![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
This book constitutes the refereed post-proceedings of the Third International Workshop on Engineering Self-Organising Applications, ESOA 2005, held in July 2005 as an associated event of AAMAS 2005. The 12 revised full papers and 6 revised short papers presented are organized in topical sections on novel self-organising mechanisms, methodologies, models and tools for self-organising applications, and specific applications of self-organising mechanisms.
This book constitutes the refereed proceedings of the 15th International Conference on Compiler Construction, CC 2006, held in March 2006 as part of ETAPS. The 17 revised full papers presented together with three tool demonstration papers and one invited paper were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections.
Expert insight for modern Python (3.6+) coding from the author of Python Essential Reference Python educator Dave Beazley's concise handbook focuses on the essential core of the Python programming language, with code examples to illuminate how Python works and how to structure programs that can be more easily explained, tested, and debugged. Rather than trying to cover every possible feature and quirk of a 30-year-old language, this pragmatic guide provides a concise narrative related to fundamental programming topics that form the foundation for Python projects of any size including Data abstraction Control flow Program structure Functions: master functions and functional programming idioms Objects: control objects and master the "protocols" that define their behavior Modules: plan for project growth by understanding modules and packages Generators Classes: understand classes from both high-level and technical perspectives I/O handling: proper techniques and abstractions Dicts "This is a pragmatic book that presents some of the most important topics about the Python programming language in a concise form, designed to make it easier to find out the most relevant information bits in a context where resources abound and frequently are just too overwhelming." -Victor Domingos, Software Developer, Slim Business Solutions, The No Title (R) Tech Blog
This book constitutes the refereed proceedings of the Second International Information Security Practice and Experience Conference, ISPEC 2006, held in Hangzhou, China, in April 2006. The 35 revised full papers presented were carefully reviewed and selected from 307 submissions. The papers are organized in topical sections.
As software systems become ubiquitous, the issues of dependability become more and more critical. Given that solutions to these issues must be taken into account from the very beginning of the design process, it is appropriate that dependability is addressed at the architectural level. This book results from an effort to bring together the research communities of software architectures and dependability. Inspired by the ICSE 2003 Workshop on Software Architectures for Dependable Systems, the book focuses on topics relevant to improving the state of the art in architecting dependable systems. The 15 thoroughly reviewed papers originate partly from the workshop; others were solicited in order to achieve complete coverage of all relevant aspects. The papers are organized into topical sections on architectures for dependability, fault-tolerance in software architectures, dependability analysis in software architectures, and industrial experience.
This book aims to teach all the essentials of developing dynamic Web sites in OS X in a linear style. This book is not for hardcore developers, but rather for those new to the OS or the Mac, and looking for a primer on Web site development. Typical readers are Web development professionals who are exploring development on the Mac for the first time and Mac-loyal designers expanding from print into Web design.
The Domain Name System (DNS) is the system created to map domain names to IP addresses, and is largely responsible for the widespread popularity of the Internet due to the convenience it offers in calling system resources by an easily recognizable name rather than a cryptic number. Given the critical nature of this technology for ensuring smooth operation of Internet-based resources such as Web and mail servers, ita (TM)s imperative that users fully understand key configuration, management and security principles. Pro DNS and BIND guides readers through the often challenging array of features surrounding DNS with a special focus on the Worlda (TM)s most diffuse DNS implementation, BIND (Berkeley Internet Name Domain). Readers will learn not only about key DNS concepts, but also how to effectively install, configure, deploy and manage BIND in enterprise environments.
While the Windows Script Host (WSH) is capable of performing a number of common tasks such as file handling and network connections, WSH's great strength is its ability to use COM components. This allows WSH to perform database, E-mail, security, user administration, network, and system administration through objects built into Windows. This book provides practical solutions to common problems as well as detailed discussions of the underlying technology used in the solutions.Stein Borge provides a general introduction to new features in recent versions of WSH, and then covers the file, shell and network operations using built-in WSH objects. Borge also provides chapters on lesser-known but important recent additions to WSH of standard input/output streams and regular expressions, as well as covering registry operations using the built-in Shell objects and WMI objects.Automating Windows Administration is targeted towards administrative and support staff in Microsoft networked environments who desperately want a way to automate common administrative tasks. common administrative tasks for all business-oriented versions of Windows from NT to Windows 2003 Server using the Windows Script Host (WSH). WSH is a replacement for Microsoft batch scripts.
