0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (138)
  • R250 - R500 (469)
  • R500+ (2,452)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)

Pro OpenSolaris - A New Open Source OS for Linux Developers and Administrators (Paperback, 1st ed.): Harry Foxwell, Hung Tran Pro OpenSolaris - A New Open Source OS for Linux Developers and Administrators (Paperback, 1st ed.)
Harry Foxwell, Hung Tran
R1,088 R885 Discovery Miles 8 850 Save R203 (19%) Ships in 10 - 15 working days

OpenSolaris is a rapidly evolving operating system with roots in Solaris 10, suitable for deployment on laptops, desktop workstations, storage appliances, and data center servers from the smallest singlepurpose systems to the largest enterpriseclass systems. The growing OpenSolaris community now has hundreds of thousands of participants and users in government agencies, commercial businesses, and universities, with more than 100 user groups around the world contributing to the use and advancement of OpenSolaris. New releases of OpenSolaris become available every six months, with contributions from both Sun engineers and OpenSolaris community members; this book covers the OpenSolaris 2008.11 release.

Pro OpenSolaris was written to demonstrate that you can host your open source applications and solutions on OpenSolaris, taking advantage of its advanced features such as containers and other forms of virtualization, the ZFS file system, and DTrace. It's assumed that you are already fairly knowledgeable about developing on Linux systems, so the authors give an overview of the similarities and differences between Linux and OpenSolaris, and then present details on how to use the Service Management Facility (SMF), ZFS, zones, and even a bit of DTrace. They also provide pointers to the many project communities associated with new OpenSolaris features. Special focus is given to web development using familiar applications such as Apache, Tomcat, and MySQL, along with the NetBeans IDE, and showing you how to exploit some of OpenSolaris's unique technologies. What you'll learn Discover the secrets of the ZFS, the most powerful file system ever conceived Explore OpenSolaris AMP (Apache, MySQL, PHP) and GlassFish in the context of Web 2.0 and Linux/Solaris, respectively Familiarize yourself with the new security administration features of OpenSolaris, including changes in DTrace Who this book is for

Linux system administrators and programmers who would like to know what they have missed since Solaris became an open-source operating system.

Learn Objective-C on the Mac (Paperback, 1st Corrected ed., Corr. 3rd printing): Scott Knaster, Mark Dalrymple Learn Objective-C on the Mac (Paperback, 1st Corrected ed., Corr. 3rd printing)
Scott Knaster, Mark Dalrymple
R1,117 R914 Discovery Miles 9 140 Save R203 (18%) Ships in 10 - 15 working days

Take your coding skills to the next level with this extensive guide to ObjectiveC, the native programming language for developing sophisticated software applications for Mac OS X. ObjectiveC is a powerful, objectoriented extension of C, making this book the perfect followup to Dave Mark's bestselling Learn C on the Mac, Mac OS X Edition. Whether you're an experienced C programmer or you're coming from a different language such as C++ or Java, leading Mac experts Mark Dalrymple and Scott Knaster show you how to harness the powers of ObjectiveC in your applications A complete course on the basics of ObjectiveC using Apple's free Xcode tools An introduction to objectoriented programming Comprehensive coverage of inheritance, composition, object initialization, categories, protocols, memory management, and organizing source files A brief tour of Cocoa's foundation framework and AppKit A helpful learning curve guide for nonC developers What you'll learn Learn ObjectiveC programming, the gateway to programming your Mac or iPhoneWrite applications for the Mac OS X interface, the cleanest userinterface aroundUnderstand variables and how to design your own data structuresWork with the file systemConnect to data sources and the Internet Who this book is for

For anyone wanting to learn to program native applications in Mac OS X, including developers new to the Mac, developers new to Objective-C, or students entirely new to programming.

Mac for Linux Geeks (Paperback, 1st ed.): Tony Steidler-Dennison Mac for Linux Geeks (Paperback, 1st ed.)
Tony Steidler-Dennison
R942 R780 Discovery Miles 7 800 Save R162 (17%) Ships in 10 - 15 working days

Some might say we all want Linux with an OS X graphical user interface. Mac for Linux Geeks will assist you step by step in migrating from Linuxbased systems to OS X. Dual booting, virtualization, and building out the Linux environment on OS X are discussed in detail, along with a comparative view of wellknown Mac tools and their open source equivalents. Written for daily use, this concise and dependable guide will steer you across the technical landscape from your chosen Linux flavor to the OS X promised land.Live with OS X, but work with Linux toolsMake the OS XLinux hybrid a realityUse Mac tools where possible and free software where appropriate What you'll learn Dual booting Linux on the Mac Creating a virtual Linux system on the Mac Understanding the OS X graphical user interfaceLeveraging free and open sourcetools to meet the traditional Apple strengths of graphics and multimedia Performing routine OS X system administration for Linux administrators Hybridizing the Linux/Mac experience Who this book is for

Whether developer, system administrator or hobbyist geek, this book guides all who want to migrate from Linux to OS X, helping to integrate both operating system experiences.

