0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (6)
  • R100 - R250 (89)
  • R250 - R500 (327)
  • R500+ (2,282)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)

Network and Parallel Computing - 15th IFIP WG 10.3 International Conference, NPC 2018, Muroran, Japan, November 29 - December... Network and Parallel Computing - 15th IFIP WG 10.3 International Conference, NPC 2018, Muroran, Japan, November 29 - December 1, 2018, Proceedings (Paperback, 1st ed. 2018)
Feng Zhang, Jidong Zhai, Marc Snir, Hai Jin, Hironori Kasahara, …
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the proceedings of the 15th IFIP International Conference on Network and Parallel Computing, NPC 2018, held in Muroran, Japan, in November/December 2018. The 22 full and 12 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The papers cover traditional areas of network and parallel computing, including parallel applications, distributed algorithms, parallel architectures, software environments, and distributed tools.

Parallel Computational Technologies - 12th International Conference, PCT 2018, Rostov-on-Don, Russia, April 2-6, 2018, Revised... Parallel Computational Technologies - 12th International Conference, PCT 2018, Rostov-on-Don, Russia, April 2-6, 2018, Revised Selected Papers (Paperback, 1st ed. 2018)
Leonid Sokolinsky, Mikhail Zymbler
R1,427 Discovery Miles 14 270 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 12th International Conference on Parallel Computational Technologies, PCT 2018, held in Rostov-on-Don, Russia, in April 2018.The 24 revised full papers presented were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on high performance architectures, tools and technologies; parallel numerical algorithms; supercomputer simulation.

Windows Server 2003 Network Administration (Paperback): Craig Hunt Windows Server 2003 Network Administration (Paperback)
Craig Hunt
R1,185 R1,014 Discovery Miles 10 140 Save R171 (14%) Ships in 18 - 22 working days

This book is the Windows Server version of the classic "TCP/IP Network Administration," Like the book that inspired it, "Windows Server 2003 Network Administration" provides an overview of the essential TCP/IP protocols, and explains how to properly manage and configure the services based on these protocols. Any skilled network administrator knows that understanding how things work is as important as knowing how things are done. This book is the essential guide to both, containing everything a network administrator needs to exchange information via the Internet, and to build effective reliable networks.

This must-read guide is divided into three distinct sections: fundamental concepts, tutorial, and reference. The first three chapters are a basic discussion of the network protocols and services. This discussion provides the fundamental concepts necessary to understand the rest of the book. The remaining chapters provide a how-to tutorial for planning, installing and configuring various important network services. The book concludes with three appendixes that are technical references for various configuration options. Content specifics include how to:

Install, configure, and manage a Microsoft DNS and Windows DHCP server

Control remote communications with Microsoft RRAS software

Protect hosts with Internet Connection Firewalls

Configure Internet and Intranet Web services with IIS

Design proper security into your network

Troubleshoot the network when problems develop

After you've turned the final page of "Windows Server 2003 Network Administration," you'll not only understand how to network, but also "why" it needs to be done.

Service-Oriented Computing - 16th International Conference, ICSOC 2018, Hangzhou, China, November 12-15, 2018, Proceedings... Service-Oriented Computing - 16th International Conference, ICSOC 2018, Hangzhou, China, November 12-15, 2018, Proceedings (Paperback, 1st ed. 2018)
Claus Pahl, Maja Vukovic, Jianwei Yin, Qi Yu
R2,821 Discovery Miles 28 210 Ships in 18 - 22 working days

This book constitutes the proceedings of the 16th International Conference on Service-Oriented Computing, ICSOC 2018, held in Hangzhou, China, in November 2018. The 63 full papers presented together with 3 keynotes in this volume were carefully reviewed and selected from numerous submissions. The papers have been organized in the following topical sections: Microservices; Services and Processes; Service Trust and Security; Business Services and Processes; Edge + IoT Services; Social and Interactive Services; Recommendation; Service Analytics; Quality of Service; Service Engineering; Service Applications; Service Management.

