0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (5)
  • R100 - R250 (93)
  • R250 - R500 (331)
  • R500+ (2,292)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)

Linux Device Drivers (Paperback, 3rd Revised edition): Jonathan Corbet, Alessandro Rubini, Greg Kroah-Hartman Linux Device Drivers (Paperback, 3rd Revised edition)
Jonathan Corbet, Alessandro Rubini, Greg Kroah-Hartman
R1,275 R1,078 Discovery Miles 10 780 Save R197 (15%) Ships in 18 - 22 working days

Device drivers literally drive everything you're interested in--disks, monitors, keyboards, modems--everything outside the computer chip and memory. And writing device drivers is one of the few areas of programming for the Linux operating system that calls for unique, Linux-specific knowledge. For years now, programmers have relied on the classic "Linux Device Drivers" from O'Reilly to master this critical subject. Now in its third edition, this bestselling guide provides all the information you'll need to write drivers for a wide range of devices.

Over the years the book has helped countless programmers learn:

how to support computer peripherals under the Linux operating system

how to develop and write software for new hardware under Linux

the basics of Linux operation even if they are not expecting to write a driver

The new edition of "Linux Device Drivers" is better than ever. The book covers all the significant changes to Version 2.6 of the Linux kernel, which simplifies many activities, and contains subtle new features that can make a driver both more efficient and more flexible. Readers will find new chapters on important types of drivers not covered previously, such as consoles, USB drivers, and more.

Best of all, you don't have to be a kernel hacker to understand and enjoy this book. All you need is an understanding of the C programming language and some background in Unix system calls. And for maximum ease-of-use, the book uses full-featured examples that you can compile and run without special hardware.

Today Linux holds fast as the most rapidly growing segment of the computer market and continues to win over enthusiastic adherents in many applicationareas. With this increasing support, Linux is now absolutely mainstream, and viewed as a solid platform for embedded systems. If you're writing device drivers, you'll want this book. In fact, you'll wonder how drivers are ever written without it.

Windows 11 Simplified (Paperback): P. McFedries Windows 11 Simplified (Paperback)
P. McFedries
R927 Discovery Miles 9 270 Ships in 10 - 15 working days

Learn Windows 11 quickly, easily, and with expert help from a tech education master Windows 11 Simplified is your from-scratch beginner's guide to the ins and outs of the latest version of Windows. It's fully updated to include all the coolest new features of Windows 11 and offers a highly visual roadmap - complete with tons of screenshots and illustrations - to Windows 11 mastery. You'll get up to speed on the basic, and not-so-basic, features of Windows 11 with plain-English instructions and step-by-step screenshots that walk you through every technique you need to know to make Windows 11 do what you want it to do. You'll learn to navigate the user interface, work with and manage files, create user accounts, and practice using the tools that make Windows 11 the most user-friendly and powerful version of the famous operating system yet. You'll also discover how to: Master the basics, as well as a bunch of power-user tools, with easy-to-follow instructions Learn your way around the interface, File Explorer, the Settings app, and more Navigate the web, send emails, access online media, and chat with friends and family Customize windows to look and feel exactly the way you want it to With the right help, learning a new operating system can be fun, straightforward, and exciting. This book is perfect for everyone from those with no Windows experience at all to users of previous versions who just need a heads-up on the latest features. If you're ready to become a Windows 11 master, Windows 11 Simplified is the easiest and fastest way to do it.

C/TCP-IP, the Embedded Protocol Stack for the Kinetis Arm Cortex-M4 (Hardcover): Christian Legare C/TCP-IP, the Embedded Protocol Stack for the Kinetis Arm Cortex-M4 (Hardcover)
Christian Legare
R2,227 Discovery Miles 22 270 Ships in 18 - 22 working days

