![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
Windows 2003 Server is unquestionably the dominant enterprise level
operating system in the industry, with 95% of all companies running
it. And for the last tow years, over 50% of all product upgrades
have been security related. Securing Windows Server, according to
bill gates, is the company's #1 priority.
The development of embedded systems offers a higher degree of abstraction, crucial to tackling the growing complexity and usage of model-driven approaches. ""Behavioral Modeling for Embedded Systems and Technologies: Applications for Design and Implementation"" provides an overview on innovative behavior models currently used for developing embedded systems, accentuating on graphical and visual notations. This dynamic compilation presents an authoritative reference collection to the most significant models of computation currently in use for embedded systems design.
This bestselling on-the-job reference and test preparation guide has been fully revised for new 2022 exam objectives This fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1101 & 220-1102. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CompTIA A+ exams with ease, this definitive guide also serves as an essential on-the-job IT reference. Covers all exam topics, including how to: Work with CPUs, RAM, BIOS, motherboards, power supplies, and other personal computer components Install, configure, and maintain hard drives Manage input devices and removable media Set up, upgrade, and maintain Microsoft Windows Troubleshoot and fix computer problems Install printers and other peripherals Configure and secure mobile devices >Connect to the Internet Set up wired and wireless networks Protect your personal computer and your network Implement virtualization and cloud-based technologies Online content includes: Practice exams for 1101 & 1102 with hundreds of questions One hour of video training from Mike Meyers TotalSim simulations of performance-based questions A collection of Mike Meyers' favorite shareware and freeware PC tools and utilities
OpenVMS Alpha Internals and Data Structures: Memory Management is
an update
All About Windows 11 provides you with a full colour, expertly written independent user insight into Microsoft's Windows 11; their latest update for your desktop and laptop computer. This guide is filled with helpful, step-by-step fully illustrated tutorials, written in plain, easy to follow English. Over the pages of this user guide we will take you through your entire Windows 11 user experience, from getting to grips with all the key features, to discovering a huge array of amazing insider tricks and tips. With this unofficial instruction manual at your side, no problem will be unsolvable and no question will be unanswered. You will discover, learn and master all you need to know about Windows 11 with ease and confidence. FEATURED INSIDE: Navigating the Start Menu Connecting to the Internet How to personalise Windows 11 Web browsing with Edge Using OneDrive Cloud Storage Video chatting with Skype Email, Social Media & Messaging Improving Windows 11 security Wi-fi and Personal wi-fi hotspots Speeding up your computer Troubleshooting & User Advice We are here to help you get the very best from WIndows 11!
This exam is designed to validate Windows Server 2003 Microsoft
Certified Systems Administrators (MCSEs) AD, Network
Infrastructure, and Application Platform Technical Specialists
skills. The object of this exam is to validate only the skills that
are are different from the existing MCSE skills. This exam will
fulfill the Windows Server 2008 Technology Specialist requirements
of Exams 70-640, 70-642, and 70-643.
Check Point NGX R65 is the next major release of Check Point's
flagship firewall software product, which has over 750,000
registered users. Check Point's NGX is the underlying security
software platform for all of the company's enterprise firewall, VPN
and management solutions. It enables enterprises of all sizes to
reduce the cost and complexity of security management and ensure
that their security systems can be easily extended to adapt to new
and emerging threats. This title is a continuation of Syngress'
best-selling references on Check Point's market leading Firewall
and VPN products.
This exam is designed to validate Windows Server 2003 Microsoft
Certified Systems Administrators (MCSAs) AD and Application
Platform Technical Specialists skills. The object of this exam is
to validate only the skills that are are different from the
existing MCSA skills. This exam will fulfill the Windows Server
2008 Technology Specialist requirements of Exams 70-640 and 70-643.
Interactive products designed for children-whether toys, games,
educational products, or websites-are increasingly embedded in
children's lives and school experiences. Making these products
safe, effective, and entertaining requires new methodologies for
carrying out sound and unbiased evaluations for these users with
unique requirements, environments, and ethical considerations.
Exchange, SQL and IIS are at the core of most Microsoft enterprise
servers. The 2007 releases of these products, along with the
release of Windows Vista and Windows 2008 Server, represents the
biggest overhaul of Windows enterprise products since Windows 2000.
The dramatic changes to security tools and the addition of features
that support "anywhere access" present IT professionals with a
steep learning curve. Making certain that these products are
configured to meet regulatory compliance requirements adds
addtionaly complexity to day-to-day management network management.
WE ARE ADRIFT IN A SEA OF INFORMATION. We need information to make
good decisions, to get things done, to learn, and to gain better
mastery of the world around us. But we do not always have good
control of our information - not even in the "home waters" of an
office or on the hard drive of a computer. Instead, information may
be controlling us - keeping us from doing the things we need to do,
getting us to waste money and precious time. The growth of
available information, plus the technologies for its creation,
storage, retrieval, distribution and use, is astonishing and
sometimes bewildering. Can there be a similar growth in our
understanding for how best to manage information and informational
tools?