SharePoint Office Web Guide (Paperback): Jeff Webb SharePoint Office Web Guide (Paperback)
Jeff Webb
R217 R200 Discovery Miles 2 000 Save R17 (8%) Ships in 18 - 22 working days

Any situation where people need to work together online is a situation for Microsoft SharePoint. SharePoint is a component of Windows 2003 that enables organizations to construct web sites specifically for information sharing and collaboration. Within these sites, individuals can capture and share ideas, plus work together on documents, tasks, contacts, and events. "The SharePoint Office Pocket Guide" from O'Reilly gets you collaborating with others in this format immediately. It covers the ins and outs of SharePoint's key tools in plain, easy-to-follow language. Within minutes, you'll understand how to: determine which web site template is best for you; customize the design and content of the site's various pages; upload documents for all team members to see; add public announcements; send alerts to team members so they know when existing documents have been changed; add links to other external sites; track work items; call meetings from within Office 2003; and add new members to the site. Thanks to SharePoint, you'll discover that emailing is no longer the most efficient way to share files. In fact, you may never need to zip files together again, which also means an end to files that bounce back because they're too large. SharePoint renders all of this aggravation obsolete. If you want more information than the average SharePoint user, then the "SharePoint Office Pocket Guide" is an essential addition to your personal library. By increasing your team's productivity, SharePoint takes the "dead" out of deadline. And this handy reference guide shows you how to get it done.

Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Saclay, France,... Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings (Paperback, 1st ed. 2018)
Cristiano Giuffrida, Sebastien Bardin, Gregory Blanc
R1,894 Discovery Miles 18 940 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2018, held in Saclay, France, in June 2018. The 17 revised full papers and 1 short paper included in this book were carefully reviewed and selected from 59 submissions. They present topics such as malware analysis; mobile and embedded security; attacks; detection and containment; web and browser security; and reverse engineering.

iOS Code Testing - Test-Driven Development and Behavior-Driven Development with Swift (Paperback, 1st ed.): Abhishek Mishra iOS Code Testing - Test-Driven Development and Behavior-Driven Development with Swift (Paperback, 1st ed.)
Abhishek Mishra
R2,700 Discovery Miles 27 000 Ships in 18 - 22 working days

Put into motion practical examples to master Test-Driven Development (TDD) and acceptance testing in Swift. This book uses a pragmatic approach to writing well-tested code and provides techniques that can be used to retrofit tests to legacy code bases. You'll be introduced to basic principles of TDD, such as Test First, Red-Green-Refactor, Remove Duplicate code, Dependency Injection, and Single Responsibility. Approaches covered include TDD, behavior-driven development (BDD), UI, and acceptance testing with common standard/open source frameworks. iOS Code Testing offers helpful instruction to teach iOS developers to retrospectively fit tests to legacy code, refactor legacy code so as to make the code more testable, install and configure a popular Swift BDD framework, practice BDD with Xcode, and create automated UI tests with Xcode. Additionally, many projects have legacy code bases. Legacy code is often seen as a blocker when it comes to implementing any kind of testing. What You Will Learn Fit test to legacy code retrospectively Install and configure popular Swift BDD frameworks Practice BDD with Xcode Who This Book Is For Software practitioners, such as Swift developers and mobile app testers.

Structural Information and Communication Complexity - 25th International Colloquium, SIROCCO 2018, Ma'ale HaHamisha,... Structural Information and Communication Complexity - 25th International Colloquium, SIROCCO 2018, Ma'ale HaHamisha, Israel, June 18-21, 2018, Revised Selected Papers (Paperback, 1st ed. 2018)
Zvi Lotker, Boaz Patt-Shamir
R1,445 Discovery Miles 14 450 Ships in 18 - 22 working days

This book constitutes the refereed post-conference proceedings of the 25th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2018, held in Ma'ale HaHamisha, Israel, in June 2018. The 23 full papers and 8 short papers presented were carefully reviewed and selected from 47 submissions. They are devoted to the study of the interplay between structural knowledge, communications, and computing in decentralized systems of multiple communicating entities and cover a large range of topics.

