0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (100)
  • R250 - R500 (353)
  • R500+ (2,294)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)

Essential iPad - iOS 10 Edition (Paperback): Kevin Wilson Essential iPad - iOS 10 Edition (Paperback)
Kevin Wilson
R402 R252 Discovery Miles 2 520 Save R150 (37%) Ships in 10 - 15 working days
Foundations of CentOS Linux - Enterprise Linux On the Cheap (Paperback, 1st ed.): Chivas Sicam, Ryan Baclit, Peter Membrey,... Foundations of CentOS Linux - Enterprise Linux On the Cheap (Paperback, 1st ed.)
Chivas Sicam, Ryan Baclit, Peter Membrey, John Newbigin
R1,253 R1,081 Discovery Miles 10 810 Save R172 (14%) Ships in 18 - 22 working days

You need to maintain clients, servers and networks, while acquiring new skills. Foundations of Cent OS Linux: Enterprise Linux On the Cheap covers a free, unencumbered Linux operating system within the Red Hat lineage, but it does not assume you have a Red Hat Enterprise Linux license. Now you can learn CentOS Linux, the most powerful and popular of all Red Hat clones, keep maintaining your network at work, and become an Red Hat Certified Engineer, all just for the cost of this book.Introduces CentOS Linux and Fedora clients as equals to Red Hat Enterprise Linux Sets up CentOS as a secure, highperformance web services back end Prepares you for the RHCE examination, but does not assume an RHEL installation Table of Contents Installation BASH Client/Host Configuration Data Storage Management User Management X Window System Package Management Basic Linux Security Advanced Security Network Security Network Services Open Source Databases Linux Web Services File Sharing Services Linux Mail Servers Directory Services The Linux Kernel Linux Virtualization Linux Troubleshooting

Web Content Caching and Distribution - Proceedings of the 8th International Workshop (Paperback, Softcover reprint of hardcover... Web Content Caching and Distribution - Proceedings of the 8th International Workshop (Paperback, Softcover reprint of hardcover 1st ed. 2004)
Fred Douglis, Brian D Davison
R4,030 Discovery Miles 40 300 Ships in 18 - 22 working days

Web caching and content delivery technologies provide the infrastructure on which systems are built for the scalable distribution of information. This proceedings of the eighth annual workshop, captures a cross-section of the latest issues and techniques of interest to network architects and researchers in large-scale content delivery. Topics covered include the distribution of streaming multimedia, edge caching and computation, multicast, delivery of dynamic content, enterprise content delivery, streaming proxies and servers, content transcoding, replication and caching strategies, peer-to-peer content delivery, and Web prefetching.
Web Content Caching and Distribution encompasses all areas relating to the intersection of storage and networking for Internet content services. The book is divided into eight parts: mobility, applications, architectures, multimedia, customization, peer-to-peer, performance and measurement, and delta encoding.

Security and Dependability for Ambient Intelligence (Paperback, Softcover reprint of hardcover 1st ed. 2009): George... Security and Dependability for Ambient Intelligence (Paperback, Softcover reprint of hardcover 1st ed. 2009)
George Spanoudakis, Spyros Kokolakis
R4,041 Discovery Miles 40 410 Ships in 18 - 22 working days

Security and Dependability for Ambient Intelligence is the primary publication of the SERENITY approach, which provides security and dependability (S&D) solutions for dynamic, highly distributed, heterogeneous systems. The objective of SERENITY is to enhance the security and dependability of ambient intelligence systems by providing a framework supporting the automated integration, configuration, monitoring and adaptation of security and dependability mechanisms.

An edited volume contributed by world leaders in the field, this book covers the problems that the highly dynamic and heterogeneous nature of ambient intelligence systems poses to security and dependability and presents solutions to these problems.

Security and Dependability for Ambient Intelligence is designed for researchers and practitioners focusing on the dynamic integration, deployment and verification of security and dependability solutions in highly distributed systems incorporating ambient intelligence features. It is also suitable as a reference or secondary text for advanced-level students in computer science and computer or electrical engineering.

