0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (6)
  • R100 - R250 (79)
  • R250 - R500 (337)
  • R500+ (2,300)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)

Security and Dependability for Ambient Intelligence (Paperback, Softcover reprint of hardcover 1st ed. 2009): George... Security and Dependability for Ambient Intelligence (Paperback, Softcover reprint of hardcover 1st ed. 2009)
George Spanoudakis, Spyros Kokolakis
R4,041 Discovery Miles 40 410 Ships in 18 - 22 working days

Security and Dependability for Ambient Intelligence is the primary publication of the SERENITY approach, which provides security and dependability (S&D) solutions for dynamic, highly distributed, heterogeneous systems. The objective of SERENITY is to enhance the security and dependability of ambient intelligence systems by providing a framework supporting the automated integration, configuration, monitoring and adaptation of security and dependability mechanisms.

An edited volume contributed by world leaders in the field, this book covers the problems that the highly dynamic and heterogeneous nature of ambient intelligence systems poses to security and dependability and presents solutions to these problems.

Security and Dependability for Ambient Intelligence is designed for researchers and practitioners focusing on the dynamic integration, deployment and verification of security and dependability solutions in highly distributed systems incorporating ambient intelligence features. It is also suitable as a reference or secondary text for advanced-level students in computer science and computer or electrical engineering.

Real-Time Systems in Mechatronic Applications (Paperback, Softcover reprint of the original 1st ed. 1998): Jan Wikander, Bertil... Real-Time Systems in Mechatronic Applications (Paperback, Softcover reprint of the original 1st ed. 1998)
Jan Wikander, Bertil Svensson
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Real-Time Systems in Mechatronic Applications brings together in one place important contributions and up-to-date research results in this fast moving area. Real-Time Systems in Mechatronic Applications serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

Pro Core Data for iOS - Data Access and Persistence Engine for iPhone, iPad, and iPod touch (Paperback, 1st ed.): Michael... Pro Core Data for iOS - Data Access and Persistence Engine for iPhone, iPad, and iPod touch (Paperback, 1st ed.)
Michael Privat, Robert Warner
R940 R819 Discovery Miles 8 190 Save R121 (13%) Ships in 18 - 22 working days

The power of Core Data allows iOS developers to efficiently store and retrieve application data using familiar object-oriented paradigms.Pro Core Data for iOS explains both how and why to use Core Data for data storage, from simple to advanced techniques. Covering common and advanced persistence patterns, this book prepares any iOS developer to store and retrieve data accurately and proficiently.
Lots of iOS development books touch on Core Data, taking you through a few mainstream use cases for storing and retrieving data in your iOS applications. In Pro Core Data for iOS, however, we take you further into Core Data and show you how to leverage the power of this data framework.
After reading this book, you'll be able to answer all of these questions:
What are all the parts of Core Data, and how do they interact? How do I create my own custom store? Should I use plain NSManagedObject instances or custom classes? How do I undo and redo Core Data actions? How do I filter, sort, and aggregate data? What is faulting, and why should I care? Suppose I want to change my data model; how do I migrate my users' data? Pro Core Data for iOS delves into these and other Core Data questions. With explanations, diagrams, code samples, and working explanations, this book will make you a Core Data pro What you'll learn Organize data appropriately Persist data efficiently Use Apple's tools effectively Build Core Data applications Use Core Data in advanced settings Version and migrate data as your applications evolve Who this book is for

All iPhone, iPad, and iPod touch developers whose applications manage any amount of data. Table of Contents Getting Started Understanding Core Data Storing Data: SQLite and Other Options Creating a Data Model Working with Data Objects Refining Result Sets Tuning Performance and Memory Usage Versioning and Migrating Data Using Core Data in Advanced Applications

Distributed and Parallel Systems - From Cluster to Grid Computing (Paperback, Softcover reprint of hardcover 1st ed. 2007):... Distributed and Parallel Systems - From Cluster to Grid Computing (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Peter Kacsuk, Thomas Fahringer, Zsolt Nemeth
R2,879 Discovery Miles 28 790 Ships in 18 - 22 working days

Distributed and Parallel Systems: From Cluster to Grid Computing, is an edited volume based on DAPSYS 2006, the 6th Austrian-Hungarian Workshop on Distributed and Parallel Systems, which is dedicated to all aspects of distributed and parallel computing. The workshop was held in conjunction with the 2nd Austrian Grid Symposium in Innsbruck, Austria in September 2006. This book is designed for a professional audience composed of practitioners and researchers in industry. It is also suitable for advanced-level students in computer science.

Networks on Chip (Paperback, Softcover reprint of hardcover 1st ed. 2003): Axel Jantsch, Hannu Tenhunen Networks on Chip (Paperback, Softcover reprint of hardcover 1st ed. 2003)
Axel Jantsch, Hannu Tenhunen
R4,223 Discovery Miles 42 230 Ships in 18 - 22 working days

Networks on Chip presents a variety of topics, problems and approaches with the common theme to systematically organize the on-chip communication in the form of a regular, shared communication network on chip, an NoC for short.

