![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
Considered a classic by an entire generation of Mac programmers, this popular guide has been updated for Mac OS X. Don't know anything about programming? No problem Acclaimed author Dave Mark starts out with the basics and takes you through a complete course in programming C using Apple's free Xcode tools. This book is perfect for beginners learning to program. It includes Mac OS X examples Provides best practices for programming newbies Written by the expert on Cprogramming for the Mac Presents all the basics with a pragmatic, Mac OS X-flavored approach Includes updated source code which is fully compatible with Xcode 4 What you'll learn Master C programming, the gateway to programming your Mac or iPhoneWrite applications for the Mac OS X interface, the cleanest user interface aroundUnderstand variables and how to design your own data structuresWork with the file systemConnect to data sources and the Internet Who this book is for For anyone wanting to learn to program in Mac OS X, including developers new to the Mac, developers new to C, or students entirely new to programming. For anyone who wants to learn how to program their iPhone, this is also the core language primer.
Computinghasbeenanenormousacceleratortoscienceandindustryalikeandit has led to an information explosion in many di?erent ?elds. The unprecedented volume of data acquired from sensors, derived by simulations and data analysis processes, accumulated in warehouses, and often shared on the Web, has given risetoanew?eldofresearch: provenancemanagement.Provenance(alsoreferred to as audit trail, lineage, and pedigree) captures information about the steps used to generate a given data product. Such information provides important documentation that is key to preserving data, to determining the data's quality and authorship, to understanding, reproducing, as well as validating results. Provenancemanagement has become an active ?eld of research, as evidenced byrecentspecializedworkshops, surveys, andtutorials.Provenancesolutionsare needed in many di?erent domains and applications, from environmental science and physics simulations, to business processes and data integration in wa- houses. Not surprisingly, di?erent techniques and provenance models have been proposed in many areas such as work?ow systems, visualization, databases, d- ital libraries, and knowledge representation. An important challenge we face - dayishowtointegratethesetechniquesandmodelssothatcompleteprovenance can be derived for complex data products. The InternationalProvenanceand AnnotationWorkshop(IPAW 2008)wasa follow-up to previous workshopsin Chigago (2006, 2002)and Edinburgh (2003). It was held during June 17-18, in Salt Lake City, at the University of Utah campus. IPAW 2008 brought together computer scientists from di?erent areas and provenance users to discuss open problems related to the provenance of computational and non-computational artifacts. A total of 55 people attended the workshop.
This volume contains the proceedings of the 6th Asian Symposium on Progr- ming Languages and Systems (APLAS 2008), which took place in Bangalore, December 9 - December 11, 2008. The symposium was sponsored by the Asian Association for Foundation of Software (AAFS) and the Indian Institute of S- ence. It was held at the Indian Institute of Science, as part of the institute's centenary celebrations, and was co-located with FSTTCS (Foundations of So- ware Technology and Theoretical Computer Science) 2008, organized by the Indian Association for Research in Computer Science (IARCS). In response to the call for papers, 41 full submissions were received. Each submission was reviewed by at least four Program Committee members with the help of external reviewers. The ProgramCommittee meeting was conducted electronically over a 2-week period. After careful discussion, the Program C- mittee selected 20 papers. I would like to sincerely thank all the members of the APLAS 2008 Program Committee for their excellent job, and all the external reviewers for their invaluable contribution. The submission and review process was managed using the EasyChair system. In addition to the 20 contributed papers, the symposium also featured three invitedtalksbyDinoDistefano(QueenMary, UniversityofLondon, UK), Radha Jagadeesan (DePaul University, USA), and Simon Peyton-Jones (Microsoft - search Cambridge, UK). Many people have helped to promote APLAS as a high-quality forum in Asia to serveprogramminglanguageresearchersworldwide.Following a seriesof well-attendedworkshopsthatwereheldinSingapore(2000), Daejeon(2001), and Shanghai (2002), the ?rst ?ve formal symposiums were held in Beijing (2003), Taipei (2004), Tsukuba (2005), Sydney (2006), and Singapore (2007).
