![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
Using Windows 8.1 is the essential step by step guide to using a computer running Windows 8, providing a complete resource for both the beginner and the enthusiast. Techniques are illustrated in step-by-step using photography and screen prints throughout, together with concise, easy to follow text from an established expert in the field, provide a comprehensive guide to Windows. Whether you have just bought your first computer, laptop or are a keen computer user who has just upgraded to Windows 8, this book will provide you with a firm grasp of the underpinning foundations and equip you with the skills needed to use a computer like a pro.
This book constitutes the refereed proceedings of the Fourth International Symposium on Search-Based Software Engineering, SSBSE 2012, held in Riva del Garda, Italy in collocation with the 28th IEEE International Conference on Software Maintenance. The 15 revised full papers, 3 revised short papers, and 2 papers of the graduate track presented together with 2 keynote talks and 1 tutorial paper were carefully reviewed and selected from 38 initial submissions. Search-based Software Engineering (SBSE) studies the application of meta-heuristic optimization techniques to various software engineering problems, ranging from requirements engineering to software testing and maintenance. The papers present current research in all areas of Search Based Software Engineering, including theoretical work, research on SBSE applications, empirical studies, and reports on industrial experience.
This book constitutes the thoroughly refereed proceedings of the 18th International Conference, Euro-Par 2012, held in Rhodes Islands, Greece, in August 2012. The 75 revised full papers presented were carefully reviewed and selected from 228 submissions. The papers are organized in topical sections on support tools and environments; performance prediction and evaluation; scheduling and load balancing; high-performance architectures and compilers; parallel and distributed data management; grid, cluster and cloud computing; peer to peer computing; distributed systems and algorithms; parallel and distributed programming; parallel numerical algorithms; multicore and manycore programming; theory and algorithms for parallel computation; high performance network and communication; mobile and ubiquitous computing; high performance and scientific applications; GPU and accelerators computing.
This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security.
This book constitutes the proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2012, held in Amsterdam, The Netherlands in September 2012. The 18 full and 12 poster papers presented were carefully reviewed and selected from 84 submissions. The papers address all current topics in virtualization, attacks and defenses, host and network security, fraud detection and underground economy, web security, intrusion detection.
Ada 2012 is the latest version of the international standard for the programming language Ada. It is designated ISO/IEC 8652:2012 (E) and is a new edition replacing the 2005 version. The primary goals for the new version were to further enhance its capabilities particularly in those areas where its reliability and predictability are of great value. Many important new features have been included such as those defining dynamic contracts and for handling multiprocessors and are integrated within the existing language framework in an elegant and coherent manner. The Ada 2012 Rationale describes not only the changes from Ada 2005 but also the reason for the changes. It starts with an introduction providing a general overview and this is followed by seven chapters focusing on contracts and aspects; extended expressions; structure and visibility; tasking and real time; iterators and pools; predefined library and containers. The book concludes with an epilogue largely concerned with compatibility issues.
You are interested in making an app. You have read all of the stories of successful developers and appreneurs. You are determined to get a piece of the pie. The world of apps is the fastest growing market in the world today, and it is here to stay. The best part is you can get in on it Now what if I told you that without the knowledge contained in this book the odds of you making a profit are slim to none? What if I also told you that you probably wouldn't break even? There is more to apps than most people think. The average person assumes that if they make an app, they will instantly become a millionaire. The truth is without the knowledge from years of successes and failures, you just won't know where to begin. Appreneur book contains tips, tricks, secrets, and stories from the top developers, appreneurs, and companies from around the globe. After reading this book, you will have the knowledge to bring your idea to life, market it, promote it, and sell it in a way that would have otherwise been impossible.What you'll learn * How to start at the bottom and rise to the top * How to choose the right development and platform for you * How to create a market for yourself instead of playing the competition * How to generate revenue from various app business models available * How to figure out what's hot versus what's not * How to make the most of your advertising dollars * What is free to pay (F2P) model and how to take advantage of it * How to secure your rights and later sell your rights to cash out or hit it big * How to evolve with the app stores and keep piracy to a minimum Who this book is for This book is for aspiring indie mobile app developers, especially those who want to build and sell apps on Apple iTunes App Store.