This volume contains the proceedings of the 8th International Workshop on Software and Compilers for Embedded Systems (SCOPES 2004) held in A- terdam, The Netherlands, on September 2 and 3, 2004. Initially, the workshop was referred to as the International Workshop on Code Generation for Emb- ded Systems. The ?rst took place in 1994 in Schloss Dagstuhl, Germany. From its beginnings, the intention of the organizers has been to create an interactive atmosphere in which the participants can discuss and pro't from the assembly of international experts in the ?eld. The name SCOPES has been used since the fourth edition in St. Goar, G- many, in1999whenthescopeoftheworkshopwasextendedtoalsocovergeneral issues in embedded software design. Since then SCOPES has been held again in St. Goar in 2001; Berlin, Germany in 2002; Vienna, Austria in 2003; and now in Amsterdam, The Netherlands. In response to the call for papers, almost 50 very strong papers were s- mitted from all over the world. All submitted papers were reviewed by at least three experts to ensure the quality of the workshop. In the end, the program committee selected 17 papers for presentation at the workshop. These papers are divided into the following categories: application-speci?c (co)design, system and application synthesis, data ?ow analysis, data partitioning, task scheduling and code generation. In addition to the selected contributions, the keynote address was delivered by Mike Uhler from MIPS Technologies. An abstract of his talk is also included in this volume.
The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica from February 28 to March 3, 2005. This conference, organized by the International Financial Cryptography Association (IFCA), continues to be the premier international forum for research, exploration, and debate regarding security in the context of finance and commerce. The conference title and scope was expanded this year to cover all aspects of securing transactions and systems. The goal is to build an interdisciplinary meeting, bringing together cryptographers, data-security specialists, business and economy researchers, as well as economists, IT professionals, implementers, and policy makers. We think that this goal was met this year. The conference received 90 submissions and 24 papers were accepted, 22 in the Research track and 2 in the Systems and Applications track. In addition, the conference featured two distinguished invited speakers, Bezalel Gavish and Lynne Coventry, and two interesting panel sessions, one on phishing and the other on economics and information security. Also, for the first time, some of the papers that were judged to be very strong but did not make the final program were selected for special invitation to our Works in Progress (Rump) Session that took place on Wednesday evening. Three papers were highlighted in this forum this year, and short versions of the papers are included here. As always, other conference attendees were also invited to make presentations during the rump session, and the evening lived up to its colorful reputation.
Concepts like ubiquitous computing and ambient intelligence that exploit - creasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data access. Furthermore, it will become easier to collect, store, and search personal information and endanger people's privacy. As a result security and privacy of data becomes more and more of an issue. Therefore, secure data management, which is also privacy-enhanced, turns out to be a challenging goal that will also seriously in?uence the acceptance of ub- uitous computing and ambient intelligence concepts by society. With the above in mind, we organized the SDM 2004 workshop to initiate and promote secure data management as one of the important interdisciplinary - search ?elds that brings together people from the security research community and the data management research community. The call for papers attracted 28 submissions both from universities and industry. The program committee selected 15 researchpapers for presentation at the workshop.The technical c- tributions presented at the SDM workshop are collected in this volume, which, wehope, willserveasavaluableresearchandreferencebookinyourprofessional life.
Code generation has the potential to revolutionize application development. Rather than handcrafting each piece of code, enterprises will increasingly turn to code generation, based on templates and application of business logic, to automatically generate code to perform a variety of tasks. Code Generation in Microsoft . NET presents the fundamentals of code generation. Code generation is already used extensively in Visual Studio . NET - every form-based application contains potentially hundreds of lines of wizard created code, which is modified as the developer sets various properties. Strongly typed datasets, XML schemas and web service proxies are also generated automatically by Visual Studio. This results in a huge cost savings and improvement in software reliability. Developers need both the technical details of how to accomplish code generation in . NET as well as a coherent series of steps to follow to incorporate code generation into their development. Code Generation in Microsoft . NET teaches developers how to adopt these techniques in their own development efforts. code generation both within and between projects in the organization. The mechanics of code generation introduced in the book are organized around these steps, and provide the tools to leverage code generation for significant payback on the very first application where it is used.
* Clear and abundant examples, using real-world code, written by three experienced developers who write networking code for a living. * Describes how to build clients and servers, explains how TCP, UDP, and IP work, and shows how to debug networking applications via packet sniffing and deconstruction. * Well suited for Windows developer looking to expand to Linux, or for the proficient Linux developer looking to incorporate client-server programming into their application.
