0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (139)
  • R250 - R500 (480)
  • R500+ (2,459)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)

Operating Systems and Services (Paperback, Softcover reprint of the original 1st ed. 1999): Ragunathan Rajkumar Operating Systems and Services (Paperback, Softcover reprint of the original 1st ed. 1999)
Ragunathan Rajkumar
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

Operating Systems and Services brings together in one place important contributions and up-to-date research results in this fast moving area. Operating Systems and Services serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

The Interaction of Compilation Technology and Computer Architecture (Paperback, Softcover reprint of the original 1st ed.... The Interaction of Compilation Technology and Computer Architecture (Paperback, Softcover reprint of the original 1st ed. 1994)
David J. Lilja, Peter L. Bird
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

In brief summary, the following results were presented in this work: * A linear time approach was developed to find register requirements for any specified CS schedule or filled MRT. * An algorithm was developed for finding register requirements for any kernel that has a dependence graph that is acyclic and has no data reuse on machines with depth independent instruction templates. * We presented an efficient method of estimating register requirements as a function of pipeline depth. * We developed a technique for efficiently finding bounds on register require ments as a function of pipeline depth. * Presented experimental data to verify these new techniques. * discussed some interesting design points for register file size on a number of different architectures. REFERENCES [1] Robert P. Colwell, Robert P. Nix, John J O'Donnell, David B Papworth, and Paul K. Rodman. A VLIW Architecture for a Trace Scheduling Com piler. In Architectural Support for Programming Languages and Operating Systems, pages 180-192, 1982. [2] C. Eisenbeis, W. Jalby, and A. Lichnewsky. Compile-Time Optimization of Memory and Register Usage on the Cray-2. In Proceedings of the Second Workshop on Languages and Compilers, Urbana l/inois, August 1989. [3] C. Eisenbeis, William Jalby, and Alain Lichnewsky. Squeezing More CPU Performance Out of a Cray-2 by Vector Block Scheduling. In Proceedings of Supercomputing '88, pages 237-246, 1988. [4] Michael J. Flynn. Very High-Speed Computing Systems. Proceedings of the IEEE, 54:1901-1909, December 1966.

Parallel Language and Compiler Research in Japan (Paperback, Softcover reprint of the original 1st ed. 1995): Lubomir Bic,... Parallel Language and Compiler Research in Japan (Paperback, Softcover reprint of the original 1st ed. 1995)
Lubomir Bic, Alexandru Nicolau, Mitsuhisa Sato
R5,498 Discovery Miles 54 980 Ships in 10 - 15 working days

Parallel Language and Compiler Research in Japan offers the international community an opportunity to learn in-depth about key Japanese research efforts in the particular software domains of parallel programming and parallelizing compilers. These are important topics that strongly bear on the effectiveness and affordability of high performance computing systems. The chapters of this book convey a comprehensive and current depiction of leading edge research efforts in Japan that focus on parallel software design, development, and optimization that could be obtained only through direct and personal interaction with the researchers themselves.

Real-Time UNIX (R) Systems - Design and Application Guide (Paperback, Softcover reprint of the original 1st ed. 1991): Borko... Real-Time UNIX (R) Systems - Design and Application Guide (Paperback, Softcover reprint of the original 1st ed. 1991)
Borko Furht, Dan Grostick, David Gluch, Guy Rabbat, John Parker, …
R4,220 Discovery Miles 42 200 Ships in 10 - 15 working days

A growing concern of mine has been the unrealistic expectations for new computer-related technologies introduced into all kinds of organizations. Unrealistic expectations lead to disappointment, and a schizophrenic approach to the introduction of new technologies. The UNIX and real-time UNIX operating system technologies are major examples of emerging technologies with great potential benefits but unrealistic expectations. Users want to use UNIX as a common operating system throughout large segments of their organizations. A common operating system would decrease software costs by helping to provide portability and interoperability between computer systems in today's multivendor environments. Users would be able to more easily purchase new equipment and technologies and cost-effectively reuse their applications. And they could more easily connect heterogeneous equipment in different departments without having to constantly write and rewrite interfaces. On the other hand, many users in various organizations do not understand the ramifications of general-purpose versus real-time UNIX. Users tend to think of "real-time" as a way to handle exotic heart-monitoring or robotics systems. Then these users use UNIX for transaction processing and office applications and complain about its performance, robustness, and reliability. Unfortunately, the users don't realize that real-time capabilities added to UNIX can provide better performance, robustness and reliability for these non-real-time applications. Many other vendors and users do realize this, however. There are indications even now that general-purpose UNIX will go away as a separate entity. It will be replaced by a real-time UNIX. General-purpose UNIX will exist only as a subset of real-time UNIX.

Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012, Proceedings (Paperback,... Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012, Proceedings (Paperback, 2012 ed.)
Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu
R1,486 Discovery Miles 14 860 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security.

Learn cocos2d 2 - Game Development for iOS (Paperback, 1st ed.): Steffen Itterheim, Andreas Lw Learn cocos2d 2 - Game Development for iOS (Paperback, 1st ed.)
Steffen Itterheim, Andreas Lw
R1,074 R900 Discovery Miles 9 000 Save R174 (16%) Ships in 10 - 15 working days

Create compelling 2D games with Learn cocos2d 2: Game Development with iOS. This book shows you how to use the powerful new cocos2d, version 2 game engine to develop games for iPhone and iPad with tilemaps, virtual joypads, Game Center, and more. It teaches you: The process and best practices of mobile game development, including sprite batching, texture atlases, parallax scrolling, touch and accelerometer input. How to enhance your games using the Box2D and Chipmunk physics engines and other cocos2d-related tools and libraries. How to add UIKit views to cocos2d and how to add cocos2d to UIKit apps. The ins and outs of the Kobold2D development environment for cocos2d and its pre-configured libraries, including cocos3d and Lua. Best of all, this book will have you making games right from the very start. It guides you step-by-step through the creation of sample games. These fun examples are modeled after popular App Store games and teach you key concepts of the new cocos2d 2 game engine and relevant tools like TexturePacker (texture atlas), PhysicsEditor (physics collision shapes), Particle Designer (particle effects), Glyph Designer (bitmap fonts), and others. This book offers a rock-solid introduction to creating games made entirely with cocos2d and little or no iOS SDK and OpenGL code. It also details alternative implementations, identifies the best free and commercial tools for cocos2d game development, features coverage of the author's improved cocos2d game engine (Kobold2D), and even helps you enhance your game's marketability on the App Store.

Search Based Software Engineering - Fourth International Symposium, SSBSE 2012, Riva del Garda, September 28-30, 2012,... Search Based Software Engineering - Fourth International Symposium, SSBSE 2012, Riva del Garda, September 28-30, 2012, Proceedings (Paperback, 2012 ed.)
Gordon Fraser, Jerffeson Teixeira De Souza
R1,474 Discovery Miles 14 740 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Fourth International Symposium on Search-Based Software Engineering, SSBSE 2012, held in Riva del Garda, Italy in collocation with the 28th IEEE International Conference on Software Maintenance. The 15 revised full papers, 3 revised short papers, and 2 papers of the graduate track presented together with 2 keynote talks and 1 tutorial paper were carefully reviewed and selected from 38 initial submissions. Search-based Software Engineering (SBSE) studies the application of meta-heuristic optimization techniques to various software engineering problems, ranging from requirements engineering to software testing and maintenance. The papers present current research in all areas of Search Based Software Engineering, including theoretical work, research on SBSE applications, empirical studies, and reports on industrial experience.

Leveraging Applications of Formal Methods, Verification and Validation - 5th International Symposium, ISoLA 2012, Heraklion,... Leveraging Applications of Formal Methods, Verification and Validation - 5th International Symposium, ISoLA 2012, Heraklion, Crete, Greece, October 15-18, 2012, Proceedings, Part I (Paperback, 2012 ed.)
Tiziana Margaria, Bernhard Steffen
R1,569 Discovery Miles 15 690 Ships in 10 - 15 working days

The two-volume set LNCS 7609 and 7610 constitutes the thoroughly refereed proceedings of the 5th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, held in Heraklion, Crete, Greece, in October 2012.
The two volumes contain papers presented in the topical sections on adaptable and evolving software for eternal systems, approaches for mastering change, runtime verification: the application perspective, model-based testing and model inference, learning techniques for software verification and validation, LearnLib tutorial: from finite automata to register interface programs, RERS grey-box challenge 2012, Linux driver verification, bioscientific data processing and modeling, process and data integration in the networked healthcare, timing constraints: theory meets practice, formal methods for the development and certification of X-by-wire control systems, quantitative modelling and analysis, software aspects of robotic systems, process-oriented geoinformation systems and applications, handling heterogeneity in formal development of HW and SW Systems.