As the number of processor cores and IP blocks integrated on a single chip is steadily growing, a systematic approach to design the communication infrastructure becomes necessary. Different variants of packed switched on-chip networks have been proposed by several groups during the past two years. This book summarizes the state of the art of these efforts and discusses the major issues from the physical integration to architecture to operating systems and application interfaces. It also provides a guideline and vision about the direction this field is moving to. Moreover, the book outlines the consequences of adopting design platforms based on packet switched network. The consequences may in fact be far reaching because many of the topics of distributed systems, distributed real-time systems, fault tolerant systems, parallel computer architecture, parallel programming as well as traditional system-on-chip issues will appear relevant but within the constraints of a single chip VLSI implementation.

The book is organized in three parts. The first deals with system design and methodology issues. The second presents problems and solutions concerning the hardware and the basic communication infrastructure. Finally, the third part covers operating system, embedded software and application. However, communication from the physical to the application level is a central theme throughout the book.

The book serves as an excellent reference source and may be used as a text for advanced courses on the subject.

Learn Java for Android Development (Paperback, 1st ed.): Jeff Friesen Learn Java for Android Development (Paperback, 1st ed.)
Jeff Friesen
R975 R853 Discovery Miles 8 530 Save R122 (13%) Ships in 18 - 22 working days

Android development is hot, and many programmers are interested in joining the fun. However, because this technology is based on Java, you should first obtain a solid grasp of the Java language and its foundational APIs to improve your chances of succeeding as an Android app developer. After all, you will be busy learning the architecture of an Android app, the various Android-specific APIs, and Android-specific tools. If you do not already know Java fundamentals, you will probably end up with a massive headache from also having to quickly cram those fundamentals into your knowledge base. Learn Java for Android Development teaches programmers of any skill level the essential Java language and foundational Java API skills that must be learned to improve the programmer's s chances of succeeding as an Android app developer. Each of the book's 10 chapters provides an exercise section that gives you the opportunity to reinforce your understanding of the chapter's s material. Answers to the book's s more than 300 exercises are provided in an appendix.Once you complete this book, you will be ready to dive into Android, and you can start that journey by obtaining a copy of Beginning Android 2. Additionally, author Jeff Friesen will provide supplementary material (such as 6 more chapters) on his javajeff.mb.ca website, available over the next few months following this book's release. What you'll learn * The Java language: This book provides complete coverage of nearly every pre-Java version 7 language feature (native methods are briefly mentioned but not formally covered). Starting with those features related to classes and objects, you progress to object-oriented features related to inheritance, polymorphism, and interfaces. You then explore the advanced language features for nested types, packages, static imports, exceptions, assertions, annotations, generics, and enums. Continuing, you investigate strictfp, class literals, synchronized, volatile, the enhanced for loop statement, autoboxing/unboxing, and transient fields. The book also briefly presents most (if not all) of Java version 7's language features, although not much is said about closures or modules (which were not finalized at the time of writing).* Java APIs: In addition to Object and APIs related to exceptions, you explore Math, StrictMath, BigDecimal, BigInteger, Package, Boolean, Character, Byte, Short, Integer, Long, Float, Double, Number, the References API, the Reflection API, String, StringBuffer, System, the Threading API, the collections framework, the concurrency utilities, the internationalization APIs, the Preferences API, Random, the Regular Expressions API, File, RandomAccessFile, stream classes, and writer/reader classes. You will also get a tiny taste of Swing in the context of internationalization. * Tools: You will learn how to use the JDK's javac (compiler), java (application launcher), javadoc (Java documentation generator), and jar (Java archive creator, updater, and extractor) tools. You will also receive an introduction to the NetBeans and Eclipse integrated development environments. Although you can develop Android apps without NetBeans or Eclipse, working with these IDEs is much more pleasant.Who this book is for This book is for any programmer (including existing Java programmers and Objective-C (iPhone/iPad) programmers) of any skill level who needs to obtain a solid understanding of the Java language and foundational Java APIs before jumping into Android app development.

Distributed Services with OpenAFS - for Enterprise and Education (Paperback, Softcover reprint of hardcover 1st ed. 2007):... Distributed Services with OpenAFS - for Enterprise and Education (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Franco Milicchio, Wolfgang Alexander Gehrke
R1,553 Discovery Miles 15 530 Ships in 18 - 22 working days

This book shows in detail how to build enterprise-level secure, redundant, and highly scalable services from scratch on top of the open source Linux operating system, suitable for small companies as well as big universities. The core architecture presented is based on Kerberos, LDAP, AFS, and Samba. Coverage shows how to integrate web, message related, data base and other services with this backbone. This architecture provides a Single-Sign-On solution for different client platforms and can also be employed for clustering. Although it is implemented with Debian GNU/Linux, the content can be applied to other UNIX flavors.

