![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
Building on classical queueing theory mainly dealing with single node queueing systems, networks of queues, or stochastic networks has been a field of intensive research over the last three decades. Whereas the first breakthrough in queueing network theory was initiated by problems and work in operations research, the second breakthrough, as well as subsequent major work in the area, was closely related to computer science, particularly to performance analysis of complex systems in computer and communication science.The text reports on recent research and development in the area. It is centered around explicit expressions for the steady behavior of discrete time queueing networks and gives a moderately positive answer to the question of whether there can be a product form calculus in discrete time. Originating from a course given by the author at Hamburg University, this book is ideally suited as a text for courses on discrete time stochastic networks.
Learn the ins and outs of macOS Ventura macOS Ventura For Dummies is packed with all the information you need on this latest version of macOS. With expert tips, tricks, and troubleshooting ideas, it's the trusted guide for those new to Mac computers and those upgrading their systems. Learn how to organize your files, ensure that your data is secure, work more efficiently, and take advantage of the newest features. Dummies helps you navigate the interface, use helpful shortcuts, and beyond--the easy way. Explore the features of macOS Ventura and get things done with ease Find out how to locate files, open and close programs, and customize the OS Troubleshoot common problems and keep your system running smoothly Make sure your data is secure and your computer is hacker-proof This is the perfect Dummies guide for first-time macOS users, as well as people who are upgrading their systems and need a reference.
Das vorliegende Handbuch wendet sich an Debian-User, die uber ein vollstandig installiertes und konfiguriertes System verfugen, und nun das breite Spektrum der Anwendungen nutzen mochten. Im einzelnen werden folgende Themen behandelt: Datenorganisation (Benutzer- und Terminverwaltung, Groupware), Datenhaltung in Datenbanken (PostgreSQL, MySQL), Gestaltung von Grafiken (xfig, gnuplot, freie CAD-Programme), Bildverarbeitung (Gimp), wichtige Anwendungen zur Netzwerkkommunikation (ftp, E-Mail, write, talk, IRC, Instant Messaging, Voice over IP). Ferner werden freie Programme zur Tabellenkalkulation (Gnumeric) und zur Textverarbeitung (vi, Emacs, LaTeX, RCS, CVS) vorgestellt, eine Einfuhrung in die Computer-Algebra mittels Maple gegeben und gangige UNIX-Werkzeuge sowie die Office-Suiten OpenOffice und StarOffice in ihrer Basisfunktionalitat dargestellt. Dieses Werk bietet die optimale Erganzung zum Buch Debian GNU/Linux Grundlagen, Installation Administration und Anwendung von Peter H. Ganten und Wulf Alex."
This book constitutes the refereed proceedings of the 10th International Conference on Compiler Construction, CC 2001, held in Genova, Italy in April 2001.The 22 revised full papers presented were carefully reviewed and selected from a total of 69 submissions. The papers are organized in topical sections on program analysis, program transformation, intraprocessor parallelism, parsing, memory hierarchy, profiling, and demos.
This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Languages and Compilers for Parallel Computing, LCPC 2000, held in Yorktown Heights, NY, USA, in August 2000. The 22 revised full papers presented together with 5 posters were carefully selected during two rounds of reviewing and improvement. All current aspects of parallel processing are addressed with emphasis on issues in optimizing compilers, languages, and software environments in high-performance computing.
This book constitutes the refereed proceedings of the Third International COST264 Workshop on Networked Group Communication, NGC 2001, held in London, UK, in November 2001.The 14 revised full papers presented were carefully reviewed and selected from 40 submissions. All current issues in the area are addressed. The papers are organized in topical sections on application-level aspects, group management, performance topics, security, and topology.
This book constitutes the refereed proceedings of the First International Conference on Soft-Ware 2002, held in Belfast, North Ireland in April 2002.The 24 revised full papers presented together with seven abstracts of invited presentations and the summary of a panel were carefully reviewed and selected for inclusion in the book. All presentations are devoted to the effective handling of soft issues in the design, development, and operation of computing systems, from an academic research point of view as well as from the point of view of industrial practice. The papers aim at integrating an interdisciplinary range of disciplines including artificial intelligence, information systems, software engineering, and systems engineering.