With Pro iOS and Android Apps for Business, you can take your web development experience and apply it toward creating a full-featured business app, from soup to nuts. Frank Zammetti shows you how to create a client app using jQuery Mobile wrapped in PhoneGap, and how to create a node.js-based server that uses MongoDB as its data store. You never have to deal with learning Objective-C, Java or any other difficult-to-learn language. Instead, you can build on your existing HTML5, JavaScript and CSS experience to quickly and effectively build any app your business needs. You can even apply this knowledge to Android apps as well as other mobile platforms since the technologies used support most modern mobile platforms as well. You'll learn: * How to design a full-featured app, including requirements like offline access * How to build the client-side of the app using jQuery Mobile, including adding stub code for calling the node.js server * How to create a simple server with node.js and interact with it using REST * How to use MongoDB with node.js for data storage * How to use PhoneGap to ready your app for mobile deployment * How to test and debug your app on iOS and Android Pro iOS and Android Apps for Business is for experienced web developers who need to get up to speed quickly in buildipng iOS and Android apps for business.Are you ready to join the mobile revolution using the same technologies you already use to build great web applications? If so, this is the book for you What you'll learn * How to design a full-featured app, including requirements like offline access * How to build the client-side of the app using jQuery Mobile, including adding stub code for calling the node.js server * How to create a simple server with node.js and interact with it using REST * How to use MongoDB with node.js for data storage * How to use PhoneGap to ready your app for mobile deployment * How to test and debug your app on iOS and Android Who this book is for Experienced web devs who need to get up to speed quickly in building iOS and Android apps for business. HTML/CSS/JavaScript experience highly recommended.
I felt deeply honored when Professor Sumit Ghosh asked me to write the foreword to his book with an extraordinary perspective. I have long admired him, ?rst as a student leader at Stanford, where he initiated the ?rst IEEE Computer Society's student chapter, and later as an esteemed and inspiring friend whose transdisciplinary research broadened and enhanced the horizons of practitioners of computer science and engineering, including my own. His ideas, which are derived from his profound vision, deep critical thinking, and personal intuition, reach from information technology to bioscience, as - hibited in this excellent book. To me, an ordinary engineer, it opens up a panoramic view of the Universe of Knowledge that keeps expanding and - spiring,likethegoodIndianproverb,whichsays,"agoodbookinformsyou,an excellent book teaches you, and a great book changes you. " I sincerely believe that Professor Ghosh's book will help us change and advance the methods of systems engineering and technology. Vision Inspired vision sees ahead of others what will or may come to be, a vivid, imagined concept or anticipation. An inspired vision personi?es what is good and what like-minded individuals hope for. Our vision is one of creating an Internet of minds, where minds are Web sites or knowledge centers, which create, store, and radiate knowledge through interaction with other minds connected by a universal shared network. This vision will not just hasten the death of distance, but will also - carcerate ignorance.
This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection; anonymity and privacy; wireless security; system security; DNS and routing security; and key management.
This book introduces the fundamental concepts and practical simulation te- niques for modeling different aspects of operating systems to study their g- eral behavior and their performance. The approaches applied are obje- oriented modeling and process interaction approach to discrete-event simu- tion. The book depends on the basic modeling concepts and is more specialized than my previous book: Practical Process Simulation with Object-Oriented Techniques and C++, published by Artech House, Boston 1999. For a more detailed description see the Web location: http: //science.kennesaw.edu/ jgarrido/mybook, html. Most other books on performance modeling use only analytical approaches, and very few apply these concepts to the study of operating systems. Thus, the unique feature of the book is that it concentrates on design aspects of operating systems using practical simulation techniques. In addition, the book illustrates the dynamic behavior of different aspects of operating systems using the various simulation models, with a general hands-on approac
Replication Techniques in Distributed Systems organizes and surveys the spectrum of replication protocols and systems that achieve high availability by replicating entities in failure-prone distributed computing environments. The entities discussed in this book vary from passive untyped data objects, to typed and complex objects, to processes and messages. Replication Techniques in Distributed Systems contains definitions and introductory material suitable for a beginner, theoretical foundations and algorithms, an annotated bibliography of commercial and experimental prototype systems, as well as short guides to recommended further readings in specialized subtopics. This book can be used as recommended or required reading in graduate courses in academia, as well as a handbook for designers and implementors of systems that must deal with replication issues in distributed systems.
This book constitutes the refereed proceedings of the International Conference on Multiscore Software Engineering, Performance, and Tools, MSEPT 2012, held in Prague in May/June 2012. The 9 revised papers, 4 of which are short papers were carefully reviewed and selected from 24 submissions. The papers address new work on optimization of multicore software, program analysis, and automatic parallelization. They also provide new perspectives on programming models as well as on applications of multicore systems.
