![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
Written by VM-certified instructors with years of professional and teaching experience, VMware Certified Professional Test Prep is the ultimate guide to the VCP exam. Its organized and highly practical approach will help administrators successfully complete the exam while also maximizing their ability to apply this tool on the job. The guide covers the body of knowledge required of a VMware certified professional, provides the tools needed to keep that knowledge current, and helps develop the wherewithal to apply that knowledge to real solutions. Covering the ESX 3.0.x through ESX 3.5.x releases that are the focus of the VCP test, this volume: Reproduces many of the real-world examples that have proven very helpful to students in the authors' classrooms Applies step-by-step instructions to more than 700 software screenshots, providing a virtual hands-on experience Points to Web resources that will keep the reader current with the latest advances Includes logistical information on the test, including costs and class location Covers background information on various topics such as storage and networking to provide a complete understanding on the implementation of a VMWare VI3 solution Provides questions at the end of the chapters that cover the important concepts Also of great use to those administrators who have already received their certification, this book includes solutions to many of the common gotchas that they are certain to encounter in virtual environments. In particular, capacity-planning concepts reveal the specific details needed to make full use of VMware's unique resource management capabilities. Troubleshooting tips appear throughout the book, making it a useful resource in the virtualized datacenter.
Based upon the authors' experience in designing and deploying an embedded Linux system with a variety of applications, Embedded Linux System Design and Development contains a full embedded Linux system development roadmap for systems architects and software programmers. Explaining the issues that arise out of the use of Linux in embedded systems, the book facilitates movement to embedded Linux from traditional real-time operating systems, and describes the system design model containing embedded Linux. This book delivers practical solutions for writing, debugging, and profiling applications and drivers in embedded Linux, and for understanding Linux BSP architecture. It enables you to understand: various drivers such as serial, I2C and USB gadgets; uClinux architecture and its programming model; and the embedded Linux graphics subsystem. The text also promotes learning of methods to reduce system boot time, optimize memory and storage, and find memory leaks and corruption in applications. This volume benefits IT managers in planning to choose an embedded Linux distribution and in creating a roadmap for OS transition. It also describes the application of the Linux licensing model in commercial products.
Device drivers literally drive everything you're interested in--disks, monitors, keyboards, modems--everything outside the computer chip and memory. And writing device drivers is one of the few areas of programming for the Linux operating system that calls for unique, Linux-specific knowledge. For years now, programmers have relied on the classic "Linux Device Drivers" from O'Reilly to master this critical subject. Now in its third edition, this bestselling guide provides all the information you'll need to write drivers for a wide range of devices. Over the years the book has helped countless programmers learn: how to support computer peripherals under the Linux operating system how to develop and write software for new hardware under Linux the basics of Linux operation even if they are not expecting to write a driver The new edition of "Linux Device Drivers" is better than ever. The book covers all the significant changes to Version 2.6 of the Linux kernel, which simplifies many activities, and contains subtle new features that can make a driver both more efficient and more flexible. Readers will find new chapters on important types of drivers not covered previously, such as consoles, USB drivers, and more. Best of all, you don't have to be a kernel hacker to understand and enjoy this book. All you need is an understanding of the C programming language and some background in Unix system calls. And for maximum ease-of-use, the book uses full-featured examples that you can compile and run without special hardware. Today Linux holds fast as the most rapidly growing segment of the computer market and continues to win over enthusiastic adherents in many applicationareas. With this increasing support, Linux is now absolutely mainstream, and viewed as a solid platform for embedded systems. If you're writing device drivers, you'll want this book. In fact, you'll wonder how drivers are ever written without it.