Real-Time Systems in Mechatronic Applications (Paperback, Softcover reprint of the original 1st ed. 1998): Jan Wikander, Bertil... Real-Time Systems in Mechatronic Applications (Paperback, Softcover reprint of the original 1st ed. 1998)
Jan Wikander, Bertil Svensson
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Real-Time Systems in Mechatronic Applications brings together in one place important contributions and up-to-date research results in this fast moving area. Real-Time Systems in Mechatronic Applications serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

Computer-Supported Cooperative Work - Introduction to Distributed Applications (Paperback, Softcover reprint of hardcover 1st... Computer-Supported Cooperative Work - Introduction to Distributed Applications (Paperback, Softcover reprint of hardcover 1st ed. 2000)
Uwe M. Borghoff, Johann H. Schlichter
R1,477 Discovery Miles 14 770 Ships in 18 - 22 working days

A detailed introduction to interdisciplinary application area of distributed systems, namely the computer support of individuals trying to solve a problem in cooperation with each other but not necessarily having identical work places or working times. The book is addressed to students of distributed systems, communications, information science and socio-organizational theory, as well as to users and developers of systems with group communication and cooperation as top priorities.

Power Aware Computing (Paperback, Softcover reprint of hardcover 1st ed. 2002): Robert Graybill, Rami Melhem Power Aware Computing (Paperback, Softcover reprint of hardcover 1st ed. 2002)
Robert Graybill, Rami Melhem
R5,200 Discovery Miles 52 000 Ships in 18 - 22 working days

With the advent of portable and autonomous computing systems, power con sumption has emerged as a focal point in many research projects, commercial systems and DoD platforms. One current research initiative, which drew much attention to this area, is the Power Aware Computing and Communications (PAC/C) program sponsored by DARPA. Many of the chapters in this book include results from work that have been supported by the PACIC program. The performance of computer systems has been tremendously improving while the size and weight of such systems has been constantly shrinking. The capacities of batteries relative to their sizes and weights has been also improv ing but at a rate which is much slower than the rate of improvement in computer performance and the rate of shrinking in computer sizes. The relation between the power consumption of a computer system and it performance and size is a complex one which is very much dependent on the specific system and the technology used to build that system. We do not need a complex argument, however, to be convinced that energy and power, which is the rate of energy consumption, are becoming critical components in computer systems in gen eral, and portable and autonomous systems, in particular. Most of the early research on power consumption in computer systems ad dressed the issue of minimizing power in a given platform, which usually translates into minimizing energy consumption, and thus, longer battery life."

Trust in Technology: A Socio-Technical Perspective (Paperback, Softcover reprint of hardcover 1st ed. 2006): Karen Clarke,... Trust in Technology: A Socio-Technical Perspective (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Karen Clarke, Gillian Hardstone, Mark Rouncefield, Ian Sommerville
R2,643 Discovery Miles 26 430 Ships in 18 - 22 working days

Computer systems can only deliver benefits if functionality, users and usability are central to their design and deployment. This book encapsulates work done in the DIRC project (Interdisciplinary Research Collaboration in Dependability), bringing together a range of disciplinary approaches - computer science, sociology and software engineering - to produce a socio-technical systems perspective on the issues surrounding trust in technology in complex settings.

Access Control Systems - Security, Identity Management and Trust Models (Paperback, Softcover reprint of hardcover 1st ed.... Access Control Systems - Security, Identity Management and Trust Models (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Messaoud Benantar
R3,083 Discovery Miles 30 830 Ships in 18 - 22 working days

This essential resource for professionals and advanced students in security programming and system design introduces the foundations of programming systems security and the theory behind access control models, and addresses emerging access control mechanisms.

Formal Models of Operating System Kernels (Paperback, Softcover reprint of hardcover 1st ed. 2007): Iain D. Craig Formal Models of Operating System Kernels (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Iain D. Craig
R4,026 Discovery Miles 40 260 Ships in 18 - 22 working days

Operating systems kernels are central to the functioning of computers. Security of the overall system, as well as its reliability and responsiveness, depend upon the correct functioning of the kernel. This unique approach - presenting a formal specification of a kernel - starts with basic constructs and develops a set of kernels; proofs are included as part of the text.