Architecture of Computing Systems - ARCS 2009 - 22nd International Conference, Delft, The Netherlands, March 10-13, 2009,... Architecture of Computing Systems - ARCS 2009 - 22nd International Conference, Delft, The Netherlands, March 10-13, 2009, Proceedings (Paperback, 2009 ed.)
Mladen Berekovic, Christian Muller-Schloer, Christian Hochberger, Stephan Wong
R1,463 Discovery Miles 14 630 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 22nd International Conference on Architecture of Computing Systems, ARCS 2009, held in Delft, The Netherlands, in March 2009.

The 21 revised full papers presented together with 3 keynote papers were carefully reviewed and selected from 57 submissions. This year's special focus is set on energy awareness. The papers are organized in topical sections on compilation technologies, reconfigurable hardware and applications, massive parallel architectures, organic computing, memory architectures, enery awareness, Java processing, and chip-level multiprocessing.

Networking Systems Design and Development (Hardcover): Lee Chao Networking Systems Design and Development (Hardcover)
Lee Chao
R3,080 Discovery Miles 30 800 Ships in 12 - 17 working days

Effectively integrating theory and hands-on practice, Networking Systems Design and Development provides students and IT professionals with the knowledge and skills needed to design, implement, and manage fully functioning network systems using readily available Linux networking tools. Recognizing that most students are beginners in the field of networking, the text provides step-by-step instruction for setting up a virtual lab environment at home.

Grounded in real-world applications, this book provides the ideal blend of conceptual instruction and lab work to give students and IT professionals a quick start in developing network systems using the Linux operating system. Leaving nothing to chance, it provides readers with detailed guidance through the many hands-on exercises.

  • Highlights fundamental networking concepts and theories
  • Addresses the server and client sides of Linux-based networking
  • Includes comprehensive lab exercises that use Ubuntu GUN/Linux
  • Supplies professors with instructions and resources to create and manage online computer labs as well as supplemental instructional materials
  • Provides an effective, low-cost alternative to traditional proprietary-based network systems

Creating and maintaining a fully functioning enterprise network system doesn?t have to be expensive. This self-contained text provides readers with the tools to create their own networks using open source materials?and the virtual lab environment to develop problem-solving skills that will serve them well in their careers.

Provenance and Annotation of Data and Processes - Second International Provenance and Annotation Workshop, IPAW 2008, Salt Lake... Provenance and Annotation of Data and Processes - Second International Provenance and Annotation Workshop, IPAW 2008, Salt Lake City, UT, USA, June 17-18, 2008 (Paperback, 2008 ed.)
Juliana Freire, David Koop
R1,484 Discovery Miles 14 840 Ships in 10 - 15 working days

Computinghasbeenanenormousacceleratortoscienceandindustryalikeandit has led to an information explosion in many di?erent ?elds. The unprecedented volume of data acquired from sensors, derived by simulations and data analysis processes, accumulated in warehouses, and often shared on the Web, has given risetoanew?eldofresearch: provenancemanagement.Provenance(alsoreferred to as audit trail, lineage, and pedigree) captures information about the steps used to generate a given data product. Such information provides important documentation that is key to preserving data, to determining the data's quality and authorship, to understanding, reproducing, as well as validating results. Provenancemanagement has become an active ?eld of research, as evidenced byrecentspecializedworkshops, surveys, andtutorials.Provenancesolutionsare needed in many di?erent domains and applications, from environmental science and physics simulations, to business processes and data integration in wa- houses. Not surprisingly, di?erent techniques and provenance models have been proposed in many areas such as work?ow systems, visualization, databases, d- ital libraries, and knowledge representation. An important challenge we face - dayishowtointegratethesetechniquesandmodelssothatcompleteprovenance can be derived for complex data products. The InternationalProvenanceand AnnotationWorkshop(IPAW 2008)wasa follow-up to previous workshopsin Chigago (2006, 2002)and Edinburgh (2003). It was held during June 17-18, in Salt Lake City, at the University of Utah campus. IPAW 2008 brought together computer scientists from di?erent areas and provenance users to discuss open problems related to the provenance of computational and non-computational artifacts. A total of 55 people attended the workshop.

Pro Ubuntu Server Administration (Paperback, 1st ed.): Sander van Vugt Pro Ubuntu Server Administration (Paperback, 1st ed.)
Sander van Vugt
R1,120 R917 Discovery Miles 9 170 Save R203 (18%) Ships in 10 - 15 working days

Pro Ubuntu Server Administration teaches you advanced Ubuntu system building. After reading this book, you will be able to manage anything from simple file servers to multiple virtual servers to highavailability clusters. This is the capstone volume of the Apress Ubuntu trilogy that includes Beginning Ubuntu Linux, Third Edition and Beginning Ubuntu Server LTS Administration: From Novice to Professional, Second Edition. You will be able to make Ubuntu technology shine in a Fortune 500 environment and let Ubuntu server become the backbone of your infrastructure. Topics covered includePerformance monitoring and optimization Highavailability clustering Advanced LightweightDirectory Access Protocol (LDAP) integrated networking What you'll learn Monitor Ubuntu Server software and the hardware it is running on. Make Ubuntu Server fly by careful optimization. Learn how to craft highavailability clusters. Ease your way into largescale LDAP networking. Acquire the skills to adjust Ubuntu Server to the security needs of a Fortune 500 environment. Run your own Ubuntu application server. Who this book is for

Anyone who administers Linux servers and wants to know enough about Ubuntu to make it fly.

