![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
This book constitutes the refereed proceedings of the Third
International Symposium on NASA Formal Methods, NFM 2011, held in
Pasadena, CA, USA, in April 2011.
The Extreme Programming Pocket Guide covers XP assumptions, principles, events, artifacts, roles, and resources, and more. It concisely explains the relationships between the XP practices. If you want to adopt XP in stages, the Extreme Programming Pocket Guide will help you choose what to apply and when. Concise and easy to use, this handy pocket guide to XP is a must-have quick reference for anyone implementing a test-driven development environment.
Distributed and Parallel Systems: From Cluster to Grid Computing, is an edited volume based on DAPSYS 2006, the 6th Austrian-Hungarian Workshop on Distributed and Parallel Systems, which is dedicated to all aspects of distributed and parallel computing. The workshop was held in conjunction with the 2nd Austrian Grid Symposium in Innsbruck, Austria in September 2006. This book is designed for a professional audience composed of practitioners and researchers in industry. It is also suitable for advanced-level students in computer science.
A number of widely used contemporary processors have instruction-set extensions for improved performance in multi-media applications. The aim is to allow operations to proceed on multiple pixels each clock cycle. Such instruction-sets have been incorporated both in specialist DSPchips such as the Texas C62xx (Texas Instruments, 1998) and in general purpose CPU chips like the Intel IA32 (Intel, 2000) or the AMD K6 (Advanced Micro Devices, 1999). These instruction-set extensions are typically based on the Single Instruc tion-stream Multiple Data-stream (SIMD) model in which a single instruction causes the same mathematical operation to be carried out on several operands, or pairs of operands, at the same time. The level or parallelism supported ranges from two floating point operations, at a time on the AMD K6 architecture to 16 byte operations at a time on the Intel P4 architecture. Whereas processor architectures are moving towards greater levels of parallelism, the most widely used programming languages such as C, Java and Delphi are structured around a model of computation in which operations takeplace on a single value at a time. This was appropriate when processors worked this way, but has become an impediment to programmers seeking to make use of the performance offered by multi-media instruction -sets. The introduction of SIMD instruction sets (Peleg et al."
This book shows in detail how to build enterprise-level secure, redundant, and highly scalable services from scratch on top of the open source Linux operating system, suitable for small companies as well as big universities. The core architecture presented is based on Kerberos, LDAP, AFS, and Samba. Coverage shows how to integrate web, message related, data base and other services with this backbone. This architecture provides a Single-Sign-On solution for different client platforms and can also be employed for clustering. Although it is implemented with Debian GNU/Linux, the content can be applied to other UNIX flavors.
Explains fault tolerance in clear terms, with concrete examples
drawn from real-world settings
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multiple disciplines in order to achieve something more signi- cant than the sum of the individual parts. Through such hybrid philosophy, a new principle can be discovered, which has the propensity to propagate throughout mul- faceted disciplines. FGIT 2009 was the first mega-conference that attempted to follow the above idea of hybridization in FGIT in a form of multiple events related to particular disciplines of IT, conducted by separate scientific committees, but coordinated in order to expose the most important contributions. It included the following international conferences: Advanced Software Engineering and Its Applications (ASEA), Bio-Science and Bio-Technology (BSBT), Control and Automation (CA), Database Theory and Application (DTA), D- aster Recovery and Business Continuity (DRBC; published independently), Future G- eration Communication and Networking (FGCN) that was combined with Advanced Communication and Networking (ACN), Grid and Distributed Computing (GDC), M- timedia, Computer Graphics and Broadcasting (MulGraB), Security Technology (SecTech), Signal Processing, Image Processing and Pattern Recognition (SIP), and- and e-Service, Science and Technology (UNESST).