Learn the essentials of Networking and Embedded TCP/IP stacks. Part I of this comprehensive book provides a thorough explanation of Micri m's C/TCP-IP stack including its implementation and usage. Part II describes practical, working applications for embedded medical devices built on C/OS-III, C/TCP-IP and Freescale's TWR-K53N512 medical board (ARM Cortex -M4) using IAR developments tools. Each of the included examples feature hands-on working projects, which allow you to get your application running quickly, and can serve as a reference design to develop an embedded system connected to the Internet of Things. This book is the perfect complement to C/OS-III: The Real-Time Kernel for the ARM Cortex -M4 by Jean Labrosse (ISBN 978-0-9823375-2-3), as it uses the same medical application examples but connects them via TCP/IP. This book is written for serious embedded systems programmers, consultants, hobbyists, and students interested in understanding the inner workings of a TCP/IP stack. C/TCP-IP is more than just a great learning platform. It is a full commercial-grade software package, ready to serve as the foundation for a wide range of products. Some of the key topics covered in this book are: Ethernet technology and device drivers IP connectivity Client and Server architecture Socket programming UDP and TCP performance tuning

Synchronous Programming of Reactive Systems (Hardcover, 1993 ed.): Nicolas Halbwachs Synchronous Programming of Reactive Systems (Hardcover, 1993 ed.)
Nicolas Halbwachs
R1,505 Discovery Miles 15 050 Ships in 18 - 22 working days

This book will attempt to give a first synthesis of recent works con cerning reactive system design. The term "reactive system" has been introduced in order to at'oid the ambiguities often associated with by the term "real-time system," which, although best known and more sugges tive, has been given so many different meanings that it is almost in evitably misunderstood. Industrial process control systems, transporta tion control and supervision systems, signal-processing systems, are ex amples of the systems we have in mind. Although these systems are more and more computerized, it is sur prising to notice that the problem of time in computer science has been studied only recently by "pure" computer scientists. Until the early 1980s, time problems were regarded as the concern of performance evalu ation, or of some (unjustly scorned) "industrial computer engineering," or, at best, of operating systems. A second surprising fact, in contrast, is the growth of research con cerning timed systems during the last decade. The handling of time has suddenly become a fundamental goal for most models of concurrency. In particular, Robin Alilner 's pioneering works about synchronous process algebras gave rise to a school of thought adopting the following abstract point of view: As soon as one admits that a system can instantaneously react to events, i. e."

Java Homework Projects - 11th Edition - A JFC GUI Swing Tutorial (Paperback, 11th ed.): Philip Conrod, Lou Tylee Java Homework Projects - 11th Edition - A JFC GUI Swing Tutorial (Paperback, 11th ed.)
Philip Conrod, Lou Tylee
R2,454 Discovery Miles 24 540 Ships in 10 - 15 working days
Recent Advances in Operator Theory and Related Topics - The Bela Szoekefalvi-Nagy Memorial Volume (Hardcover, 2001 ed.): L aszl... Recent Advances in Operator Theory and Related Topics - The Bela Szoekefalvi-Nagy Memorial Volume (Hardcover, 2001 ed.)
L aszl o K erchy, Ciprian I. Foias, Izrael Gohberg, Heinz Langer
R4,194 Discovery Miles 41 940 Ships in 18 - 22 working days

((keine o-Punkte, sondern 2 accents aigus auf dem o in Szokefalvi, s. auch Titel ))

In August 1999, an international conference was held in Szeged, Hungary, in honor of Bela Szokefalvi-Nagy, one of the founders and main contributors of modern operator theory. This volume contains some of the papers presented at the meeting, complemented by several papers of experts who were unable to attend. These 35 refereed articles report on recent and original results in various areas of operator theory and connected fields, many of them strongly related to contributions of Sz.-Nagy. The scientific part of the book is preceeded by fifty pages of biographical material, including several photos."

Robot Operating System (ROS) - The Complete Reference (Volume 5) (Hardcover, 1st ed. 2021): Anis Koubaa Robot Operating System (ROS) - The Complete Reference (Volume 5) (Hardcover, 1st ed. 2021)
Anis Koubaa
R4,652 Discovery Miles 46 520 Ships in 10 - 15 working days

This book is the fifth volume in the successful book series Robot Operating System: The Complete Reference. The objective of the book is to provide the reader with comprehensive coverage on the Robot Operating System (ROS), which is currently considered to be the primary development framework for robotics applications, and the latest trends and contributing systems. The content is divided into six parts. Pat I presents for the first time the emerging ROS 2.0 framework, while Part II focuses on multi-robot systems, namely on SLAM and Swarm coordination. Part III provides two chapters on autonomous systems, namely self-driving cars and unmanned aerial systems. In turn, Part IV addresses the contributions of simulation frameworks for ROS. In Part V, two chapters explore robotic manipulators and legged robots. Finally, Part VI presents emerging topics in monocular SLAM and a chapter on fault tolerance systems for ROS. Given its scope, the book will offer a valuable companion for ROS users and developers, helping them deepen their knowledge of ROS capabilities and features.