Programming Languages and Systems - 6th Asian Symposium, APLAS 2008, Bangalore, India, December 9-11, 2008, Proceedings... Programming Languages and Systems - 6th Asian Symposium, APLAS 2008, Bangalore, India, December 9-11, 2008, Proceedings (Paperback, 2008 ed.)
G. Ramalingam
R1,487 Discovery Miles 14 870 Ships in 10 - 15 working days

This volume contains the proceedings of the 6th Asian Symposium on Progr- ming Languages and Systems (APLAS 2008), which took place in Bangalore, December 9 - December 11, 2008. The symposium was sponsored by the Asian Association for Foundation of Software (AAFS) and the Indian Institute of S- ence. It was held at the Indian Institute of Science, as part of the institute's centenary celebrations, and was co-located with FSTTCS (Foundations of So- ware Technology and Theoretical Computer Science) 2008, organized by the Indian Association for Research in Computer Science (IARCS). In response to the call for papers, 41 full submissions were received. Each submission was reviewed by at least four Program Committee members with the help of external reviewers. The ProgramCommittee meeting was conducted electronically over a 2-week period. After careful discussion, the Program C- mittee selected 20 papers. I would like to sincerely thank all the members of the APLAS 2008 Program Committee for their excellent job, and all the external reviewers for their invaluable contribution. The submission and review process was managed using the EasyChair system. In addition to the 20 contributed papers, the symposium also featured three invitedtalksbyDinoDistefano(QueenMary, UniversityofLondon, UK), Radha Jagadeesan (DePaul University, USA), and Simon Peyton-Jones (Microsoft - search Cambridge, UK). Many people have helped to promote APLAS as a high-quality forum in Asia to serveprogramminglanguageresearchersworldwide.Following a seriesof well-attendedworkshopsthatwereheldinSingapore(2000), Daejeon(2001), and Shanghai (2002), the ?rst ?ve formal symposiums were held in Beijing (2003), Taipei (2004), Tsukuba (2005), Sydney (2006), and Singapore (2007).

Computer Supported Cooperative Work in Design IV - 11th International Conference, CSCWD 2007, Melbourne, Australia, April... Computer Supported Cooperative Work in Design IV - 11th International Conference, CSCWD 2007, Melbourne, Australia, April 26-28, 2007. Revised Selected Papers (Paperback, 2008 ed.)
Weiming. Shen, Jianming Yong, Yun Yang, Jean-Paul A. Barthes, Junzhou Luo
R2,904 Discovery Miles 29 040 Ships in 10 - 15 working days

Design of complex artifacts and systems requires the cooperation of multidisciplinary design teams using multiple sophisticated commercial and non-commercial engine- ing tools such as CAD tools, modeling, simulation and optimization software, en- neering databases, and knowledge-based systems. Individuals or individual groups of multidisciplinary design teams usually work in parallel and independently with various engineering tools, which are located on different sites, often for quite a long period of time. At any moment, individual members may be working on different versions of a design or viewing the design from various perspectives, at different levels of details. In order to meet these requirements, it is necessary to have efficient comput- supported collaborative design systems. These systems should not only automate in- vidual tasks, in the manner of traditional computer-aided engineering tools, but also enable individual members to share information, collaborate, and coordinate their activities within the context of a design project. Based on close international collaboration between the University of Technology of Compiegne in France and the Institute of Computing Technology of the Chinese Ac- emy of Sciences in the early 1990s, a series of international workshops on CSCW in Design started in 1996. In order to facilitate the organization of these workshops, an International Working Group on CSCW in Design (CSCWD) was established and an International Steering Committee was formed in 1998. The series was converted to int- national conferences in 2000 building on the success of the four previous workshops."

Self-Sustaining Systems - First Workshop, S3 2008 Potsdam, Germany, May 15-16, 2008, Proceedings (Paperback, 2008 ed.): Robert... Self-Sustaining Systems - First Workshop, S3 2008 Potsdam, Germany, May 15-16, 2008, Proceedings (Paperback, 2008 ed.)
Robert Hirschfeld, Kim Rose
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