Active Middleware Services - From the Proceedings of the 2nd Annual Workshop on Active Middleware Services (Paperback, 2000... Active Middleware Services - From the Proceedings of the 2nd Annual Workshop on Active Middleware Services (Paperback, 2000 ed.)
Salim Hariri, Craig A. Lee, Cauligi S. Raghavendra
R2,774 Discovery Miles 27 740 Ships in 10 - 15 working days

The papers in this volume were presented at the Second Annual Work shop on Active Middleware Services and were selected for inclusion here by the Editors. The AMS workshop was organized with support from both the National Science Foundation and the CAT center at the Uni versity of Arizona, and was held in Pittsburgh, Pennsylvania, on August 1, 2000, in conjunction with the 9th IEEE International Symposium on High Performance Distributed Computing (HPDC-9). The explosive growth of Internet-based applications and the prolifer ation of networking technologies has been transforming most areas of computer science and engineering as well as computational science and commercial application areas. This opens an outstanding opportunity to explore new, Internet-oriented software technologies that will open new research and application opportunities not only for the multimedia and commercial world, but also for the scientific and high-performance computing applications community. Two emerging technologies - agents and active networks - allow increased programmability to enable bring ing new services to Internet based applications. The AMS workshop presented research results and working papers in the areas of active net works, mobile and intelligent agents, software tools for high performance distributed computing, network operating systems, and application pro gramming models and environments. The success of an endeavor such as this depends on the contributions of many individuals. We would like to thank Dr. Frederica Darema and the NSF for sponsoring the workshop.

Leveraging Applications of Formal Methods, Verification and Validation - 5th International Symposium, ISoLA 2012, Heraklion,... Leveraging Applications of Formal Methods, Verification and Validation - 5th International Symposium, ISoLA 2012, Heraklion, Crete, Greece, October 15-18, 2012, Proceedings, Part II (Paperback, 2012 ed.)
Tiziana Margaria, Bernhard Steffen
R1,494 Discovery Miles 14 940 Ships in 10 - 15 working days

The two-volume set LNCS 7609 and 7610 constitutes the thoroughly refereed proceedings of the 5th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, held in Heraklion, Crete, Greece, in October 2012. The two volumes contain papers presented in the topical sections on adaptable and evolving software for eternal systems, approaches for mastering change, runtime verification: the application perspective, model-based testing and model inference, learning techniques for software verification and validation, LearnLib tutorial: from finite automata to register interface programs, RERS grey-box challenge 2012, Linux driver verification, bioscientific data processing and modeling, process and data integration in the networked healthcare, timing constraints: theory meets practice, formal methods for the developent and certification of X-by-wire control systems, quantitative modelling and analysis, software aspects of robotic systems, process-oriented geoinformation systems and applications, handling heterogeneity in formal development of HW and SW Systems.

Energy-Efficient High Performance Computing - Measurement and Tuning (Paperback, 2013 ed.): James H. Laros III, Kevin Pedretti,... Energy-Efficient High Performance Computing - Measurement and Tuning (Paperback, 2013 ed.)
James H. Laros III, Kevin Pedretti, Suzanne M. Kelly, Wei Shu, Kurt Ferreira, …
R1,408 Discovery Miles 14 080 Ships in 10 - 15 working days

In this work, the unique power measurement capabilities of the Cray XT architecture were exploited to gain an understanding of power and energy use, and the effects of tuning both CPU and network bandwidth. Modifications were made to deterministically halt cores when idle. Additionally, capabilities were added to alter operating P-state. At the application level, an understanding of the power requirements of a range of important DOE/NNSA production scientific computing applications running at large scale is gained by simultaneously collecting current and voltage measurements on the hosting nodes. The effects of both CPU and network bandwidth tuning are examined, and energy savings opportunities without impact on run-time performance are demonstrated. This research suggests that next-generation large-scale platforms should not only approach CPU frequency scaling differently, but could also benefit from the capability to tune other platform components to achieve more energy-efficient performance.

Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, September 7-9,... Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, September 7-9, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis
R1,548 Discovery Miles 15 480 Ships in 10 - 15 working days

This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection; anonymity and privacy; wireless security; system security; DNS and routing security; and key management.

Euro-Par 2012 Parallel Processing - 18th International Conference, Euro-Par 2012, Rhodes Island, Greece, August 27-31, 2012.... Euro-Par 2012 Parallel Processing - 18th International Conference, Euro-Par 2012, Rhodes Island, Greece, August 27-31, 2012. Proceedings (Paperback, 2012 ed.)
Christos Kaklamanis, Theodore Papatheodorou, Paul G. Spirakis
R1,672 Discovery Miles 16 720 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 18th International Conference, Euro-Par 2012, held in Rhodes Islands, Greece, in August 2012. The 75 revised full papers presented were carefully reviewed and selected from 228 submissions. The papers are organized in topical sections on support tools and environments; performance prediction and evaluation; scheduling and load balancing; high-performance architectures and compilers; parallel and distributed data management; grid, cluster and cloud computing; peer to peer computing; distributed systems and algorithms; parallel and distributed programming; parallel numerical algorithms; multicore and manycore programming; theory and algorithms for parallel computation; high performance network and communication; mobile and ubiquitous computing; high performance and scientific applications; GPU and accelerators computing.

The Hacker's Guide to OS X - Exploiting OS X from the Root Up (Paperback): Robert Bathurst, Russ Rogers, Alijohn... The Hacker's Guide to OS X - Exploiting OS X from the Root Up (Paperback)
Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei
R1,018 R736 Discovery Miles 7 360 Save R282 (28%) Ships in 12 - 17 working days

Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers

As a resource to the reader, the companion website will provide links from the authors, commentary and updates.

*Provides relevant information including some of the latest OS X threats

*Easily accessible to those without any prior OS X experience

*Useful tips and strategies for exploiting and compromising OS X systems

*Includes discussion of defensive and countermeasure applications and how to use them

*Covers mobile IOS vulnerabilities

Research in Attacks, Intrusions and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September... Research in Attacks, Intrusions and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012, Proceedings (Paperback, 2012 ed.)
Davide Balzarotti, Salvatore J Stolfo, Marco Cova
R1,504 Discovery Miles 15 040 Ships in 10 - 15 working days

This book constitutes the proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2012, held in Amsterdam, The Netherlands in September 2012. The 18 full and 12 poster papers presented were carefully reviewed and selected from 84 submissions. The papers address all current topics in virtualization, attacks and defenses, host and network security, fraud detection and underground economy, web security, intrusion detection.

Software Engineering for Resilient Systems - Fourth International Workshop, SERENE 2012, Pisa, Italy, September 27-28, 2012,... Software Engineering for Resilient Systems - Fourth International Workshop, SERENE 2012, Pisa, Italy, September 27-28, 2012, Proceedings (Paperback, 2012 ed.)
Paris Avgeriou
R1,877 Discovery Miles 18 770 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Fourth International Workshop on Software Engineering for Resilient Systems, SERENE 2012, held in Pisa, Italy, in September 2012. The 12 revised full papers were carefully reviewed and selected from numerous submissions. The papers address all aspects of fault tolerance and exception handling, safety modeling, supporting evolution, resilience in service-oriented computing, and applying formal methods in case studies.

Tools And Weapons (Paperback): Brad Smith, Carol Ann Browne Tools And Weapons (Paperback)
Brad Smith, Carol Ann Browne
R280 R224 Discovery Miles 2 240 Save R56 (20%) Ships in 5 - 17 working days

From Microsoft's President and one of the tech industry's wisest thinkers, a frank and thoughtful reckoning with how to balance enormous promise and existential risk as the digitization of everything accelerates.

Microsoft President Brad Smith operates by a simple core belief: when your technology changes the world, you bear a responsibility to help address the world you have helped create.