Distributed Event-Based Systems (Paperback, Softcover reprint of hardcover 1st ed. 2006): Gero Muhl, Ludger Fiege, Peter... Distributed Event-Based Systems (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Gero Muhl, Ludger Fiege, Peter Pietzuch
R1,438 Discovery Miles 14 380 Ships in 18 - 22 working days

This book provides an in-depth description of event-based systems, covering topics ranging from local event matching and distributed event forwarding algorithms, through a practical discussion of software engineering issues raised by the event-based style, to state-of-the-art research in event-based systems like composite event detection and security. The authors offer a comprehensive overview, and show the power of event-based architectures in modern system design, encouraging professionals to exploit this technique in next generation large-scale distributed applications like information dissemination, network monitoring, enterprise application integration, or mobile systems.

Learn Java for Android Development (Paperback, 1st ed.): Jeff Friesen Learn Java for Android Development (Paperback, 1st ed.)
Jeff Friesen
R975 R853 Discovery Miles 8 530 Save R122 (13%) Ships in 18 - 22 working days

Android development is hot, and many programmers are interested in joining the fun. However, because this technology is based on Java, you should first obtain a solid grasp of the Java language and its foundational APIs to improve your chances of succeeding as an Android app developer. After all, you will be busy learning the architecture of an Android app, the various Android-specific APIs, and Android-specific tools. If you do not already know Java fundamentals, you will probably end up with a massive headache from also having to quickly cram those fundamentals into your knowledge base. Learn Java for Android Development teaches programmers of any skill level the essential Java language and foundational Java API skills that must be learned to improve the programmer's s chances of succeeding as an Android app developer. Each of the book's 10 chapters provides an exercise section that gives you the opportunity to reinforce your understanding of the chapter's s material. Answers to the book's s more than 300 exercises are provided in an appendix.Once you complete this book, you will be ready to dive into Android, and you can start that journey by obtaining a copy of Beginning Android 2. Additionally, author Jeff Friesen will provide supplementary material (such as 6 more chapters) on his javajeff.mb.ca website, available over the next few months following this book's release. What you'll learn * The Java language: This book provides complete coverage of nearly every pre-Java version 7 language feature (native methods are briefly mentioned but not formally covered). Starting with those features related to classes and objects, you progress to object-oriented features related to inheritance, polymorphism, and interfaces. You then explore the advanced language features for nested types, packages, static imports, exceptions, assertions, annotations, generics, and enums. Continuing, you investigate strictfp, class literals, synchronized, volatile, the enhanced for loop statement, autoboxing/unboxing, and transient fields. The book also briefly presents most (if not all) of Java version 7's language features, although not much is said about closures or modules (which were not finalized at the time of writing).* Java APIs: In addition to Object and APIs related to exceptions, you explore Math, StrictMath, BigDecimal, BigInteger, Package, Boolean, Character, Byte, Short, Integer, Long, Float, Double, Number, the References API, the Reflection API, String, StringBuffer, System, the Threading API, the collections framework, the concurrency utilities, the internationalization APIs, the Preferences API, Random, the Regular Expressions API, File, RandomAccessFile, stream classes, and writer/reader classes. You will also get a tiny taste of Swing in the context of internationalization. * Tools: You will learn how to use the JDK's javac (compiler), java (application launcher), javadoc (Java documentation generator), and jar (Java archive creator, updater, and extractor) tools. You will also receive an introduction to the NetBeans and Eclipse integrated development environments. Although you can develop Android apps without NetBeans or Eclipse, working with these IDEs is much more pleasant.Who this book is for This book is for any programmer (including existing Java programmers and Objective-C (iPhone/iPad) programmers) of any skill level who needs to obtain a solid understanding of the Java language and foundational Java APIs before jumping into Android app development.

