Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-Forensics 2010, held in Shanghai, China, in November 2010. The 32 revised full papers presented were carefully reviewed and selected from 42 submissions in total. These, along with 5 papers from a collocated workshop of E-Forensics Law, cover a wide range of topics including digital evidence handling, data carving, records tracing, device forensics, data tamper identification, and mobile device locating.
This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was "Remodelling the Attacker" with the intention to tell the students at the start of a security course that it is very important to model the attacker, but like most advice to the young, this is an oversimplification. Shouldn't the attacker's capability be an output of the design process as well as an input? The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries.
This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.
The two-volume set LNCS 6852/6853 constitutes the refereed proceedings of the 17th International Euro-Par Conference held in Bordeaux, France, in August/September 2011. The 81 revised full papers presented were carefully reviewed and selected from 271 submissions. The papers are organized in topical sections on support tools and environments; performance prediction and evaluation; scheduling and load-balancing; high-performance architectures and compilers; parallel and distributed data management; grid, cluster and cloud computing; peer to peer computing; distributed systems and algorithms; parallel and distributed programming; parallel numerical algorithms; multicore and manycore programming; theory and algorithms for parallel computation; high performance networks and mobile ubiquitous computing.
This book constitutes the refereed proceedings of the Third
International Symposium on NASA Formal Methods, NFM 2011, held in
Pasadena, CA, USA, in April 2011.
The phenomenal success of the iPhone, iPad and the iPod touch has ushered in a gold rush for developers, but with well over 300,000 apps in the highly competitive App Store, it has become increasingly difficult for new apps to stand out in the crowd. Achieving consumer awareness and sales longevity for your iOS app requires a lot of organization and some strategic planning. Updated and expanded for iOS 4, this bestselling book will show you how to incorporate marketing and business savvy into every aspect of the design and development process, giving your app the best possible chance of succeeding in the App Store The Business of iPhone and iPad App Development was written by experienced developers with business backgrounds, taking you step-by-step through cost effective marketing techniques that have proven successful for professional iOS app creatorsperfect for independent developers on shoestring budgets. No prior business knowledge is required. This is the book you wish you had read before you launched your first app What you'll learn Analyze your ideas and competition, and identify your audience to evaluate sales potential. Protect your business and intellectual property and avoid potential legal hassles. Transform your iOS app into a powerful marketing tool. Build synergy with in-app cross-promotion and social media, and Apple's Game Center. Utilize revenue-generating business models such as in-app advertising and In-App Purchase. Includes extensive coverage of the iAd framework and the Store Kit API. Improve usability and implement effective testing. Create a pre-release buzz online with Twitter, Facebook, blogs, and a dedicated website. Successfully navigate the App Store submission process. Execute a post-release marketing strategy with press releases, app reviews, promotional sales and giveaways. Who this book is for This book is for any developer looking to build a successful business selling iPhone, iPod touch, and iPad apps in Apple's iTunes App Store. All the code examples included in this book can be downloaded fromhttp: //iphonebusinessbook.com/. Table of Contents Seeing the Big Picture in a Crowded App Store Marketplace Doing Your Homework: Analyzing iOS App Ideas and Performing Competitive Research Protecting Your Intellectual Property Your iOS App Is Your Most Powerful Marketing Tool Social Inception: Promoting Your Apps Within Apps Money for Nothing: When It Pays to Be Free Monetizing Free Apps with iAd and Other In-App Advertising Opportunities Exploring the Freemium Model with In-App Purchase Testing and Usability: Putting Your Best Foot Forward Get the Party Started Creating a Prerelease Buzz Keys to the Kingdom: The App Store Submission Process Increasing Awareness for Your iOS App Online Resources for App Research and Marketing
It's time to capitalize on your mastery of Cocoa withPro Objective-C Design Patterns for iOS.You've developed apps that impressed and performed, and now you're ready to jump into development practices that will leave you with more effective, efficient, and professional level apps.This book is the element you need to make the jump from journeyman to master. All too often, developers grind through building good apps on willpower and a vigorous focus on code development, leaving them unaware of and unable to benefit from the underlying structural and functional design patterns. Pro Objective-C Design Patterns for iOS will teach you those design patterns that have always been present at some level in your code, but were never recognized, acknowledged, or fully utilized.Implementation of specific pattern approaches will prove their value to any developer working in the iOS application arena. You'll learn to master classic patterns like singleton, abstract factory, chain of responsibility, and observer. You'll also discover less well-known but useful patterns like memento, composite, command, and mediator. What you'll learn The basic concepts ofvarious design patterns How to apply designpatterns to your code based on different scenarios How design patterns canstrengthen your apps Who this book is for Any professional or aspiring iOS developer will find productivity, efficiency, and effectiveness of software development enhanced by the methods and practice delivered byPro Objective-C Design Patterns for iOS. Table of Contents Hello, Design Patterns A Case Study: Designing an App Prototype Factory Method Abstract Factory Builder Singleton Adapter Bridge Facade Mediator Observer Composite Iterator Visitor Decorator Chain of Responsibility Template Method Strategy Command Flyweight Proxy Memento
The power of Core Data allows iOS developers to efficiently
store and retrieve application data using familiar object-oriented
paradigms.Pro Core Data for iOS explains both how and why to use
Core Data for data storage, from simple to advanced techniques.