To many readers, Mozart/Oz represents a new addition to the pantheon of p- gramming systems. One way of evaluating a newcomer is through the eyes of the classics, for example Kernighan and Pike's "The Practice of Programming," a bookthatconcludeswithsix"lastingconcepts" simplicityandclarity, generality, evolution, interfaces, automation, andnotation.KernighanandPikeconcentrate on using standard languages such as C and Java to implement these concepts, but it is instructive to see how a multiparadigm language such as Oz changes the outlook. Oz's concurrency model yields simplicity and clarity (because Oz makes it easier to express complex programs with many interacting components), g- erality, and better interfaces (because the data?ow model automatically makes interfaces more lightweight). Constraint programming in Oz again yields simplicity and clarity (because theprogrammercanexpresswhatneedstobetrueratherthanthemorecomplex issue of how to make it true), and o?ers a powerful mathematical notation that is di?cult to implement on top of languages that do not support it natively. Mozart's distributed computing model makes for improved interfaces and eases the evolution of systems. In my own work, one of the most important concernsistobeabletoquicklyscaleupaprototypeimplementationintoalar- scale service that can run reliably on thousands of computers, serving millions of users. The ?eld of computer science needs more research to discover the best ways of facilitating this, but Mozart provides one powerful approach. Altogether, Mozart/Ozhelpswithallthelastingconceptsexceptautomation, and it plays a particularly strong role in notation, which Kernighan and Pike pointoutisanunderappreciatedarea.Ibelievethatprovidingtherightnotation isthemostimportantofthesixconcepts, onethatsupportsalltheothers.Mul- paradigm systems such as Oz provide more choices for notation than sing- paradigm languages.
* Covers the new, forthcoming release of Samba 3. * Demonstrates how to integrate Samba with other network protocols, such as NFS, AppleTalk, LPD, IPP, DNS, and NTP. * Clear and concise, the books describes the inner working of SMB/CIFS, and how to configure and maintain the Samba software on many platforms, including Linux, Unix, FreeBSD, Mac OS X (Jaguar and Panther), and Windows.
E-commerce services are su?ering abuse by programs (bots, spiders, etc.) m- querading as legitimate human users. E?orts to defend against such attacks have, over the past several years, stimulated investigations into a new family of security protocols - "Human Interactive Proofs" (HIPs) - which allow a person to authenticate herself as a member of a given group: e.g., as a human (vs. a machine), as herself (vs. anyoneelse), as an adult (vs. a child). Most commercial usesofHIPstodayareCAPTCHAs,"CompletelyAutomaticPublicTuringtests to tell Computers and Humans Apart," which exploit the gap in ability between humans and machine vision systems in reading images of text. HIP challenges can also be non-graphical, e.g., requiring recognition of speech, solving puzzles, etc. Wearepleasedtopresentthe?rstrefereedandarchivallypublishedcollection of state-of-the-art papers on HIPs and CAPTCHAs. Each paper was reviewed by three members of the Program Committee, judged by the Co-chairs to be of su?cient relevance and quality, and revised by the authors in response to the referees' suggestions. The papers investigate performance analysis of novel CAPTCHAs, HIP - chitectures, and the role of HIPs within security systems. Kumar Chellapilla, Kevin Larson, Patrice Simard, and Mary Czerwinski describe user trials of a CAPTCHA designed to resist segmentation attacks, including a systematic evaluation of its tolerance by human users. Henry Baird, Michael Moll, and Sui- Yu Wang analyze data from a human legibility trial of another segmentati- resistantCAPTCHAandlocateahighlylegibleengineeringregime.AmaliaRusu and Venu Govindaraju describe research towards CAPTCHAs based on reading synthetically damaged images of real images of unconstrained handwritten text.
Most programming books are about as exciting as Bill Gates' left ear. But with this latest eye-opening release, technology author--> Karl Moore--> shows it doesn't have to be quite so dull and uninspiring. Split into eight dynamic parts, Karl Moore's Visual Basic .NET covers every key area of real-life computer developmentand promises to turn even newbie programmers into VB .NET wizards, quicker than anyone else. It's a perfect tutorial guide for those learning VB .NET from scratch or moving from VB6. "Karl Moore's Visual Basic .NET: The Tutorials" consists of a number of key tutorials, each dealing with a specific, "real-life" area of programming. The tutorials are broken down into easily digestible 10-page installments, with an accompanying FAQ and review sheet at the close. Numerous "top tips" are also distributed throughout the texts to aid understanding.