iOS Forensic Analysis - for iPhone, iPad, and iPod touch (Paperback, 1st ed.): Sean Morrissey, Tony Campbell iOS Forensic Analysis - for iPhone, iPad, and iPod touch (Paperback, 1st ed.)
Sean Morrissey, Tony Campbell
R1,452 Discovery Miles 14 520 Ships in 18 - 22 working days

iOS Forensic Analysis provides an in-depth look at investigative processes for the iPhone, iPod Touch, and iPad devices. The methods and procedures outlined in the book can be taken into any courtroom. With never-before-published iOS information and data sets that are new and evolving, this book gives the examiner and investigator the knowledge to complete a full device examination that will be credible and accepted in the forensic community. -->What you'll learn-->How to respond to security incidents involving iOS devices How to acquire and analyze data on iOS devices such as iPhone and iPad How to analyze media exploitation on iOS devices-->Who this book is for-->

Computer forensic professionals, law enforcement, attorneys, security professionals, those who are curious about such things, and educators-->-->-->Table of Contents-->History of Apple Mobile Devices iOS Operating and File System Analysis Search, Seizure, and Incident Response iPhone Logical Acquisition Logical Data Analysis Mac and Windows Artifacts GPS Analysis Media Exploitation Media Exploitation Analysis Network Analysis

Beginning the Linux Command Line (Paperback, 1st ed.): Sander van Vugt Beginning the Linux Command Line (Paperback, 1st ed.)
Sander van Vugt
R1,018 R872 Discovery Miles 8 720 Save R146 (14%) Ships in 18 - 22 working days

This is Linux for those of us who don't mind typing. All Linux users and administrators tend to like the flexibility and speed of Linux administration from the command line in bytesized chunks, instead of fairly standard graphical user interfaces. Beginning the Linux Command Line follows a taskoriented approach and is distribution-agnostic.Work with files and directories. Administer users and security. Understand how Linux is organized. What you'll learn Finding help from insystem resources Finding the right command for the task you have to accomplish Working with text editors and intelligent filters Shell programming Managing partitions and file systems Configuring access to hardware devices Who this book is for

Everyone who uses Linux. No exceptions.

Linux Iptables Pocket Reference (Paperback): Gregor N. Purdy Linux Iptables Pocket Reference (Paperback)
Gregor N. Purdy
R218 R201 Discovery Miles 2 010 Save R17 (8%) Ships in 18 - 22 working days

Firewalls, Network Address Translation (NAT), network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables interface is the most sophisticated ever offered on

Linux and makes Linux an extremely flexible system for any kind of network filtering you might do. Large sets of filtering rules can be grouped in ways that makes it easy to test them and turn them on and off.

Do you watch for all types of ICMP traffic--some of them quite dangerous? Can you take advantage of stateful filtering to simplify the management of TCP connections? Would you like to track how much traffic of various types you get?

This pocket reference will help you at those critical moments when someone asks you to open or close a port in a hurry, either to enable some important traffic or to block an attack. The book will keep the subtle syntax straight and help you remember all the values you have to enter in order to be as secure as possible. The book has an introductory section that describes applications, followed by a reference/encyclopaedic section with all the matches and targets arranged alphabetically.

Learn AppleScript - The Comprehensive Guide to Scripting and Automation on Mac OS X (Paperback, 3rd ed.): Hamish Sanderson,... Learn AppleScript - The Comprehensive Guide to Scripting and Automation on Mac OS X (Paperback, 3rd ed.)
Hamish Sanderson, Hanaan Rosenthal, Ian Piper, Barry Wainwright, Emmanuel Levy, …
R2,376 R1,953 Discovery Miles 19 530 Save R423 (18%) Ships in 18 - 22 working days

AppleScript is an English-like, easy-to-understand scripting language built into every Mac. AppleScript can automate hundreds of AppleScript-able applications, performing tasks both large and small, complex and simple.

Learn AppleScript: The Comprehensive Guide to Scripting and Automation on Mac OS X, Third Edition has been completely updated for Mac OS X Snow Leopard. It's all here, with an emphasis on practical information that will help you solve any automation problemfrom the most mundane repetitive tasks to highly integrated workflows of complex systems.Friendly enough for beginners, detailed enough for advanced AppleScripters Includes major contributions from expert AppleScripters: Emmanuel Levy, Harald Monihart, Ian Piper, Shane Stanley, Barry Wainwright, Craig Williams, and foreword by AppleScript inventor, William Cook What you'll learn See how AppleScript represents information as objectsincluding numbers, strings, lists, and records. Learn how to manipulate these objects using commands and operators, and how to store them in variables. Organize your code using handlers and script objects. Understand how applications describe their objects and commands in dictionaries and how to interpret that information when learning to script applications. Manipulate the Mac OS X file system. Automate iTunes, Mail, iCal, and other popular lifestyle applications in Mac OS X. Discover sophisticated text processing techniques using regular expressions. Script professional productivity applicationsApple iWork, Microsoft Office, FileMaker Pro, and Adobe InDesign. Harness the power of the Unix command line in Mac OS X. Create your own Cocoa applications with the new AppleScriptObjC bridge. Who this book is for