Covering common and advanced persistence patterns, this book
prepares any iOS developer to store and retrieve data accurately
and proficiently. All iPhone, iPad, and iPod touch developers whose applications manage any amount of data. Table of Contents Getting Started Understanding Core Data Storing Data: SQLite and Other Options Creating a Data Model Working with Data Objects Refining Result Sets Tuning Performance and Memory Usage Versioning and Migrating Data Using Core Data in Advanced Applications
The control and data flow of a program can be represented using continuations, a concept from denotational semantics that has practical application in real compilers. This book shows how continuation-passing style is used as an intermediate representation on which to perform optimisations and program transformations. Continuations can be used to compile most programming languages. The method is illustrated in a compiler for the programming language Standard ML. However, prior knowledge of ML is not necessary, as the author carefully explains each concept as it arises. This is the first book to show how concepts from the theory of programming languages can be applied to the producton of practical optimising compilers for modern languages like ML. This book will be essential reading for compiler writers in both industry and academe, as well as for students and researchers in programming language theory.
Want to learn how to program on your Mac? Not sure where to begin? Best-selling author Wallace Wang will explain how to get started with Cocoa, Objective-C, and Xcode. Whether you are an experienced Windows coder moving to the Mac, or you are completely new to programming, you'll see how the basic design of a Mac OS X program works, how Objective-C differs from other languages you may have used, and how to use the Xcode development environment. Most importantly, you'll learn how to use elements of the Cocoa framework to create windows, store data, and respond to users in your own Mac programs. If you want to learn how to develop apps with Cocoa, Objective-C, and Xcode, this book is a great first step. Here are just a few of the things you'll master along the way: Fundamental programming concepts aided by short, easy-to-understand examples How to use Xcode and related programming tools to save time and work more efficiently A firm understanding of the basics of Objective-C and how it compares to other languages you might know How to create simple apps using the Cocoa framework How to easily design, write, test, and market your finished program What you'll learn Basic programming concepts illustrated with short, easy-to-understand examples How to use Xcode and related programming tools The basics of Objective-C and how it compares to other languages you might know How to create simple apps using the Cocoa framework Who this book is for Mac users who want to learn programming or Windows developers who are moving to the Mac OS and iOS platforms. No previous programming experience required. Table of Contents Understanding Programming Understanding Apple's Programming Tools The Basic Steps to Creating a Mac Program Getting Help Learning Objective-C Making Decisions with Branches Repeating Code with Loops Understanding the Cocoa Framework Manipulating Strings Arrays Dictionaries and Sets Creating Classes and Objects Inheritance, Method Overriding, and Events Creating a User Interface Choosing Commands with Buttons Making Choices with Radio Buttons and Check Boxes Making Choices with Pop-Up Buttons Inputting and Outputting Data with Labels, Text Fields, and Combo Boxes Inputting Data with Sliders, Date Pickers, and Steppers Using Built-In Dialog Boxes Creating Pull-Down Menus Designing Your Own Programs Working with Xcode Debugging Your Program
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc.