This might seem uncontroversial, but it flies in the face of a tech sector long obsessed with rapid growth and sometimes on disruption as an end in itself. While sweeping digital transformation holds great promise, we have reached an inflection point. The world has turned information technology into both a powerful tool and a formidable weapon, and new approaches are needed to manage an era defined by even more powerful inventions like artificial intelligence. Companies that create technology must accept greater responsibility for the future, and governments will need to regulate technology by moving faster and catching up with the pace of innovation.

In Tools and Weapons, Brad Smith and Carol Ann Browne bring us a captivating narrative from the cockpit of one of the world's largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no pre-existing playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of artificial intelligence, big tech's relationship to inequality, and the challenges for democracy, far and near. While in no way a self-glorifying "Microsoft memoir," the book pulls back the curtain remarkably wide onto some of the company's most crucial recent decision points as it strives to protect the hopes technology offers against the very real threats it also presents. There are huge ramifications for communities and countries, and Brad Smith provides a thoughtful and urgent contribution to that effort.

In Tools and Weapons, Brad Smith takes us behind the scenes on some of the biggest stories to hit the tech industry in the past decade and some of the biggest threats we face. From Edward Snowden's NSA leak to the NHS WannaCry ransomware attack, this book is essential reading to understand what's happening in the world around us.

Pro Android Augmented Reality (Paperback, 1st ed.): Raghav Sood Pro Android Augmented Reality (Paperback, 1st ed.)
Raghav Sood
R1,113 R909 Discovery Miles 9 090 Save R204 (18%) Ships in 10 - 15 working days

Augmented reality (AR) offers a live direct or indirect view of a physical, real-world environment, where the elements and surroundings are augmented by computer-generated sensory input such as graphics and GPS data. It makes a game more real. Your social media app puts you where want to be or go. Pro Android Augmented Reality walks you through the foundations of building an augmented reality application. From using various software and Android hardware sensors, such as an accelerometer or a magnetometer (compass), you'll learn the building blocks of augmented reality for both marker- and location-based apps. Case studies are included in this one-of-a-kind book, which pairs nicely with other Android development books. After reading Pro Android Augmented Reality, you'll be able to build augmented reality rich media apps or integrate all the best augmented reality into your favorite Android smartphone and/or tablet.What you'll learn * How to use most Android cameras * How to find the user's location with GPS data * How to detect movement and orientation of the device * How to program against the accelerometer and compass * How to use the AndAR library in marker recognition * How to create an artificial horizon for your app * How to integrate the Google Maps API into AR apps * How to build enterprise augmented reality apps using the case studies in this book Who this book is for This book is for Android developers familiar with Android programming, but new to the camera, accelerometer, magnetometer and building augmented reality applications in general. Table of Contents * Applications of Augmented Reality * Basics of Augmented Reality on the Android Platform * Adding Overlays * Artificial Horizons * Other Features of Augmented Reality * A Simple App Using AR * A More Complex Project Using More AR Features * A Project Using All AR Features * An AR Game

Dependable Networks and Services - 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and... Dependable Networks and Services - 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012, Luxembourg, Luxembourg, June 4-8, 2012, Proceedings (Paperback)
Ramin Sadre, Jiri Novotny, Pavel Celeda, Martin Waldburger, Burkhard Stiller
R1,434 Discovery Miles 14 340 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012, held in Luxembourg in June 2012. The 10 full papers presented were carefully reviewed and selected from 23 submissions. They cover autonomic and distributed management, network security, network monitoring, and special environments and Internet of Things. In addition, this book contains 9 workshop papers which were selected from 18 submissions. They deal with high-speed networks and network management, intrusion detection, and network monitoring and security.

Multicore Software Engineering, Performance and Tools - International Conference, MSEPT 2012, Prague, Czech Republic, May... Multicore Software Engineering, Performance and Tools - International Conference, MSEPT 2012, Prague, Czech Republic, May 31--June 1, 2012, Proceedings (Paperback, 2012)
Victor Pankratius, Michael Philippsen
R1,773 Discovery Miles 17 730 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Conference on Multiscore Software Engineering, Performance, and Tools, MSEPT 2012, held in Prague in May/June 2012. The 9 revised papers, 4 of which are short papers were carefully reviewed and selected from 24 submissions. The papers address new work on optimization of multicore software, program analysis, and automatic parallelization. They also provide new perspectives on programming models as well as on applications of multicore systems.