First-time scripters who want to automate tasks on their MacsExisting AppleScripters looking to develop proficient, professional, or guru-level knowledge and skillsProfessional Mac OS X developers wishing to understand this powerful and pervasive technology Table of Contents Introducing AppleScript AppleScript in Principle AppleScript in Practice Writing Scripts in AppleScript Editor Understanding How Application Scripting Works Learning to Work with AppleScript Objects Working with Text Working with Numbers Working with Dates Working with Lists and Records Storing Objects in Variables More on Commands More on Operators and Coercions Making Decisions Using Conditionals and Loops Making Decisions When Dealing with Errors Interacting with the User Working with Files Organizing Your Code with Handlers Organizing Your Code with Script Objects Scripting the File System Scripting Apple Applications Extending AppleScript with Scripting Additions AppleScript Amenities Scripting iWork and Office Scripting Data and Databases Scripting Adobe InDesign Interacting with the Unix Command Line Using Smile: The AppleScript Integrated Production Environment Tips and Techniques for Improving Your Scripts Creating Cocoa Applications with AppleScriptObjC

Classic Computer Science Problems in Java (Paperback): David Kopec Classic Computer Science Problems in Java (Paperback)
David Kopec
R1,192 Discovery Miles 11 920 Ships in 10 - 15 working days

Sharpen your coding skills by exploring established computer science problems! Classic Computer Science Problems in Java challenges you with time-tested scenarios and algorithms. You'll work through a series of exercises based in computer science fundamentals that are designed to improve your software development abilities, improve your understanding of artificial intelligence, and even prepare you to ace an interview. Classic Computer Science Problems in Java will teach you techniques to solve common-but-tricky programming issues. You'll explore foundational coding methods, fundamental algorithms, and artificial intelligence topics, all through code-centric Java tutorials and computer science exercises. As you work through examples in search, clustering, graphs, and more, you'll remember important things you've forgotten and discover classic solutions to your "new" problems! Key Features * Recursion, memorization, bit manipulation * Search algorithms * Constraint-satisfaction problems * Graph algorithms * K-means clustering For intermediate Java programmers. About the technology In any computer science classroom you'll find a set of tried-and-true algorithms, techniques, and coding exercises. These techniques have stood the test of time as some of the best ways to solve problems when writing code, and expanding your Java skill set with these classic computer science methods will make you a better Java programmer. David Kopec is an assistant professor of computer science and innovation at Champlain College in Burlington, Vermont. He is the author of Dart for Absolute Beginners (Apress, 2014), Classic Computer Science Problems in Swift (Manning, 2018), and Classic Computer Science Problems in Python (Manning, 2019).

Advances in Grid and Pervasive Computing - 5th International Conference, CPC 2010, Hualien, Taiwan, May 10-13, 2010,... Advances in Grid and Pervasive Computing - 5th International Conference, CPC 2010, Hualien, Taiwan, May 10-13, 2010, Proceedings (Paperback, 2010 ed.)
Paolo Bellavista, Ruay-Shiung Chang, Han-Chieh Chao, Shin-Feng Lin, Peter M. A. Sloot
R2,788 Discovery Miles 27 880 Ships in 18 - 22 working days

Grid and Pervasive Computing (GPC) is an annual international conference on the emerging areas of grid computing and pervasive computing, aimed at p- viding an exciting platform and paradigm for all-the-time, everywhere services. GPC 2010 provided a high-pro?le, leading-edgeforum for researchersand dev- opers from industry and academia to present their latest research in the ?eld of grid and pervasive computing. Three workshops were held in conjunction with the GPC 2010 conference: * The First International Workshop on Intelligent Management of Networked Environment (IMNE 2010) * International Workshop on Multimedia Applications for Cloud (MAC 2010) * The 6thInternationalWorkshopon Mobile Commerce andServices (WMCS 2010) The proceedingsof these workshoparealso included in this volume. We received 184 papers originating from 22 countries. The Program Committee ?nally - lected 67 papers for presentation at the conference and inclusion in this LNCS volume. At GPC 2010, we were very pleased to have four distinguished invited speakers, who delivered state-of-the-art information on the conference topics: * A grid based virtual laboratory for HIV drugranking by Peter Sloot (U- versity of Amsterdam, The Netherlands) * Solving the scalability dilemma with clouds, crowds, and algorithms by Michael J. Franklin (University of California, Berkeley, USA) * The trend of cloud computing - from industry's perspective by Enwei Xie (Microsoft Greater China Region, China) * Towards ubiquitous a?ective learning by Bin Hu (The Birmingham City University, UK) Theconferencewouldnothavebeenpossiblewithoutthesupportofmanypeople andorganizationsthathelped invariouswaysto makeita success.

