![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
Whether you are a professional new to the user-centered design
field, or an experienced designer who needs to learn the
fundamentals of user interface design and evaluation, this book can
lead the way.
Almost all of the messages that are received by the cerebral cortex
from the environment or from the body's internal receptors come
through the thalamus and much current thought about perceptual
processing is based on sensory pathways that relay in the thalamus.
This volume focuses on three major areas: the role of
thalamocortical communication in cognition and attention; the role
of the thalamus in communication between cortical areas; the
hypothesis that much or all of the information relayed by thalamus,
even to classical, pure "sensory" areas of cortex, represents a
corollary message being sent simultaneously to motor centers. It
presents a broad overview of important recent advances in these
areas.
Appropriate for all courses in Tcl/Tk scripting, and many courses in Unix shell scripting. Practical Programming in Tcl/Tk, Fourth Edition is the definitive guide to Tcl/Tk programming for developers at all levels—including experienced Perl and Python programmers who want to use Tk to build high-quality, cross-platform user interfaces. Thoroughly updated for Tcl/Tk 8.4, this book brings together comprehensive, authoritative coverage of every Tcl and Tk command in the core toolkits, along with detailed examples that demonstrate the best ways to use the Tcl/Tk toolkit. Extensive new Tcl/Tk 8.4 coverage includes: the Tcl/Tk virtual filesystem (VFS); spinbox, panedwindow, labelframe, and other new widgets; and improved internationalization support. The book includes an exceptionally clear introduction to the unique Tcl programming model, as well as practical coverage of cross-platform development for Unix, Windows, and Macintosh; Web application development with the TclHttpd web server; and much more. The accompanying CD-ROM contains all sample code from the book, as well as the latest binary distributions of Tcl/Tk, Tcl extensions, and an extensive collection of Tcl/Tk freeware.
A clear, comprehensive guide to VMware's latest virtualization solution Mastering VMware NSX for vSphere is the ultimate guide to VMware's network security virtualization platform. Written by a rock star in the VMware community, this book offers invaluable guidance and crucial reference for every facet of NSX, with clear explanations that go far beyond the public documentation. Coverage includes NSX architecture, controllers, and edges; preparation and deployment; logical switches; VLANS and VXLANS; logical routers; virtualization; edge network services; firewall security; and much more to help you take full advantage of the platform's many features. More and more organizations are recognizing both the need for stronger network security and the powerful solution that is NSX; usage has doubled in the past year alone, and that trend is projected to grow--and these organizations need qualified professionals who know how to work effectively with the NSX platform. This book covers everything you need to know to exploit the platform's full functionality so you can: Step up security at the application level Automate security and networking services Streamline infrastructure for better continuity Improve compliance by isolating systems that handle sensitive data VMware's NSX provides advanced security tools at a lower cost than traditional networking. As server virtualization has already become a de facto standard in many circles, network virtualization will follow quickly--and NSX positions VMware in the lead the way vSphere won the servers. NSX allows you to boost security at a granular level, streamline compliance, and build a more robust defense against the sort of problems that make headlines. Mastering VMware NSX for vSphere helps you get up to speed quickly and put this powerful platform to work for your organization.
MATLAB®, now the industry-standard engineering language for computation, analysis, and visualization, continues to evolve in its capabilities. Version 6.x incorporated several major improvements, including significant enhancements to its graphics features, such as transparencies, increased 3-D visualization, and an improved rendering engine.
The conventional wisdom was that biology influenced mathematics and computer science. But a new approach has taken hold: that of transferring methods and tools from computer science to biology. The reverse trend is evident in Grammars and Automata for String Processing: From Mathematics and Computer Science to Biology and Back. The contributors address the structural (syntactical) view of the domain. Mathematical linguistics and computer science can offer various tools for modeling complex macromolecules and for analyzing and simulating biological issues. This collection is valuable for students and researchers in biology, computer science, and applied mathematics.