Pro tips for macOS from "Dr. Mac" Your shiny new iMac or trusty old MacBook both rely on macOS to help you get things done. It helps to have an equally reliable guidebook to steer you through the tasks and steps that make macOS run efficiently. This fun and friendly guide provides the direction you need to easily navigate macOS. Longtime expert Bob "Dr. Mac" LeVitus shares his years of experience to help you better understand macOS and make it a timesaving tool in your life. Take a tour of the macOS interface Get organized and save time with macOS applications Get pro tips on speeding up your Mac Back up your data with ease Covering the fundamentals of the OS and offering insight into the most common functions of macOS, this is indispensable reading for new or inexperienced macOS users.
This volume presents twelve case studies that use RAISE - Rigorous Approach to Industrial Software Engineering - to construct, analyse, develop and apply formal specifications. The case studies cover a wide range of application areas including government finance, case-based reasoning, multi-language text processing, object-oriented design patterns, component-based software design and natural resource management. By illustrating the variety of uses of formal specifications, the case studies also raise questions about the creation, purpose and scope of formal models before they are built. Additional resources and complete specifications for all of the case studies and the RAISE tools used to process them, are available on the World Wide Web. This book will be of particular interest to software engineers, especially those responsible for the initial stages of requirements engineering and software architecture and design. It will also be of interest to academics and students on advanced formal methods courses.
This volume contains the papers presented at the International Workshop on Tools for Working with Guidelines, (TFWWG 2000), held in Biarritz, France, in October 2000. It is the final outcome of the International Special Interest Group on Tools for Working with Guidelines.Human-computer interaction guidelines have been recognized as a uniquely relevant source for improving the usability of user interfaces for interactive systems. The range of interactive techniques exploited by these interactive systems is rapidly expanding to include multimodal user interfaces, virtual reality systems, highly interactive web-based applications, and three-dimensional user interfaces. Therefore, the scope of guidelines' sources is rapidly expanding as well, and so are the tools that should support users who employ guidelines to ensure some form of usability.Tools For Working With Guidelines (TFWWG) covers not only software tools that designers, developers, and human factors experts can use to manage multiple types of guidelines, but also looks at techniques addressing organizational, sociological, and technological issues.
Implement Industrial-Strength Security on Any Linux Server In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker's toolkit, you can't rely on outdated security methods-especially if you're responsible for Internet-facing services. In Linux (R) Hardening in Hostile Networks, Kyle Rankin helps you to implement modern safeguards that provide maximum impact with minimum effort and to strip away old techniques that are no longer worth your time. Rankin provides clear, concise guidance on modern workstation, server, and network hardening, and explains how to harden specific services, such as web servers, email, DNS, and databases. Along the way, he demystifies technologies once viewed as too complex or mysterious but now essential to mainstream Linux security. He also includes a full chapter on effective incident response that both DevOps and SecOps can use to write their own incident response plan. Each chapter begins with techniques any sysadmin can use quickly to protect against entry-level hackers and presents intermediate and advanced techniques to safeguard against sophisticated and knowledgeable attackers, perhaps even state actors. Throughout, you learn what each technique does, how it works, what it does and doesn't protect against, and whether it would be useful in your environment. Apply core security techniques including 2FA and strong passwords Protect admin workstations via lock screens, disk encryption, BIOS passwords, and other methods Use the security-focused Tails distribution as a quick path to a hardened workstation Compartmentalize workstation tasks into VMs with varying levels of trust Harden servers with SSH, use apparmor and sudo to limit the damage attackers can do, and set up remote syslog servers to track their actions Establish secure VPNs with OpenVPN, and leverage SSH to tunnel traffic when VPNs can't be used Configure a software load balancer to terminate SSL/TLS connections and initiate new ones downstream Set up standalone Tor services and hidden Tor services and relays Secure Apache and Nginx web servers, and take full advantage of HTTPS Perform advanced web server hardening with HTTPS forward secrecy and ModSecurity web application firewalls Strengthen email security with SMTP relay authentication, SMTPS, SPF records, DKIM, and DMARC Harden DNS servers, deter their use in DDoS attacks, and fully implement DNSSEC Systematically protect databases via network access control, TLS traffic encryption, and encrypted data storage Respond to a compromised server, collect evidence, and prevent future attacks Register your product at informit.com/register for convenient access to downloads, updates, and corrections as they become available.