Beginning the Linux Command Line (Paperback, 1st ed.): Sander van Vugt Beginning the Linux Command Line (Paperback, 1st ed.)
Sander van Vugt
R1,018 R872 Discovery Miles 8 720 Save R146 (14%) Ships in 18 - 22 working days

This is Linux for those of us who don't mind typing. All Linux users and administrators tend to like the flexibility and speed of Linux administration from the command line in bytesized chunks, instead of fairly standard graphical user interfaces. Beginning the Linux Command Line follows a taskoriented approach and is distribution-agnostic.Work with files and directories. Administer users and security. Understand how Linux is organized. What you'll learn Finding help from insystem resources Finding the right command for the task you have to accomplish Working with text editors and intelligent filters Shell programming Managing partitions and file systems Configuring access to hardware devices Who this book is for

Everyone who uses Linux. No exceptions.

Linux Iptables Pocket Reference (Paperback): Gregor N. Purdy Linux Iptables Pocket Reference (Paperback)
Gregor N. Purdy
R218 R201 Discovery Miles 2 010 Save R17 (8%) Ships in 18 - 22 working days

Firewalls, Network Address Translation (NAT), network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables interface is the most sophisticated ever offered on

Linux and makes Linux an extremely flexible system for any kind of network filtering you might do. Large sets of filtering rules can be grouped in ways that makes it easy to test them and turn them on and off.

Do you watch for all types of ICMP traffic--some of them quite dangerous? Can you take advantage of stateful filtering to simplify the management of TCP connections? Would you like to track how much traffic of various types you get?

This pocket reference will help you at those critical moments when someone asks you to open or close a port in a hurry, either to enable some important traffic or to block an attack. The book will keep the subtle syntax straight and help you remember all the values you have to enter in order to be as secure as possible. The book has an introductory section that describes applications, followed by a reference/encyclopaedic section with all the matches and targets arranged alphabetically.

Learn AppleScript - The Comprehensive Guide to Scripting and Automation on Mac OS X (Paperback, 3rd ed.): Hamish Sanderson,... Learn AppleScript - The Comprehensive Guide to Scripting and Automation on Mac OS X (Paperback, 3rd ed.)
Hamish Sanderson, Hanaan Rosenthal, Ian Piper, Barry Wainwright, Emmanuel Levy, …
R2,376 R1,953 Discovery Miles 19 530 Save R423 (18%) Ships in 18 - 22 working days

AppleScript is an English-like, easy-to-understand scripting language built into every Mac. AppleScript can automate hundreds of AppleScript-able applications, performing tasks both large and small, complex and simple.

Learn AppleScript: The Comprehensive Guide to Scripting and Automation on Mac OS X, Third Edition has been completely updated for Mac OS X Snow Leopard. It's all here, with an emphasis on practical information that will help you solve any automation problemfrom the most mundane repetitive tasks to highly integrated workflows of complex systems.Friendly enough for beginners, detailed enough for advanced AppleScripters Includes major contributions from expert AppleScripters: Emmanuel Levy, Harald Monihart, Ian Piper, Shane Stanley, Barry Wainwright, Craig Williams, and foreword by AppleScript inventor, William Cook What you'll learn See how AppleScript represents information as objectsincluding numbers, strings, lists, and records. Learn how to manipulate these objects using commands and operators, and how to store them in variables. Organize your code using handlers and script objects. Understand how applications describe their objects and commands in dictionaries and how to interpret that information when learning to script applications. Manipulate the Mac OS X file system. Automate iTunes, Mail, iCal, and other popular lifestyle applications in Mac OS X. Discover sophisticated text processing techniques using regular expressions. Script professional productivity applicationsApple iWork, Microsoft Office, FileMaker Pro, and Adobe InDesign. Harness the power of the Unix command line in Mac OS X. Create your own Cocoa applications with the new AppleScriptObjC bridge. Who this book is for

First-time scripters who want to automate tasks on their MacsExisting AppleScripters looking to develop proficient, professional, or guru-level knowledge and skillsProfessional Mac OS X developers wishing to understand this powerful and pervasive technology Table of Contents Introducing AppleScript AppleScript in Principle AppleScript in Practice Writing Scripts in AppleScript Editor Understanding How Application Scripting Works Learning to Work with AppleScript Objects Working with Text Working with Numbers Working with Dates Working with Lists and Records Storing Objects in Variables More on Commands More on Operators and Coercions Making Decisions Using Conditionals and Loops Making Decisions When Dealing with Errors Interacting with the User Working with Files Organizing Your Code with Handlers Organizing Your Code with Script Objects Scripting the File System Scripting Apple Applications Extending AppleScript with Scripting Additions AppleScript Amenities Scripting iWork and Office Scripting Data and Databases Scripting Adobe InDesign Interacting with the Unix Command Line Using Smile: The AppleScript Integrated Production Environment Tips and Techniques for Improving Your Scripts Creating Cocoa Applications with AppleScriptObjC