iOS Forensic Analysis provides an in-depth look at investigative processes for the iPhone, iPod Touch, and iPad devices. The methods and procedures outlined in the book can be taken into any courtroom. With never-before-published iOS information and data sets that are new and evolving, this book gives the examiner and investigator the knowledge to complete a full device examination that will be credible and accepted in the forensic community. -->What you'll learn-->How to respond to security incidents involving iOS devices How to acquire and analyze data on iOS devices such as iPhone and iPad How to analyze media exploitation on iOS devices-->Who this book is for--> Computer forensic professionals, law enforcement, attorneys, security professionals, those who are curious about such things, and educators-->-->-->Table of Contents-->History of Apple Mobile Devices iOS Operating and File System Analysis Search, Seizure, and Incident Response iPhone Logical Acquisition Logical Data Analysis Mac and Windows Artifacts GPS Analysis Media Exploitation Media Exploitation Analysis Network Analysis
Mobile devices haveevolved to focus onrich media production and consumption. Developers of mobile applications are able to create applications that allow people to play, capture, andshare media in a variety of new ways on mobile devices. The popularity of Android has soared in part because the platform offers developers a rich set of capabilities including access to media capturing and playback functions. Pro Android Mediaprovides concise and clear instruction on how to utilize the media APIs made available through Android to create dynamic apps. It takes youfrom a simple means to gain access to the camera to complex video capture and sharing examples. It also covers sound, graphics, painting, and moreeverything you need to make your app come "alive." What you'll learn Develop graphics, music, video and rich media apps for Android smartphones and tablets Build touchscreen input features into Android apps that allow users to draw, paint, and do other creative forms of input Turn the Android smartphone into a full fledged media player Integrate and use location-based services and media-related web service APIs Who this book is for This book is aimed primarily at the growing market of Android developers. It is written in such a way that it may be used by those who are familiar with Android, but have no experience developing applications that deal with images, audio, or video Table of Contents Introduction to Android Imaging Building Custom Camera Applications Image Editing and Processing Graphics and Touch Events Introduction to Audio on Android Background and Networked Audio Audio Capture Audio Synthesis and Analysis Introduction to Video Advanced Video Video Capture Media Consumption and Publishing Using Web Services
As the telecommunication industry introduces new sophisticated technologies, the nature of services and the volume of demands have changed. Indeed, a broad range of new services for users appear, combining voice, data, graphics, video, etc. This implies new planning issues. Fiber transmission systems that can carry large amounts of data on a few strands of wire were introduced. These systems have such a large bandwidth that the failure of even a single transmission link: in the network can create a severe service loss to customers. Therefore, a very high level of service reliability is becoming imperative for both system users and service providers. Since equipment failures and accidents cannot be avoided entirely, networks have to be designed so as to "survive" failures. This is done by judiciously installing spare capacity over the network so that all traffic interrupted by a failure may be diverted around that failure by way of this spare or reserve capacity. This of course translates into huge investments for network operators. Designing such survivable networks while minimizing spare capacity costs is, not surprisingly, a major concern of operating companies which gives rise to very difficult combinatorial problems. In order to make telecommunication networks survivable, one can essentially use two different strategies: protection or restoration. The protection approach preas signs spare capacity to protect each element of the network independently, while the restoration approach spreads the redundant capacity over the whole network and uses it as required in order to restore the disrupted traffic."
Hard real-time systems are very predictable, but not sufficiently flexible to adapt to dynamic situations. They are built under pessimistic assumptions to cope with worst-case scenarios, so they often waste resources. Soft real-time systems are built to reduce resource consumption, tolerate overloads and adapt to system changes. They are also more suited to novel applications of real-time technology, such as multimedia systems, monitoring apparatuses, telecommunication networks, mobile robotics, virtual reality, and interactive computer games. This unique monograph provides concrete methods for building flexible, predictable soft real-time systems, in order to optimize resources and reduce costs. It is an invaluable reference for developers, as well as researchers and students in Computer Science.
Several works on multimedia storage appear in literature today, but very little if any, have been devoted to handling long duration video retrieval, over large scale networks. Distributed retrieval of multimedia documents, especially the long duration documents, is an imperative step in rendering high-quality, high-fidelity, and cost-effective services for network service providers. Distributed Multimedia Retrieval Strategies for Large Scale Networked Systems presents an up-to-date research status in the domain of distributed video retrieval. This professional book will include several different techniques that are in place for long duration video retrieval. An experimentally tested technology under the JINI platform, demonstrates a practical working system which serves as a feasibility study, as well as the first step in realizing such a technology.