Build next-generation security operations with Microsoft Sentinel Microsoft Sentinel is the scalable, cloud-native, security information and event management (SIEM) solution for automating and streamlining threat identification and response across your enterprise. Now, three leading experts guide you step-by-step through planning, deployment, and operations, helping you use Microsoft Sentinel to escape the complexity and scalability challenges of traditional solutions. Fully updated for the latest enhancements, this edition introduces new use cases for investigation, hunting, automation, and orchestration across your enterprise and all your clouds. The authors clearly introduce each service, concisely explain all new concepts, and present proven best practices for maximizing Microsoft Sentinel's value throughout security operations. Three of Microsoft's leading security operations experts show how to: Review emerging challenges that make better cyberdefense an urgent priority See how Microsoft Sentinel responds by unifying alert detection, threat visibility, proactive hunting, and threat response Explore components, architecture, design, and initial configuration Ingest alerts and raw logs from all sources you need to monitor Define and validate rules that prevent alert fatigue Use threat intelligence, machine learning, and automation to triage issues and focus on high-value tasks Add context with User and Entity Behavior Analytics (UEBA) and Watchlists Hunt sophisticated new threats to disrupt cyber kill chains before you're exploited Enrich incident management and threat hunting with Jupyter notebooks Use Playbooks to automate more incident handling and investigation tasks Create visualizations to spot trends, clarify relationships, and speed decisions Simplify integration with point-and-click data connectors that provide normalization, detection rules, queries, and Workbooks About This Book For cybersecurity analysts, security administrators, threat hunters, support professionals, engineers, and other IT professionals concerned with security operations For both Microsoft Azure and non-Azure users at all levels of experience
Use this expert guide to prepare for the VCA-DCV exam "VCA-DCV VMware Certified Associate on vSphere Study Guide: VCAD-510" is a comprehensive study guide for the VMware Certified Associate - Data Center Virtualization exam. Hands-on examples, real-world scenarios, and expert review questions cover the full exam blueprint, and the companion website offers a suite of tools to help you prepare for the exam including practice exams, electronic flashcards, and a glossary of key terms. In addition, the website includes videos that demonstrate how to complete the more challenging tasks. Focused on practical skills, this study guide not only prepares you for the certification exam, but also for the duties expected of a VCA. The VMware Certified Associate-Data Center Virtualization certification targets those with limited virtualization and VMware data center technology experience, providing a springboard to the popular VMware Certified Professional-Data Center Virtualization certification. Virtualization has become a high priority among organizations, and credentialed professionals are in high demand. This guide helps you prove a certain level of foundational skill in basic virtualization technology, including the vSphere suite's Infrastructure Services, Application Services, and vCenter Server. Topics include: Explaining data center virtualization conceptsIdentifying the core components of vSphereNetworking and storage planning/configuration with vSphereCorrelating VMware solutions to common business challenges The VCA-DCV certification is the only one with no instructor-led training requirement, so a thorough study guide is an invaluable tool in you exam preparation. This book not only covers the full exam, but also provides practice designed to actually improve the skills used every day on the job. "VCA-DCV VMware Certified Associate on vSphere Study Guide" is more than just test prep--it's job prep.