Proven best practices for success with every Azure monitoring and management service For cloud environments to deliver optimal value, their monitoring and management services must be designed, deployed, and managed well. Leading cloud consultant Avinash Valiramani shows how to simplify administration, reduce downtime, control cost, solve problems faster, and prepare for any workload in any environment. Explore detailed, expert coverage of Azure Backup, Azure Site Recovery, Azure Migrate, Azure Monitor, Azure Network Watcher, Azure Portal, Azure Cloud Shell, Azure Service Health, Azure Cost Management, and more. Whatever your role in delivering effi cient, reliable cloud services, this best practice, deep dive guide will help you make the most of your Azure investment. Leading Azure consultant Avinash Valiramani shows how to: Back up on-premises, Azure-based, and other cloud workloads for short- and long-term retention Implement simple, stable, cost-effective business continuity/disaster recovery with Azure Site Recovery Discover, assess, and migrate diverse workloads to Azure, VMs, web apps, databases, and more Monitor all Azure applications, VMs, and other deployed services centrally via Azure Monitor Track, troubleshoot, and optimize networking for IaaS resources Create and manage anything from single-service solutions to complex multi-service architectures Run Azure Cloud Shell's cloud-native command line from any device, anywhere Monitor service health, workload levels, service layer resources, and availability Also look for these Definitive Guides to Azure success: Microsoft Azure Compute: The Definitive Guide Microsoft Azure Networking: The Definitive Guide Microsoft Azure Storage: The Definitive Guide
Artificial Intelligence is the most exciting technology of the century, and Deep Learning is, quite literally, the "brain" behind the world's smartest Artificial Intelligence systems out there. Grokking Deep Learning is the perfect place to begin the deep learning journey. Rather than just learning the "black box" API of some library or framework, readers will actually understand how to build these algorithms completely from scratch. Key Features: Build neural networks that can see and understand images Build an A.I. that will learn to defeat you in a classic Atari game Hands-on Learning Written for readers with high school-level math and intermediate programming skills. Experience with Calculus is helpful but not required. ABOUT THE TECHNOLOGY Deep Learning is a subset of Machine Learning, which is a field dedicated to the study and development of machines that can learn, often with the goal of eventually attaining general artificial intelligence.
Integrating concepts from multiple theoretical disciplines and detailed analyses of the evolution of Internet-related innovations (including computer networking, the World Wide Web and the Linux open source operating system), this book develops foundations for a new theoretical and practical understanding of innovation. It covers topics ranging from fashion to history of art, and includes the most detailed analysis of the open source development model so far published.
* Unique entry-level guide to Domain Name System (DNS), which translates Internet host names into IP addresses and is used with all Internet servers
Prepare for Microsoft Exam AZ-104-and help demonstrate your real-world mastery of Microsoft Azure administration. Designed for working Azure administrators, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Solutions Associate level. Focus on the expertise measured by these objectives: Manage Azure identities and governance Implement and manage storage Deploy and manage Azure compute resources Configure and manage virtual networking Monitor and back up Azure resources This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you want to demonstrate your ability to administer diverse Microsoft Azure cloud environments About the Exam Exam AZ-104 focuses on knowledge needed to manage Azure AD objects, RBAC, subscriptions, and governance; manage storage accounts and Azure Storage data; configure Azure fi les and blob storage; configure VMs for high availability and scalability; automate VM deployment and configuration; create and configure VMs, containers, and Web Apps; implement, manage, secure, monitor, and troubleshoot virtual networking; configure name resolution and load balancing; integrate on-premises networks; monitor resources with Azure Monitor; implement backup and security. About Microsoft Certification Passing this exam fulfills your requirements for the Microsoft Certified: Azure Administrator Associate credential, demonstrating your readiness to implement, manage, and monitor identity, governance, storage, compute, and virtual networks in a cloud environment, and to provision, size, monitor, and adjust resources as appropriate. See full details at: microsoft.com/learn
As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system. The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs. The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.
Graph Searching Games and Probabilistic Methods is the first book that focuses on the intersection of graph searching games and probabilistic methods. The book explores various applications of these powerful mathematical tools to games and processes such as Cops and Robbers, Zombie and Survivors, and Firefighting. Written in an engaging style, the book is accessible to a wide audience including mathematicians and computer scientists. Readers will find that the book provides state-of-the-art results, techniques, and directions in graph searching games, especially from the point of view of probabilistic methods. The authors describe three directions while providing numerous examples, which include: * Playing a deterministic game on a random board. * Players making random moves. * Probabilistic methods used to analyze a deterministic game.