1. An up-to-date reference on Red Hat 8 with comparisons to Red Hat's 7 and 6 when warranted. 2. A combination of how to use and administer Linux and operating systems concepts (making this text unique to Linux textbooks) written in an easy-to-read manner. 3. Improved chapters on computer networks, regular expressions and scripting. Revised and additional examples to support the concepts in these chapters. 4. Comparisons between Red Hat Linux and other Linux distributions when such comparisons will be useful. 5. A set of ancillary material including a complete lab manual, text bank, power point notes, glossary of terms, instructor's manual and supplemental readings. The supplemental readings will allow for a smaller book while still retaining all of the important content. 6. Improved chapter reviews, added end-of-section activities, additional tables, improved figures (where possible) and "did you know" boxes inserted to provide useful facts.
Mastering cluster technology-the linking of servers-is becoming increasingly important for application and system programmers and network designers, administrators, and managers. With Microsoft's Windows NT cluster server being the first to tie cluster technology with a major operating system, it appears destined to take a leadership position in the industry. Introduction to Microsoft Windows NT Cluster Server provides all you need to know to develop your abilities for this essential technology. The author provides both introductory and advanced material focused on the three basic functions: fault tolerant computing (failover), load balancing, and centralized administration and monitoring. He guides the reader from the basics of cluster servers, through Microsoft's cluster server set-up, communication, programming, and administration. Written for professionals who are familiar with the Windows NT operating system and have programming experience, Introduction to Microsoft Windows NT Cluster Server contains information instrumental in helping you achieve zero downtime.
In this international collection of papers there is a wealth of knowledge on artificial intelligence (AI) and cognitive science (CS) techniques applied to the problem of providing help systems mainly for the UNIX operating system. The research described here involves the representation of technical computer concepts, but also the representation of how users conceptualise such concepts. The collection looks at computational models and systems such as UC, Yucca, and OSCON programmed in languages such as Lisp, Prolog, OPS-5, and C which have been developed to provide UNIX help. These systems range from being menu-based to ones with natural language interfaces, some providing active help, intervening when they believe the user to have misconceptions, and some based on empirical studies of what users actually do while using UNIX. Further papers investigate planning and knowledge representation where the focus is on discovering what the user wants to do, and figuring out a way to do it, as well as representing the knowledge needed to do so. There is a significant focus on natural language dialogue where consultation systems can become active, metaphors, and users' mistaken beliefs. Much can be learned from seeing how AI and CS techniques can be investigated in depth while being applied to a real test-bed domain such as help on UNIX.
Prepare for Microsoft Exam AZ-500: Demonstrate your real-world knowledge of Microsoft Azure security, including tools and techniques for protecting identity, access, platforms, data, and applications, and for effectively managing security operations. Designed for professionals with Azure security experience, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified: Azure Security Engineer Associate level. Focus on the expertise measured by these objectives: Manage identity and access Implement platform protection Manage security operations Secure data and applications This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you have expertise implementing security controls and threat protection, managing identity and access, and protecting assets in cloud and hybrid environments About the Exam Exam AZ-500 focuses on the knowledge needed to manage Azure Active Directory identities; configure secure access with Azure AD; manage application access and access control; implement advanced network security; configure advanced security for compute; monitor security with Azure Monitor, Azure Firewall manager, Azure Security Center, Azure Defender, and Azure Sentinel; configure security policies; configure security for storage and databases; and configure and manage Key Vault. About Microsoft Certification Passing this exam fulfills your requirements for the Microsoft Certified: Azure Security Engineer Associate credential, demonstrating your expertise as an Azure Security Engineer capable of maintaining security posture, identifying and remediating vulnerabilities, implementing threat protection, and responding to incident escalations as part of a cloud-based management and security team. See full details at: microsoft.com/learn
Although numerous sources document aspects of user-centered design, there are few references that consider how a designer transforms the information gathered about users and their work into an effective user interface design. This book explains just how designers bridge that gap. A group of leading experts in GUI design describe their methods in the context of specific design projects, and while the projects, processes, and methods vary considerably, the common theme is building a bridge between user requirements and user interface design.
Barry Kauler explains the exacting details of Windows programming at the systems level, revealing architectural details that Microsoft has never publicly documented. Ideal for software developers who are moving applications from 3.x to Win95, the book gives how-to information and systems programming tips and tricks. The companion disk contains all example programs, source code, and utilities in the book.