The chapters in this book are revised, updated, and edited versions of 13 selected papers from the Second International Conference on Cooperative Multimodal Communication (CMC'98), held in Tilburg, The Netherlands, in 1998.This wasthesecondconferencein a series,ofwhichthe ?rstonewasheld inEindhoven,TheNetherlands,in1995.Threeofthesepaperswerepresentedby invitedspeakers;thosebyDoniaScott(co-authoredwithRichardPower),Steven Feiner (co-authored with Michele Zhou), and Oliviero Stock (co-authored with Carlo Strapparava and Massimo Zancanaro). The other ten were among the submitted papers that were accepted by the CMC'98 program committee. The editors contributed an introductory chapter to set the stage for the rest of the book. We thank the programcommittee for their excellent and timely feedback to the authors of the submitted papers, and at a later stage for advising on the contents of this volume and for providing additional suggestions for improving theselectedcontributions.Theprogramcommittee consistedofNicholasAsher, NormannBadler,DonBouwhuis,HarryBunt,WalthervonHahn,DieterHuber, Hans Kamp, John Lee, Joseph Mariani, Jean-Claude Martin, Mark Maybury, PaulMcKevitt, RobNederpelt, KeesvanOverveld,RayPerrault,Donia Scott, Jan Treur, Wolfgang Wahlster, Bonnie Webber, Kent Wittenburg, and Henk Zeevat. WethanktheRoyalDutchAcademyofSciences(KNAW)andtheOrga- zationforCooperationamongUniversitiesinBrabant(SOBU)fortheirgrants that supported the conference.
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Job Scheduling Strategies for Parallel Processing, JSSPP 2001, held in Cambridge, MA, USA, in June 2001.The 11 revised full papers presented were carefully selected and improved during two rounds of reviewing and revision, and present state-of-the-art results in the area.
This volume contains the papers prepared for the 2nd International Conference on Natural Language Processing, held 2-4 June in Patras, Greece. The conference program features invited talks and submitted papers, c- ering a wide range of NLP areas: text segmentation, morphological analysis, lexical knowledge acquisition and representation, grammar formalism and s- tacticparsing, discourse analysis, languagegeneration, man-machineinteraction, machine translation, word sense disambiguation, and information extraction. The program committee received 71 abstracts, of which unfortunately no more than 50% could be accepted. Every paper was reviewed by at least two reviewers. The fairness of the reviewing process is demonstrated by the broad spread of institutions and countries represented in the accepted papers. So many have contributed to the success of the conference. The primary credit, ofcourse, goes to theauthors andto the invitedspeakers. By theirpapers and their inspired talks they established the quality of the conference. Secondly, thanks should go to the referees and to the program committee members who did a thorough and conscientious job. It was not easy to select the papers to be presented. Last, but not least, my special thanks to the organizing committee for making this conference happ
ETAPS2000 was the third instance of the EuropeanJoint Conferenceson Theory and Practice of Software. ETAPS is an annual federated conference that was established in 1998 by combining a number of existing and new conferences. This year it comprised ?ve conferences (FOSSACS, FASE, ESOP, CC, TACAS), ?ve satellite workshops (CBS, CMCS, CoFI, GRATRA, INT), seven invited lectures, a panel discussion, and ten tutorials. The events that comprise ETAPS address various aspects of the system - velopment process, including speci?cation, design, implementation, analysis, and improvement. The languages, methodologies, and tools which support these - tivities are all well within its scope. Di?erent blends of theory and practice are represented, with an inclination towards theory with a practical motivation on one hand and soundly-based practice on the other. Many of the issues involved in software design apply to systems in general, including hardware systems, and the emphasis on software is not intended to be exclusive.