The object of this book is to cover most of the currently relevant areas of data communications and networks. These include: Communications protocols (especially TCP/IP) Networking (especially in Ethernet, Fast Ethernet, FDDI and ATM) Networking operating systems (especially in Windows NT, Novell NetWare and UNIX) Communications programs (especially in serial communications, parallel communications and TCP/IP) Computer hardware (especially in PC hardware, serial communications and parallel communication) The book thus splits into 15 different areas, these are: General data compression (Chapters 2 and 3) Video, images and sound (Chapters 4-11 ) Error coding and encryption (Chapters 12-17) TCP/IP, WWW, Internets and Intranets (Chapters 18-20 and 23) Electronic Mail (Chapter 21 ) HTML (Chapters 25 and 26) Java (Chapters 27-29) Communication Programs (Chapters 20, 29 and 49) Network Operating Systems (Chapters 31-34) LANs/WANs (Chapters 35, 38-46) Serial Communications (Chapters 47 and 48) Parallel Communications (Chapters 50-52) Local Communications (Chapters 53-57) Routing and Protocols (Chapters 36 and 37) Cables and connectors (Chapters 58--60) Many handbooks and reference guides on the market contain endless tables and mathematics, or are dry to read and contain very little insight in their subject area. I have tried to make this book readable, but also contain key information which can be used by professionals.
This book constitutes the proceedings of the 10th IFIP International Conference on Network and Parallel Computing, NPC 2013, held in Guiyang, China, in September 2013. The 34 papers presented in this volume were carefully reviewed and selected from 109 submissions. They are organized in topical sections named: parallel programming and algorithms; cloud resource management; parallel architectures; multi-core computing and GPU; and miscellaneous.
This text comprises the edited collection of papers presented at the NATO Advanced Study Institute which took place at Altmyunus,
This book is a result of the Tenth International Conference on Information Systems Development (ISD2001) held at Royal Holloway, University of London, United Kingdom, during September 5-7, 2001. ISD 2001 carries on the fine tradition established by the first Polish-Scandinavian Seminar on Current Trends in Information Systems Development Methodologies, held in Gdansk, Poland in 1988. Through the years, this seminar evolved into an International Conference on Information Systems Development. The Conference gives participants an opportunity to express ideas on the current state of the art in information systems development, and to discuss and exchange views on new methods, tools, applications as well as theory. In all, 55 papers were presented at ISD2001 organised into twelve tracks covering the following themes: Systems Analysis and Development, Modelling, Methodology, Database Systems, Collaborative Systems, Theory, Knowledge Management, Project Management, IS Education, Management issues, E-Commerce. and Technical Issues. We would like to thank all the contributing authors for making this book possible and for their participation in ISD200 1. We are grateful to our panel of paper reviewers for their help and support. We would also like to express our sincere thanks to Ceri Bowyer and Steve Brown for their unfailing support with organising ISD2001.
This book constitutes the refereed proceedings of the 14th International Conference on Passive and Active Measurement, PAM 2013, held in Hong Kong, China, in March 2013. The 24 revised full papers presented were carefully reviewed and selected from 74 submissions. The papers have been organized in the following topical sections: measurement design, experience and analysis; Internet wireless and mobility; performance measurement; protocol and application behavior; characterization of network usage; and network security and privacy. In addition, 9 poster abstracts have been included.
This book constitutes the refereed proceedings of the International Conference on Multiscore Software Engineering, Performance, and Tools, MUSEPAT 2013, held in Saint Petersburg, Russia, in August 2013. The 9 revised papers were carefully reviewed and selected from 25 submissions. The accepted papers are organized into three main sessions and cover topics such as software engineering for multicore systems; specification, modeling and design; programing models, languages, compiler techniques and development tools; verification, testing, analysis, debugging and performance tuning, security testing; software maintenance and evolution; multicore software issues in scientific computing, embedded and mobile systems; energy-efficient computing as well as experience reports.
I love virtual machines (VMs) and I have done for a long time.If that makes me "sad" or an "anorak," so be it. I love them because they are so much fun, as well as being so useful. They have an element of original sin (writing assembly programs and being in control of an entire machine), while still being able to claim that one is being a respectable member of the community (being structured, modular, high-level, object-oriented, and so on). They also allow one to design machines of one's own, unencumbered by the restrictions of a starts optimising it for some physical particular processor (at least, until one processor or other). I have been building virtual machines, on and off, since 1980 or there abouts. It has always been something of a hobby for me; it has also turned out to be a technique of great power and applicability. I hope to continue working on them, perhaps on some of the ideas outlined in the last chapter (I certainly want to do some more work with register-based VMs and concur rency). I originally wanted to write the book from a purely semantic viewpoint."