Growing demands for the quality, safety, and security of software can only be satisfied by the rigorous application of formal methods during software design. This book methodically investigates the potential of first-order logic automated theorem provers for applications in software engineering. Illustrated by complete case studies on protocol verification, verification of security protocols, and logic-based software reuse, this book provides techniques for assessing the prover's capabilities and for selecting and developing an appropriate interface architecture.
As almost no other technology, embedded systems is an essential element of many innovations in automotive engineering. New functions and improvements of already existing functions, as well as the compliance with traffic regulations and customer requirements, have only become possible by the increasing use of electronic systems, especially in the fields of driving, safety, reliability, and functionality. Along with the functionalities that increase in number and have to cooperate, the complexity of the entire system will increase. Synergy effects resulting from distributed application functionalities via several electronic control devies, exchanging information through the network brings about more complex system architectures with many different sub-networks, operating with different velocities and different protocol implementations. To manage the increasing complexity of these systems, a deterministic behaviour of the control units and the communication network must be provided for, in particular when dealing with a distributed functionality. From Specification to Embedded Systems Application documents recent approaches and results presented at the International Embedded Systems Symposium (IESS 2005), which was held in August 2005 in Manaus (Brazil) and sponsored by the International Federation for Information Processing (IFIP). The topics which have been chosen for this working conference
are very timely: design methodology, modeling, specification,
software synthesis, power management, formal verification, testing,
network, communication systems, distributed control systems,
resource management and special aspects in system design.
Lean Manufacturing has proved to be one of the most successful and most powerful production business systems over the last decades. Its application enabled many companies to make a big leap towards better utilization of resources and thus provide better service to the customers through faster response, higher quality and lowered costs. Lean is often described as "eyes for flow and eyes for muda" philosophy. It simply means that value is created only when all the resources flow through the system. If the flow is stopped no value but only costs and time are added, which is muda (Jap. waste). Since the philosophy was born at the Toyota many solutions were tailored for the high volume environment. But in turbulent, fast-changing market environment and progressing globalization, customers tend to require more customization, lower volumes and higher variety at much less cost and of better quality. This calls for adaptation of existing lean techniques and exploration of the new waste-free solutions that go far beyond manufacturing. This book brings together the opinions of a number of leading academics and researchers from around the world responding to those emerging needs. They tried to find answer to the question how to move forward from "Spaghetti World" of supply, production, distribution, sales, administration, product development, logistics, accounting, etc. Through individual chapters in this book authors present their views, approaches, concepts and developed tools. The reader will learn the key issues currently being addressed in production management research and practice throughout the world.
Networks on Chip presents a variety of topics, problems and approaches with the common theme to systematically organize the on-chip communication in the form of a regular, shared communication network on chip, an NoC for short. As the number of processor cores and IP blocks integrated on a single chip is steadily growing, a systematic approach to design the communication infrastructure becomes necessary. Different variants of packed switched on-chip networks have been proposed by several groups during the past two years. This book summarizes the state of the art of these efforts and discusses the major issues from the physical integration to architecture to operating systems and application interfaces. It also provides a guideline and vision about the direction this field is moving to. Moreover, the book outlines the consequences of adopting design platforms based on packet switched network. The consequences may in fact be far reaching because many of the topics of distributed systems, distributed real-time systems, fault tolerant systems, parallel computer architecture, parallel programming as well as traditional system-on-chip issues will appear relevant but within the constraints of a single chip VLSI implementation. The book is organized in three parts. The first deals with system design and methodology issues. The second presents problems and solutions concerning the hardware and the basic communication infrastructure. Finally, the third part covers operating system, embedded software and application. However, communication from the physical to the application level is a central theme throughout the book. The book serves as an excellent reference source and may be used as a text for advanced courses on the subject.