Welcome to ICOIN 2005,the International Conference on Information Netwo- ing, held at Ramada Plaza Jeju Hotel, Jeju Island, Korea during January 31- February2,2005.ICOIN2005followedthesuccessofpreviousconferences.Since 1986, the conference has provided a technical forum for various issues in inf- mation networking. The theme of each conference re?ects the historic events in the computer communication industry. (Please refer to www.icoin2005.or.kr for details.) The theme of ICOIN 2004, "Convergence in Broadband and Mobile Networking," was used again for ICOIN 2005 since we believed it was ongoing. This year we received 427 submissions in total, which came from 22 co- tries. Upon submission, authors were asked to select one of the categories listed in the Call for Papers. The most popular category chosen was network se- rity, followed by mobile networks and wireless LANs. Other areas with strong showings included QoS and resource management, ad hoc and sensor networks, and wireless multimedia systems. From the outset, we could see where recent research interest lay and could make sure that the theme was still going in the right direction.
This volume contains the proceedings of the 7th International Workshop on Software and Compilers for Embedded Systems, SCOPES 2003, held in Vienna, Austria, September 24-26, 2003. Initially, the workshop was referred to as the International Workshop on Code Generation for Embedded Systems. The ?rst workshop took place in 1994 in Schloss Dagstuhl, Germany. From its beg- nings, the intention of the organizers was to create an atmosphere in which the researcherscould participateactively in dynamic discussionsand pro't from the assembly of international experts in the ?eld. It was at the fourth workshop, in St. Goar, Germany, in 1999, that the spectrum of topics of interest for the workshop was extended, and not only code generation, but also software and compilers for embedded systems, were considered. The change in ?elds of interest led to a change of name, and this is when the present name was used for the ?rst time. Since then, SCOPES has been held again in St. Goar, Germany, in 2001; Berlin, Germany, in 2002; and this year, 2003, in Vienna, Austria. In response to the call for papers, 43 very strong papers from all over the world were submitted. The program committee selected 26 papers for pres- tation at SCOPES 2003. All submitted papers were reviewed by at least three experts in order to ensure the quality of the work presented at the workshop.
The 7th Annual Financial Cryptography Conference was held January 27-30, 2003, in Guadeloupe, French West Indies. Financial Cryptography is organized by the International Financial Cryptography Association. Financial Cryptography 2003 received 54 paper submissions, of which one was withdrawn. The remaining papers were carefully reviewed by at least three members of the program committee. The program committee selected 17 papers for inclusion in the conference, revised versions of which are included in this proceedings. In addition to the submitted papers, the program included interesting and entertaining invited talks by Tim Jones on digital cash and by Richard Field on the interactions between technology and the United Nations. There were also several panels, on micropayments, economics of security, and trusted computing platforms, some of which are represented by contributions in these proceedings, and a rump session chaired by Juan Garay. We thank the program committee (listed on the next page) for their hard work in selecting the program from these papers. We also thank the external referees who helped with the reviewing task: N. Asokan, Danny Bickson, - manuel Bresson, Dario Catalano, Xuhua Ding, Louis Granboulan, Stuart Haber, Amir Herzberg, Bill Horne, Russ Housley, Yongdae Kim, Brian LaMacchia, Phil MacKenzie, Maithili Narasimha, Phong Nguyen, Kaisa Nyberg, David Poi- cheval, Tomas Sander, Yaron Sella, Mike Szydlo, Anat Talmy, Ahmed Tew?k, Susanne Wetzel, Shouhuai Xu, and Jeong Yi. (Apologies for any omissions - advertent.