The Workshop on Self-sustaining Systems (S3) is a forum for the discussion of topics relating to computer systems and languages that are able to bootstrap, implement, modify, and maintain themselves. One property of these systems is that their implementation is based onsmall but powerfulabstractions;examples include (amongst others) Squeak/Smalltalk, COLA, Klein/Self, PyPy/Python, Rubinius/Ruby, andLisp.Suchsystemsaretheenginesoftheirownreplacement, giving researchers and developers great power to experiment with, and explore future directions from within, their own small language kernels. S3 took place on May 15-16, 2008 at the Hasso-Plattner-Institute (HPI) in Potsdam, Germany. It was an exciting opportunity for researchers and prac- tioners interested in self-sustaining systems to meet and share their knowledge, experience, and ideas for future research and development. S3 provided an - portunity for a community to gather and discuss the need for self-sustainability in software systems, and to share and explore thoughts on why such systems are needed and how they can be created and deployed. Analogies were made, for example, with evolutionary cycles, and with urban design and the subsequent inevitable socially-driven change. TheS3participantsleftwithagreatersenseofcommunityandanenthusiasm for probing more deeply into this subject. We see the need for self-sustaining systems becoming critical not only to the developer's community, but to e- users in business, academia, learning and play, and so we hope that this S3 workshop will become the ?rst of many.

Systems and Virtualization Management - Standards and New Technologies (Paperback, 2009 ed.): Latifa Boursas, Mark Carlson,... Systems and Virtualization Management - Standards and New Technologies (Paperback, 2009 ed.)
Latifa Boursas, Mark Carlson, Wolfgang Hommel, Michelle Sibilla, Kes Wold
R1,426 Discovery Miles 14 260 Ships in 10 - 15 working days

This volume contains the proceedings of the Second International DMTF Ac- emic Alliance Workshopon Systems and Virtualization Management:Standards and New Technologies (SVM 2008) held in Munich, Germany, during October 21-22, 2008. The SVM 2008 proceedings are intended for use by students of systems and virtualization management. The reader is presumed to have a basic knowledge of systems management technologies and standards at the level provided, for example, the Common Information Model (CIM) standard for modeling m- agement resources. The student of systems management will ?nd here material that could be included in anadvanced study program.These proceedings should furthermoreallowstudents to acquireanappreciationofthe breadthandvariety of systems and virtualization management research. The proceedings also illuminate related standards and research issues, - swering questions such as:what are the implications of virtualizationfor distr- uted systems management, which advances in information models and protocols aidinmanagingvirtualization,whatnewproblemswillweincur whenmanaging virtualized systems and services, and how might management itself bene?t from virtualization? Topics related to managing distributed systems, virtualization of distributed resources/servicesand workin management standardizationare also highlighted. There were 15 regular paper submissions. These went through an active - view process, with each submission reviewed by at least three members of the Program Committee. We also sought external reviews from experts in certain areas. All these inputs were used by the ProgramCommittee in selecting a ?nal program with 13 regular papers.

Learn PowerShell in a Month of Lunches: Covers Windows, Linux, and macOS (Paperback): Travis Plunk, James Petty, Tyler... Learn PowerShell in a Month of Lunches: Covers Windows, Linux, and macOS (Paperback)
Travis Plunk, James Petty, Tyler Leonhardt, Don Jones, Jeffery Hicks
R952 R843 Discovery Miles 8 430 Save R109 (11%) Ships in 9 - 15 working days

"Not only for MacOS and Linux users, but also a great resource for Windows PS users." - Bruce Bergman Learn PowerShell in a Month of Lunches: Covers Windows, Linux, and macOS is a task-focused tutorial for administering Linux and macOS systems using Microsoft PowerShell. Adapted by PowerShell team members Travis Plunk and Tyler Leonhardt from the bestselling Learn Windows PowerShell in a Month of Lunches by community legends Don Jones and Jeffrey Hicks, it features Linux-based examples covering core language features and admin tasks. Designed for busy IT professionals, this innovative guide will take you from the basics to PowerShell proficiency through 25 tutorials you can do in your lunch break. about the technology The PowerShell scripting language and administrative shell was initially created for Windows, providing a high-quality command-line interface and awesome automation features. As part of Microsoft's ongoing strategy to support non-Windows platforms with its Azure cloud service and .NET Core framework, PowerShell now runs on Linux and macOS. Like Bash, PowerShell can execute and script nearly any aspect of Linux, so you can easily manage repetitive daily tasks, servers, Cloud resources, Continuous Integration pipelines, and more. Because PowerShell is a full-featured programming language, however, it provides capability well beyond traditional shell scripting languages, such as the ability to treat OS components as objects. about the book Learn PowerShell in a Month of Lunches: Covers Windows, Linux, and macOS is a user-friendly tutorial to managing Linux and macOS systems with PowerShell. It's based on the bestselling Learn Windows PowerShell in a Month of Lunches, which has introduced PowerShell to nearly 100,000 readers. You'll learn how PowerShell shapes up to Bash or Python scripting as you write and run simple scripts that automate boring daily tasks. As you progress through the book, you'll use PowerShell to write Continuous Integration Pipelines and manage cloud-based servers. Just set aside one hour a day for a month, and you'll be automating tasks faster than you ever thought possible! what's inside - Why you should use PowerShell on Linux and macOS - Background jobs and automation techniques - Simple scripting to automate repetitive daily tasks - Common syntax and commands cheat sheet - Each lesson takes you an hour or less about the reader For IT professionals comfortable administering Windows or Linux. No previous experience with PowerShell or Bash required. about the author Travis Plunk has been a Software Engineer on various PowerShell teams since 2013, and at Microsoft since 1999. He was involved in open sourcing PowerShell and has worked on the project full time since shortly after the project was announced. James Petty is a Microsoft MVP, and the CEO and Executive Director for the DevOps Collective and PowerShell.org. Tyler Leonhardt has been a Software Engineer on the PowerShell team since 2017, and at Microsoft since 2016. He is a core maintainer of the PowerShell extension for Visual Studio Code. Learn Windows PowerShell in a Month of Lunches was written by PowerShell community legends Don Jones and Jeffrey Hicks, who have years of experience as successful PowerShell trainers.