This book/disk set for experienced developers offers alternatives for interfacing Windows applications to hardware. This new edition has been expanded to include Windows 95. The companion disk includes source code and tools. (Computer Books - Languages/Programming)
Master operating system development. FreeDOS Kernel explains the construction and operation of Pat Villani's DOS-C - a highly portable, single threaded operating system. Written in C and with system calls similar to MS-DOS, the FreeDOS kernel provides an excellent source code base for experimentation. Study it, modify it and use it without getting lost in the complexity of most microkernels. The book and companion disk include the full source code for an 80X86 kernel and support files. Achieve real platform independence with DOS compatibility. FreeDOS uses the de facto DOS hardware standards and provides binary compatibility for MS-DOS applications, compiles with Borland C, Microsoft C and other C cross-compilers without using their run-time libraries, and is the kernel provided by the FreeDOS community on the Internet. Provide embedded systems with full OS functionality. The FreeDOS kernel provides embedded systems applications with the functionality of larger operating systems, including file storage, embedded databases, and sophisticated device control. Simplify the design of your embedded systems by using your PC for development and then linking your own version of FreeDOS to create the application ROM.
Validation of Computerized Analytical and Networked Systems provides the definitive rationales, logic, and methodology for validation of computerized analytical systems. Whether you are involved with formulation or analytical development laboratories, chemical or microbiological quality control laboratories, LIMS installations, or any aspect of robotic in a healthcare laboratory, this book furnishes complete validation details. International and FDA regulations and requirements are discussed and juxtaposed with numerous practical examples that show you how to cost-effectively and efficiently accomplish validation acceptable to FDA GCP/GLP/GMP, NAMAS, and EN45001 standards. The templates included provide documentation examples and the many checklists found throughout the book assure that all aspects of covered in a logical sequence. The chapters describe and explain such topics as the Product Life Cycle revalidation, change control, documentation requirements, qualifications, testing, data validation and traceability, inspection, SOPs, and many other that help streamline the validation process.
Designed as a self-study guide, the book describes the real-world tradeoffs encountered in building a production-quality, platform-retargetable compiler. The authors examine the implementation of lcc, a production-quality, research-oriented retargetable compiler, designed at AT&T Bell Laboratories for the ANSI C programming language. The authors' innovative approach-a "literate program" that intermingles the text with the source code-uses a line-by-line explanation of the code to demonstrate how lcc is built.
The number of security countermeasures against user-land
exploitation is on the rise. Because of this, kernel exploitation
is becoming much more popular among exploit writers and attackers.
Playing with the heart of the operating system can be a dangerous
game: This book covers the theoretical techniques and approaches
needed to develop reliable and effective kernel-level exploits and
applies them to different operating systems (Linux, Solaris, Mac OS
X, and Windows). Kernel exploits require both art and science to
achieve. Every OS has its quirks and so every exploit must be
molded to fully exploit its target. This book discusses the most
popular OS families-UNIX derivatives, Mac OS X, and Windows-and how
to gain complete control over them. Concepts and tactics are
presented categorically so that even when a specifically detailed
exploit has been patched, the foundational information that you
have read will help you to write a newer, better attack or a more
concrete design and defensive structure.
The fields of computer-assisted instruction and intelligent tutoring systems have had few vehicles for sharing ideas or programs. Different backgrounds and settings meant reading different journals and attending different conferences. The purpose of this book is to foster a mutual understanding of shared issues and contemporary approaches so as to further powerful educational applications of computing. It is unique in drawing on both the intelligent tutoring systems and computer assisted instruction communities. Each chapter provides an in-depth discussion by leaders in these fields of current work, focusing on instructional programs -- their design, use, and evaluation. The editors and authors have made extensive efforts to ensure each chapter's clarity and readability for both communities.
The fields of computer-assisted instruction and intelligent
tutoring systems have had few vehicles for sharing ideas or
programs. Different backgrounds and settings meant reading
different journals and attending different conferences. The purpose
of this book is to foster a mutual understanding of shared issues
and contemporary approaches so as to further powerful educational
applications of computing. It is unique in drawing on both the
intelligent tutoring systems and computer assisted instruction
communities.
Learning Visual Basic .NET is a complete introduction to VB.NET and object-oriented programming. By using hundreds of examples, this book demonstrates how to develop various kinds of applications--including those that work with databases--and web services. Learning Visual Basic .NET will help you build a solid foundation in .NET.