Distributed Embedded Systems: Design, Middleware and Resources - IFIP 20th World Computer Congress, TC10 Working Conference on... Distributed Embedded Systems: Design, Middleware and Resources - IFIP 20th World Computer Congress, TC10 Working Conference on Distributed and Parallel Embedded Systems (DIPES 2008), September 7-10, 2008, Milano, Italy (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Bernd Kleinjohann, Lisa Kleinjohann, Marilyn Wolf
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This year, the IFIP Working Conference on Distributed and Parallel Embedded Sys tems (DIPES 2008) is held as part of the IFIP World Computer Congress, held in Milan on September 7 10, 2008. The embedded systems world has a great deal of experience with parallel and distributed computing. Many embedded computing systems require the high performance that can be delivered by parallel computing. Parallel and distributed computing are often the only ways to deliver adequate real time performance at low power levels. This year's conference attracted 30 submissions, of which 21 were accepted. Prof. Jor ] g Henkel of the University of Karlsruhe graciously contributed a keynote address on embedded computing and reliability. We would like to thank all of the program committee members for their diligence. Wayne Wolf, Bernd Kleinjohann, and Lisa Kleinjohann Acknowledgements We would like to thank all people involved in the organization of the IFIP World Computer Congress 2008, especially the IPC Co Chairs Judith Bishop and Ivo De Lotto, the Organization Chair Giulio Occhini, as well as the Publications Chair John Impagliazzo. Further thanks go to the authors for their valuable contributions to DIPES 2008. Last but not least we would like to acknowledge the considerable amount of work and enthusiasm spent by our colleague Claudius Stern in preparing theproceedingsofDIPES2008. Hemadeitpossibletoproducethemintheircurrent professional and homogeneous style."

Computer Supported Cooperative Work in Design IV - 11th International Conference, CSCWD 2007, Melbourne, Australia, April... Computer Supported Cooperative Work in Design IV - 11th International Conference, CSCWD 2007, Melbourne, Australia, April 26-28, 2007. Revised Selected Papers (Paperback, 2008 ed.)
Weiming. Shen, Jianming Yong, Yun Yang, Jean-Paul A. Barthes, Junzhou Luo
R2,760 Discovery Miles 27 600 Ships in 18 - 22 working days

Design of complex artifacts and systems requires the cooperation of multidisciplinary design teams using multiple sophisticated commercial and non-commercial engine- ing tools such as CAD tools, modeling, simulation and optimization software, en- neering databases, and knowledge-based systems. Individuals or individual groups of multidisciplinary design teams usually work in parallel and independently with various engineering tools, which are located on different sites, often for quite a long period of time. At any moment, individual members may be working on different versions of a design or viewing the design from various perspectives, at different levels of details. In order to meet these requirements, it is necessary to have efficient comput- supported collaborative design systems. These systems should not only automate in- vidual tasks, in the manner of traditional computer-aided engineering tools, but also enable individual members to share information, collaborate, and coordinate their activities within the context of a design project. Based on close international collaboration between the University of Technology of Compiegne in France and the Institute of Computing Technology of the Chinese Ac- emy of Sciences in the early 1990s, a series of international workshops on CSCW in Design started in 1996. In order to facilitate the organization of these workshops, an International Working Group on CSCW in Design (CSCWD) was established and an International Steering Committee was formed in 1998. The series was converted to int- national conferences in 2000 building on the success of the four previous workshops."

My Windows 10 Computer For Seniors (Paperback, 3rd Edition): Michael Miller My Windows 10 Computer For Seniors (Paperback, 3rd Edition)
Michael Miller
R582 Discovery Miles 5 820 Ships in 10 - 15 working days

My Windows® 10 Computer for Seniors is an easy, full-color tutorial on the latest operating system from Microsoft.

Veteran author Michael Miller is known for his ability to explain complex topics to everyday readers. Michael wrote this book from the 50+ point of view, using step-by-step instructions and large, full-colour photos to cover all the most popular tasks.

  • Written specifically for seniors - this is not a beginner level book that is shoehorned into the "Seniors" mold
  • Full-colour, custom interior that is designed specifically for seniors, using larger text and images
  • Part of the wildly popular My... series, which has already shown some traction with the seniors audience
The second edition of this book was written on the Windows 10 release 1709 in Fall 2017. Since then we've had four additional releases — 1803 (Spring 2018), 1809 (Fall 2018), 1903 (Spring 2019), and 1909 (Fall 2019) — with an additional release (2004) scheduled for Spring 2020. There's a bit of catching up to do.

What's new in this edition?