Advances in Grid and Pervasive Computing - 7th International Conference, GPC 2012, Hong Kong, China, May 11-13, 2012,... Advances in Grid and Pervasive Computing - 7th International Conference, GPC 2012, Hong Kong, China, May 11-13, 2012, Proceedings (Paperback)
Ruixuan Li, Jiannong Cao, Julien Bourgeois
R1,496 Discovery Miles 14 960 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Conference on Grid and Pervasive Computing, GPC 2012, held in Hong Kong, China, in May 2012. The 9 revised full papers and 19 short papers were carefully revised and selected from 55 submissions. They are organized in topical sections on cloud computing, grid and service computing, green computing, mobile and pervasive computing, scheduling and performance, and trust and security. Also included are 4 papers presented at the 2012 International Workshop on Mobile Cloud and Ubiquitous Computing (Mobi-Cloud 2012) held in conjunction with GPC 2012.

Distributed Operating Systems - Theory and Practice (Paperback, Softcover reprint of the original 1st ed. 1987): Yakup Paker,... Distributed Operating Systems - Theory and Practice (Paperback, Softcover reprint of the original 1st ed. 1987)
Yakup Paker, Jean-Pierre Ban atre, Muslim Bozyigit
R2,845 Discovery Miles 28 450 Ships in 10 - 15 working days

This text comprises the edited collection of papers presented at the NATO Advanced Study Institute which took place at Altmyunus,

Beginning Android Web Apps Development - Develop for Android using HTML5, CSS3, and JavaScript (Paperback, 1st ed.): Jon... Beginning Android Web Apps Development - Develop for Android using HTML5, CSS3, and JavaScript (Paperback, 1st ed.)
Jon Westfall, Rocco Augusto, Grant Allen
R1,078 Discovery Miles 10 780 Ships in 10 - 15 working days

With Beginning Android Web Apps Development, you'll learn how to apply HTML5, CSS3, JavaScript, Ajax and other Web standards for use on the Android mobile platform, by building a variety of fun and visually stimulating games and other web applications If you've done some basic web development, and you want to build your skills to create exceptional web apps, you'll find everything you seek in the discussions and examples in this book. Each application you'll build in Beginning Android Web Application Development will show you solutions that you can apply to many of your own projects. Each example shares techniques and coding solutions that will inspire your own work. You'll learn how to tie your Android apps into Twitter through two apps that you'll build: Who's that Tweet? , a quiz game based on celebrity accounts, and I Love Ham, a coding investigation into search phrases and rhyming. Your Android web app development skills will then proceed in another direction, as you discover the power of HTML5 in two game apps: Scavenger Hunt, which introduces you to the HTML5 GPS location API, and Spies , a location-based application that shows you how to use CSS3, Ajax, and HTML5 within multi-player environments. You'll also create an Android web application which checks the arrival time of buses and light-rails through the use of Portland, Oregon's open Tri-Met data API This app is a great template for other apps you may want to build in the future, and showcases the important techniques for incorporating cloud-based apps into web games. After reading Beginning Android Web Apps Development, you will have built real apps and developed along the way the skills you'll need to create highly interactive, professional web applications...and, your journey will be engaging and enjoyable What you'll learn * Coding solutions that you can use time and again in your own Android web apps * Key methods and techniques for contemporary Android web app development * How to take full advantage of CSS3 in the mobile environment and how to handle a multitude of screen resolutions * How to build feature-rich user interfaces with navigation, colors, and professional styling * How to add audio and video for highly interactive sites * How to optimize Ajax within your site * How to access and use the HTML location API * How to integrate JavaScript and JavaScript frameworks into your site Who this book is for For anyone starting out in Android web app development who wants to build feature-rich web apps that are optimized for the Android mobile platform. If you've got basic web development skills, you'll find the code samples and discussions in this book will take your techniques to a completely different level. Table of Contents1. Harnessing the Power of Mobile Web 2. Twitter Application: Who's That Tweet? 3. Twitter Application: I Love Ham 4.Creating a Mobile Strategy and Structuring your Code 5. Handling Multiple Screen Resolutions with CSS 3 6. Handling Different Browser Platforms 7. Providing an Impressive User Experience with jQuery Mobile 8. Building Visually Rich Internet Applications 9. HTML5 Location-Based Applications 10. Using Cloud Services: A Transport Application 11. Pushing the Limits with Audio and Video 12. Ajax and Extreme User Interfaces 13. Packaging Your Applications

Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, DPM 2011 and 4th International... Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers (Paperback, 2012)
Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Sabrina de Capitani di Vimercati
R1,480 Discovery Miles 14 800 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration.