Pro Ubuntu Server Administration (Paperback, 1st ed.): Sander van Vugt Pro Ubuntu Server Administration (Paperback, 1st ed.)
Sander van Vugt
R1,032 R885 Discovery Miles 8 850 Save R147 (14%) Ships in 18 - 22 working days

Pro Ubuntu Server Administration teaches you advanced Ubuntu system building. After reading this book, you will be able to manage anything from simple file servers to multiple virtual servers to highavailability clusters. This is the capstone volume of the Apress Ubuntu trilogy that includes Beginning Ubuntu Linux, Third Edition and Beginning Ubuntu Server LTS Administration: From Novice to Professional, Second Edition. You will be able to make Ubuntu technology shine in a Fortune 500 environment and let Ubuntu server become the backbone of your infrastructure. Topics covered includePerformance monitoring and optimization Highavailability clustering Advanced LightweightDirectory Access Protocol (LDAP) integrated networking What you'll learn Monitor Ubuntu Server software and the hardware it is running on. Make Ubuntu Server fly by careful optimization. Learn how to craft highavailability clusters. Ease your way into largescale LDAP networking. Acquire the skills to adjust Ubuntu Server to the security needs of a Fortune 500 environment. Run your own Ubuntu application server. Who this book is for

Anyone who administers Linux servers and wants to know enough about Ubuntu to make it fly.

Computer Supported Cooperative Work in Design IV - 11th International Conference, CSCWD 2007, Melbourne, Australia, April... Computer Supported Cooperative Work in Design IV - 11th International Conference, CSCWD 2007, Melbourne, Australia, April 26-28, 2007. Revised Selected Papers (Paperback, 2008 ed.)
Weiming. Shen, Jianming Yong, Yun Yang, Jean-Paul A. Barthes, Junzhou Luo
R2,760 Discovery Miles 27 600 Ships in 18 - 22 working days

Design of complex artifacts and systems requires the cooperation of multidisciplinary design teams using multiple sophisticated commercial and non-commercial engine- ing tools such as CAD tools, modeling, simulation and optimization software, en- neering databases, and knowledge-based systems. Individuals or individual groups of multidisciplinary design teams usually work in parallel and independently with various engineering tools, which are located on different sites, often for quite a long period of time. At any moment, individual members may be working on different versions of a design or viewing the design from various perspectives, at different levels of details. In order to meet these requirements, it is necessary to have efficient comput- supported collaborative design systems. These systems should not only automate in- vidual tasks, in the manner of traditional computer-aided engineering tools, but also enable individual members to share information, collaborate, and coordinate their activities within the context of a design project. Based on close international collaboration between the University of Technology of Compiegne in France and the Institute of Computing Technology of the Chinese Ac- emy of Sciences in the early 1990s, a series of international workshops on CSCW in Design started in 1996. In order to facilitate the organization of these workshops, an International Working Group on CSCW in Design (CSCWD) was established and an International Steering Committee was formed in 1998. The series was converted to int- national conferences in 2000 building on the success of the four previous workshops."