It seems that everyone and her sister has developed an iPhone App-everyone except you, the hard-working web professional. And now with the introduction of the iPad, you may even feel farther behind. But the time has come where you don't need to struggle through Objective-C or master Apple's Cocoa touch APIs. WebKit's support for HTML5 means any ambitious web developer can join Apple's second mobile App wave and create compelling apps that address the unique features of both the iPhone and the larger iPad. Beginning iPhone and iPad Web Apps: Scripting with HTML5, CSS3, and JavaScript takes you through every aspect of the latest Mobile Web Standards as well as the specific features of the iPhone and iPad. You'll go beyond Web 2.0 and Ajax to learn about WebKit and Mobile Safari, HTML5 and CSS3, Vector Graphics and Multimedia support. You'll discover what built-in hardware features of the iPhone and iPad you can use and how to take advantage of these device-specific capabilities. The market for Web apps is expanding and the combination of iPhone and iPad makes this a very hot area-as well as a competitive one.You'll want to know about all the advantages available to get ahead and stay ahead, and Beginning iPhone and iPad Web Apps is the perfect starting point.
Parallel and distributed computing is one of the foremost
technologies for shaping New Horizons of Parallel and Distributed Computing is a collection of self-contained chapters written by pioneering researchers to provide solutions for newly emerging problems in this field. This volume will not only provide novel ideas, work in progress and state-of-the-art techniques in the field, but will also stimulate future research activities in the area of parallel and distributed computing with applications. New Horizons of Parallel and Distributed Computing is intended for industry researchers and developers, as well as for academic researchers and advanced-level students in computer science and electrical engineering. A valuable reference work, it is also suitable as a textbook.
Distributed and Parallel Systems: From Cluster to Grid Computing, is an edited volume based on DAPSYS 2006, the 6th Austrian-Hungarian Workshop on Distributed and Parallel Systems, which is dedicated to all aspects of distributed and parallel computing. The workshop was held in conjunction with the 2nd Austrian Grid Symposium in Innsbruck, Austria in September 2006. This book is designed for a professional audience composed of practitioners and researchers in industry. It is also suitable for advanced-level students in computer science.
With the advent of portable and autonomous computing systems, power con sumption has emerged as a focal point in many research projects, commercial systems and DoD platforms. One current research initiative, which drew much attention to this area, is the Power Aware Computing and Communications (PAC/C) program sponsored by DARPA. Many of the chapters in this book include results from work that have been supported by the PACIC program. The performance of computer systems has been tremendously improving while the size and weight of such systems has been constantly shrinking. The capacities of batteries relative to their sizes and weights has been also improv ing but at a rate which is much slower than the rate of improvement in computer performance and the rate of shrinking in computer sizes. The relation between the power consumption of a computer system and it performance and size is a complex one which is very much dependent on the specific system and the technology used to build that system. We do not need a complex argument, however, to be convinced that energy and power, which is the rate of energy consumption, are becoming critical components in computer systems in gen eral, and portable and autonomous systems, in particular. Most of the early research on power consumption in computer systems ad dressed the issue of minimizing power in a given platform, which usually translates into minimizing energy consumption, and thus, longer battery life."
A number of widely used contemporary processors have instruction-set extensions for improved performance in multi-media applications. The aim is to allow operations to proceed on multiple pixels each clock cycle. Such instruction-sets have been incorporated both in specialist DSPchips such as the Texas C62xx (Texas Instruments, 1998) and in general purpose CPU chips like the Intel IA32 (Intel, 2000) or the AMD K6 (Advanced Micro Devices, 1999). These instruction-set extensions are typically based on the Single Instruc tion-stream Multiple Data-stream (SIMD) model in which a single instruction causes the same mathematical operation to be carried out on several operands, or pairs of operands, at the same time. The level or parallelism supported ranges from two floating point operations, at a time on the AMD K6 architecture to 16 byte operations at a time on the Intel P4 architecture. Whereas processor architectures are moving towards greater levels of parallelism, the most widely used programming languages such as C, Java and Delphi are structured around a model of computation in which operations takeplace on a single value at a time. This was appropriate when processors worked this way, but has become an impediment to programmers seeking to make use of the performance offered by multi-media instruction -sets. The introduction of SIMD instruction sets (Peleg et al." |
You may like...
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, …
Hardcover
R1,276
Discovery Miles 12 760
PowerShell for Administration, IT Pro…
William R. Stanek, William Stanek
Hardcover
R1,482
Discovery Miles 14 820
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R996
Discovery Miles 9 960
|