run business development. Features Organization culture and software architecture Business requirement management Pipeline and tooling Branching and releasing strategy Automation strategy Configuration and artefacts management Deployment and production healthy The case studies at the end of the book-scenarios in which the author was personally involved-are explored in depth and meticulously detailed in order to represent typical agile transition scenarios that will benefit all readers.
"Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE" explains how to apply the complex MARTE standard in practical situations. This approachable reference provides a handy user guide, illustrating with numerous examples how you can use MARTE to design and develop real-time and embedded systems and software. Expert co-authors Bran Selic and Sebastien Gerard lead the team
that drafted and maintain the standard and give you the tools you
need apply MARTE to overcome the limitations of cyber-physical
systems. The functional sophistication required of modern
cyber-physical systems has reached a point where traditional
code-centric development methods are proving less and less capable
of delivering a reliable product in a timely manner. In "Modeling
and Analysis of Real-Time and Embedded Systems with UML and MARTE,"
you will learn how to take advantage of modern model-based
engineering methods and corresponding industry standards to
overcome these limitations. These methods take full advantage of
computer-supported automation allowing timely detection of design
flaws to reduce engineering risk, leading thereby to better overall
product quality and greater productivity.
Prepare for Microsoft Exam AZ-500: Demonstrate your real-world knowledge of Microsoft Azure security, including tools and techniques for protecting identity, access, platforms, data, and applications, and for effectively managing security operations. Designed for professionals with Azure security experience, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified: Azure Security Engineer Associate level. Focus on the expertise measured by these objectives: Manage identity and access Implement platform protection Manage security operations Secure data and applications This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you have expertise implementing security controls and threat protection, managing identity and access, and protecting assets in cloud and hybrid environments About the Exam Exam AZ-500 focuses on the knowledge needed to manage Azure Active Directory identities; configure secure access with Azure AD; manage application access and access control; implement advanced network security; configure advanced security for compute; monitor security with Azure Monitor, Azure Firewall manager, Azure Security Center, Azure Defender, and Azure Sentinel; configure security policies; configure security for storage and databases; and configure and manage Key Vault. About Microsoft Certification Passing this exam fulfills your requirements for the Microsoft Certified: Azure Security Engineer Associate credential, demonstrating your expertise as an Azure Security Engineer capable of maintaining security posture, identifying and remediating vulnerabilities, implementing threat protection, and responding to incident escalations as part of a cloud-based management and security team. See full details at: microsoft.com/learn
In modern conditions of the development of intelligent systems to solve the problems of smart cities, more and more attention is paid to the construction of distributed intelligent systems, which, based on a network of sensors and specialized calculators, help residents and visitors of the city in real time to solve a whole range of complex problems that arise in an urban environment. In a smart city, much attention is paid to the processing of biometric information that comes from biometric sensors distributed throughout the city. Such biometric systems are multimodal and allow you to control the general condition of a person, and also help a person to move around the city and predict events within the city. This book describes methods for processing biometric information in a smart city environment. The theoretical foundations of building a biometric multisensor network, which allows you to create a unified urban biometric community, are considered. The theoretical foundations of the parallel shift technology and the Radon transformation on cellular automata with a hexagonal covering are presented. On the basis of these technologies, methods of biometric identification by gait parameters and the geometric shape of the auricle are described, which are effectively used in a smart city. A method for tracking dynamic changes in the state of a smart city in real time is considered. Models of behavior of colonies of living organisms, their formation, movement and interaction are described on the basis of the technology of cellular automata with active cells. Models of behavior of active cells in meeting with unwanted cells and models of combining and destruction of active cell colonies are also described. This book is intended for undergraduate, graduate students and specialists working and conducting research in the field of biometric information processing, as well as in the development and construction of distributed intelligent systems.
1. An up-to-date reference on Red Hat 8 with comparisons to Red Hat's 7 and 6 when warranted. 2. A combination of how to use and administer Linux and operating systems concepts (making this text unique to Linux textbooks) written in an easy-to-read manner. 3. Improved chapters on computer networks, regular expressions and scripting. Revised and additional examples to support the concepts in these chapters. 4. Comparisons between Red Hat Linux and other Linux distributions when such comparisons will be useful. 5. A set of ancillary material including a complete lab manual, text bank, power point notes, glossary of terms, instructor's manual and supplemental readings. The supplemental readings will allow for a smaller book while still retaining all of the important content. 6. Improved chapter reviews, added end-of-section activities, additional tables, improved figures (where possible) and "did you know" boxes inserted to provide useful facts. |
You may like...
The Environmental Ethics and Policy Book…
Christine Pierce, Donald VanDeVeer
Paperback
R1,198
Discovery Miles 11 980
God and Cosmos - Moral Truth and Human…
David Baggett, Jerry L. Walls
Hardcover
R3,578
Discovery Miles 35 780
|