Switching to the Mac (Paperback, Mavericks edition): David Pogue Switching to the Mac (Paperback, Mavericks edition)
David Pogue
R839 R768 Discovery Miles 7 680 Save R71 (8%) Ships in 18 - 22 working days

What makes Windows refugees decide to get a Mac? Enthusiastic friends? The Apple Stores? Great-looking laptops? A "halo effect" from the popularity of iPhones and iPads? The absence of viruses and spyware? The freedom to run Windows on a Mac? In any case, there's never been a better time to switch to OS X--and there's never been a better, more authoritative book to help you do it.

The important stuff you need to know: Transfer your stuff. Moving files from a PC to a Mac by cable, network, or disk is the easy part. But how do you extract your email, address book, calendar, Web bookmarks, buddy list, desktop pictures, and MP3 files? Now you'll know.Recreate your software suite. Many of the PC programs you've been using are Windows-only. Discover the Mac equivalents and learn how to move data to them.Learn Mavericks. Apple's latest operating system is faster, smarter, and more iPaddish--but you still have to learn it. Finder tabs. Finder tags. iBooks. Maps. Passwords and credit cards synced between your Mac and your phone or tablet. If Mavericks has it, this book covers it. Get the expert view. Learn from "New York Times" columnist and Missing Manuals creator David Pogue--author of "OS X Mavericks: The Missing Manual," the #1 bestselling Mac book on earth.

Embedded Systems Technology - 15th National Conference, ESTC 2017, Shenyang, China, November 17-19, 2017, Revised Selected... Embedded Systems Technology - 15th National Conference, ESTC 2017, Shenyang, China, November 17-19, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Yuanguo Bi, Gang Chen, Qingxu Deng, Yi Wang
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 15th National Conference on Embedded Systems Technology, ESTC 2017, held in Shenyang, China, in November 2017. The 18 revised full papers presented were carefully reviewed and selected from 45 papers. The topics cover a broad range of fields focusing on the theme "embedded systems and intelligent computing," such as context aware computing, scheduling, cyber physical system, high performance embedded computing, embedded system and applications, and education and surveys.

Transactions on Computational Collective Intelligence XXVIII (Paperback, 1st ed. 2018): Ngoc Thanh Nguyen, Ryszard Kowalczyk,... Transactions on Computational Collective Intelligence XXVIII (Paperback, 1st ed. 2018)
Ngoc Thanh Nguyen, Ryszard Kowalczyk, Jaap van den Herik, Ana Paula Rocha, Joaquim Filipe
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic Web, social networks, and multi-agent systems. TCCI strives to cover new methodological, theoretical and practical aspects of CCI understood as the form of intelligence that emerges from the collaboration and competition of many individuals (artificial and/or natural). The application of multiple computational intelligence technologies, such as fuzzy systems, evolutionary computation, neural systems, consensus theory, etc., aims to support human and other collective intelligence and to create new forms of CCI in natural and/or artificial systems. This twenty-eight issue is a special issue with 11 selected papers from the International Conference on Agents and Artificial Intelligence, ICAART 2016 and 2017 editions.

Introducing ZFS on Linux - Understand the Basics of Storage with ZFS (Paperback, 1st ed.): Damian Wojslaw Introducing ZFS on Linux - Understand the Basics of Storage with ZFS (Paperback, 1st ed.)
Damian Wojslaw
R1,698 Discovery Miles 16 980 Ships in 18 - 22 working days

Learn the basics of do-it-yourself ZFS storage on Linux. This book delivers explanations of key features and provides best practices for planning, creating and sharing your storage. ZFS as a file system simplifies many aspects of the storage administrator's day-to-day job and solves a lot of problems that administrators face, but it can be confusing. Introducing ZFS on Linux addresses some of these issues and shows you how to resolve them. This book explains the technical side of ZFS, through planning the hardware list to planning the physical and logical layout of the storage. What You'll Learn Understand the gains ZFS gives system and storage administrators and utilize its features Install and configure ZFS software Create and maintain ZFS pool Administer ZFS storage, including sharing Who This Book is For This book is ideal for those who already have experience working with Linux systems but want to understand the bare basics of ZFS before moving further.

