![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
This book presents a historical and philosophical analysis of programming systems, intended as large computational systems like, for instance, operating systems, programmed to control processes. The introduction to the volume emphasizes the contemporary need of providing a foundational analysis of such systems, rooted in a broader historical and philosophical discussion. The different chapters are grouped around three major themes. The first concerns the early history of large systems developed against the background of issues related to the growing semantic gap between hardware and code. The second revisits the fundamental issue of complexity of large systems, dealt with by the use of formal methods and the development of `grand designs' like Unix. Finally, a third part considers several issues related to programming systems in the real world, including chapters on aesthetical, ethical and political issues. This book will interest researchers from a diversity of backgrounds. It will appeal to historians, philosophers, as well as logicians and computer scientists who want to engage with topics relevant to the history and philosophy of programming and more specifically the role of programming systems in the foundations of computing.
This volume is a record of the Workshop on Graphics and Communications organized within ESPRIT II Project 2463 ARGOSI (Applications Related Graphics and OSI Standards Integration). The workshop was included in the Eurographics workshop programme for 1990. The ARGOSI project essentially arose from the observation that international standards in the graphics and networking areas were generally being developed in isolation and that insufficient attention was being paid to the needs of applications whose requirements spanned several standards. The importance of the integration of graphics and networking has been growing over recent years, with the growth of interest in multi-media systems to support cooperative working, and the use of computer graphics techniques in the visualization of the results of scientific and engineering computations. The latter frequently involve high-speed links between workstations and supercomputers. The presentations in this volume cover a broad range of activities from a classification scheme for graphics and networking to interconnection experiments with broadband networks. Three topics were selected for detailed discussion in working groups: - Improvements to the computer graphics metafile standard, - The role of application profiles in graphics data exchange, - The impact of multi-media. The volume contains a record of the discussions and the recommendations from the working groups, subsequently endorsed by the workshop.
Reference MWAPI shows readers how to develop robust Windows
applications using the innovative M Windowing Applications
Interface (MWAPI). This book uses numerous tables, illustrations,
sample programs, images and discussions to demonstrate how high
quality graphical user interface applications are created using a
technology that insulates the user from the intricacies and
complexities of any particular Windows environment. It shows how
applications created through the host-independent development
environment can be ported to any Windows platform with no change in
source code while maintaining the look and feel of event-processing
methodology. It examines portability and compact code, some of the
traits the MWAPI shares with the Java programming language.
Linux for Embedded and Real-Time Applications, Fourth Edition, provides a practical introduction to the basics, covering the latest developments in this rapidly evolving technology. Ideal for those new to the use of Linux in an embedded environment, the book takes a hands-on approach that covers key concepts of building applications in a cross-development environment. Hands-on exercises focus on the popular open source BeagleBone Black board. New content includes graphical programming with QT as well as expanded and updated material on projects such as Eclipse, BusyBox - configuring and building, the U-Boot bootloader - what it is, how it works, configuring and building, and new coverage of the Root file system and the latest updates on the Linux kernel..
Discover a clear, straightforward explanation of both current operating system theory and today's practices within UNDERSTANDING OPERATING SYSTEMS, 8E. This leading book's proven approach begins with a valuable discussion of fundamentals before introducing specific operating systems. Fully updated, timely content offers an expanded analysis of how modern innovations, such as multi-core processing and wireless technologies, have impacted today's operating systems. Revised Research Topics within this edition's practical exercises encourage you to research emerging and influential topics on your own. In addition, updates throughout the final four chapters now highlight information on the most current versions of UNIX (including the latest Macintosh OS), Linux, Windows, and Android to equip you with the contemporary knowledge and skills you need to working most effectively with today's systems.