Introduction to Radar Analysis, Second Edition is a major revision of the popular textbook. It is written within the context of communication theory as well as the theory of signals and noise. By emphasizing principles and fundamentals, the textbook serves as a vital source for students and engineers. Part I bridges the gap between communication, signal analysis, and radar. Topics include modulation techniques and associated Continuous Wave (CW) and pulsed radar systems. Part II is devoted to radar signal processing and pulse compression techniques. Part III presents special topics in radar systems including radar detection, radar clutter, target tracking, phased arrays, and Synthetic Aperture Radar (SAR). Many new exercise are included and the author provides comprehensive easy-to-follow mathematical derivations of all key equations and formulas. The author has worked extensively for the U.S. Army, the U.S. Space and Missile Command, and other military agencies. This is not just a textbook for senior level and graduates students, but a valuable tool for practicing radar engineers. Features Authored by a leading industry radar professional. Comprehensive up-to-date coverage of radar systems analysis issues. Easy to follow mathematical derivations of all equations and formulas Numerous graphical plots and table format outputs. One part of the book is dedicated to radar waveforms and radar signal processing.
The main goal is to offer readers a panorama of recent progress in nonlinear physics, complexity and transport with attractive chapters readable by a broad audience. It allows readers to gain an insight into these active fields of research and notably promotes the interdisciplinary studies from mathematics to experimental physics. To reach this aim, the book collects a selection of contributions to the CCT11 conference (Marseille, 23 - 27 May 2011).
Features Teaches software design by showing programmers how to build the tools they use every day. Each chapter includes exercises to help readers check and deepen their understanding. All the example code can be downloaded, re-used, and modified under an open license.
The second edition of this popular book presents the theory of graphs from an algorithmic viewpoint. The authors present the graph theory in a rigorous, but informal style and cover most of the main areas of graph theory. The ideas of surface topology are presented from an intuitive point of view. We have also included a discussion on linear programming that emphasizes problems in graph theory. The text is suitable for students in computer science or mathematics programs.
This volume is a record of the Workshop on Graphics and Communications organized within ESPRIT II Project 2463 ARGOSI (Applications Related Graphics and OSI Standards Integration). The workshop was included in the Eurographics workshop programme for 1990. The ARGOSI project essentially arose from the observation that international standards in the graphics and networking areas were generally being developed in isolation and that insufficient attention was being paid to the needs of applications whose requirements spanned several standards. The importance of the integration of graphics and networking has been growing over recent years, with the growth of interest in multi-media systems to support cooperative working, and the use of computer graphics techniques in the visualization of the results of scientific and engineering computations. The latter frequently involve high-speed links between workstations and supercomputers. The presentations in this volume cover a broad range of activities from a classification scheme for graphics and networking to interconnection experiments with broadband networks. Three topics were selected for detailed discussion in working groups: - Improvements to the computer graphics metafile standard, - The role of application profiles in graphics data exchange, - The impact of multi-media. The volume contains a record of the discussions and the recommendations from the working groups, subsequently endorsed by the workshop.
Linux for Embedded and Real-Time Applications, Fourth Edition, provides a practical introduction to the basics, covering the latest developments in this rapidly evolving technology. Ideal for those new to the use of Linux in an embedded environment, the book takes a hands-on approach that covers key concepts of building applications in a cross-development environment. Hands-on exercises focus on the popular open source BeagleBone Black board. New content includes graphical programming with QT as well as expanded and updated material on projects such as Eclipse, BusyBox - configuring and building, the U-Boot bootloader - what it is, how it works, configuring and building, and new coverage of the Root file system and the latest updates on the Linux kernel..
Features Teaches software design by showing programmers how to build the tools they use every day. Each chapter includes exercises to help readers check and deepen their understanding. All the example code can be downloaded, re-used, and modified under an open license.