As software systems become increasingly ubiquitous, issues of dependability become ever more crucial. Given that solutions to these issues must be considered from the very beginning of the design process, it is reasonable that dependability and security are addressed at the architectural level. This book has originated from an effort to bring together the research communities of software architectures, dependability and security. This state-of-the-art survey contains expanded and peer-reviewed papers based on the carefully selected contributions to two workshops: the Workshop on Architecting Dependable Systems (WADS 2008), organized at the 2008 International Conference on Dependable Systems and Networks (DSN 2008), held in Anchorage, Alaska, USA, in June 2008, and the Third International Workshop on Views On Designing Complex Architectures (VODCA 2008) held in Bertinoro, Italy, in August 2008. It also contains invited papers written by recognized experts in the area. The 13 papers are organized in topical sections on dependable service-oriented architectures, fault-tolerance and system evaluation, and architecting security.
You need to maintain clients, servers and networks, while acquiring new skills. Foundations of Cent OS Linux: Enterprise Linux On the Cheap covers a free, unencumbered Linux operating system within the Red Hat lineage, but it does not assume you have a Red Hat Enterprise Linux license. Now you can learn CentOS Linux, the most powerful and popular of all Red Hat clones, keep maintaining your network at work, and become an Red Hat Certified Engineer, all just for the cost of this book.Introduces CentOS Linux and Fedora clients as equals to Red Hat Enterprise Linux Sets up CentOS as a secure, highperformance web services back end Prepares you for the RHCE examination, but does not assume an RHEL installation Table of Contents Installation BASH Client/Host Configuration Data Storage Management User Management X Window System Package Management Basic Linux Security Advanced Security Network Security Network Services Open Source Databases Linux Web Services File Sharing Services Linux Mail Servers Directory Services The Linux Kernel Linux Virtualization Linux Troubleshooting
Web caching and content delivery technologies provide the
infrastructure on which systems are built for the scalable
distribution of information. This proceedings of the eighth annual
workshop, captures a cross-section of the latest issues and
techniques of interest to network architects and researchers in
large-scale content delivery. Topics covered include the
distribution of streaming multimedia, edge caching and computation,
multicast, delivery of dynamic content, enterprise content
delivery, streaming proxies and servers, content transcoding,
replication and caching strategies, peer-to-peer content delivery,
and Web prefetching.
Security and Dependability for Ambient Intelligence is the primary publication of the SERENITY approach, which provides security and dependability (S&D) solutions for dynamic, highly distributed, heterogeneous systems. The objective of SERENITY is to enhance the security and dependability of ambient intelligence systems by providing a framework supporting the automated integration, configuration, monitoring and adaptation of security and dependability mechanisms. An edited volume contributed by world leaders in the field, this book covers the problems that the highly dynamic and heterogeneous nature of ambient intelligence systems poses to security and dependability and presents solutions to these problems. Security and Dependability for Ambient Intelligence is designed for researchers and practitioners focusing on the dynamic integration, deployment and verification of security and dependability solutions in highly distributed systems incorporating ambient intelligence features. It is also suitable as a reference or secondary text for advanced-level students in computer science and computer or electrical engineering.
Real-Time Systems in Mechatronic Applications brings together in one place important contributions and up-to-date research results in this fast moving area. Real-Time Systems in Mechatronic Applications serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
A detailed introduction to interdisciplinary application area of distributed systems, namely the computer support of individuals trying to solve a problem in cooperation with each other but not necessarily having identical work places or working times. The book is addressed to students of distributed systems, communications, information science and socio-organizational theory, as well as to users and developers of systems with group communication and cooperation as top priorities.
With the advent of portable and autonomous computing systems, power con sumption has emerged as a focal point in many research projects, commercial systems and DoD platforms. One current research initiative, which drew much attention to this area, is the Power Aware Computing and Communications (PAC/C) program sponsored by DARPA. Many of the chapters in this book include results from work that have been supported by the PACIC program. The performance of computer systems has been tremendously improving while the size and weight of such systems has been constantly shrinking. The capacities of batteries relative to their sizes and weights has been also improv ing but at a rate which is much slower than the rate of improvement in computer performance and the rate of shrinking in computer sizes. The relation between the power consumption of a computer system and it performance and size is a complex one which is very much dependent on the specific system and the technology used to build that system. We do not need a complex argument, however, to be convinced that energy and power, which is the rate of energy consumption, are becoming critical components in computer systems in gen eral, and portable and autonomous systems, in particular. Most of the early research on power consumption in computer systems ad dressed the issue of minimizing power in a given platform, which usually translates into minimizing energy consumption, and thus, longer battery life."