Kubernetes Management Design Patterns - With Docker, CoreOS Linux, and Other Platforms (Paperback, 1st ed.): Deepak Vohra Kubernetes Management Design Patterns - With Docker, CoreOS Linux, and Other Platforms (Paperback, 1st ed.)
Deepak Vohra
R2,533 Discovery Miles 25 330 Ships in 18 - 22 working days

Take container cluster management to the next level; learn how to administer and configure Kubernetes on CoreOS; and apply suitable management design patterns such as Configmaps, Autoscaling, elastic resource usage, and high availability. Some of the other features discussed are logging, scheduling, rolling updates, volumes, service types, and multiple cloud provider zones. The atomic unit of modular container service in Kubernetes is a Pod, which is a group of containers with a common filesystem and networking. The Kubernetes Pod abstraction enables design patterns for containerized applications similar to object-oriented design patterns. Containers provide some of the same benefits as software objects such as modularity or packaging, abstraction, and reuse. CoreOS Linux is used in the majority of the chapters and other platforms discussed are CentOS with OpenShift, Debian 8 (jessie) on AWS, and Debian 7 for Google Container Engine. CoreOS is the main focus becayse Docker is pre-installed on CoreOS out-of-the-box. CoreOS: Supports most cloud providers (including Amazon AWS EC2 and Google Cloud Platform) and virtualization platforms (such as VMWare and VirtualBox) Provides Cloud-Config for declaratively configuring for OS items such as network configuration (flannel), storage (etcd), and user accounts Provides a production-level infrastructure for containerized applications including automation, security, and scalability Leads the drive for container industry standards and founded appc Provides the most advanced container registry, Quay Docker was made available as open source in March 2013 and has become the most commonly used containerization platform. Kubernetes was open-sourced in June 2014 and has become the most widely used container cluster manager. The first stable version of CoreOS Linux was made available in July 2014 and since has become one of the most commonly used operating system for containers. What You'll Learn Use Kubernetes with Docker Create a Kubernetes cluster on CoreOS on AWS Apply cluster management design patterns Use multiple cloud provider zones Work with Kubernetes and tools like Ansible Discover the Kubernetes-based PaaS platform OpenShift Create a high availability website Build a high availability Kubernetes master cluster Use volumes, configmaps, services, autoscaling, and rolling updates Manage compute resources Configure logging and scheduling Who This Book Is For Linux admins, CoreOS admins, application developers, and container as a service (CAAS) developers. Some pre-requisite knowledge of Linux and Docker is required. Introductory knowledge of Kubernetes is required such as creating a cluster, creating a Pod, creating a service, and creating and scaling a replication controller. For introductory Docker and Kubernetes information, refer to Pro Docker (Apress) and Kubernetes Microservices with Docker (Apress). Some pre-requisite knowledge about using Amazon Web Services (AWS) EC2, CloudFormation, and VPC is also required.

Microsoft Windows Security Essentials (Paperback): D. Gibson Microsoft Windows Security Essentials (Paperback)
D. Gibson
R948 R826 Discovery Miles 8 260 Save R122 (13%) Ships in 18 - 22 working days

Windows security concepts and technologies for IT beginners

IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built.

This straightforward guide begins each chapter by laying out a list of topics to be discussed, followed by a concise discussion of the core networking skills you need to have to gain a strong handle on the subject matter. Chapters conclude with review questions and suggested labs so you can measure your level of understanding of the chapter's content.Serves as an ideal resource for gaining a solid understanding of fundamental security concepts and skillsOffers a straightforward and direct approach to security basics and covers anti-malware software products, firewalls, network topologies and devices, network ports, and moreReviews all the topics you need to know for taking the MTA 98-367 examProvides an overview of security components, looks at securing access with permissions, addresses audit policies and network auditing, and examines protecting clients and servers

If you're new to IT and interested in entering the IT workforce, then "Microsoft Windows Security Essentials" is essential reading.