The definitive practical guide to Microsoft Defender for Cloud covering new components and multi-cloud enhancements! Microsoft Defender for Cloud offers comprehensive tools for hardening resources, tracking security posture, protecting against attacks, and streamlining security management - all in one natively integrated toolset. Now, leading Microsoft security experts Yuri Diogenes and Tom Janetscheck help you apply its robust protection, detection, and response capabilities throughout your operations, protecting workloads running on all your cloud, hybrid, and on-premises platforms. This guide shows how to make the most of new components, enhancements, and deployment scenarios, as you address today's latest threat vectors. Sharing best practices, expert tips, and optimizations only available from Microsoft's Defender for Cloud team, the authors walk through improving everything from policies and governance to incident response and risk management. Whatever your role or experience, they'll help you address new security challenges far more effectively-and save hours, days, or even weeks. Two of Microsoft's leading cloud security experts show how to: Assess new threat landscapes, the MITRE ATT&CK framework, and the implications of ''assume-breach'' Explore Defender for Cloud architecture, use cases, and adoption considerations including multicloud with AWS and GCP Plan for effective governance, successful onboarding, and maximum value Fully visualize complex cloud estates and systematically reduce their attack surfaces Prioritize risks with Secure Score, and leverage at-scale tools to build secure cloud-native apps Establish consistent policy enforcement to avoid drift Use advanced analytics and machine learning to identify attacks based on signals from all cloud workloads Enhance security posture by integrating with the Microsoft Sentinel SIEM/SOAR, Microsoft Purview, and Microsoft Defender for Endpoint Leverage just-in-time VM access and other enhanced security capabilities About This Book For architects, designers, implementers, SecOps professionals, developers, and security specialists working in Microsoft Azure environments For all IT professionals and decision-makers concerned with securing modern hybrid/multicloud environments, cloud-native apps, and PaaS services
Discover a clear, straightforward explanation of both current operating system theory and today's practices within UNDERSTANDING OPERATING SYSTEMS, 8E. This leading book's proven approach begins with a valuable discussion of fundamentals before introducing specific operating systems. Fully updated, timely content offers an expanded analysis of how modern innovations, such as multi-core processing and wireless technologies, have impacted today's operating systems. Revised Research Topics within this edition's practical exercises encourage you to research emerging and influential topics on your own. In addition, updates throughout the final four chapters now highlight information on the most current versions of UNIX (including the latest Macintosh OS), Linux, Windows, and Android to equip you with the contemporary knowledge and skills you need to working most effectively with today's systems.
1. An up-to-date reference on Red Hat 8 with comparisons to Red Hat's 7 and 6 when warranted. 2. A combination of how to use and administer Linux and operating systems concepts (making this text unique to Linux textbooks) written in an easy-to-read manner. 3. Improved chapters on computer networks, regular expressions and scripting. Revised and additional examples to support the concepts in these chapters. 4. Comparisons between Red Hat Linux and other Linux distributions when such comparisons will be useful. 5. A set of ancillary material including a complete lab manual, text bank, power point notes, glossary of terms, instructor's manual and supplemental readings. The supplemental readings will allow for a smaller book while still retaining all of the important content. 6. Improved chapter reviews, added end-of-section activities, additional tables, improved figures (where possible) and "did you know" boxes inserted to provide useful facts.
Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed, followed by a concise discussion of the core networking skills you need to have to gain a strong handle on the subject matter. Chapters conclude with review questions and suggested labs so you can measure your level of understanding of the chapter's content.Serves as an ideal resource for gaining a solid understanding of fundamental security concepts and skillsOffers a straightforward and direct approach to security basics and covers anti-malware software products, firewalls, network topologies and devices, network ports, and moreReviews all the topics you need to know for taking the MTA 98-367 examProvides an overview of security components, looks at securing access with permissions, addresses audit policies and network auditing, and examines protecting clients and servers If you're new to IT and interested in entering the IT workforce, then "Microsoft Windows Security Essentials" is essential reading.
macOS Support Essentials 12, the official book for macOS support, is a top-notch primer for anyone who needs to support, troubleshoot, or optimize macOS Monterey, such as IT professionals, technicians, help desk specialists, and ardent Mac users. This is the only Apple Pro Training Series book that covers Monterey. You'll find in-depth, step-by-step instructions on everything from upgrading, updating, reinstalling and configuring macOS Monterey to setting-up network services. This book covers updated system utilities and new features in macOS Monterey: Passwords System Preference Live Text Voice Control User privacy settings Notarized apps Startup Security Utility And more! This book includes the following content: Authoritative explanations of underlying technologies, troubleshooting, system administration, and much more Focused lessons that take you step by step through practical, real-world tasks A Web Edition that provides the full text of the book online The Apple Pro Training Series is Apple's official self-paced learning resource. Books in this series offer downloadable lesson files and an online version of the book. Additional information on this and other books in this series can be found at www.peachpit.com/apple. For more on certification, visit training.apple.com.