Self-Sustaining Systems - First Workshop, S3 2008 Potsdam, Germany, May 15-16, 2008, Proceedings (Paperback, 2008 ed.): Robert... Self-Sustaining Systems - First Workshop, S3 2008 Potsdam, Germany, May 15-16, 2008, Proceedings (Paperback, 2008 ed.)
Robert Hirschfeld, Kim Rose
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The Workshop on Self-sustaining Systems (S3) is a forum for the discussion of topics relating to computer systems and languages that are able to bootstrap, implement, modify, and maintain themselves. One property of these systems is that their implementation is based onsmall but powerfulabstractions;examples include (amongst others) Squeak/Smalltalk, COLA, Klein/Self, PyPy/Python, Rubinius/Ruby, andLisp.Suchsystemsaretheenginesoftheirownreplacement, giving researchers and developers great power to experiment with, and explore future directions from within, their own small language kernels. S3 took place on May 15-16, 2008 at the Hasso-Plattner-Institute (HPI) in Potsdam, Germany. It was an exciting opportunity for researchers and prac- tioners interested in self-sustaining systems to meet and share their knowledge, experience, and ideas for future research and development. S3 provided an - portunity for a community to gather and discuss the need for self-sustainability in software systems, and to share and explore thoughts on why such systems are needed and how they can be created and deployed. Analogies were made, for example, with evolutionary cycles, and with urban design and the subsequent inevitable socially-driven change. TheS3participantsleftwithagreatersenseofcommunityandanenthusiasm for probing more deeply into this subject. We see the need for self-sustaining systems becoming critical not only to the developer's community, but to e- users in business, academia, learning and play, and so we hope that this S3 workshop will become the ?rst of many.

Middleware 2009 - ACM/IFIP/USENIX, 10th International Conference, Urbana, IL, USA, November 30 - December 4, 2009, Proceedings... Middleware 2009 - ACM/IFIP/USENIX, 10th International Conference, Urbana, IL, USA, November 30 - December 4, 2009, Proceedings (Paperback, 2009 ed.)
Valerie Issarny, Brian F. Cooper
R1,451 Discovery Miles 14 510 Ships in 18 - 22 working days

This edition marks the tenth Middleware conference. The ?rst conference was held in the Lake District of England in 1998, and its genesis re?ected a growing realization that middleware systems were a unique breed of distributed system requiring their own rigorous research and evaluation. Distributed systems had been around for decades, and the Middleware conference itself resulted from the combination of three previous conferences. But the attempt to build common platforms for many di?erent applications requireda unique combinationofhi- level abstraction and low-level optimization, and presented challenges di?erent from building a monolithic distributed system. Since that ?rst conference, the notion of what constitutes "middleware" has changed somewhat, and the focus of research papers has changed with it. The ?rst edition focused heavily on distributed objects as a metaphor for building systems, including six papers with "CORBA" or "ORB" in the title. In f- lowing years, the conference broadened to cover publish/subscribe messaging, peer-to-peer systems, distributed databases, Web services, and automated m- agement, among other topics. Innovative techniques and architectures surfaced in workshops, and expanded to become themes of the main conference, while changes in the industry and advances in other research areas helped to shape research agendas. This tenth edition includes papers on next-generation pl- forms (such as stream systems, pervasive systems and cloud systems), managing enterprise data centers, and platforms for building other platforms, among o- ers.

Advances in Information Technology - Third International Conference, IAIT 2009, Bangkok, Thailand, December 1-5, 2009,... Advances in Information Technology - Third International Conference, IAIT 2009, Bangkok, Thailand, December 1-5, 2009, Proceedings (Paperback, 2009 ed.)
Borworn Papasratorn, Wichian Chutimaskul, Kriengkrai Porkaew, Vajirasak Vanijja
R1,388 Discovery Miles 13 880 Ships in 18 - 22 working days

At the School of Information Technology, KMUTT, we believe that information te- nology is the most important driver of economy and social development. IT can - able better productivity, as well as helping us to save resources. IT is giving rise to a new round of industrial and business revolution. We now can have products and s- vices that once were believed to be beyond reach. Without IT, it is impossible for people to realize their full potential. Businesses worldwide are harnessing the power of broadband communication, which will have a profound and constructive impact on the economic, social devel- ment, education, and almost all aspects of our life. This new era of unified commu- cation presents us with new challenges. This is why we should work together more closely to enhance the exchange of knowledge related to effective application of broadband communication and IT. It is my sincere hope that all contributions to the Third International Conference on Advances in Information Technology (IAIT 2009) will increase our understanding of how we can have effectively apply this emerging technology for the benefit of all people all around the world. I hope IAIT 2009 will also lead to more research that can contr- ute to a better methodology for IT applications in the era of unified communication. I am very grateful to all our keynotes speakers for coming all the way to Thailand.