Investigating Windows Systems (Paperback): Harlan Carvey Investigating Windows Systems (Paperback)
Harlan Carvey
R1,450 Discovery Miles 14 500 Ships in 10 - 15 working days

Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way. Investigating Windows Systems will not address topics which have been covered in other books, but will expect the reader to have some ability to discover the detailed usage of tools and to perform their own research. The focus of this volume is to provide a walk-through of the analysis process, with descriptions of the thought process and the analysis decisions made along the way. A must-have guide for those in the field of digital forensic analysis and incident response.

Current Trends in Computer Science and Mechanical Automation Vol.2 - Selected Papers from CSMA2016 (Hardcover): Shawn X Wang Current Trends in Computer Science and Mechanical Automation Vol.2 - Selected Papers from CSMA2016 (Hardcover)
Shawn X Wang
R6,796 Discovery Miles 67 960 Ships in 18 - 22 working days
The Windows Command Line Beginner's Guide - Second Edition (Paperback): Jonathan Moeller The Windows Command Line Beginner's Guide - Second Edition (Paperback)
Jonathan Moeller
R266 Discovery Miles 2 660 Ships in 18 - 22 working days
Current Trends in Computer Science and Mechanical Automation Vol.1 - Selected Papers from CSMA2016 (Hardcover): Shawn X Wang Current Trends in Computer Science and Mechanical Automation Vol.1 - Selected Papers from CSMA2016 (Hardcover)
Shawn X Wang
R6,789 Discovery Miles 67 890 Ships in 18 - 22 working days
Red Hat RHCE 8 (EX294) Cert Guide (Paperback): Sander van Vugt Red Hat RHCE 8 (EX294) Cert Guide (Paperback)
Sander van Vugt
R904 Discovery Miles 9 040 Ships in 10 - 15 working days

Learn, prepare, and practice for Red Hat RHCE 8 EX294 exam success with this Cert Guide from Pearson IT Certification, a leader in IT certification learning. * Master RHCE 8 EX294 exam topics * Assess your knowledge with chapter-ending quizzes * Review key concepts with step-by-step exercises, code examples, and complete labs after every chapter, designed to closely resemble the exam * Practice with realistic exam questions from four full practice exams: two printed in the book and two more on the companion website * Supplement your learning with an hour of video mentoring Red Hat RHCE 8 (EX294) Cert Guide is the authoritative exam study guide. Leading Red Hat and Linux consultant, trainer, and author Sander van Vugt walks you through the RHCE EX 294 objectives so you have a full study resource. He shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding, retention of exam topics, and hands-on practice so you can feel ready to take the exam. The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan. The end of chapter labs are an essential part of learning each topic and cover each chapter's key concepts so you can test yourself and put your knowledge to work. The companion website contains two additional practice exams, flashcards that test you on the glossary terms in the book, an hour of video mentoring from the author, and study resources. Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time. The study guide helps you master all the topics on the RHCE 8 exam, including * Understanding configuration management * Installing Ansible and setting up managed environments * Using ad hoc commands * Getting started with playbooks * Working with variables and facts * Using task control * Deploying files * Using Ansible roles * Using Ansible in large environments * Troubleshooting Ansible * Managing software with Ansible * Managing users, processes, tasks, and storage

5G Wireless Systems - Simulation and Evaluation Techniques (Hardcover, 1st ed. 2018): Yang Yang, Jing Xu, Guang Shi,... 5G Wireless Systems - Simulation and Evaluation Techniques (Hardcover, 1st ed. 2018)
Yang Yang, Jing Xu, Guang Shi, Cheng-Xiang Wang
R4,346 Discovery Miles 43 460 Ships in 18 - 22 working days