Secure Data Management - 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings (Paperback, 2008... Secure Data Management - 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings (Paperback, 2008 ed.)
Willem Jonker, Milan Petkovic
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

Information and communication technologies are advancing fast. Processing speed is still increasing at a high rate, followed by advances in digital storage technology, which double storage capacity every year. Furthermore, communication techno- gies do not lag behind. The Internet has been widely used, as well as wireless te- nologies. With a few mouse clicks, people can communicate with each other around the world. All these advances have great potential to change the way people live, introducing new concepts like ubiquitous computing and ambient intelligence. Technology is becoming present everywhere in the form of smart and sensitive c- puting devices. They are nonintrusive, transparent and hidden in the background, but they collect, process, and share all kinds of information, including user beh- ior, in order to act in an intelligent and adaptive way. These emerging technologies put new requirements on security and data m- agement. As data are accessible anytime anywhere, it becomes much easier to get unauthorized data access. Furthermore, the use of new technologies has brought about some privacy concerns. It becomes simpler to collect, store, and search personal information, thereby endangering people's privacy. Therefore, research in secure data management is gaining importance, attracting the attention of both the data management and the security research communities. The intere- ing problems range from traditional topics, such as, access control and general database security, via privacy protection to new research directions, such as cryptographically enforced access control.

Secure Transaction Protocol Analysis - Models and Applications (Paperback, 2008 ed.): Qingfeng Chen, Chengqi Zhang, Shichao... Secure Transaction Protocol Analysis - Models and Applications (Paperback, 2008 ed.)
Qingfeng Chen, Chengqi Zhang, Shichao Zhang
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

The application of formal methods to security protocol analysis has attracted increasing attention in the past two decades, and recently has been sh- ing signs of new maturity and consolidation. The development of these formal methodsismotivatedbythehostilenatureofsomeaspectsofthenetworkand the persistent e?orts of intruders, and has been widely discussed among - searchers in this ?eld. Contributions to the investigation of novel and e?cient ideas and techniques have been made through some important conferences and journals, such asESORICS, CSFW andACM Transactions in Computer Systems. Thus, formal methods have played an important role in a variety of applications such as discrete system analysis for cryptographic protocols, - lief logics and state exploration tools. A complicated security protocol can be abstractedasamanipulationofsymbolsandstructurescomposedbysymbols. The analysis of e-commerce (electronic commerce) protocols is a particular case of such symbol systems. There have been considerable e?orts in developing a number of tools for ensuring the security of protocols, both specialized and general-purpose, such as belief logic and process algebras. The application of formal methods starts with the analysis of key-distribution protocols for communication between two principals at an early stage. With the performance of transactions - coming more and more dependent on computer networks, and cryptography becoming more widely deployed, the type of application becomes more varied and complicated. The emerging complex network-based transactions such as ?nancial transactionsand secure groupcommunication have not only brought innovationstothecurrentbusinesspractice, butthey alsoposeabigchallenge to protect the information transmitted over the open network from malicious attack

Architecting Dependable Systems V (Paperback, 2008 ed.): Rogerio De Lemos, Felicita Giandomenico, Cristina Gacek, Henry... Architecting Dependable Systems V (Paperback, 2008 ed.)
Rogerio De Lemos, Felicita Giandomenico, Cristina Gacek, Henry Muccini, Marlon Vieira
R1,488 Discovery Miles 14 880 Ships in 10 - 15 working days

As software systems become ubiquitous, the issues of dependability become more and more crucial. Given that solutions to these issues must be considered from the very beginning of the design process, it is reasonable that dependability is addressed at the architectural level. This book was born of an effort to bring together the research communities of software architectures and dependability.

This state-of-the-art survey contains expanded and peer-reviewed papers based on the carefully selected contributions to two workshops: the Workshop on Architecting Dependable Systems (WADS 2007), organized at the 2007 International Conference on Dependable Systems and Networks (DSN 2007), held in Edinburgh, UK in June 2007 and the Third Workshop on the Role of Software Architecture for Testing and Analysis (ROSATEA 2007) organized as part of a federated conference on Component-Based Software Engineering and Software Architecture (CompArch 2007), held in Medford, MA, USA in July 2007. It also contains a number of invited papers written by recognized experts in the area. The 14 papers are organized in topical sections on critical infrastructures, rigorous design/fault tolerance, and verification and validation.