grep Pocket Reference (Paperback): John Bambenek grep Pocket Reference (Paperback)
John Bambenek
R519 R472 Discovery Miles 4 720 Save R47 (9%) Ships in 18 - 22 working days

"Grep Pocket Reference" is the first guide devoted to grep, the powerful utility program that helps you locate content in any file on a Unix or Linux system. Several applications use grep, from mail filtering and system log management to malware analysis and application development, and there are many other ways to use the utility. This pocket reference is ideal for system administrators, security professionals, developers, and others who want to learn more about grep and take new approaches with it.With "Grep Pocket Reference", you will: learn methods for filtering large files for specific content; acquire information not included in the current grep documentation; get several tricks for using variants such as egrep; keep key information about grep right at your fingertips; and, find the answers you need about grep quickly and easily. If you're familiar with this utility, "Grep Pocket Reference" will help you refresh your basic knowledge, understand rare situations, and find more efficient uses. If you're new to grep, this book is the best way to get started.

Secure Data Management - 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings (Paperback, 2008... Secure Data Management - 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings (Paperback, 2008 ed.)
Willem Jonker, Milan Petkovic
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Information and communication technologies are advancing fast. Processing speed is still increasing at a high rate, followed by advances in digital storage technology, which double storage capacity every year. Furthermore, communication techno- gies do not lag behind. The Internet has been widely used, as well as wireless te- nologies. With a few mouse clicks, people can communicate with each other around the world. All these advances have great potential to change the way people live, introducing new concepts like ubiquitous computing and ambient intelligence. Technology is becoming present everywhere in the form of smart and sensitive c- puting devices. They are nonintrusive, transparent and hidden in the background, but they collect, process, and share all kinds of information, including user beh- ior, in order to act in an intelligent and adaptive way. These emerging technologies put new requirements on security and data m- agement. As data are accessible anytime anywhere, it becomes much easier to get unauthorized data access. Furthermore, the use of new technologies has brought about some privacy concerns. It becomes simpler to collect, store, and search personal information, thereby endangering people's privacy. Therefore, research in secure data management is gaining importance, attracting the attention of both the data management and the security research communities. The intere- ing problems range from traditional topics, such as, access control and general database security, via privacy protection to new research directions, such as cryptographically enforced access control.

Secure Transaction Protocol Analysis - Models and Applications (Paperback, 2008 ed.): Qingfeng Chen, Chengqi Zhang, Shichao... Secure Transaction Protocol Analysis - Models and Applications (Paperback, 2008 ed.)
Qingfeng Chen, Chengqi Zhang, Shichao Zhang
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The application of formal methods to security protocol analysis has attracted increasing attention in the past two decades, and recently has been sh- ing signs of new maturity and consolidation. The development of these formal methodsismotivatedbythehostilenatureofsomeaspectsofthenetworkand the persistent e?orts of intruders, and has been widely discussed among - searchers in this ?eld. Contributions to the investigation of novel and e?cient ideas and techniques have been made through some important conferences and journals, such asESORICS, CSFW andACM Transactions in Computer Systems. Thus, formal methods have played an important role in a variety of applications such as discrete system analysis for cryptographic protocols, - lief logics and state exploration tools. A complicated security protocol can be abstractedasamanipulationofsymbolsandstructurescomposedbysymbols. The analysis of e-commerce (electronic commerce) protocols is a particular case of such symbol systems. There have been considerable e?orts in developing a number of tools for ensuring the security of protocols, both specialized and general-purpose, such as belief logic and process algebras. The application of formal methods starts with the analysis of key-distribution protocols for communication between two principals at an early stage. With the performance of transactions - coming more and more dependent on computer networks, and cryptography becoming more widely deployed, the type of application becomes more varied and complicated. The emerging complex network-based transactions such as ?nancial transactionsand secure groupcommunication have not only brought innovationstothecurrentbusinesspractice, butthey alsoposeabigchallenge to protect the information transmitted over the open network from malicious attack