Docker in Action (Paperback, 2nd edition): Jeff Nickoloff, Stephen Kuenzli, Bret Fisher Docker in Action (Paperback, 2nd edition)
Jeff Nickoloff, Stephen Kuenzli, Bret Fisher
R1,198 Discovery Miles 11 980 Ships in 10 - 15 working days

The idea behind Docker is simple. Create a tiny virtual environment called a container that holds just your application and its dependencies. The Docker engine uses the host operating system to keep track of your containers. Applications running inside containers share resources, making their footprints small. They are easy to install, manage, and remove. Docker in Action, Second Edition teaches you to create, deploy, and manage applications hosted in Docker containers running on Linux. Fully updated, with four new chapters and revised best practices and examples, this second edition begins with a clear explanation of the Docker model. Then, you go hands-on with packaging applications, testing, installing, running programs securely, and deploying them across a cluster of hosts. With examples showing how Docker benefits the whole dev lifecycle, you'll discover techniques for everything from dev-and-test machines to full-scale cloud deployments.

Practical LXC and LXD - Linux Containers for Virtualization and Orchestration (Paperback, 1st ed.): S.S. Kumaran Practical LXC and LXD - Linux Containers for Virtualization and Orchestration (Paperback, 1st ed.)
S.S. Kumaran
R1,609 Discovery Miles 16 090 Ships in 18 - 22 working days

Use Linux containers as an alternative virtualization technique to virtualize your operating system environment. This book will cover LXC's unmatched flexibility with virtualization and LXD's smooth user experience. Practical LXC and LXD begins by introducing you to Linux containers (LXC and LXD). You will then go through use cases based on LXC and LXD. Next, you will see the internal workings of LXC and LXD by considering the repositories and templates used. You will then learn how to integrate LXC and LXD with common virtualization and orchestration tools such as libvirt and SaltStack. Finally, you will dive into containerization and security. The book will explore some of the common problems in security and provide a case study on how containerization can help mitigate some of the operating system-level security issues in an IoT environment. What You Will Learn Get an introduction to Linux containers Discover the basics of LXC and LXD See use cases that can be solved with LXC and LXD - for developers, devops, and system administrators Master LXC and LXD repositories Use LXC and LXD with common virtualization and orchestration tools Consider a containerization and security in IoT case study Who This Book Is For The audience for this book should have basic knowledge of Linux and software development in general. The intended readership is primarily software developers, operations engineers, and system administrators who are interested in devops, though managers and enthusiasts will also benefit from this book.

Migrating to Swift from Flash and ActionScript (Paperback, 1st ed.): Radoslava Leseva Adams, Hristo Lesev Migrating to Swift from Flash and ActionScript (Paperback, 1st ed.)
Radoslava Leseva Adams, Hristo Lesev
R1,398 Discovery Miles 13 980 Ships in 18 - 22 working days

Build on your knowledge of ActionScript to take the fast track developing iOS apps with Apple's latest language, Swift. Swift's syntax is easier to understand than Objective-C for people already familiar with ActionScript. At the same time it offers a number of new features and richer expressiveness than both ActionScript and Objective-C. Switching to a new platform usually involves migration on three levels: tools, workflow, and programming language. This book is structured as a guide that will help you on each level with step-by-step tutorials. Apart from the tutorials, it comes with recipes for some of the most popular mobile development topics: social network integration and messaging, taking advantage of device capabilities, networking and working with local and iCloud data, advertising in your app or game, and 2D and 3D graphics. The book also includes a final chapter that takes you through Apple's App Store submission process. Don't just build your apps, sell them. What You Will Learn: Expand your development knowledge to native iOS programming with Swift Use the latest Xcode 7 IDE Migrate your existing ActionScript projects to Swift Create advanced UI, leverage the device hardware, integrate with social networks, take advantage of 2D and 3D graphics Diagnose your app quickly with Xcode's debugger and instruments Prepare and submit our iOS app in Apple's App Store Who This Book is For: Migrating to Swift from Flash and ActionScript is for Flash and Adobe AIR developers who want to move on to native iOS programming with the latest Apple Swift language. It's for the seasoned ActionScript programmer who is looking to add another language and platform to their tool belt quickly. Migrating to Swift from Flash and ActionScript is a good choice for developers who learn by doing and don't have time to read thick manuals and books for beginners in order to start programming in a new language.