This new third edition will cover all the changes made in the past five Windows updates as well as changes in the computer hardware market. It will also cover changes to popular social networks and computer software and websites. New or updated coverage on a chapter-by-chapter basis is extensive, and all screen images will be reshot with the current version of the Windows 10 interface.
Provenance and Annotation of Data and Processes - Second International Provenance and Annotation Workshop, IPAW 2008, Salt Lake... Provenance and Annotation of Data and Processes - Second International Provenance and Annotation Workshop, IPAW 2008, Salt Lake City, UT, USA, June 17-18, 2008 (Paperback, 2008 ed.)
Juliana Freire, David Koop
R1,421 Discovery Miles 14 210 Ships in 18 - 22 working days

Computinghasbeenanenormousacceleratortoscienceandindustryalikeandit has led to an information explosion in many di?erent ?elds. The unprecedented volume of data acquired from sensors, derived by simulations and data analysis processes, accumulated in warehouses, and often shared on the Web, has given risetoanew?eldofresearch: provenancemanagement.Provenance(alsoreferred to as audit trail, lineage, and pedigree) captures information about the steps used to generate a given data product. Such information provides important documentation that is key to preserving data, to determining the data's quality and authorship, to understanding, reproducing, as well as validating results. Provenancemanagement has become an active ?eld of research, as evidenced byrecentspecializedworkshops, surveys, andtutorials.Provenancesolutionsare needed in many di?erent domains and applications, from environmental science and physics simulations, to business processes and data integration in wa- houses. Not surprisingly, di?erent techniques and provenance models have been proposed in many areas such as work?ow systems, visualization, databases, d- ital libraries, and knowledge representation. An important challenge we face - dayishowtointegratethesetechniquesandmodelssothatcompleteprovenance can be derived for complex data products. The InternationalProvenanceand AnnotationWorkshop(IPAW 2008)wasa follow-up to previous workshopsin Chigago (2006, 2002)and Edinburgh (2003). It was held during June 17-18, in Salt Lake City, at the University of Utah campus. IPAW 2008 brought together computer scientists from di?erent areas and provenance users to discuss open problems related to the provenance of computational and non-computational artifacts. A total of 55 people attended the workshop.

Pro Ubuntu Server Administration (Paperback, 1st ed.): Sander van Vugt Pro Ubuntu Server Administration (Paperback, 1st ed.)
Sander van Vugt
R1,032 R885 Discovery Miles 8 850 Save R147 (14%) Ships in 18 - 22 working days

Pro Ubuntu Server Administration teaches you advanced Ubuntu system building. After reading this book, you will be able to manage anything from simple file servers to multiple virtual servers to highavailability clusters. This is the capstone volume of the Apress Ubuntu trilogy that includes Beginning Ubuntu Linux, Third Edition and Beginning Ubuntu Server LTS Administration: From Novice to Professional, Second Edition. You will be able to make Ubuntu technology shine in a Fortune 500 environment and let Ubuntu server become the backbone of your infrastructure. Topics covered includePerformance monitoring and optimization Highavailability clustering Advanced LightweightDirectory Access Protocol (LDAP) integrated networking What you'll learn Monitor Ubuntu Server software and the hardware it is running on. Make Ubuntu Server fly by careful optimization. Learn how to craft highavailability clusters. Ease your way into largescale LDAP networking. Acquire the skills to adjust Ubuntu Server to the security needs of a Fortune 500 environment. Run your own Ubuntu application server. Who this book is for

Anyone who administers Linux servers and wants to know enough about Ubuntu to make it fly.

Self-Sustaining Systems - First Workshop, S3 2008 Potsdam, Germany, May 15-16, 2008, Proceedings (Paperback, 2008 ed.): Robert... Self-Sustaining Systems - First Workshop, S3 2008 Potsdam, Germany, May 15-16, 2008, Proceedings (Paperback, 2008 ed.)
Robert Hirschfeld, Kim Rose
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The Workshop on Self-sustaining Systems (S3) is a forum for the discussion of topics relating to computer systems and languages that are able to bootstrap, implement, modify, and maintain themselves. One property of these systems is that their implementation is based onsmall but powerfulabstractions;examples include (amongst others) Squeak/Smalltalk, COLA, Klein/Self, PyPy/Python, Rubinius/Ruby, andLisp.Suchsystemsaretheenginesoftheirownreplacement, giving researchers and developers great power to experiment with, and explore future directions from within, their own small language kernels. S3 took place on May 15-16, 2008 at the Hasso-Plattner-Institute (HPI) in Potsdam, Germany. It was an exciting opportunity for researchers and prac- tioners interested in self-sustaining systems to meet and share their knowledge, experience, and ideas for future research and development. S3 provided an - portunity for a community to gather and discuss the need for self-sustainability in software systems, and to share and explore thoughts on why such systems are needed and how they can be created and deployed. Analogies were made, for example, with evolutionary cycles, and with urban design and the subsequent inevitable socially-driven change. TheS3participantsleftwithagreatersenseofcommunityandanenthusiasm for probing more deeply into this subject. We see the need for self-sustaining systems becoming critical not only to the developer's community, but to e- users in business, academia, learning and play, and so we hope that this S3 workshop will become the ?rst of many.