Formal Methods for Components and Objects - 7th International Symposium, FMCO 2008, Sophia Antipolis, France, October 21-23,... Formal Methods for Components and Objects - 7th International Symposium, FMCO 2008, Sophia Antipolis, France, October 21-23, 2008, State of the Art Survey (Paperback, 2009 ed.)
Marcello M. Bonsangue, Eric Madelaine
R1,412 Discovery Miles 14 120 Ships in 18 - 22 working days

All modern industries rely on large and complex software systems. In order to construct such large systems in a systematic manner, the focus of the development methodologies has switched in the last two decades from functional to structural issues. Formal methods have been applied successfully to the verification of medium-sized programs in protocol and hardware design. However, their application to the development of large systems requires a greater emphasis on specification, modeling, and validation techniques supporting the concepts of reusability and modifiability, and their implementation in new extensions of existing programming languages like Java.

This state-of-the-art survey presents the outcome of the 7th Symposium on Formal Methods for Components and Objects, held in Sophia Antipolis, France, in October 2008. The volume contains 14 revised contributions submitted after the symposium by speakers from each of the following European IST projects: the IST-FP7 project COMPAS on compliance-driven models, languages, and architectures for services; the IST-FP6 project CREDO on modelling and analysis of evolutionary structures for distributed services; the IST-FP7 DEPLOY on industrial deployment of advanced system engineering methods for high productivity and dependability; the IST-FP6 project GridComp on grid programming with components; and the IST-FP6 project MOBIUS aiming at developing the technology for establishing trust and security for the next generation of global computers, using the proof carrying code paradigm.

Formal Methods for Open Object-Based Distributed Systems - 10th IFIP WG 6.1 International Conference, FMOODS 2008, Oslo,... Formal Methods for Open Object-Based Distributed Systems - 10th IFIP WG 6.1 International Conference, FMOODS 2008, Oslo, Norway, June 4-6, 2008 Proceedings (Paperback, 2008 ed.)
Gilles Barthe
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This volume contains the proceedings of the 10th IFIP Working Group 6.1 - ternational Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS 2008).The conference was part of the Third Federated c- ferences on Distributed Computing Techniques (DisCoTec), together with the 10th International Conference on Coordination Models and Languages (COOR- DINATION 2008) and the 8th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS 2008). We are grateful to Frank Eliassen and Einar Broch Johnsen of the University of Oslo for the excellent organization of this event in Olso, Norway, June 4-6, 2008. The goal of the FMOODS conferences is to bring together researchers and practitioners whose work encompasses three important and related ?elds: - Formal methods - Distributed systems - Object-based technology The 14 papers presented at FMOODS 2008 and included in this volume were selected by the Program Committee among 35 submissions. Each submission was reviewed by at least three Program Committee members. They all re?ect thescopeoftheconferenceandcoverthe following topics: semantics of obje- oriented programming; formal techniques for speci?cation, analysis, and re?- ment; model checking; theorem proving and deductive veri?cation;type systems and behavioral typing; formal methods for service-oriented computing; integ- tion of quality of service requirements into formal models; formal approaches to component-based design; and applications of formal methods.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
DNSSEC Mastery, 2nd Edition
Michael W Lucas Hardcover R873 R792 Discovery Miles 7 920
Linux - The Ultimate Crash Course to…
Mark Reed Hardcover R558 R512 Discovery Miles 5 120
Linux - The Ultimate Beginner's Guide to…
Ryan Turner Hardcover R979 R827 Discovery Miles 8 270
IBM Mainframe Developer Training and…
Robert Wingate Hardcover R1,674 R1,402 Discovery Miles 14 020
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright Paperback R1,491 Discovery Miles 14 910
Linux for Hackers - A Comprehensive…
William Vance Hardcover R576 R530 Discovery Miles 5 300
Microsoft Windows 10 Tips & Tricks
Joan Lambert Fold-out book or chart R229 Discovery Miles 2 290
Linux Command - A Comprehensive…
William Vance Hardcover R581 R536 Discovery Miles 5 360
Mike Meyers' CompTIA A+ Guide to 802…
Mike Meyers Paperback R1,201 Discovery Miles 12 010
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,018 Discovery Miles 10 180

 

Partners