This volume contains the proceedings of the Second International DMTF Ac- emic Alliance Workshopon Systems and Virtualization Management:Standards and New Technologies (SVM 2008) held in Munich, Germany, during October 21-22, 2008. The SVM 2008 proceedings are intended for use by students of systems and virtualization management. The reader is presumed to have a basic knowledge of systems management technologies and standards at the level provided, for example, the Common Information Model (CIM) standard for modeling m- agement resources. The student of systems management will ?nd here material that could be included in anadvanced study program.These proceedings should furthermoreallowstudents to acquireanappreciationofthe breadthandvariety of systems and virtualization management research. The proceedings also illuminate related standards and research issues, - swering questions such as:what are the implications of virtualizationfor distr- uted systems management, which advances in information models and protocols aidinmanagingvirtualization,whatnewproblemswillweincur whenmanaging virtualized systems and services, and how might management itself bene?t from virtualization? Topics related to managing distributed systems, virtualization of distributed resources/servicesand workin management standardizationare also highlighted. There were 15 regular paper submissions. These went through an active - view process, with each submission reviewed by at least three members of the Program Committee. We also sought external reviews from experts in certain areas. All these inputs were used by the ProgramCommittee in selecting a ?nal program with 13 regular papers.
As the standard for KDE desktop environment, Trolltech's Qt is a necessary basis for all programmers who want to develop cross-platform applications on Windows, Mac OS, Linux, and FreeBSD. A multitude of popular applications have been written in Qt, including Adobe Photoshop Elements, Google Earth, Perforce Visual Client, and Skype. "Foundations of Qt Development" is based on Qt 4.2, and is aimed at C++ programmers who want to become proficient using this excellent toolkit to create graphical applications that can be ported to all major platforms. The book is focused on teaching you to write your own code in addition to using existing code. Common areas of confusion are identified, addressed, and answered.
This is the first of a two-volume set that constitutes the refereed proceedings of the Symposium on Human Interface 2007, held in Beijing, China in July 2007. It covers design and evaluation methods and techniques, visualizing information, retrieval, searching, browsing and navigation, development methods and techniques, as well as advanced interaction technologies and techniques.
Effectively integrating theory and hands-on practice, Networking Systems Design and Development provides students and IT professionals with the knowledge and skills needed to design, implement, and manage fully functioning network systems using readily available Linux networking tools. Recognizing that most students are beginners in the field of networking, the text provides step-by-step instruction for setting up a virtual lab environment at home. Grounded in real-world applications, this book provides the ideal blend of conceptual instruction and lab work to give students and IT professionals a quick start in developing network systems using the Linux operating system. Leaving nothing to chance, it provides readers with detailed guidance through the many hands-on exercises.
Creating and maintaining a fully functioning enterprise network system doesn?t have to be expensive. This self-contained text provides readers with the tools to create their own networks using open source materials?and the virtual lab environment to develop problem-solving skills that will serve them well in their careers.
This is the first of a two-volume set that constitutes the refereed proceedings of the Second International Conference on Usability and Internationalization, UIHCII 2007, held in Beijing, China in July 2007. The papers of this first volume cover HCI and culture and are organized in topical sections on cross-cultural design, internationalization and intercultural usability, as well as user studies.
As software systems become ubiquitous, the issues of dependability become more and more crucial. Given that solutions to these issues must be considered from the very beginning of the design process, it is reasonable that dependability is addressed at the architectural level. This book was born of an effort to bring together the research communities of software architectures and dependability. This state-of-the-art survey contains expanded and peer-reviewed papers based on the carefully selected contributions to two workshops: the Workshop on Architecting Dependable Systems (WADS 2007), organized at the 2007 International Conference on Dependable Systems and Networks (DSN 2007), held in Edinburgh, UK in June 2007 and the Third Workshop on the Role of Software Architecture for Testing and Analysis (ROSATEA 2007) organized as part of a federated conference on Component-Based Software Engineering and Software Architecture (CompArch 2007), held in Medford, MA, USA in July 2007. It also contains a number of invited papers written by recognized experts in the area. The 14 papers are organized in topical sections on critical infrastructures, rigorous design/fault tolerance, and verification and validation.
This volume contains the proceedings of FORTE 2008, 28th IFIP WG6.1 - ternational Conference on Formal Techniques for Networked and Distributed Systems. FORTE 2008 was held at the Campus Innovation Center in Tokyo, Japan during June 10-13, 2008. FORTE denotes a series of international wo- ing conferences on formal description techniques applied to computer networks and distributed systems. The conference series started in 1981 under the name PSTV. In 1988 a second series under the name FORTE was set up. Both - ries were united to FORTE/PSTV in 1996. In 2001 the conference changed the name to its current form. Recent conferences of this long series were held in Berlin (2003), Madrid(2004), Taipei(2005), Paris(2006), and Tallinn(2007). As in the previous year, FORTE 2008 was collocated with TESTCOM/ FATES 2008: the 20th IFIP International Conference on Testing of Com- nicating Systems (TESTCOM) and the 8th International Workshop on Formal Approaches to Testing of Software (FATES). The co-location of FORTE and TESTCOM/FATES fostered the collaboration between their communities. The commonspiritofboth conferenceswasunderpinnedby jointopening andclosing sessions, invited talks, as well as joint social events.