Systems and Virtualization Management - Standards and New Technologies (Paperback, 2009 ed.): Latifa Boursas, Mark Carlson,... Systems and Virtualization Management - Standards and New Technologies (Paperback, 2009 ed.)
Latifa Boursas, Mark Carlson, Wolfgang Hommel, Michelle Sibilla, Kes Wold
R1,368 Discovery Miles 13 680 Ships in 18 - 22 working days

This volume contains the proceedings of the Second International DMTF Ac- emic Alliance Workshopon Systems and Virtualization Management:Standards and New Technologies (SVM 2008) held in Munich, Germany, during October 21-22, 2008. The SVM 2008 proceedings are intended for use by students of systems and virtualization management. The reader is presumed to have a basic knowledge of systems management technologies and standards at the level provided, for example, the Common Information Model (CIM) standard for modeling m- agement resources. The student of systems management will ?nd here material that could be included in anadvanced study program.These proceedings should furthermoreallowstudents to acquireanappreciationofthe breadthandvariety of systems and virtualization management research. The proceedings also illuminate related standards and research issues, - swering questions such as:what are the implications of virtualizationfor distr- uted systems management, which advances in information models and protocols aidinmanagingvirtualization,whatnewproblemswillweincur whenmanaging virtualized systems and services, and how might management itself bene?t from virtualization? Topics related to managing distributed systems, virtualization of distributed resources/servicesand workin management standardizationare also highlighted. There were 15 regular paper submissions. These went through an active - view process, with each submission reviewed by at least three members of the Program Committee. We also sought external reviews from experts in certain areas. All these inputs were used by the ProgramCommittee in selecting a ?nal program with 13 regular papers.

Smart Home Automation with Linux (Paperback, 1st ed.): Steven Goodwin Smart Home Automation with Linux (Paperback, 1st ed.)
Steven Goodwin
R810 R713 Discovery Miles 7 130 Save R97 (12%) Ships in 18 - 22 working days

Linux users can now control their homes remotely Are you a Linux user who has ever wanted to turn on the lights in your house, or open and close the curtains, while away on holiday? Want to be able to play the same music in every room, controlled from your laptop or mobile phone? Do you want to do these things without an expensive off-the-shelf kit?

In Smart Home Automation with Linux, Steven Goodwin will show you how a house can be fully controlled by its occupants, all using open source software. From appliances to kettles to curtains, control your home remotely What you'll learn Control appliances like kettles and curtains both locally and remotely. Find and harness data sources to provide context-aware living. Hack/change existing hardware/software to better fit your needs. Integrate various technologies into a function greater than the whole. Set up a home network, for both network and audio/video traffic. Who this book is for

This book is for amateur and professional Linux users who want to control their homes and their gadgets Table of Contents Appliance Control Appliance Hacking Media Systems Home is Home Communication Data Sources Control Hubs

Architecting Dependable Systems VI (Paperback, 2009 ed.): Rogerio De Lemos, Jean-Charles Fabre, Cristina Gacek, Fabio Gadducci,... Architecting Dependable Systems VI (Paperback, 2009 ed.)
Rogerio De Lemos, Jean-Charles Fabre, Cristina Gacek, Fabio Gadducci, Maurice H. ter Beek
R1,422 Discovery Miles 14 220 Ships in 18 - 22 working days

As software systems become increasingly ubiquitous, issues of dependability become ever more crucial. Given that solutions to these issues must be considered from the very beginning of the design process, it is reasonable that dependability and security are addressed at the architectural level. This book has originated from an effort to bring together the research communities of software architectures, dependability and security.

This state-of-the-art survey contains expanded and peer-reviewed papers based on the carefully selected contributions to two workshops: the Workshop on Architecting Dependable Systems (WADS 2008), organized at the 2008 International Conference on Dependable Systems and Networks (DSN 2008), held in Anchorage, Alaska, USA, in June 2008, and the Third International Workshop on Views On Designing Complex Architectures (VODCA 2008) held in Bertinoro, Italy, in August 2008. It also contains invited papers written by recognized experts in the area. The 13 papers are organized in topical sections on dependable service-oriented architectures, fault-tolerance and system evaluation, and architecting security.

Secure Data Management - 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings (Paperback, 2008... Secure Data Management - 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings (Paperback, 2008 ed.)
Willem Jonker, Milan Petkovic
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Information and communication technologies are advancing fast. Processing speed is still increasing at a high rate, followed by advances in digital storage technology, which double storage capacity every year. Furthermore, communication techno- gies do not lag behind. The Internet has been widely used, as well as wireless te- nologies. With a few mouse clicks, people can communicate with each other around the world. All these advances have great potential to change the way people live, introducing new concepts like ubiquitous computing and ambient intelligence. Technology is becoming present everywhere in the form of smart and sensitive c- puting devices. They are nonintrusive, transparent and hidden in the background, but they collect, process, and share all kinds of information, including user beh- ior, in order to act in an intelligent and adaptive way. These emerging technologies put new requirements on security and data m- agement. As data are accessible anytime anywhere, it becomes much easier to get unauthorized data access. Furthermore, the use of new technologies has brought about some privacy concerns. It becomes simpler to collect, store, and search personal information, thereby endangering people's privacy. Therefore, research in secure data management is gaining importance, attracting the attention of both the data management and the security research communities. The intere- ing problems range from traditional topics, such as, access control and general database security, via privacy protection to new research directions, such as cryptographically enforced access control.