"Not only for MacOS and Linux users, but also a great resource for Windows PS users." - Bruce Bergman Learn PowerShell in a Month of Lunches: Covers Windows, Linux, and macOS is a task-focused tutorial for administering Linux and macOS systems using Microsoft PowerShell. Adapted by PowerShell team members Travis Plunk and Tyler Leonhardt from the bestselling Learn Windows PowerShell in a Month of Lunches by community legends Don Jones and Jeffrey Hicks, it features Linux-based examples covering core language features and admin tasks. Designed for busy IT professionals, this innovative guide will take you from the basics to PowerShell proficiency through 25 tutorials you can do in your lunch break. about the technology The PowerShell scripting language and administrative shell was initially created for Windows, providing a high-quality command-line interface and awesome automation features. As part of Microsoft's ongoing strategy to support non-Windows platforms with its Azure cloud service and .NET Core framework, PowerShell now runs on Linux and macOS. Like Bash, PowerShell can execute and script nearly any aspect of Linux, so you can easily manage repetitive daily tasks, servers, Cloud resources, Continuous Integration pipelines, and more. Because PowerShell is a full-featured programming language, however, it provides capability well beyond traditional shell scripting languages, such as the ability to treat OS components as objects. about the book Learn PowerShell in a Month of Lunches: Covers Windows, Linux, and macOS is a user-friendly tutorial to managing Linux and macOS systems with PowerShell. It's based on the bestselling Learn Windows PowerShell in a Month of Lunches, which has introduced PowerShell to nearly 100,000 readers. You'll learn how PowerShell shapes up to Bash or Python scripting as you write and run simple scripts that automate boring daily tasks. As you progress through the book, you'll use PowerShell to write Continuous Integration Pipelines and manage cloud-based servers. Just set aside one hour a day for a month, and you'll be automating tasks faster than you ever thought possible! what's inside - Why you should use PowerShell on Linux and macOS - Background jobs and automation techniques - Simple scripting to automate repetitive daily tasks - Common syntax and commands cheat sheet - Each lesson takes you an hour or less about the reader For IT professionals comfortable administering Windows or Linux. No previous experience with PowerShell or Bash required. about the author Travis Plunk has been a Software Engineer on various PowerShell teams since 2013, and at Microsoft since 1999. He was involved in open sourcing PowerShell and has worked on the project full time since shortly after the project was announced. James Petty is a Microsoft MVP, and the CEO and Executive Director for the DevOps Collective and PowerShell.org. Tyler Leonhardt has been a Software Engineer on the PowerShell team since 2017, and at Microsoft since 2016. He is a core maintainer of the PowerShell extension for Visual Studio Code. Learn Windows PowerShell in a Month of Lunches was written by PowerShell community legends Don Jones and Jeffrey Hicks, who have years of experience as successful PowerShell trainers.
Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You'll learn how to prepare infrastructure with Microsoft's integrated tools, prebuilt templates, and managed services-and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security at physical, network, host, application, and data layers. You'll learn best practices for security-aware deployment, operational management, threat mitigation, and continuous improvement-so you can help protect all your data, make services resilient to attack, and stay in control no matter how your cloud systems evolve. Three Microsoft Azure experts show you how to: * Understand cloud security boundaries and responsibilities * Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection * Explore Azure's defense-in-depth security architecture * Use Azure network security patterns and best practices * Help safeguard data via encryption, storage redundancy, rights management, database security, and storage security * Help protect virtual machines with Microsoft Antimalware for Azure Cloud Services and Virtual Machines * Use the Microsoft Azure Key Vault service to help secure cryptographic keys and other confidential information * Monitor and help protect Azure and on-premises resources with Azure Security Center and Operations Management Suite * Effectively model threats and plan protection for IoT systems * Use Azure security tools for operations, incident response, and forensic investigation
macOS Support Essentials 12, the official book for macOS support, is a top-notch primer for anyone who needs to support, troubleshoot, or optimize macOS Monterey, such as IT professionals, technicians, help desk specialists, and ardent Mac users. This is the only Apple Pro Training Series book that covers Monterey. You'll find in-depth, step-by-step instructions on everything from upgrading, updating, reinstalling and configuring macOS Monterey to setting-up network services. This book covers updated system utilities and new features in macOS Monterey: Passwords System Preference Live Text Voice Control User privacy settings Notarized apps Startup Security Utility And more! This book includes the following content: Authoritative explanations of underlying technologies, troubleshooting, system administration, and much more Focused lessons that take you step by step through practical, real-world tasks A Web Edition that provides the full text of the book online The Apple Pro Training Series is Apple's official self-paced learning resource. Books in this series offer downloadable lesson files and an online version of the book. Additional information on this and other books in this series can be found at www.peachpit.com/apple. For more on certification, visit training.apple.com.