This book constitutes the refereed proceedings of the 20th International Conference on Architecture of Computing Systems, ARCS 2007, held in Zurich, Switzerland in March 2007. The 20 revised full papers presented together with 1 invited paper were carefully reviewed and selected from 83 submissions. The papers cover a broad range of research topics related to basic technology, architecture, and application of computing systems with a strong focus on system aspects of pervasive computing and self organization techniques in both organic and autonomic computing.
This book constitutes the refereed proceedings of the 6th International Workshop on Task Models and Diagrams for User Interface Design, TAMODIA 2007, held in Toulouse, France, in November 2007. The workshop features current research and gives some indication of the new directions in which task analysis theories, methods, techniques and tools are progressing. The papers are organized in topical sections.
This book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography and Data Security, FC 2006, held in Anguilla, British West Indies in February/March 2006. The 19 revised full papers and six revised short papers presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections.
This book constitutes the refereed proceedings of the 8th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems, FMOODS 2006, held in Bologna, Italy, June 2006. The book presents 16 revised full papers together with an invited paper and abstracts of 2 invited talks. Coverage includes component- and model-based design, service-oriented computing, software quality, modeling languages implementation, formal specification, verification, validation, testing, and service-oriented systems.
"Windows Server 2003 Networking Recipes" is ideal for network managers and Windows Server 2003 system administrators responsible for setting up and running computers and networks. Think of this book as the comprehensive, task-based guide to installing, deploying, and configuring the various networking protocols and services supported by Windows Server 2003 and the only book you'll need. You'll find hundreds of quick reference solutions. And the featured recipes are all based on the first-hand experiences of the authors. You can rest assured that this book is written by a team of leading experts in Windows administration.
This book constitutes the thoroughly refereed post-proceedings of the Fourth International Workshop on Formal Aspects in Security and Trust, FAST 2006, held in Hamilton, Ontario, Canada, August 26-27, 2006. The 18 revised papers presented were carefully reviewed and selected from 47 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and ID issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, GRID security, security risk assessment, and case studies.
This book constitutes the refereed proceedings of the Fourth VLDB 2007 International Workshop on Secure Data Management, SDM 2007, held in Vienna, Austria, September 23-24, 2007 in conjunction with VLDB 2007. The 11 revised full papers presented were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Access Control, Database Security, Privacy Protection and Positon Papers.
This book puts you in charge of the most flexible and adaptable graphical interface in the computer industry. The X Window System underlies graphical desktops on Linux and Unix systems, and supports advanced features of modern graphics cards. More people use the X Window System than ever before, but there are few books about X in print. "X Power Tools" fills that hole with the most practical and up-to-date information available. Written in O'Reilly's popular "Power Tools" format, "X Power Tools" offers dozens of standalone articles, thoroughly cross-referenced, on useful tools and techniques for using X.This unique inside look at X gives Unix/Linux system administrators, owners of self-administered systems, and power users a lot of useful ways to harness the power of this system effectively. This book: offers a thorough grounding in X configuration and how the system works; provides the complete ins and outs of changing a desktop's behavior, such as fonts, keyboard settings, and remote security; includes articles on how to take advantage of X's "network transparency" - its ability to display graphical applications on a remote machine; explores intriguing areas such as using multiple monitors, building kiosks, and accessibility; and features discussions on X Window innovations and the future of the system. "X Power Tools" covers configuration and use of X, focusing on Linux but also including notes on other operating systems such as Solaris and FreeBSD. Each article in the book gives you insight into X; the entire book gives you a real grasp on this system and what you can do with it.
This book constitutes the refereed proceedings of the 7th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems, DAIS 2007, held in Paphos, Cyprus in June 2007. The DAIS conference was held as a joint event in federation with the 9th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS 2007) and the 9th International Conference on Coordination Models and Languages (Coordination 2007). The 24 revised full papers presented were carefully reviewed and
selected from 97 submissions. The papers address current research
in context-awareness, adaptation, mobility, distributed
applications and peer-to-peer computing, all of which relate to the
sustainability of distributed applications and integrated systems.