Tools and Methods of Program Analysis - 4th International Conference, TMPA 2017, Moscow, Russia, March 3-4, 2017, Revised... Tools and Methods of Program Analysis - 4th International Conference, TMPA 2017, Moscow, Russia, March 3-4, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Vladimir Itsykson, Andre Scedrov, Victor Zakharov
R1,390 Discovery Miles 13 900 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th International Conference on Tools and Methods for Program Analysis, TMPA 2017, Moscow, Russia, March 3-4, 2017. The 12 revised full papers and 5 revised short papers presented together with three abstracts of keynote talks were carefully reviewed and selected from 51 submissions. The papers deal with topics such as software test automation, static program analysis, verification, dynamic methods of program analysis, testing and analysis of parallel and distributed systems, testing and analysis of high-load and high-availability systems, analysis and verification of hardware and software systems, methods of building quality software, tools for software analysis, testing and verification.

Exam Ref MD-100 Windows 10 (Paperback): Andrew Bettany, Andrew Warren Exam Ref MD-100 Windows 10 (Paperback)
Andrew Bettany, Andrew Warren 1
R1,020 Discovery Miles 10 200 Ships in 10 - 15 working days

Prepare for Microsoft Exam MD-100: Windows 10-and help demonstrate your real-world mastery of skills and knowledge required to deploy, configure, secure, manage, and monitor Windows devices and client applications. Designed for Windows administrators, Exam Ref MD-100: Windows 10 focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Associate level. Focus on the expertise measured by these objectives: Deploy Windows Manage devices and data Configure connectivity Maintain Windows This Microsoft Exam Ref MD-100: Windows 10: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you have some experience administering Windows 10 and non-Windows devices and technologies About the Exam Exam MD-100: Windows 10 focuses on knowledge needed to deploy Windows; perform post-installation configuration; manage local users, local groups, and devices; configure data access and protection; configure devices with local policies; manage Windows security; configure networking; configure remote connectivity; configure system and data recovery; manage updates; and monitor and manage Windows. About Microsoft Certification Passing this exam and Exam MD-101: Managing Modern Desktops fulfills your requirements for the Microsoft 365 Certified: Modern Desktop Administrator Associate certification credential, demonstrating your ability to install Windows 10 operating systems and deploy and manage modern desktops and devices in an enterprise environment. See full details at: microsoft.com/learn

High Performance Computing Systems. Performance Modeling, Benchmarking, and Simulation - 8th International Workshop, PMBS 2017,... High Performance Computing Systems. Performance Modeling, Benchmarking, and Simulation - 8th International Workshop, PMBS 2017, Denver, CO, USA, November 13, 2017, Proceedings (Paperback, 1st ed. 2018)
Stephen Jarvis, Steven Wright, Simon Hammond
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings papers from the 8th International Workshop on Performance Modeling, Benchmarking and Simulation of High Performance Computing Systems, PMBS 2017, held in Denver, Colorado, USA, in November 2017. The 10 full papers and 3 short papers included in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named: performance evaluation and analysis; performance modeling and simulation; and short papers.