Introduction to Radar Analysis, Second Edition is a major revision of the popular textbook. It is written within the context of communication theory as well as the theory of signals and noise. By emphasizing principles and fundamentals, the textbook serves as a vital source for students and engineers. Part I bridges the gap between communication, signal analysis, and radar. Topics include modulation techniques and associated Continuous Wave (CW) and pulsed radar systems. Part II is devoted to radar signal processing and pulse compression techniques. Part III presents special topics in radar systems including radar detection, radar clutter, target tracking, phased arrays, and Synthetic Aperture Radar (SAR). Many new exercise are included and the author provides comprehensive easy-to-follow mathematical derivations of all key equations and formulas. The author has worked extensively for the U.S. Army, the U.S. Space and Missile Command, and other military agencies. This is not just a textbook for senior level and graduates students, but a valuable tool for practicing radar engineers. Features Authored by a leading industry radar professional. Comprehensive up-to-date coverage of radar systems analysis issues. Easy to follow mathematical derivations of all equations and formulas Numerous graphical plots and table format outputs. One part of the book is dedicated to radar waveforms and radar signal processing.
The second edition of this popular book presents the theory of graphs from an algorithmic viewpoint. The authors present the graph theory in a rigorous, but informal style and cover most of the main areas of graph theory. The ideas of surface topology are presented from an intuitive point of view. We have also included a discussion on linear programming that emphasizes problems in graph theory. The text is suitable for students in computer science or mathematics programs.
Graph Searching Games and Probabilistic Methods is the first book that focuses on the intersection of graph searching games and probabilistic methods. The book explores various applications of these powerful mathematical tools to games and processes such as Cops and Robbers, Zombie and Survivors, and Firefighting. Written in an engaging style, the book is accessible to a wide audience including mathematicians and computer scientists. Readers will find that the book provides state-of-the-art results, techniques, and directions in graph searching games, especially from the point of view of probabilistic methods. The authors describe three directions while providing numerous examples, which include: * Playing a deterministic game on a random board. * Players making random moves. * Probabilistic methods used to analyze a deterministic game.
Prepare for Microsoft Exam AZ-500: Demonstrate your real-world knowledge of Microsoft Azure security, including tools and techniques for protecting identity, access, platforms, data, and applications, and for effectively managing security operations. Designed for professionals with Azure security experience, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified: Azure Security Engineer Associate level. Focus on the expertise measured by these objectives: Manage identity and access Implement platform protection Manage security operations Secure data and applications This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you have expertise implementing security controls and threat protection, managing identity and access, and protecting assets in cloud and hybrid environments About the Exam Exam AZ-500 focuses on the knowledge needed to manage Azure Active Directory identities; configure secure access with Azure AD; manage application access and access control; implement advanced network security; configure advanced security for compute; monitor security with Azure Monitor, Azure Firewall manager, Azure Security Center, Azure Defender, and Azure Sentinel; configure security policies; configure security for storage and databases; and configure and manage Key Vault. About Microsoft Certification Passing this exam fulfills your requirements for the Microsoft Certified: Azure Security Engineer Associate credential, demonstrating your expertise as an Azure Security Engineer capable of maintaining security posture, identifying and remediating vulnerabilities, implementing threat protection, and responding to incident escalations as part of a cloud-based management and security team. See full details at: microsoft.com/learn
Features Teaches software design by showing programmers how to build the tools they use every day. Each chapter includes exercises to help readers check and deepen their understanding. All the example code can be downloaded, re-used, and modified under an open license.
Features Teaches software design by showing programmers how to build the tools they use every day. Each chapter includes exercises to help readers check and deepen their understanding. All the example code can be downloaded, re-used, and modified under an open license.
Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a practical field guide approach to performance monitoring and analysis from experts who do this work every day. Think of this book as your own guide to "What would Microsoft support do?" when you have a Windows performance issue. Author Clint Huffman, a Microsoft veteran of over fifteen years, shows you how to identify and alleviate problems with the computer resources of disk, memory, processor, and network. You will learn to use performance counters as the initial indicators, then use various tools to "dig in" to the problem, as well as how to capture and analyze boot performance problems.