Computer systems can only deliver benefits if functionality, users and usability are central to their design and deployment. This book encapsulates work done in the DIRC project (Interdisciplinary Research Collaboration in Dependability), bringing together a range of disciplinary approaches - computer science, sociology and software engineering - to produce a socio-technical systems perspective on the issues surrounding trust in technology in complex settings.
The power of Core Data allows iOS developers to efficiently
store and retrieve application data using familiar object-oriented
paradigms.Pro Core Data for iOS explains both how and why to use
Core Data for data storage, from simple to advanced techniques.
Covering common and advanced persistence patterns, this book
prepares any iOS developer to store and retrieve data accurately
and proficiently. All iPhone, iPad, and iPod touch developers whose applications manage any amount of data. Table of Contents Getting Started Understanding Core Data Storing Data: SQLite and Other Options Creating a Data Model Working with Data Objects Refining Result Sets Tuning Performance and Memory Usage Versioning and Migrating Data Using Core Data in Advanced Applications
This essential resource for professionals and advanced students in security programming and system design introduces the foundations of programming systems security and the theory behind access control models, and addresses emerging access control mechanisms.
Operating systems kernels are central to the functioning of computers. Security of the overall system, as well as its reliability and responsiveness, depend upon the correct functioning of the kernel. This unique approach - presenting a formal specification of a kernel - starts with basic constructs and develops a set of kernels; proofs are included as part of the text.
This book provides an in-depth description of event-based systems, covering topics ranging from local event matching and distributed event forwarding algorithms, through a practical discussion of software engineering issues raised by the event-based style, to state-of-the-art research in event-based systems like composite event detection and security. The authors offer a comprehensive overview, and show the power of event-based architectures in modern system design, encouraging professionals to exploit this technique in next generation large-scale distributed applications like information dissemination, network monitoring, enterprise application integration, or mobile systems.
Android development is hot, and many programmers are interested in joining the fun. However, because this technology is based on Java, you should first obtain a solid grasp of the Java language and its foundational APIs to improve your chances of succeeding as an Android app developer. After all, you will be busy learning the architecture of an Android app, the various Android-specific APIs, and Android-specific tools. If you do not already know Java fundamentals, you will probably end up with a massive headache from also having to quickly cram those fundamentals into your knowledge base. Learn Java for Android Development teaches programmers of any skill level the essential Java language and foundational Java API skills that must be learned to improve the programmer's s chances of succeeding as an Android app developer. Each of the book's 10 chapters provides an exercise section that gives you the opportunity to reinforce your understanding of the chapter's s material. Answers to the book's s more than 300 exercises are provided in an appendix.Once you complete this book, you will be ready to dive into Android, and you can start that journey by obtaining a copy of Beginning Android 2. Additionally, author Jeff Friesen will provide supplementary material (such as 6 more chapters) on his javajeff.mb.ca website, available over the next few months following this book's release. What you'll learn * The Java language: This book provides complete coverage of nearly every pre-Java version 7 language feature (native methods are briefly mentioned but not formally covered). Starting with those features related to classes and objects, you progress to object-oriented features related to inheritance, polymorphism, and interfaces. You then explore the advanced language features for nested types, packages, static imports, exceptions, assertions, annotations, generics, and enums. Continuing, you investigate strictfp, class literals, synchronized, volatile, the enhanced for loop statement, autoboxing/unboxing, and transient fields. The book also briefly presents most (if not all) of Java version 7's language features, although not much is said about closures or modules (which were not finalized at the time of writing).* Java APIs: In addition to Object and APIs related to exceptions, you explore Math, StrictMath, BigDecimal, BigInteger, Package, Boolean, Character, Byte, Short, Integer, Long, Float, Double, Number, the References API, the Reflection API, String, StringBuffer, System, the Threading API, the collections framework, the concurrency utilities, the internationalization APIs, the Preferences API, Random, the Regular Expressions API, File, RandomAccessFile, stream classes, and writer/reader classes. You will also get a tiny taste of Swing in the context of internationalization. * Tools: You will learn how to use the JDK's javac (compiler), java (application launcher), javadoc (Java documentation generator), and jar (Java archive creator, updater, and extractor) tools. You will also receive an introduction to the NetBeans and Eclipse integrated development environments. Although you can develop Android apps without NetBeans or Eclipse, working with these IDEs is much more pleasant.Who this book is for This book is for any programmer (including existing Java programmers and Objective-C (iPhone/iPad) programmers) of any skill level who needs to obtain a solid understanding of the Java language and foundational Java APIs before jumping into Android app development.