Learn Objective-C on the Mac - For OS X and iOS (Paperback, 2nd ed.): Scott Knaster, Mark Dalrymple, Waqar Malik Learn Objective-C on the Mac - For OS X and iOS (Paperback, 2nd ed.)
Scott Knaster, Mark Dalrymple, Waqar Malik
R1,126 R922 Discovery Miles 9 220 Save R204 (18%) Ships in 10 - 15 working days

Learn to write apps for some of today's hottest technologies, including the iPhone and iPad (using iOS), as well as the Mac (using OS X). It starts with Objective-C, the base language on which the native iOS software development kit (SDK) and the OS X are based. Learn Objective-C on the Mac: For OS X and iOS, Second Edition updates a best selling book and is an extensive, newly updated guide to Objective-C. Objective-C is a powerful, object-oriented extension of C, making this update the perfect follow-up to Dave Mark's bestselling Learn C on the Mac. Whether you're an experienced C programmer or you're coming from a different language such as C++ or Java, leading Mac experts Scott Knaster and Waqar Malik show how to harness the power of Objective-C in your apps A complete course on the basics of Objective-C using Apple's newest Xcode tools An introduction to object-oriented programming Comprehensive coverage of new topics like blocks, GCD, ARC, class extensions, as well as inheritance, composition, object initialization, categories, protocols, memory management, and organizing source files An introduction to building user interfaces using what is called the UIKit A primer for non-C programmers to get off the ground even faster What you'll learn Learn Objective-C programming, the gateway to programming your iPhone, iPad or Mac Write apps for the iOS and/or OS X interfaces, the cleanest user-interfaces around Understand variables and how to design your own data structures Work with the new Objective-C features now available in this update like blocks, automated reference counting (ARC) and class extensions Work with new tools available like Clang static analyzer and Grand Central Dispatch (GCD) Undertand UIKit and how to build simple user interfaces easily and effectively Explore using the latest Xcode Who this book is for

For anyone wanting to learn to program native apps in iOS and/orOS X, including developers new to the iOS-based iPhone and iPad as well as OS X-based Mac computers. This book is for developers new to Objective-C, but who have some programming experience. Table of Contents Hello Extensions to C Introduction to Object-Oriented Programming Inheritance Composition Source File Organization and Using Xcode 4 More About Xcode A Quick Tour of the Foundation Kit Memory Management and ARC Object Initialization Properties Categories Protocols Blocks and Concurrency Introduction to UIKit Introduction to the Application Kit File Loading and Saving Key-Value Coding Using the Static Analyzer NSPredicate

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Linux Bible, Tenth Edition
C Negus Paperback R1,119 Discovery Miles 11 190
DNSSEC Mastery, 2nd Edition
Michael W Lucas Hardcover R947 R816 Discovery Miles 8 160
PowerShell for Administration, IT Pro…
William R. Stanek, William Stanek Hardcover R1,482 Discovery Miles 14 820
PowerShell - A Comprehensive Guide to…
Sam Griffin Hardcover R614 R515 Discovery Miles 5 150
Mike Meyers' CompTIA A+ Guide to 802…
Mike Meyers Paperback R1,252 Discovery Miles 12 520
Powershell - The ultimate beginner's…
Craig Newport Hardcover R593 R491 Discovery Miles 4 910
Essential Windows 10: 1st Anniversary…
Kevin Wilson Paperback R450 R248 Discovery Miles 2 480
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,276 Discovery Miles 12 760
PowerShell - The Ultimate Beginners…
Mark Reed Hardcover R615 R516 Discovery Miles 5 160
PowerShell, IT Pro Solutions…
William R. Stanek, William Stanek Hardcover R1,498 Discovery Miles 14 980

 

Partners