The definitive guide to modern Windows internals: new coverage of virtualization, file systems, boot, security, and more. For advanced computing professionals, this is the definitive up-to-date guide to how Windows core components behave "under the hood." Using it, experienced developers can build more powerful and scalable software, administrators can debug complex system and performance problems, and security researchers can harden their systems. This Seventh Edition is fully updated through the May 2021 (21H1/2104) updates to Windows 10 and Windows Server (2022, 2019, and 2016). It adds extensive content on Hyper-V, plus fully rewritten chapters on the boot process, new storage technologies, and Windows system and management mechanisms. As always, it delivers unparalleled insight based on insider access to Microsoft source code, with hands-on experiments using the latest debugging tools to show you Windows' internal behaviors firsthand. With Windows 11 introducing new user interface design elements that build upon the same core technologies as Windows 10, readers will be well-prepared for this new chapter of computing. Leading Windows insiders help you: * Discover system mechanisms for serving device drivers and applications, including ALPC, Object Manager, synchronization, WNF, WoW64, and the processor execution model * Explore underlying hardware architecture, including trap processing, segmentation, and side channel vulnerabilities * Understand Windows virtualization, and how virtualization-based security (VBS) protects against OS vulnerabilities * Delve into key management and configuration mechanisms, including the Registry, Windows services, WMI, and Task Scheduling * Explore diagnostic services such as Event Tracing for Windows (ETW) and DTrace * Learn how the cache manager and file system drivers interact to provide reliable support for files, directories, and disks, including on Persistent Memory (NVDIMM) DAX devices. * Understand NTFS, ReFS, and other Windows file systems * Review Windows startup/shutdown operations, and OS components involved in boot flow * Analyze UEFI-based Secure Boot, Measured Boot, and Secure Launch About This Book * For experienced programmers, architects, software quality and performance specialists, administrators, security practitioners, and support professionals * Assumes you are a Windows power user
Get a head start on building apps for Windows 8. With a series of examples, this hands-on guide takes you through the process of creating complete touch-enabled apps that respond to native sensors. Through the course of the book, you'll learn how to work with the Windows Runtime application model while building a Bing Image Search app. If you're an experienced .NET developer who wants to get up to speed with Windows 8, this book provides the expertise and C# code samples you need. Get a high-level overview of Windows 8 features--from the Start Screen to in-app features such as the Application Bar Begin by building a simple app to retrieve Bing image search results from a web service Learn about the components needed to complete the app, including UI design, the MVVM architectural pattern, and "tombstoning" Take advantage of native OS features such as tiles, file pickers, and sharing requests Examine the steps necessary to publish an app to the Windows Store
Uses the Running Operation as the Main Thread Difficulty in understanding an operating system (OS) lies not in the technical aspects, but in the complex relationships inside the operating systems. The Art of Linux Kernel Design: Illustrating the Operating System Design Principle and Implementation addresses this complexity. Written from the perspective of the designer of an operating system, this book tackles important issues and practical problems on how to understand an operating system completely and systematically. It removes the mystery, revealing operating system design guidelines, explaining the BIOS code directly related to the operating system, and simplifying the relationships and guiding ideology behind it all. Based on the Source Code of a Real Multi-Process Operating System Using the 0.11 edition source code as a representation of the Linux basic design, the book illustrates the real states of an operating system in actual operations. It provides a complete, systematic analysis of the operating system source code, as well as a direct and complete understanding of the real operating system run-time structure. The author includes run-time memory structure diagrams, and an accompanying essay to help readers grasp the dynamics behind Linux and similar software systems. Identifies through diagrams the location of the key operating system data structures that lie in the memory Indicates through diagrams the current operating status information which helps users understand the interrupt state, and left time slice of processes Examines the relationship between process and memory, memory and file, file and process, and the kernel Explores the essential association, preparation, and transition, which is the vital part of operating system Develop a System of Your Own This text offers an in-dep
Master operation system development. FreeDOS Kernel explains the construction and operation of Pat Villani's DOS-C - a highly portable, single threaded operating system. Written in C and with system calls similar to MS-DOS, the FreeDOS kernel provides an |
You may like...
PowerShell, IT Pro Solutions…
William R. Stanek, William Stanek
Hardcover
R1,434
Discovery Miles 14 340
|