My Windows® 10 Computer for Seniors is an easy, full-color tutorial on
the latest operating system from Microsoft.
What's new in this edition? This new third edition will cover all the changes made in the past five Windows updates as well as changes in the computer hardware market. It will also cover changes to popular social networks and computer software and websites. New or updated coverage on a chapter-by-chapter basis is extensive, and all screen images will be reshot with the current version of the Windows 10 interface.
iOS Forensic Analysis provides an in-depth look at investigative processes for the iPhone, iPod Touch, and iPad devices. The methods and procedures outlined in the book can be taken into any courtroom. With never-before-published iOS information and data sets that are new and evolving, this book gives the examiner and investigator the knowledge to complete a full device examination that will be credible and accepted in the forensic community. -->What you'll learn-->How to respond to security incidents involving iOS devices How to acquire and analyze data on iOS devices such as iPhone and iPad How to analyze media exploitation on iOS devices-->Who this book is for--> Computer forensic professionals, law enforcement, attorneys, security professionals, those who are curious about such things, and educators-->-->-->Table of Contents-->History of Apple Mobile Devices iOS Operating and File System Analysis Search, Seizure, and Incident Response iPhone Logical Acquisition Logical Data Analysis Mac and Windows Artifacts GPS Analysis Media Exploitation Media Exploitation Analysis Network Analysis
This is Linux for those of us who don't mind typing. All Linux users and administrators tend to like the flexibility and speed of Linux administration from the command line in bytesized chunks, instead of fairly standard graphical user interfaces. Beginning the Linux Command Line follows a taskoriented approach and is distribution-agnostic.Work with files and directories. Administer users and security. Understand how Linux is organized. What you'll learn Finding help from insystem resources Finding the right command for the task you have to accomplish Working with text editors and intelligent filters Shell programming Managing partitions and file systems Configuring access to hardware devices Who this book is for Everyone who uses Linux. No exceptions.
Firewalls, Network Address Translation (NAT), network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables interface is the most sophisticated ever offered on Linux and makes Linux an extremely flexible system for any kind of network filtering you might do. Large sets of filtering rules can be grouped in ways that makes it easy to test them and turn them on and off. Do you watch for all types of ICMP traffic--some of them quite dangerous? Can you take advantage of stateful filtering to simplify the management of TCP connections? Would you like to track how much traffic of various types you get? This pocket reference will help you at those critical moments when someone asks you to open or close a port in a hurry, either to enable some important traffic or to block an attack. The book will keep the subtle syntax straight and help you remember all the values you have to enter in order to be as secure as possible. The book has an introductory section that describes applications, followed by a reference/encyclopaedic section with all the matches and targets arranged alphabetically. |
You may like...
Android Boot Camp for Developers Using…
Corinne Hoisington
Paperback
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright
Paperback
R1,491
Discovery Miles 14 910
|