Proven best practices for success with every Azure monitoring and management service For cloud environments to deliver optimal value, their monitoring and management services must be designed, deployed, and managed well. Leading cloud consultant Avinash Valiramani shows how to simplify administration, reduce downtime, control cost, solve problems faster, and prepare for any workload in any environment. Explore detailed, expert coverage of Azure Backup, Azure Site Recovery, Azure Migrate, Azure Monitor, Azure Network Watcher, Azure Portal, Azure Cloud Shell, Azure Service Health, Azure Cost Management, and more. Whatever your role in delivering effi cient, reliable cloud services, this best practice, deep dive guide will help you make the most of your Azure investment. Leading Azure consultant Avinash Valiramani shows how to: Back up on-premises, Azure-based, and other cloud workloads for short- and long-term retention Implement simple, stable, cost-effective business continuity/disaster recovery with Azure Site Recovery Discover, assess, and migrate diverse workloads to Azure, VMs, web apps, databases, and more Monitor all Azure applications, VMs, and other deployed services centrally via Azure Monitor Track, troubleshoot, and optimize networking for IaaS resources Create and manage anything from single-service solutions to complex multi-service architectures Run Azure Cloud Shell's cloud-native command line from any device, anywhere Monitor service health, workload levels, service layer resources, and availability Also look for these Definitive Guides to Azure success: Microsoft Azure Compute: The Definitive Guide Microsoft Azure Networking: The Definitive Guide Microsoft Azure Storage: The Definitive Guide
Learn the critical tips and techniques to make using Xcode for the iPhone, iPad, or Mac easier, and even fun. Explore the features and functionality of Xcode you may not have heard of. Go under the hood to discover how projects really work, so when they stop working, you'll know how to fix them. Explore the common problems developers face when using Xcode, and find out how to get the most out of your IDE. Dig into Xcode, and you'll discover it's richer and more powerful than you might have thought. Get a huge productivity boost by working with Xcode instead of against it. Instead of hacky code fixes and manual processes, once you know the the why and how of Xcode's process, you'll discover that doing things Xcode's way makes your app development more elegant and less aggravating. Explore the major features of Xcode: project management, building UIs with storyboards, code editing, compiling apps, fixing bugs and performance problems, unit- and UI testing, and source code management. Go beyond the basics and explore tasks that professionals deal with when they're working on big projects. Create storyboards that many developers can work on at once, even as projects grow to hundreds or thousands of files. Find the tools that make the code editor pleasant to work with, even in long coding sessions. Discover the right way to find and fix bugs when you have lots of code that's not always playing nicely together. Dig into specific and little-discussed features that help developers on Apple's other platforms: macOS, watchOS, and tvOS. When you're ready to distribute your app, learn how Apple's code-signing system really works. Find out when to let Xcode handle it automatically, and how to do it manually when needed. Discover how much easier and more fun iOS development is when you know the secrets of the tools. What You Need: This book requires Xcode 9 and a Mac running macOS High Sierra (10.13.2) or later. Additionally, an iOS device is recommended for on-device testing but not required.
My Windows 11 Computer for Seniors Easy, clear, readable, and focused on what you want to do Step-by-step instructions for the tasks you care about most Large, full-color, close-up photos show you exactly what to do Common-sense help whenever you run into problems Tips and notes to help you do even more Over the years, you've learned a lot. Now, learn Windows 11! We've brought together all the Windows 11 skills you need to stay connected and safe, express your creativity, find new passions, and live a better, healthier life. Our crystal-clear instructions respect your smarts but never assume you're an expert. Big, colorful photos on nearly every page make this book incredibly easy to read and use! * Get started with Windows 11, whether you're experienced with computers or not * Learn all that's new and different in Windows 11, including the new taskbar and Start menu * Reliably connect to the Internet, both at home and away * Explore the Web with the Microsoft Edge browser and Google Search * Make and receive video and voice calls with Microsoft Teams and Zoom * Send and receive email with the Windows Email app * Shop safely online and avoid online scams * Find, install, and use the best Windows apps * Connect your phone to your PC to text, make calls, and share photos * Stay connected with friends and family on Facebook, Pinterest, and Twitter * Store, touch up, and share your pictures * Keep track of all your files and folders * Watch streaming TV shows and movies and listen to streaming music on your PC * Configure Windows 11 to work better for those with vision and physical challenges * Fix common PC problems and manage Windows updates
Use your laptop or tablet with confidence This practical book will have you achieving immediate results using: a friendly, visual approach simple language practical, task-based examples large, full-colour screenshots. Discover everything you want to know about choosing and using your laptop or tablet in this easy-to-use guide; from the most essential tasks that you'll want to perform, to solving the most common problems you'll encounter. Practical. Simple. Fast. Get the most out of your laptop or tablet with practical tips on every page: * ALERT: Solutions to common problems * HOT TIP: Time-saving shortcuts * SEE ALSO: Related tasks and information * DID YOU KNOW? Additional features to explore * WHAT DOES THIS MEAN? Jargon explained in plain English
The tools, guidelines, and procedures that IS auditors need Auditing Information Systems, Second Edition, explains clearly how to audit the controls and security over all types of information systems environments. The concepts and techniques in the book enable auditors, information security professionals, managers, and audit committee members of every knowledge and skill level to truly understand whether or not their computing systems are safe. The book provides a detailed examination of contemporary auditing issues such as:
Auditing Information Systems, Second Edition gives auditing professionals the tools they need to get their job done right. It is a must-have reference for any auditor’s library.