Windows PowerShell for Developers (Paperback): Douglas Finke Windows PowerShell for Developers (Paperback)
Douglas Finke
R592 R428 Discovery Miles 4 280 Save R164 (28%) Ships in 12 - 17 working days

Want to perform programming tasks better, faster, simpler, and make them repeatable? Take a deep dive into Windows PowerShell and discover what this distributed automation platform can do. Whether you're a .NET developer or IT pro, this concise guide will show you how PowerShell's scripting language can help you be more productive on everyday tasks.

Quickly learn how to create PowerShell scripts and embed them into your existing applications, write "little languages" to solve specific problems, and take charge of your code. This book includes example scripts that you can easily pull apart, tweak, and then use in your own PowerShell and .NET solutions.Slice and dice text, XML, CSV, and JSON with easeEmbed PowerShell to provide scripting capabilities for your C# appsCreate GUI applications five to ten times faster with less codeLeverage PowerShell's capabilities to work with the InternetInteract with DLLs and create objects, automatically display properties, and call methods in live interactive sessionsBuild domain-specific languages (DSLs) and vocabularies to express solutions more clearlyWork with Microsoft Office via the Component Object Model (COM)Discover PowerShell v3 features included with Windows 8 and Windows Server 2012

Formal Methods for Open Object-Based Distributed Systems - 10th IFIP WG 6.1 International Conference, FMOODS 2008, Oslo,... Formal Methods for Open Object-Based Distributed Systems - 10th IFIP WG 6.1 International Conference, FMOODS 2008, Oslo, Norway, June 4-6, 2008 Proceedings (Paperback, 2008 ed.)
Gilles Barthe
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This volume contains the proceedings of the 10th IFIP Working Group 6.1 - ternational Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS 2008).The conference was part of the Third Federated c- ferences on Distributed Computing Techniques (DisCoTec), together with the 10th International Conference on Coordination Models and Languages (COOR- DINATION 2008) and the 8th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS 2008). We are grateful to Frank Eliassen and Einar Broch Johnsen of the University of Oslo for the excellent organization of this event in Olso, Norway, June 4-6, 2008. The goal of the FMOODS conferences is to bring together researchers and practitioners whose work encompasses three important and related ?elds: - Formal methods - Distributed systems - Object-based technology The 14 papers presented at FMOODS 2008 and included in this volume were selected by the Program Committee among 35 submissions. Each submission was reviewed by at least three Program Committee members. They all re?ect thescopeoftheconferenceandcoverthe following topics: semantics of obje- oriented programming; formal techniques for speci?cation, analysis, and re?- ment; model checking; theorem proving and deductive veri?cation;type systems and behavioral typing; formal methods for service-oriented computing; integ- tion of quality of service requirements into formal models; formal approaches to component-based design; and applications of formal methods.

Formal Techniques for Networked and Distributed Systems - FORTE 2008 - 28th IFIP WG 6.1 International Conference Tokyo, Japan,... Formal Techniques for Networked and Distributed Systems - FORTE 2008 - 28th IFIP WG 6.1 International Conference Tokyo, Japan, June 10-13, 2008 Proceedings (Paperback, 2008 ed.)
Kenji Suzuki, Teruo Higashino, Keiichi Yasumoto, Khaled El-Fakih
R1,488 Discovery Miles 14 880 Ships in 10 - 15 working days

This volume contains the proceedings of FORTE 2008, 28th IFIP WG6.1 - ternational Conference on Formal Techniques for Networked and Distributed Systems. FORTE 2008 was held at the Campus Innovation Center in Tokyo, Japan during June 10-13, 2008. FORTE denotes a series of international wo- ing conferences on formal description techniques applied to computer networks and distributed systems. The conference series started in 1981 under the name PSTV. In 1988 a second series under the name FORTE was set up. Both - ries were united to FORTE/PSTV in 1996. In 2001 the conference changed the name to its current form. Recent conferences of this long series were held in Berlin (2003), Madrid(2004), Taipei(2005), Paris(2006), and Tallinn(2007). As in the previous year, FORTE 2008 was collocated with TESTCOM/ FATES 2008: the 20th IFIP International Conference on Testing of Com- nicating Systems (TESTCOM) and the 8th International Workshop on Formal Approaches to Testing of Software (FATES). The co-location of FORTE and TESTCOM/FATES fostered the collaboration between their communities. The commonspiritofboth conferenceswasunderpinnedby jointopening andclosing sessions, invited talks, as well as joint social events.