Make the most of your Windows 11 laptop or desktop computer--without becoming a technical expert! This book is the fastest way to get comfortable, get productive, get online, get started with social networking, make more connections, and have more fun! Even if you've never used a Windows computer before, this book shows you how to do what you want, one incredibly clear and easy step at a time. Computer basics have never, ever been this simple! Who knew how simple using computers could be? This is today's best beginner's guide to using your computer or tablet with the Windows 11 operating system...simple, practical instructions for doing everything you really want to do! Here's a small sample of what you'll learn: * Set up your computer and personalize the Windows 11 Start menu and desktop * Connect to the Internet and browse the Web with Microsoft Edge * Get started with social networking on Facebook, Twitter, Pinterest, and LinkedIn * Video chat with Zoom and Microsoft Teams * Use Windows 11's built-in apps--and find great new apps in the Microsoft Store * Connect printers and external storage * Connect to a home wireless network or public Wi-Fi hotspot * Go online to shop and sell--including ordering food and groceries online * Get work done quickly with Microsoft Office * Organize, view, and share photos * Listen to streaming music with Pandora and Spotify * Watch streaming movies and TV shows with Amazon Prime Video, Disney+, HBO Max, Hulu, Netflix, and more * Protect yourself against viruses, spyware, and spam
The bestselling study guide for the popular Linux Professional Institute Certification Level 1 (LPIC-1). The updated fifth edition of LPIC-1: Linux Professional Institute Certification Study Guide is a comprehensive, one-volume resource that covers 100% of all exam objectives. Building on the proven Sybex Study Guide approach, this essential resource offers a comprehensive suite of study and learning tools such as assessment tests, hands-on exercises, chapter review questions, and practical, real-world examples. This book, completely updated to reflect the latest 101-500 and 102-500 exams, contains clear, concise, and user-friendly information on all of the Linux administration topics you will encounter on test day. Key exam topics include system architecture, Linux installation and package management, GNU and UNIX commands, user interfaces and desktops, essential system services, network and server security, and many more. Linux Servers currently have a 20% market share which continues to grow. The Linux OS market saw a 75% increase from last year and is the third leading OS, behind Windows and MacOS. There has never been a better time to expand your skills, broaden your knowledge, and earn certification from the Linux Professional Institute. A must-have guide for anyone preparing for the 101-500 and 102-500 exams, this study guide enables you to: Assess your performance on practice exams to determine what areas need extra study Understand and retain vital exam topics such as administrative tasks, network configuration, booting Linux, working with filesystems, writing scripts, and using databases Gain insights and tips from two of the industry's most highly respected instructors, consultants, and authors Access Sybex interactive tools that include electronic flashcards, an online test bank, customizable practice exams, bonus chapter review questions, and a searchable PDF glossary of key terms LPIC-1: Linux Professional Institute Certification Study Guide is ideal for network and system administrators studying for the LPIC-1 exams, either for the first time or for the purpose of renewing their certifications.
This book covers the most important topics in the area of pattern recognition, object recognition, computer vision, robot vision, medical computing, computational geometry, and bioinformatics systems. Students and researchers will find a comprehensive treatment of polygonal approximation and its real life applications. The book not only explains the theoretical aspects but also presents applications with detailed design parameters. The systematic development of the concept of polygonal approximation of digital curves and its scale-space analysis are useful and attractive to scholars in many fields. |
![]() ![]() You may like...
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright
Paperback
R1,581
Discovery Miles 15 810
PowerShell, IT Pro Solutions…
William R. Stanek, William Stanek
Hardcover
R1,550
Discovery Miles 15 500
PowerShell for Administration, IT Pro…
William R. Stanek, William Stanek
Hardcover
R1,533
Discovery Miles 15 330
|