This book focuses on key simulation and evaluation technologies for 5G systems. Based on the most recent research results from academia and industry, it describes the evaluation methodologies in depth for network and physical layer technologies. The evaluation methods are discussed in depth. It also covers the analysis of the 5G candidate technologies and the testing challenges, the evolution of the testing technologies, fading channel measurement and modeling, software simulations, software hardware cosimulation, field testing and other novel evaluation methods. The fifth-generation (5G) mobile communications system targets highly improved network performances in terms of the network capacity and the number of connections. Testing and evaluation technologies is widely recognized and plays important roles in the wireless technology developments, along with the research on basic theory and key technologies. The investigation and developments on the multi-level and comprehensive evaluations for 5G new technologies, provides important performance references for the 5G technology filtering and future standardizations. Students focused on telecommunications, electronic engineering, computer science or other related disciplines will find this book useful as a secondary text. Researchers and professionals working within these related fields will also find this book useful as a reference.

Customizable and Adaptive Quantum Processors - Theory and Applications (Hardcover): Nadia Nedjah, Luiza de Macedo Mourelle Customizable and Adaptive Quantum Processors - Theory and Applications (Hardcover)
Nadia Nedjah, Luiza de Macedo Mourelle
R1,550 Discovery Miles 15 500 Ships in 10 - 15 working days

The book describes state-of-the-art advances in simulators and emulators for quantum computing. It introduces the main concepts of quantum computing, defining q-bits, explaining the parallelism behind any quantum computation, describing measurement of the quantum state of information and explaining the process of quantum bit entanglement, collapsed state and cloning. The book reviews the concept of quantum unitary, binary and ternary quantum operators as well as the computation implied by each operator. It provides details of the quantum processor, providing its architecture, which is validated via execution simulation of some quantum instructions.

Core Data in Objective-C 3e (Paperback, 3 Revised Edition): Marcus Zarra Core Data in Objective-C 3e (Paperback, 3 Revised Edition)
Marcus Zarra
R858 R765 Discovery Miles 7 650 Save R93 (11%) Ships in 10 - 15 working days

Core Data is Apple's data storage framework: it's powerful, built-in, and can integrate with iCloud. Discover all of Core Data's powerful capabilities, learn fundamental principles including thread and memory management, and add Core Data to both your iOS and OS X projects. All examples in this edition are based on Objective-C and are up-to-date for the latest versions of OS X El Capitan and iOS 9. Core Data expert Marcus Zarra walks you through a fully developed application based around the Core Data APIs. You'll build on this application throughout the book, learning key Core Data principles such as NSPredicate, NSFetchRequest, thread management, and memory management. Start with the basics of Core Data and learn how to use it to develop your application. Then delve deep into the API details. Explore how to get Core Data integrated into your application properly, and work with this flexible API to create convenience methods to improve your application's maintainability. Reduce your migration difficulties, integrate your Core Data app with iCloud and Watch Kit, and use Core Data in a queue-based environment. By the end of the book, you'll have built a full-featured application, gained a complete understanding of Core Data, and learned how to integrate your application into the iPhone/iPad platform. This third edition updates all examples for OS X El Capitan and iOS 9, and gets you up to speed on changes in multithreading and batch processing. There's a new chapter on efficiently importing data from a network location, and a new discussion of how best to pre-load data into your application. What You Need: Mac OS X El Capitan and iOS 9 and a basic working knowledge of Objective-C

Data Hiding Techniques in Windows OS - A Practical Approach to Investigation and Defense (Paperback): Nihad Hassan, Rami Hijazi Data Hiding Techniques in Windows OS - A Practical Approach to Investigation and Defense (Paperback)
Nihad Hassan, Rami Hijazi
R1,054 Discovery Miles 10 540 Ships in 10 - 15 working days