ThePKC2000conferencewasheldattheMelbourneExhibitionCentre, Victoria, Australia, January 18-20, 2000. It was the third conference in the international workshop series dedicated to practice and theory in public key cryptography. The program committee of the conference received 70 full submissions from around the world, of which 31 were selected for presentation. All submissions were reviewed by experts in the relevant areas. The program committee consisted of 19 experts in cryptography and data se- rity drawn from the international research community, these being Chin-Chen Chang (National Chung Cheng University, Taiwan), Claude Cr epeau (McGill University, Canada), Ed Dawson (Queensland University of Technology, A- tralia), Yvo Desmedt (Florida State University, USA), Hideki Imai (Co-chair, UniversityofTokyo, Japan), MarkusJakobsson(BellLabs, USA), KwangjoKim (Information and Communications University, Korea), Arjen Lenstra (Citibank, USA), TsutomuMatsumoto(YokohamaNationalUniversity, Japan), DavidN- cache (Gemplus, France), Eiji Okamoto (University of Wisconsin-Milwaukee, USA), TatsuakiOkamoto(NTTLabs, Japan), JosefPieprzyk(UniversityofW- longong, Australia), Jean-Jacques Quisquater (Universit e Catholique de L- vain, Belgium), Nigel Smart (HP Labs Bristol, UK), Vijay Varadharajan (U- versity of Western Sydney, Australia), Serge Vaudenay (Ecole Polytechnique F ed erale de Lausanne, Switzerland), Moti Yung (CertCo, USA), and Yuliang Zheng (Co-chair, Monash University, Australia). Members of the committee spent numerous hours in reviewing the submissions and providing advice and comments on the selection of paper
Ready to move to the Mac? This incomparable guide helps you make a smooth transition. "New York Times" columnist and Missing Manuals creator David Pogue gets you past three challenges: transferring your stuff, assembling Mac programs so you can do what you did with Windows, and learning your way around Mac OS X. Learning to use a Mac is not a piece of cake, but once you do, the rewards are oh-so-much better. No viruses, worms, or spyware. No questionable firewalls or inefficient permissions. Just a beautiful machine with a thoroughly reliable system. Whether you're using Windows XP or Windows 7, we've got you covered. Transfer your stuff. Moving files from a PC to a Mac is the easy part. This guide gets you through the tricky things: extracting your email, address book, calendar, Web bookmarks, buddy list, desktop pictures, and MP3 files. Re-create your software suite. Big-name programs from Microsoft, Adobe, and others are available in both Mac and Windows versions. But hundreds of other programs are Windows-only. Learn the Macintosh equivalents and how to move data to them. Learn Mac OS X Lion. Once you've moved into the Macintosh mansion, it's time to learn your way around. You're in good hands with the author of "Mac OS X: The Missing Manual," the #1 bestselling guide to Mac OS X.
This volume contains the papers presented at the f th workshop on Job SchedulingStrategiesforParallelProcessing, whichwasheldinconjunctionwith the IPPS/SPDP 99conference in San Juan, Puerto Rico, on April 16, 1999.The papers have been through a complete refereeing process, with the full version beingreadandevaluatedbyv etosevenmembersoftheprogramcommittee.We would like to take this opportunity to thank the program committee, Andrea Arpaci-Dusseau, Stephen Booth, Allen Downey, Allan Gottlieb, Atsushi Hori, PhilKrueger, RichardLagerstrom, MironLivny, VirginiaLo, ReaganMoore, Bill Nitzberg, UweSchwiegelshohn, KenSevcik, MarkSquillante, andJohnZahorjan, for an excellent job. Thanks are also due to the authors for their submissions, presentations, and nal revisionsfor this volume. Finally, we wouldlike to thank the MIT Laboratory for Computer Science and the Computer Science Institute at the Hebrew Universityfor the use of their facilities in the preparationof these proceedings. Thiswasthe fth annualworkshopinthis series, whichre?ectsthe continued interest in this eld. The previous four were held in conjunction with IPPS 95 through IPPS/SPDP 98. Their proceedings are available from Springer-Verlag as volumes 949, 1162, 1291, and 1459 of the Lecture Notes in Computer Science series. Sinceour rstworkshop, parallelprocessinghas evolvedtothe pointwhereit is no longer synonymous with scienti c computing on massively parallel sup- computers. In fact, enterprise computing on one hand and metasystems on the other hand often overshadow the original uses of parallel processing. This shift has underscored the importance of job scheduling in multi-user parallelsystems. Correspondingly, we had a session in the workshop devoted to job scheduling on standalonesystems, emphasizing gang scheduling, and another on scheduling for meta-systems. A third session continued the trend from previous workshops of discussing evaluation methodology and workloads. Aninnovationthisyearwasapaneldiscussiononthepossiblestandardization ofaworkloadbenchmarkthatwillservefortheevaluationofdi erentsche
The European Commission emphasizes, in its Fifth Research Framework, the . . . emerging generic dependability requirements in the information society, stemming both from the ubiquity and volume of embedded and networked systems and services as well as from the global and complex nature of large scale information and communication infrastructures, from citizens, administrations and business in terms of technologies, tools, systems, applications and services." The series of Conference on Computer Safety, Reliability, and Security (Safecomp) contributes to satisfy these requirements by reviewing the state of the art, experiences, and new trends in the relevant scientific and industrial areas. Safecomp is intended to be a platform for technology transfer among academia, industry, and research institutions, providing the opportunity for exchange of ideas, opinions, and visions among experts. This year Safecomp celebrates the 20th anniversary, its first Conference having been organized in Stuttgart by EWICS (European Workshop on Industrial Computer Systems) in 1979, and we hope these Proceedings will contribute to the celebration by supporting Safecomp aims. The Proceedings include the 25 papers that have been presented orally at the Conference and the full version of the 14 papers that have been presented as posters, all of which were selected from 76 submissions. Papers almost uniformly take up Safecomp topics, dealing with the issues of Safety Assessment and Human Factors, Verification and Validation, Design for Safety, Formal Methods, and Security."