The Best Damn Windows Server 2008 Book Period (Paperback, 2nd edition): Anthony Piltzecker The Best Damn Windows Server 2008 Book Period (Paperback, 2nd edition)
Anthony Piltzecker
R1,364 R1,258 Discovery Miles 12 580 Save R106 (8%) Ships in 12 - 17 working days

The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.
This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have more control over your servers and web sites using new tools like IIS7, Windows Server Manager, and Windows PowerShell; and secure your network with Network Access Protection and the Read-Only Domain Controller.
New to this Edition:
* Web server management with Internet Information Services 7.0
* Virtualize multiple operating systems on a single server
* Hardening Security, including Network Access Protection, Federated Rights Management, and Read-Only Domain Controller

HCI Beyond the GUI - Design for Haptic, Speech, Olfactory, and Other Nontraditional Interfaces (Paperback): Philip Kortum HCI Beyond the GUI - Design for Haptic, Speech, Olfactory, and Other Nontraditional Interfaces (Paperback)
Philip Kortum
R1,221 Discovery Miles 12 210 Ships in 12 - 17 working days

As technology expands and evolves, one-dimensional, graphical user interface (GUI) design becomes increasingly limiting and simplistic. Designers must meet the challenge of developing new and creative interfaces that adapt to meet human needs and technological trends. HCI Beyond the GUI provides designers with this know how by exploring new ways to reach users that involve all of the human senses. Dr. Kortum gathers contributions from leading human factors designers to present a single reference for professionals, researchers, and students.
Explores the human factors involved in the design and implementation of the nontraditional interfaces, detailing design strategies, testing methodologies, and implementation techniques
Provides an invaluable resource for practitioners who design interfaces for children, gamers and users with accessibility needs
Offers extensive case studies, examples and design guidelines

Database Systems for Advanced Applications. DASFAA 2022 International Workshops - BDMS, BDQM, GDMA, IWBT, MAQTDS, and PMBD,... Database Systems for Advanced Applications. DASFAA 2022 International Workshops - BDMS, BDQM, GDMA, IWBT, MAQTDS, and PMBD, Virtual Event, April 11-14, 2022, Proceedings (Paperback, 1st ed. 2022)
Uday Kiran Rage, Vikram Goyal, P. Krishna Reddy
R2,064 Discovery Miles 20 640 Ships in 12 - 17 working days

This volume constitutes the papers of several workshops which were held in conjunction with the 27th International Conference on Database Systems for Advanced Applications, DASFAA 2022, held as virtual event in April 2022. The 30 revised full papers presented in this book were carefully reviewed and selected from 65 submissions. DASFAA 2022 presents the following five workshops: * First workshop on Pattern mining and Machine learning in Big complex Databases (PMBD 2021) * 6th International Workshop on Graph Data Management and Analysis (GDMA 2022) * First International Workshop on Blockchain Technologies (IWBT2022) * 8th International Workshop on Big Data Management and Service (BDMS 2022) * First workshop on Managing Air Quality Through Data Science * 7th International Workshop on Big Data Quality Management (BDQM 2022).

OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback): Paul Baccas, Kevin Finisterre, Larry H, David... OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback)
Paul Baccas, Kevin Finisterre, Larry H, David Harley, Gary Porteus, …
R1,366 R1,251 Discovery Miles 12 510 Save R115 (8%) Ships in 12 - 17 working days

Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why the system is vulnerable and understanding how to defend it is critical to computer security.
* Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and all the geekery of Linux is present in Mac OS X. Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX platform....Now, you can master the boot process, and Macintosh forensic software.
* Look Back Before the Flood and Forward Through the 21st Century Threatscape Back in the day, a misunderstanding of Macintosh security was more or less industry-wide. Neither the administrators nor the attackers knew much about the platform. Learn from Kevin Finisterre how and why that has all changed
* Malicious Macs: Malware and the Mac As OS X moves further from desktops, laptops, and servers into the world of consumer technology (iPhones, iPods, and so on), what are the implications for the further spread of malware and other security breaches? Find out from David Harley.
* Malware Detection and the Mac Understand why the continuing insistence of vociferous Mac zealots that it "can't happen here" is likely to aid OS X exploitationg
* Mac OS X for Pen Testers With its BSD roots, super-slick graphical interface, and near-bulletproof reliability, Apple's Mac OS X provides a great platform for pen testing.
* WarDriving and Wireless Penetration Testing with OS X Configure and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use the information obtained during a WarDrive, to successfully penetrate a customer's wireless network.
* Leopard and Tiger Evasion Follow Larry Hernandez through exploitation techniques, tricks, and features of both OS X Tiger and Leopard, using real-world scenarios for explaining and demonstrating the concepts behind them.
* Encryption Technologies and OS X Apple has come a long way from the bleak days of OS9. THere is now a wide array of encryption choices within Mac OS X. Let Gareth Poreus show you what they are.
* Cuts through the hype with a serious discussion of the security
vulnerabilities of the Mac OS X operating system
* Reveals techniques by which OS X can be "owned"
* Details procedures to defeat these techniques
* Offers a sober look at emerging threats and trends

Pro Windows PowerShell (Paperback, 1st ed.): Hristo Deshev Pro Windows PowerShell (Paperback, 1st ed.)
Hristo Deshev
R1,258 R1,025 Discovery Miles 10 250 Save R233 (19%) Ships in 10 - 15 working days