The papers are organized in topical sections on context-awareness,
distributed applications, adaptation, peer-to-peer, and
mobility.
This is the second edition of Hanaan Rosenthals critically-acclaimed AppleScript book. It goes the extra mile to teach you AppleScript, explaining advanced topics without leaving you behind. AppleScript is the high-level scripting language that resides on the Mac platform. It can be used to add functionality to the Mac operating system, automate tasks, add functions, and generally make things easier. AppleScript has always been very useful, and with Mac OS X, you can take AppleScript further than before. This book begins with the basics like handling variables, loops, and commands. It proceeds with more advanced concepts like debugging, AppleScripting with databases, manipulating PDFs with SMILE, and automating media workflow. In a nutshell, this book: Takes you on a journey from novice to professional AppleScripter. Is completely comprehensive; nothing is left to the imagination. Is up-to-date through AppleScript 1.10/Mac OS X Tiger. If you are a Mac user who wants to know the real meaning of having full control over your machine, get into AppleScripting. And pick up this bookit really is the only guide you'll need to master the art of AppleScripting
This book constitutes the refereed proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection held in September 2005. The 15 revised full papers and two practical experience reports were carefully reviewed and selected from 83 submissions. The papers are organized in topical sections on worm detection and containment, anomaly detection, intrusion prevention and response, intrusion detection based on system calls and network-based, as well as intrusion detection in mobile and wireless networks.
This book constitutes the refereed proceedings of the 19th International Conference on Architecture of Computing Systems, ARCS 2006, held in March 2006. The 32 revised full papers presented together with two invited and keynote papers were carefully reviewed and selected from 174 submissions. The papers are organized in topical sections on pervasive computing, memory systems, architectures, multiprocessing, energy efficient design, power awareness, network protocols, security, and distributed networks.
Most programmers' fear of user interface (UI) programming comes from their fear of doing UI design. They think that UI design is like graphic designthe mysterious process by which creative, latte-drinking, all-black-wearing people produce cool-looking, artistic pieces. Most programmers see themselves as analytic, logical thinkers insteadstrong at reasoning, weak on artistic judgment, and incapable of doing UI design. In this brilliantly readable book, author Joel Spolsky proposes simple, logical rules that can be applied without any artistic talent to improve any user interface, from traditional GUI applications to websites to consumer electronics. Spolsky's primary axiom, the importance of bringing the program model in line with the user model, is both rational and simple. In a fun and entertaining way, Spolky makesuser interfacedesign easy for programmers to grasp. After reading "User Interface Design for Programmers," you'll know how to design interfaces with the user in mind. You'll learn the important principles that underlie all good UI design, and you'll learn how to perform usability testing that works.
This book constitutes the refereed proceedings of the Second International Conference on Distributed Computing in Sensor Systems, DCOSS 2006, held in San Francisco, California, USA, June 2006. The book presents 33 revised full papers, focusing on distributed computing issues in large-scale networked sensor systems. Coverage includes topics such as distributed algorithms and applications, programming support and middleware, data aggregation and dissemination, security, information fusion, lifetime maximization, and localization.
Ready to build mobile apps that out-perform the rest? If you're an iOS developer with app-building experience, this practical guide provides tips and best practices to help you solve many common performance issues. You'll learn how to design and optimize iOS apps that deliver a smooth experience even when the network is poor and memory is low. Today's picky users want fast and responsive apps that don't hog resources. In this book, author Gaurav Vaish demonstrates methods for writing optimal code from an engineering perspective, using reusable Objective-C code that you can use right away. Up your game and create high-performance native iOS apps that truly stand out from the crowd. Measure key performance indicators-attributes that constitute and affect app performance Write efficient apps by minimizing memory and power consumption, and explore options for using available CPU cores Optimize your app's lifecycle and UI, as well as its networking, data sharing, and security features Learn about application testing, debugging and analysis tools, and monitoring your app in the wild Collect data from real users to analyze app usage, identify bottlenecks, and provide fixes Use iOS 9 upgrades to improve your app's performance |
You may like...
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright
Paperback
R1,491
Discovery Miles 14 910
Unix / Linux FAQ - (With Tips to Face…
N B Venkateswarlu
Hardcover
PowerShell, IT Pro Solutions…
William R. Stanek, William Stanek
Hardcover
R1,434
Discovery Miles 14 340
|