NX-OS and Cisco Nexus SwitchingNext-Generation Data Center
ArchitecturesSecond Edition The complete guide to planning,
configuring, managing, and troubleshooting NX-OS in the
enterprise-updated with new technologies and examples Using Cisco
Nexus switches and the NX-OS operating system, data center
professionals can build unified core networks that deliver
unprecedented scalability, resilience, operational continuity,
flexibility, and performance. "NX-OS and Cisco Nexus Switching,"
Second Edition, is the definitive guide to applying these
breakthrough technologies in real-world environments. This
extensively updated edition contains five new chapters addressing a
wide range of new technologies, including FabricPath, OTV, IPv6,
QoS, VSG, Multi-Hop FCoE, LISP, MPLS, Layer 3 on Nexus 5000, and
Config sync. It also presents a start-to-finish, step-by-step case
study of an enterprise customer who migrated from Cisco Catalyst to
a Nexus-based architecture, illuminated with insights that are
applicable in virtually any enterprise data center. Drawing on
decades of experience with enterprise customers, the authors cover
every facet of deploying, configuring, operating, and
troubleshooting NX-OS in today's data center. You'll find updated
best practices for high availability, virtualization, security,
This book covers the most important topics in the area of pattern recognition, object recognition, computer vision, robot vision, medical computing, computational geometry, and bioinformatics systems. Students and researchers will find a comprehensive treatment of polygonal approximation and its real life applications. The book not only explains the theoretical aspects but also presents applications with detailed design parameters. The systematic development of the concept of polygonal approximation of digital curves and its scale-space analysis are useful and attractive to scholars in many fields.
The main goal is to offer readers a panorama of recent progress in nonlinear physics, complexity and transport with attractive chapters readable by a broad audience. It allows readers to gain an insight into these active fields of research and notably promotes the interdisciplinary studies from mathematics to experimental physics. To reach this aim, the book collects a selection of contributions to the CCT11 conference (Marseille, 23 - 27 May 2011).
Recently, the pressure for fast processing and efficient storage of large data with complexrelations increased beyond the capability of traditional databases. Typical examples include iPhone applications, computer aided design - both electrical and mechanical, biochemistry applications, and incremental compilers. Serialization, which is sometimes used in such situations is notoriously tedious and error prone. In this book, Jiri Soukup and Petr Macha ek show in detail how to write programs which store their internal data automatically and transparently to disk. Together with special data structure libraries which treat relations among objects as first-class entities, and with a UML class-diagram generator, the core application code is much simplified. The benchmark chapter shows a typical example where persistent data is faster by the order of magnitude than with a traditional database, in both traversing and accessing the data. The authors explore and exploit advanced features of object-oriented languages in a depth hardly seen in print before. Yet, you as a reader need only a basic knowledge of C++, Java, C#, or Objective C. These languages are quite similar with respect to persistency, and the authors explain their differences where necessary. The book targets professional programmers working on any industry applications, it teaches you how to design your own persistent data or how to use the existing packages efficiently. Researchers in areas like language design, compiler construction, performance evaluation, and no-SQL applications will find a wealth of novel ideas and valuable implementation tips. Under http: //www.codefarms.com/bk, you will find a blog and other information, including a downloadable zip file with the sources of all the listings that are longer than just a few lines - ready to compile and run." |
You may like...
The Continuing Arms Race - Code-Reuse…
Per Larsen, Ahmad-Reza Sadeghi
Hardcover
R2,482
Discovery Miles 24 820
Windows Server 2012 Security from End to…
Thomas W. Shinder, Yuri Diogenes, …
Paperback
R2,156
Discovery Miles 21 560
|