Windows power users have always envied their friends running UNIX machines for the ease of automation that they enjoy. The traditional Windows command-line shell, cmd.exe, has never been up to par with shells like bash or tcsh, especially when it comes to text processing and process automation. Windows PowerShell changes all that. This next-generation shell is also a full-blown scripting environment with a real programming language that allows users to access every part of their operating system. Files, registry entries, and COM and .NET objects are all supported by PowerShell, which makes manipulating them a breeze. Pro Windows PowerShell will show you how to use all this power in your own work. You'll discover the object-oriented features of the shell and how they help in extracting and manipulating data. You'll then learn how to use those features to solve real-world problems: manipulating files, working with text, monitoring systems, and performing operations over the network. The book serves as not only a tutorial, but also a reference: the Real World part is structured so that it can be read nonlinearly and used as a reference or a cookbook. And you'll find freely available tools and extensions that will help you do things even faster. Pro Windows PowerShell is your best companion to the capabilities and power that PowerShell offers you. What you'll learn See how to solve real problems with Windows PowerShell using a repository of working code. Get a sense of the big picture, with PowerShell integrating with the outside world. You will discover examples and techniques when dealing with other programs, the operating system, and the network. Explore free andopen-source tools and extensions that help you get results with Windows PowerShell fast. (No other book has this feature ) Who is this book for? Pro Windows PowerShell is targeted at professionals who handle a lot of repetitive tasks. The goal is to show how PowerShell can help script most of those tasks and reduce their burden. The book contains examples on automating typical system administration tasks: configuration, monitoring, network queries, text manipulation, and file operations. The ideas presented will be beneficial to power users needing a better shell and an automation environment, system and network administrators looking to streamline their daily activities, and software developers wishing to optimize their build and deploy process. About the Apress Pro Series The Apress Pro series books are practical, professional tutorials to keep you on and moving up the professional ladder. You have gotten the job, now you need to hone your skills in these tough competitive times. The Apress Pro series expands your skills and expertise in exactly the areas you need. Master the content of a Pro book, and you will always be able to get the job done in a professional development project. Written by experts in their field, Pro series books from Apress give you the hard-won solutions to problems you will face in your professional programming career. Related Titles Windows Server 2003 Networking Recipes: A Problem-Solution Approach From Bash to Z Shell: Conquering the Command Line

Task Models and Diagrams for User Interface Design - 6th International Workshop, TAMODIA 2007, Toulouse, France, November 7-9,... Task Models and Diagrams for User Interface Design - 6th International Workshop, TAMODIA 2007, Toulouse, France, November 7-9, 2007, Proceedings (Paperback, 2007 ed.)
Marco Winckler, Hilary Johnson, Philippe Palanque
R1,476 Discovery Miles 14 760 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Workshop on Task Models and Diagrams for User Interface Design, TAMODIA 2007, held in Toulouse, France, in November 2007. The workshop features current research and gives some indication of the new directions in which task analysis theories, methods, techniques and tools are progressing. The papers are organized in topical sections.

Microsoft Forefront Security Administration Guide (Paperback): Jesse Varsalone Microsoft Forefront Security Administration Guide (Paperback)
Jesse Varsalone
R1,177 R856 Discovery Miles 8 560 Save R321 (27%) Ships in 12 - 17 working days

Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for their systems to go down because of viruses, malware, bugs, trojans, or other attacks. Running a Microsoft Forefront Suite within your environment brings many different benefits. Forefront allows you to achieve comprehensive, integrated, and simplified infrastructure security. This comprehensive suite of tools provides end-to-end security stretching from Web servers back to the desktop. This book will provide system administrators familiar with Syngress' existing Microsoft networking and security titles with a complete reference to Microsoft's flagship security products.
* First book to address securing an entire Microsoft network from Web servers all the way back to the desktop.
* Companion Web site provides best practices checklists for securing Microsoft operating systems, applications, servers, and databases.
* Companion Web site provides special chapter on designing and implementing a disaster recover plan for a Microsoft network.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Coding Basics for Beginners - The Smart…
Jefferson Sandyman Hardcover R557 Discovery Miles 5 570
Powershell - The ultimate beginner's…
Craig Newport Hardcover R593 R491 Discovery Miles 4 910
PowerShell - The Ultimate Beginners…
Mark Reed Hardcover R615 R516 Discovery Miles 5 160
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,276 Discovery Miles 12 760
PowerShell for Administration, IT Pro…
William R. Stanek, William Stanek Hardcover R1,482 Discovery Miles 14 820
Kubernetes - The Ultimate Beginners…
Mark Reed Hardcover R599 R498 Discovery Miles 4 980
Essential Windows 10: 1st Anniversary…
Kevin Wilson Paperback R450 R248 Discovery Miles 2 480
Windows 11 For Seniors For Dummies
C. Simmons Paperback R485 Discovery Miles 4 850
Linux - The Ultimate Crash Course to…
Mark Reed Hardcover R605 R505 Discovery Miles 5 050
PowerShell - A Comprehensive Guide to…
Sam Griffin Hardcover R614 R515 Discovery Miles 5 150

 

Partners