This volume constitutes the refereed proceedings of the Second
International Conference on Scale-Space Theories in Computer
Vision, Scale-Space'99, held in Corfu, Greece, in September
1999.
Formal methods have been established as the rigorous engineering methodology for the system development. Applying formal methods to a large and complex system development often requires the modelling of different aspects of such a system. For instance, complex systems (such as integrated avionics systems, engine control software) can involve functional and timing requirements that must be eventually implemented as executing code on a communicating distributed topology. This book contains the papers presented at the First International Workshop on Integrated Formal Methods, held at the University of York in June 1999. The conference provided a forum for the discussion of theoretical aspects of combing behavioural and state-based formalisms and practical solutions to the industrial problems of this approach.
ICALP { the International Colloquium on Automata, Languages, and Progr- ming { is a series of annual conferences of the European Association for Th- retical Computer Science (EATCS). ICALP'99 was organized by the Institute of Computer Science of the Academy of Sciences of the Czech Republic in - operation with the Action M Agency. Stimulated by the positive experience from previous meetings, the guiding idea of the ICALP'99 organization was to keep and to enhance the idea of a parallel two{track conference with invited plenary talks. Similarly to the two parts of the journal Theoretical Computer Science, Track A of the meeting is devoted to Algorithms, Automata, Complexity, and Games, and Track B to Logic, Semantics, and Theory of Programming. The Program Committee was structured along these same lines. As a further inno- tion, ICALP'99 was coordinated with the European Symposium on Algorithms (ESA'99) in such a way that both conferences took place in the same location with the former immediately followed by the latter. ICALP'99 was the 26th in the series of ICALP colloquia. Previous colloquia were held in Paris (1972), Saarbruc ] ken (1974), Edinburgh (1976), Turku (1977), Udine (1978), Graz (1979), Amsterdam (1980), Haifa (1981), Aarhus (1982), Barcelona (1983), Antwerp (1984), Nafplion (1985), Rennes (1986), Karlsruhe (1987), Tampere (1988), Stresa (1989), Warwick (1990), Madrid (1991), Vienna (1992), Lund (1993), Jerusalem (1994), Szeged (1995), Paderborn (1996), Bo- gna (1997), and Aalborg (1998). In the year 2000 ICALP will be held in Geneva."
Conceptual Modeling for User Interface Development introduces the technique of Entity-Relationship-Modeling and shows how the technique can be applied to interface issues. It explains those aspects of entity-relationship modeling which are relevant to ERMIAs, and it presents the extensions to the notation that are necessary for modeling interfaces. This book is aimed at both interface designers and software developers in an attempt to bridge the gap in the development of interactive systems. Too often, when software is being developed, the software engineers do not sufficiently consider how easy the system will be to learn and use. On the other side, interface specialists tend to express their concerns in ways which are either too detailed to be readily understood or in ways which are difficult for the software developer to implement. ERMIA provides a set of concepts which can be used equally easily by software developers and interface designers alike. |
You may like...
Research Anthology on Recent Trends…
Information Reso Management Association
Hardcover
R9,789
Discovery Miles 97 890
Dark Silicon and Future On-chip Systems…
Suyel Namasudra, Hamid Sarbazi-Azad
Hardcover
R3,940
Discovery Miles 39 400
Handbook of Metaheuristics
Michel Gendreau, Jean-Yves Potvin
Hardcover
R4,998
Discovery Miles 49 980
C and C++ programming concepts and Data…
P.S. Subramanyam
Hardcover
|