This volume contains a selection of papers that focus on the state-of the-art in real-time scheduling and resource management. Preliminary versions of these papers were presented at a workshop on the foundations of real-time computing sponsored by the Office of Naval Research in October, 1990 in Washington, D.C. A companion volume by the title Foundations of Real-Time Computing: Fonnal Specifications and Methods complements this book by addressing many of the most advanced approaches currently being investigated in the arena of formal specification and verification of real-time systems. Together, these two texts provide a comprehensive snapshot of current insights into the process of designing and building real-time computing systems on a scientific basis. Many of the papers in this book take care to define the notion of real-time system precisely, because it is often easy to misunderstand what is meant by that term. Different communities of researchers variously use the term real-time to refer to either very fast computing, or immediate on-line data acquisition, or deadline-driven computing. This text is concerned with the very difficult problems of scheduling tasks and resource management in computer systems whose performance is inextricably fused with the achievement of deadlines. Such systems have been enabled for a rapidly increasing set of diverse end-uses by the unremitting advances in computing power per constant-dollar cost and per constant-unit-volume of space. End-use applications of deadline-driven real-time computers span a spectrum that includes transportation systems, robotics and manufacturing, aerospace and defense, industrial process control, and telecommunications."
Compilers and Operating Systems for Low Power focuses on both application-level compiler directed energy optimization and low-power operating systems. Chapters have been written exclusively for this volume by several of the leading researchers and application developers active in the field. The first six chapters focus on low energy operating systems, or more in general, energy-aware middleware services. The next five chapters are centered on compilation and code optimization. Finally, the last chapter takes a more general viewpoint on mobile computing. The material demonstrates the state-of-the-art work and proves that to obtain the best energy/performance characteristics, compilers, system software, and architecture must work together. The relationship between energy-aware middleware and wireless microsensors, mobile computing and other wireless applications are covered. This work will be of interest to researchers in the areas of low-power computing, embedded systems, compiler optimizations, and operating systems.
Is this the right book for me? Get Started in Windows 7 explains all the key aspects of this operating system from the user's angle including: - running programs and managing files - getting online - managing your email - maintaining your system - configuring printers - customising your system. - getting help - using accessories Written for the new user at home or in the office it covers all the key features of Windows 7 and helps you maximise your use of the system with confidence. Get Started in Windows 7 includes: Chapter 1: Introducing Windows 7 Chapter 2: Programs and documents Chapter 3: Working with windows Chapter 4: Basic skills Chapter 5: Help! Chapter 6: The Desktop Chapter 7: Files and folders Chapter 8: Internet Explorer Chapter 9: Live Mail Chapter 10: Control Panel Chapter 11: Taskbar and Start menu Chapter 12: Accessories Chapter 13: Maintenance Chapter 14: Printers Learn effortlessly with a new easy-to-read page design and interactive features: Not got much time? One, five and ten-minute introductions to key principles to get you started. Author insights Lots of instant help with common problems and quick tips for success, based on the author's many years of experience. Test yourself Tests in the book and online to keep track of your progress. Extend your knowledge Extra online articles to give you a richer understanding of the subject. Five things to remember Quick refreshers to help you remember the key facts. Try this Innovative exercises illustrate what you've learnt and how to use it.
As we continue to build faster and fast. er computers, their performance is be coming increasingly dependent on the memory hierarchy. Both the clock speed of the machine and its throughput per clock depend heavily on the memory hierarchy. The time to complet. e a cache acce88 is oft. en the factor that det. er mines the cycle time. The effectiveness of the hierarchy in keeping the average cost of a reference down has a major impact on how close the sustained per formance is to the peak performance. Small changes in the performance of the memory hierarchy cause large changes in overall system performance. The strong growth of ruse machines, whose performance is more tightly coupled to the memory hierarchy, has created increasing demand for high performance memory systems. This trend is likely to accelerate: the improvements in main memory performance will be small compared to the improvements in processor performance. This difference will lead to an increasing gap between prOCe880r cycle time and main memory acce. time. This gap must be closed by improving the memory hierarchy. Computer architects have attacked this gap by designing machines with cache sizes an order of magnitude larger than those appearing five years ago. Microproce880r-based RISe systems now have caches that rival the size of those in mainframes and supercomputers."
The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains three full-paper length invited papers and 7 corrected and extended papers from the First International Workshop on Smart Grid Security, SmartGridSec 2012, which brought together researchers from different communities from academia and industry in the area of securing the Future Smart Grid and was held in Berlin, Germany, on December 3, 2012. |
You may like...
Cases on Open-Linked Data and Semantic…
Patricia Ordonez De Pablos, Miltiadis D Lytras, …
Hardcover
R4,398
Discovery Miles 43 980
Perspectives on Web Services - Applying…
Olaf Zimmermann, Mark Tomlinson, …
Hardcover
Emerging Technologies of Augmented…
Michael Haller, Mark Billinghurst, …
Hardcover
R2,648
Discovery Miles 26 480
|