Design and Implementation of the MTX Operating System (Paperback, Softcover reprint of the original 1st ed. 2015): K. C. Wang Design and Implementation of the MTX Operating System (Paperback, Softcover reprint of the original 1st ed. 2015)
K. C. Wang
R3,870 Discovery Miles 38 700 Ships in 18 - 22 working days

This course-tested textbook describes the design and implementation of operating systems, and applies it to the MTX operating system, a Unix-like system designed for Intel x86 based PCs. Written in an evolutional style, theoretical and practical aspects of operating systems are presented as the design and implementation of a complete operating system is demonstrated. Throughout the text, complete source code and working sample systems are used to exhibit the techniques discussed. The book contains many new materials on the design and use of parallel algorithms in SMP. Complete coverage on booting an operating system is included, as well as, extending the process model to implement threads support in the MTX kernel, an init program for system startup and a sh program for executing user commands. Intended for technically oriented operating systems courses that emphasize both theory and practice, the book is also suitable for self-study.

Technologies and Innovation - Third International Conference, CITI 2017, Guayaquil, Ecuador, October 24-27, 2017, Proceedings... Technologies and Innovation - Third International Conference, CITI 2017, Guayaquil, Ecuador, October 24-27, 2017, Proceedings (Paperback, 1st ed. 2017)
Rafael Valencia-Garcia, Katty Lagos-Ortiz, Gema Alcaraz Marmol, Javier del Cioppo, Nestor Vera-Lucio, …
R1,422 Discovery Miles 14 220 Ships in 18 - 22 working days

This book constitutes the proceedings of the Third International Conference on Technologies and Innovation, CITI 2017, held in Guayaquil, Ecuador, in October 2017. The 24 papers presented in this volume were carefully reviewed and selected from 68 submissions. They were organized in topical sections named: cloud and mobile computing; knowledge based and expert systems; applications in healthcare and wellness; e-learning; and ICT in agronomy.

Introducing Linux Distros (Paperback, 1st ed.): Jose Dieguez Castro Introducing Linux Distros (Paperback, 1st ed.)
Jose Dieguez Castro
R2,454 Discovery Miles 24 540 Ships in 18 - 22 working days

Learn the pros and the cons of the most frequently used distros in order to find the one that is right for you. You will explore each distro step by step, so that you don't have to endure hours of web surfing, countless downloads, becoming confused by new concepts and, in the worst cases, reading complex and marathon installation guides. You will benefit from the author's long-term experience working with each distro hands on, enabling you to choose the best distro for your long-term needs. The first barrier that a new Linux user has to face is the overwhelming number of "flavors" that this operating system has. These "flavors" are commonly known as distros (from distribution), and to date there are more than three hundred active distros to choose from. So, how to choose one? You can choose the most popular at the moment, or take heed of what your friend says, but are you sure that this is the one that you need? Making the wrong decision on this matter is behind a good number of disappointments with this operating system. You need to choose the distro that is right for you and your needs. Linux offers us a wonderful open source alternative to proprietary software. With Introducing Linux Distros you can decide how to best make it work for you. Start exploring the open source world today. What You'll learn Review what a Linux distro is and which one to select Decide which criteria to follow to make a right decision Examine the most used Linux distros and their unique philosophies install and maintain different Linux distros Who This Book Is For Newcomers to the Linux world that have to deal with the myriad of distributions.

Windows PowerShell for Developers (Paperback): Douglas Finke Windows PowerShell for Developers (Paperback)
Douglas Finke
R682 Discovery Miles 6 820 Ships in 18 - 22 working days

Want to perform programming tasks better, faster, simpler, and make them repeatable? Take a deep dive into Windows PowerShell and discover what this distributed automation platform can do. Whether you're a .NET developer or IT pro, this concise guide will show you how PowerShell's scripting language can help you be more productive on everyday tasks.