Secure Transaction Protocol Analysis - Models and Applications (Paperback, 2008 ed.): Qingfeng Chen, Chengqi Zhang, Shichao... Secure Transaction Protocol Analysis - Models and Applications (Paperback, 2008 ed.)
Qingfeng Chen, Chengqi Zhang, Shichao Zhang
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The application of formal methods to security protocol analysis has attracted increasing attention in the past two decades, and recently has been sh- ing signs of new maturity and consolidation. The development of these formal methodsismotivatedbythehostilenatureofsomeaspectsofthenetworkand the persistent e?orts of intruders, and has been widely discussed among - searchers in this ?eld. Contributions to the investigation of novel and e?cient ideas and techniques have been made through some important conferences and journals, such asESORICS, CSFW andACM Transactions in Computer Systems. Thus, formal methods have played an important role in a variety of applications such as discrete system analysis for cryptographic protocols, - lief logics and state exploration tools. A complicated security protocol can be abstractedasamanipulationofsymbolsandstructurescomposedbysymbols. The analysis of e-commerce (electronic commerce) protocols is a particular case of such symbol systems. There have been considerable e?orts in developing a number of tools for ensuring the security of protocols, both specialized and general-purpose, such as belief logic and process algebras. The application of formal methods starts with the analysis of key-distribution protocols for communication between two principals at an early stage. With the performance of transactions - coming more and more dependent on computer networks, and cryptography becoming more widely deployed, the type of application becomes more varied and complicated. The emerging complex network-based transactions such as ?nancial transactionsand secure groupcommunication have not only brought innovationstothecurrentbusinesspractice, butthey alsoposeabigchallenge to protect the information transmitted over the open network from malicious attack

Learn Objective-C for Java Developers (Paperback, 1st ed.): James Bucanek Learn Objective-C for Java Developers (Paperback, 1st ed.)
James Bucanek
R939 R817 Discovery Miles 8 170 Save R122 (13%) Ships in 18 - 22 working days

Learn Objective-C for Java Developers will guide experienced Java developers into the world of Objective-C. It will show them how to take their existing language knowledge and design patterns and transfer that experience to Objective-C and the Cocoa runtime library. This is the express train to productivity for every Java developer who has dreamed of developing for Mac OS X or iPhone, but felt that Objective-C was too intimidating. So hop on and enjoy the ride Provides a translation service that turns Java problem-solving skills into Objective-C solutions Allows Java developers to leverage their existing experience and quickly launch themselves into a new domain Takes the risk out of learning Objective-C What you'll learn Apply Java experience to Objective-C and Cocoa Use elegant alternatives that increase productivity Maximize the powerfully unique constructs of Objective-C, like class clusters Think like an object-oriented C programmer to create more reusable code Use all of the things in Java and Objective-C that are actually quite similar, like MVC design patterns Learn how to do all of it within Apple's powerful Xcode programming environment using Cocoa frameworks Who this book is for

Experienced Java developers interested in developing native applications for Apple's Mac OS X operating system, iPhone, and iPod touch. Table of Contents Introduction Java and C: Key Differences Welcome to Objective-C Creating an Xcode Project Exploring Protocols and Categories Sending Messages Making Friends with nil Strings and Primitive Values Garbage Collection Introspection Files Serialization Communicating Near and Far Exception Handling Threads Collection Patterns Delegation Pattern Provider/Subscriber Pattern Observer Pattern Model-View-Controller Pattern Lazy Initialization Pattern Factory Pattern Singleton Pattern Memory Management Mixing C and Objective-C Runtime

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Language of Law
Andrei Marmor Hardcover R2,144 Discovery Miles 21 440
A Grammar of Karbi
Linda Konnerth Hardcover R5,235 Discovery Miles 52 350
An Atlas Of Endangered Alphabets - A…
Tim Brookes Hardcover R778 R729 Discovery Miles 7 290
Fractal Geometry and Stochastics VI
Uta Freiberg, Ben Hambly, … Hardcover R4,273 Discovery Miles 42 730
Application of Fractals in Earth…
V. P. Dimri Hardcover R2,501 Discovery Miles 25 010
Computer Corpora and Open Source…
Kristina Posavec Hardcover R4,863 Discovery Miles 48 630
Important Developments in Soliton Theory
Athanasios Fokas, V.E. Zakharov Hardcover R2,475 Discovery Miles 24 750
Anti-contiguity - A Theory of Wh…
Jason Kandybowicz Hardcover R2,430 Discovery Miles 24 300
Differential Equations on Fractals - A…
Robert S. Strichartz Paperback R2,277 Discovery Miles 22 770
Random Geometrically Graph Directed…
Lars Olsen Paperback R1,384 Discovery Miles 13 840

 

Partners