"This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run's on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can see this book siting on the shelves of Cyber Security Professionals, and those working in the world of Digital Forensics - it is a recommended read, and is in my opinion a very valuable asset to those who are interested in the landscape of unknown unknowns. This is a book which may well help to discover more about that which is not in immediate view of the onlooker, and open up the mind to expand its imagination beyond its accepted limitations of known knowns." - John Walker, CSIRT/SOC/Cyber Threat Intelligence Specialist Featured in Digital Forensics Magazine, February 2017 In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files. Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows (R) machine to conceal their private data. Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques. Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world. Computer forensic investigators, law enforcements officers, intelligence services and IT security professionals need a guide to tell them where criminals can conceal their data in Windows (R) OS & multimedia files and how they can discover concealed data quickly and retrieve it in a forensic way. Data Hiding Techniques in Windows OS is a response to all these concerns. Data hiding topics are usually approached in most books using an academic method, with long math equations about how each hiding technique algorithm works behind the scene, and are usually targeted at people who work in the academic arenas. This book teaches professionals and end users alike how they can hide their data and discover the hidden ones using a variety of ways under the most commonly used operating system on earth, Windows (R). This is your hands-on guide to understand, detect and use today's most popular techniques in hiding and exploring hidden data under Windows (R) machines, covering all Windows (R) versions from XP till Windows (R) 10. Starting with the Roman Emperor, Julius Caesar, and his simple cipher method to the surveillance programs deployed by NSA, to monitor communication and online traffic, this book will teach you everything you need to know to protect your digital data using steganographic & anonymity cryptographic techniques. Written in a simple style and requiring only basic knowledge of main Windows (R) functions, techniques are presented in a way to easily implement them directly on your computer.

Parallel Language and Compiler Research in Japan (Hardcover, 1995 ed.): Lubomir Bic, Alexandru Nicolau, Mitsuhisa Sato Parallel Language and Compiler Research in Japan (Hardcover, 1995 ed.)
Lubomir Bic, Alexandru Nicolau, Mitsuhisa Sato
R5,431 Discovery Miles 54 310 Ships in 18 - 22 working days

Parallel Language and Compiler Research in Japan offers the international community an opportunity to learn in-depth about key Japanese research efforts in the particular software domains of parallel programming and parallelizing compilers. These are important topics that strongly bear on the effectiveness and affordability of high performance computing systems. The chapters of this book convey a comprehensive and current depiction of leading edge research efforts in Japan that focus on parallel software design, development, and optimization that could be obtained only through direct and personal interaction with the researchers themselves.

Executing Windows Command Line Investigations - While Ensuring Evidentiary Integrity (Paperback): Chet Hosmer, Joshua... Executing Windows Command Line Investigations - While Ensuring Evidentiary Integrity (Paperback)
Chet Hosmer, Joshua Bartolomie, Rosanne Pelli
R1,297 Discovery Miles 12 970 Ships in 10 - 15 working days

The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analysis; and responding to human resource violations. The authors lead readers through the importance of Windows CLI, as well as optimal configuration and usage. Readers will then learn the importance of maintaining evidentiary integrity, evidence volatility, and gain appropriate insight into methodologies that limit the potential of inadvertently destroying or otherwise altering evidence. Next, readers will be given an overview on how to use the proprietary software that accompanies the book as a download from the companion website. This software, called Proactive Incident Response Command Shell (PIRCS), developed by Harris Corporation provides an interface similar to that of a Windows CLI that automates evidentiary chain of custody and reduces human error and documentation gaps during incident response.

Internet of Things. Information Processing in an Increasingly Connected World - First IFIP International Cross-Domain... Internet of Things. Information Processing in an Increasingly Connected World - First IFIP International Cross-Domain Conference, IFIPIoT 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-19, 2018, Revised Selected Papers (Hardcover, 1st ed. 2019)
Leon Strous, Vinton G. Cerf
R2,103 Discovery Miles 21 030 Ships in 18 - 22 working days

This open access book constitutes the refereed post-conference proceedings of the First IFIP International Cross-Domain Conference on Internet of Things, IFIPIoT 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018. The 12 full papers presented were carefully reviewed and selected from 24 submissions. Also included in this volume are 4 WCC 2018 plenary contributions, an invited talk and a position paper from the IFIP domain committee on IoT. The papers cover a wide range of topics from a technology to a business perspective and include among others hardware, software and management aspects, process innovation, privacy, power consumption, architecture, applications.