Quickly learn how to create PowerShell scripts and embed them into your existing applications, write "little languages" to solve specific problems, and take charge of your code. This book includes example scripts that you can easily pull apart, tweak, and then use in your own PowerShell and .NET solutions.Slice and dice text, XML, CSV, and JSON with easeEmbed PowerShell to provide scripting capabilities for your C# appsCreate GUI applications five to ten times faster with less codeLeverage PowerShell's capabilities to work with the InternetInteract with DLLs and create objects, automatically display properties, and call methods in live interactive sessionsBuild domain-specific languages (DSLs) and vocabularies to express solutions more clearlyWork with Microsoft Office via the Component Object Model (COM)Discover PowerShell v3 features included with Windows 8 and Windows Server 2012

Linux Hardening in Hostile Networks - Server Security from TLS to Tor (Paperback): Kyle Rankin Linux Hardening in Hostile Networks - Server Security from TLS to Tor (Paperback)
Kyle Rankin
R845 R729 Discovery Miles 7 290 Save R116 (14%) Ships in 5 - 10 working days

Implement Industrial-Strength Security on Any Linux Server In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker's toolkit, you can't rely on outdated security methods-especially if you're responsible for Internet-facing services. In Linux (R) Hardening in Hostile Networks, Kyle Rankin helps you to implement modern safeguards that provide maximum impact with minimum effort and to strip away old techniques that are no longer worth your time. Rankin provides clear, concise guidance on modern workstation, server, and network hardening, and explains how to harden specific services, such as web servers, email, DNS, and databases. Along the way, he demystifies technologies once viewed as too complex or mysterious but now essential to mainstream Linux security. He also includes a full chapter on effective incident response that both DevOps and SecOps can use to write their own incident response plan. Each chapter begins with techniques any sysadmin can use quickly to protect against entry-level hackers and presents intermediate and advanced techniques to safeguard against sophisticated and knowledgeable attackers, perhaps even state actors. Throughout, you learn what each technique does, how it works, what it does and doesn't protect against, and whether it would be useful in your environment. Apply core security techniques including 2FA and strong passwords Protect admin workstations via lock screens, disk encryption, BIOS passwords, and other methods Use the security-focused Tails distribution as a quick path to a hardened workstation Compartmentalize workstation tasks into VMs with varying levels of trust Harden servers with SSH, use apparmor and sudo to limit the damage attackers can do, and set up remote syslog servers to track their actions Establish secure VPNs with OpenVPN, and leverage SSH to tunnel traffic when VPNs can't be used Configure a software load balancer to terminate SSL/TLS connections and initiate new ones downstream Set up standalone Tor services and hidden Tor services and relays Secure Apache and Nginx web servers, and take full advantage of HTTPS Perform advanced web server hardening with HTTPS forward secrecy and ModSecurity web application firewalls Strengthen email security with SMTP relay authentication, SMTPS, SPF records, DKIM, and DMARC Harden DNS servers, deter their use in DDoS attacks, and fully implement DNSSEC Systematically protect databases via network access control, TLS traffic encryption, and encrypted data storage Respond to a compromised server, collect evidence, and prevent future attacks Register your product at informit.com/register for convenient access to downloads, updates, and corrections as they become available.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,018 Discovery Miles 10 180
Linux - The Ultimate Crash Course to…
Mark Reed Hardcover R558 R512 Discovery Miles 5 120
DNSSEC Mastery, 2nd Edition
Michael W Lucas Hardcover R873 R792 Discovery Miles 7 920
Coding Basics for Beginners - The Smart…
Jefferson Sandyman Hardcover R588 Discovery Miles 5 880
Microsoft Windows 10 Tips & Tricks
Joan Lambert Fold-out book or chart R229 Discovery Miles 2 290
The Hacker's Guide to OS X - Exploiting…
Robert Bathurst, Russ Rogers, … Paperback R976 R760 Discovery Miles 7 600
PowerShell - The Ultimate Beginners…
Mark Reed Hardcover R567 R521 Discovery Miles 5 210
Essential Windows 10: 1st Anniversary…
Kevin Wilson Paperback R431 R271 Discovery Miles 2 710
IBM Mainframe Developer Training and…
Robert Wingate Hardcover R1,674 R1,402 Discovery Miles 14 020
Mike Meyers' CompTIA A+ Guide to 802…
Mike Meyers Paperback R1,201 Discovery Miles 12 010

 

Partners