"Introduction to 3D Game Engine Design Using DirectX 9 and C#" illustrates the process of creating a simple 3D game engine. During this process, author Lynn Harrison demonstrates many facets of the DirectX 9 software through clear-cut explanations and examples. Throughout the course of the book, you'll develop an off-road driving game that brings such features as management of large scenes, environmental effects, and physics into play. To write the game, you'll use cutting-edge technologiesC# and DirectX, and the .NET Frameworkand you'll go beyond simple graphics to explore audio, user input, artificial intelligence, and multiplayer design. Table of Contents Overview User Interface Hanging Ten: A Ride Through the Rendering Pipeline Basic 3D Objects Complex 3D Objects Camera: The Player's View of the World Adding Some Atmosphere: Lighting and Fog Artificial Intelligence: Adding the Competition Game Audio: Let's Make Some Noise Game Physics: Keeping It Real Tools of the Trade
This volume contains the accepted papers from the 3rd International School andSymposium onAdvanced Distributed Systems heldin Guadalajara, Mexico, January24-30,2004.Thiseventwasorganizedbytheteamsmadeupofmembers of CINVESTAV Guadalajara, CUCEI, the Computer Science Department of the Centre of Research and Advances Studies at the CUCEA campus of the University of Guadalajara, Mexico, the University of Rostock, Germany and ITESO, Guadalajara. The ISSADS symposium provides a forum for scientists and people from industry to discuss the progress of applications and theory of distributedsystems.Thisyeartherewereover300participantsfrom3continents, among which about 20 percent came from industry. Theconferenceprogramconsistedof25acceptedpapersoutof46submissions and covered several aspects of distributed systems from hardware and system level up to di?erent applications. These papers were selected by a peer review process, in which each paper was evaluated by at least three members of the international program committee. Inaddition, thethreeinvitedspeakers, AdolfoGuzmanArenas, YakupParker and Joaquin Vila, presented interesting overviews to current development and research directions in distributed systems. Furthermore, eight tutorials and four industrial forums from IBM, INTEL, HP and SUN enabled the participants to extend their knowledge in selected areas. A panel, which was organized by a team composed of researchersfrom the Universidadde Guadalajaraand focused on tra?c control and simulation, also demonstrated the practical application of recent research in distributed systems to the problems of Guadalaj
This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Information Hiding, IH 2002, held in Noordwijkerhout, The Netherlands, in October 2002. The 27 revised full papers presented were carefully selected during two rounds of reviewing and revision from 78 submissions. The papers are organized in topical sections on information hiding and networking, anonymity, fundamentals of watermarking, watermarking algorithms, attacks on watermarking algorithms, steganography algorithms, steganalysis, and hiding information in unusual content.
One of the secrets to the ever-increasing popularity of Windows Server can be found in the simplicity its administration. The easy-to-use GUI, consistent set of tools, and wizards that walk you through complex tasks allow you to install, configure and maintain Windows servers without any knowledge of programming or scripting languages or learning complicated command-line syntax. It's possible, in fact, to accomplish about 90 per cent of all Windows administration without ever opening a command prompt or running a script common, day-to-day tasks of Windows administration can be performed from the GUI, it's not always the best way, especially with complex or repetitive tasks Scripts and command-line tools often provide a faster, more flexible approach. Windows Server Hacks reveals techniques that go well beyond basic management tasks found in most handbooks to help busy system administrators master the more powerful features of Windows Server. life as an administrator much easier. These tools, or hacks--quick and dirty solutions to problems, or clever ways of doing things--were created by other professionals who've also had to struggle to find solutions to administering Windows environments. You'll save valuable time using their scripts, tools, tips, and advice. Plus, you can easily learn to customize the scripts to create even more powerful tools for your own, specific needs. User Management, Group Policy, DNS and DHCP, File and Print, IIS, performance and security. The hundred, industrial strength hacks in the book range from those that deal with general administration to more esoteric hacks in the areas of network deployment, patch management, and backup and recovery. put the knowledge and expertise of veteran system administrators and hackers to work for you. Windows Server Hacks will make your life easier while expanding your understanding of the capabilities of Windows Server.
Visual Interfaces to Digital Libraries exploit the power of human vision and spatial cognition to help individuals mentally organize and electronically access and manage large and complex information spaces. They draw on progress in the field of information visualization and seek to shift the users' mental load from slow reading to faster perceptual processes such as visual pattern recognition.Based on two workshops, the book presents an introductory overview as well as a closing listing of the top ten problems in the area by the volume editors. Also included are 16 thoroughly reviewed and revised full papers organized in topical sections on visual interfaces to documents, document parts, document variants, and document usage data; visual interfaces to image and video documents; visualization of knowledge domains; cartographic interfaces to digital libraries; and a general framework. |
You may like...
Kirstenbosch - A Visitor's Guide
Colin Paterson-Jones, John Winter
Paperback
The BRICS In Africa - Promoting…
Funeka Y. April, Modimowabarwa Kanyane, …
Paperback
|