Microsoft Defender for Cloud (Paperback): Yuri Diogenes, Tom Janetscheck Microsoft Defender for Cloud (Paperback)
Yuri Diogenes, Tom Janetscheck
R776 Discovery Miles 7 760 Ships in 10 - 15 working days

The definitive practical guide to Microsoft Defender for Cloud covering new components and multi-cloud enhancements! Microsoft Defender for Cloud offers comprehensive tools for hardening resources, tracking security posture, protecting against attacks, and streamlining security management - all in one natively integrated toolset. Now, leading Microsoft security experts Yuri Diogenes and Tom Janetscheck help you apply its robust protection, detection, and response capabilities throughout your operations, protecting workloads running on all your cloud, hybrid, and on-premises platforms. This guide shows how to make the most of new components, enhancements, and deployment scenarios, as you address today's latest threat vectors. Sharing best practices, expert tips, and optimizations only available from Microsoft's Defender for Cloud team, the authors walk through improving everything from policies and governance to incident response and risk management. Whatever your role or experience, they'll help you address new security challenges far more effectively-and save hours, days, or even weeks. Two of Microsoft's leading cloud security experts show how to: Assess new threat landscapes, the MITRE ATT&CK framework, and the implications of ''assume-breach'' Explore Defender for Cloud architecture, use cases, and adoption considerations including multicloud with AWS and GCP Plan for effective governance, successful onboarding, and maximum value Fully visualize complex cloud estates and systematically reduce their attack surfaces Prioritize risks with Secure Score, and leverage at-scale tools to build secure cloud-native apps Establish consistent policy enforcement to avoid drift Use advanced analytics and machine learning to identify attacks based on signals from all cloud workloads Enhance security posture by integrating with the Microsoft Sentinel SIEM/SOAR, Microsoft Purview, and Microsoft Defender for Endpoint Leverage just-in-time VM access and other enhanced security capabilities About This Book For architects, designers, implementers, SecOps professionals, developers, and security specialists working in Microsoft Azure environments For all IT professionals and decision-makers concerned with securing modern hybrid/multicloud environments, cloud-native apps, and PaaS services

Methods and Models in Mathematical Programming (Hardcover, 1st ed. 2019): S.A. MirHassani, F. Hooshmand Methods and Models in Mathematical Programming (Hardcover, 1st ed. 2019)
S.A. MirHassani, F. Hooshmand
R2,710 Discovery Miles 27 100 Ships in 18 - 22 working days

This book focuses on mathematical modeling, describes the process of constructing and evaluating models, discusses the challenges and delicacies of the modeling process, and explicitly outlines the required rules and regulations so that the reader will be able to generalize and reuse concepts in other problems by relying on mathematical logic.Undergraduate and postgraduate students of different academic disciplines would find this book a suitable option preparing them for jobs and research fields requiring modeling techniques. Furthermore, this book can be used as a reference book for experts and practitioners requiring advanced skills of model building in their jobs.

Operating Systems In Depth (WSE) (Hardcover): Tw Doeppner Operating Systems In Depth (WSE) (Hardcover)
Tw Doeppner
R5,049 Discovery Miles 50 490 Ships in 18 - 22 working days

"Programmers don't want to just read about the core concepts of operating systems. They want to learn how to apply the material by actually building applications. This new book motivates them by presenting numerous programming exercises at the code level. They are not only introduced to the OS concepts and abstractions, but also the implementation. Two design projects are integrated throughout the book that they'll be able to follow to get them into the code. Self-assessment and review material is presented at the end of each chapter to reinforce concepts. These features help to make this an excellent resource for programmers to gain invaluable experience."--

In the Plex - How Google Thinks, Works, and Shapes Our Lives (Paperback): Steven Levy In the Plex - How Google Thinks, Works, and Shapes Our Lives (Paperback)
Steven Levy
R447 R421 Discovery Miles 4 210 Save R26 (6%) Ships in 18 - 22 working days

"The most interesting book ever written about Google" (The Washington Post) delivers the inside story behind the most successful and admired technology company of our time, now updated with a new Afterword. Google is arguably the most important company in the world today, with such pervasive influence that its name is a verb. The company founded by two Stanford graduate students-Larry Page and Sergey Brin-has become a tech giant known the world over. Since starting with its search engine, Google has moved into mobile phones, computer operating systems, power utilities, self-driving cars, all while remaining the most powerful company in the advertising business. Granted unprecedented access to the company, Levy disclosed that the key to Google's success in all these businesses lay in its engineering mindset and adoption of certain internet values such as speed, openness, experimentation, and risk-taking. Levy discloses details behind Google's relationship with China, including how Brin disagreed with his colleagues on the China strategy-and why its social networking initiative failed; the first time Google tried chasing a successful competitor. He examines Google's rocky relationship with government regulators, particularly in the EU, and how it has responded when employees left the company for smaller, nimbler start-ups. In the Plex is the "most authoritative...and in many ways the most entertaining" (James Gleick, The New York Book Review) account of Google to date and offers "an instructive primer on how the minds behind the world's most influential internet company function" (Richard Waters, The Wall Street Journal).

Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE - Developing Cyber-Physical Systems (Paperback):... Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE - Developing Cyber-Physical Systems (Paperback)
Bran Selic, Sebastien Gerard
R1,203 Discovery Miles 12 030 Ships in 10 - 15 working days

"Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE" explains how to apply the complex MARTE standard in practical situations. This approachable reference provides a handy user guide, illustrating with numerous examples how you can use MARTE to design and develop real-time and embedded systems and software.

Expert co-authors Bran Selic and Sebastien Gerard lead the team that drafted and maintain the standard and give you the tools you need apply MARTE to overcome the limitations of cyber-physical systems. The functional sophistication required of modern cyber-physical systems has reached a point where traditional code-centric development methods are proving less and less capable of delivering a reliable product in a timely manner. In "Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE," you will learn how to take advantage of modern model-based engineering methods and corresponding industry standards to overcome these limitations. These methods take full advantage of computer-supported automation allowing timely detection of design flaws to reduce engineering risk, leading thereby to better overall product quality and greater productivity.
Understand the design rationale behind the MARTE standard needed to take full advantage of its many powerful modeling capabilities Best apply the various MARTE features for the most common use cases encountered in the design of real-time and embedded softwareLearn how MARTE can be used together with the SysML language for the design of complex cyber-physical systemsDiscover how MARTE can be used for different kinds of computer-supported engineering analyses to predict key system characteristics early in development Customize MARTE for a specific domain or project"

Modernizing the Datacenter with Windows Server and Hybrid Cloud (Paperback): John McCabe, Ward Ralston Modernizing the Datacenter with Windows Server and Hybrid Cloud (Paperback)
John McCabe, Ward Ralston
R1,061 R968 Discovery Miles 9 680 Save R93 (9%) Ships in 9 - 17 working days

Using cloud and hybrid cloud computing services, you can transform your data center to serve dynamic, highly-changeable workloads, process and analyze soaring data loads, and deliver greater flexibility at lower cost. Modernizing the Data Center with Windows Server and Hybrid Cloud is the definitive guide to using Windows Server, Microsoft Azure, and related Microsoft technologies to achieve this transformation in your own environment. Three world-renowned experts in Microsoft data center technology show how to effectively leverage your current legacy systems as you incorporate your optimal mix of private and public cloud services. Drawing on extensive experience implementing Microsoft hybrid cloud solutions, they offer approachable, step-by-step coverage of your entire transition, from strategy through implementation, security and identity protection, management, and scripting for automation. The authors conclude with full chapters on maximizing data center efficiency, and on supporting innovation going forward.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
All-time Greatest Hits
Neil Diamond CD  (1)
R372 Discovery Miles 3 720
Discrete Choice Analysis with R
Antonio Paez, Genevieve Boisjoly Hardcover R3,343 Discovery Miles 33 430
Evidence-Based Validation of Herbal…
Pulok K. Mukherjee Hardcover R4,281 Discovery Miles 42 810
Essential Bayesian Models
C.R. Rao, Dipak K. Dey Hardcover R1,633 Discovery Miles 16 330
Heptagram - The 7-Pillar Business Design…
Pamela Ayuso Hardcover R593 Discovery Miles 5 930
LLC - The Ultimate Guide to Starting a…
Greg Shields Hardcover R655 R584 Discovery Miles 5 840
Helford River - Constantine, Gweek…
Friendly Guides Sheet map, folded R78 Discovery Miles 780
Management And Cost Accounting
Colin Drury, Mike Tayles Paperback R1,366 R1,273 Discovery Miles 12 730
The Rockies Collect and Scratch Print
Sheet map, rolled R522 Discovery Miles 5 220
The Goal - A Business Graphic Novel
Dwight Jon Zimmerman Paperback R582 R536 Discovery Miles 5 360

 

Partners