This book is designed for the professional system administrators
who need to securely deploy Microsoft Vista in their networks.
Readers will not only learn about the new security features of
Vista, but they will learn how to safely integrate Vista with their
existing wired and wireless network infrastructure and safely
deploy with their existing applications and databases. The book
begins with a discussion of Microsoft's Trustworthy Computing
Initiative and Vista's development cycle, which was like none other
in Microsoft's history. Expert authors will separate the hype from
the reality of Vista s preparedness to withstand the 24 x 7 attacks
it will face from malicious attackers as the world s #1 desktop
operating system. The book has a companion CD which contains
hundreds of working scripts and utilities to help administrators
secure their environments.
The sexy, elegant design of the Apple PowerBook combined with the
Unix-like OS X operating system based on FreeBSD, have once again
made OS X the Apple of every hacker s eye. In this unique and
engaging book covering the brand new OS X 10.4 Tiger, the world s
foremost true hackers unleash the power of OS X for everything form
cutting edge research and development to just plain old fun.
This book presents a comprehensive introduction to Internetware, covering aspects ranging from the fundamental principles and engineering methodologies to operational platforms, quality measurements and assurance and future directions. It also includes guidelines and numerous representative real-world case studies that serve as an invaluable reference resource for software engineers involved in the development of Internetware applications. Providing a detailed analysis of current trends in modern software engineering in the Internet, it offers an essential blueprint and an important contribution to the research on software engineering and systems for future Internet computing.
A number of widely used contemporary processors have instruction-set extensions for improved performance in multi-media applications. The aim is to allow operations to proceed on multiple pixels each clock cycle. Such instruction-sets have been incorporated both in specialist DSPchips such as the Texas C62xx (Texas Instruments, 1998) and in general purpose CPU chips like the Intel IA32 (Intel, 2000) or the AMD K6 (Advanced Micro Devices, 1999). These instruction-set extensions are typically based on the Single Instruc tion-stream Multiple Data-stream (SIMD) model in which a single instruction causes the same mathematical operation to be carried out on several operands, or pairs of operands, at the same time. The level or parallelism supported ranges from two floating point operations, at a time on the AMD K6 architecture to 16 byte operations at a time on the Intel P4 architecture. Whereas processor architectures are moving towards greater levels of parallelism, the most widely used programming languages such as C, Java and Delphi are structured around a model of computation in which operations takeplace on a single value at a time. This was appropriate when processors worked this way, but has become an impediment to programmers seeking to make use of the performance offered by multi-media instruction -sets. The introduction of SIMD instruction sets (Peleg et al."
More than ever before, energy is becoming one of the most crucial concerns in economical and industrial development. ""Intelligent Information Systems and Knowledge Management for Energy: Applications for Decision Support, Usage, and Environmental Protection"" provides in-depth analysis of the need for a holistic approach for the construction and engineering of cities and societies. This defining body of research examines key issues and approaches for energy use and provides future direction of development as well.
OpenVMS System Management Guide, Second Edition, the most complete
book on the topic, details for system administrators the tools,
technologies, and techniques by which they can configure, maintain,
and tune computers running Hewlett-Packard's high-performance
OpenVMS operating system. Revised by a topical authority and a
principal OpenVMS engineer, the book enables system administrators
to perform more efficiently and effectively those everyday tasks
critical to an OpenVMS system. Examples have been updated to
include OpenVMS/VAX 7.3 and OpenVMS/Alpha 7.3-1.
Process calculi are among the most successful models of concurrent systems. Various behavior equivalences between processes are central notions in CCS (calculus of communicating systems) and other process calculi. In the real applications, specification and implementation are described as two processes, and correctness of programs is treated as a certain behavior equivalence between them. The purpose of this book is to establish a theory of approximate correctness and infinite evolution of concurrent programs by employing some notions and tools from point-set topology. This book is restricted to CCS for simplicity, but the main idea also applies to some other process calculi. The concept of bisimulation limits, useful for the understanding and analysis of infinite evolution of processes, is introduced. In addition, the notions of near bisimulations and bisimulation indexes, suitable in describing approximate correctness of concurrent programs, are proposed. The book will be of particular interest to researchers in the fields of theoretical computer science, especially theory of concurrency and hybrid systems, and graduate students in related disciplines. It will also be valuable to practical system designers developing concurrent and/or real-time systems.
The BeOS is the exciting new operating system designed natively
for the Internet and digital media. Programmers are drawn to the
BeOS by its many state-of-the-art features, including pervasive
multithreading, a symmetric multiprocessing architecture, and an
integrated multithreaded graphics system. The Be engineering team
also built in many UNIX-like capabilities as part of a POSIX
toolkit. Best of all, the BeOS runs on a variety of Intel
architectures and PowerPC platforms and uses off-the-shelf
hardware. This book explores the BeOS from a POSIX programmer's point of
view, providing a comprehensive and practical guide to porting UNIX
and other POSIX-based software to the BeOS. BeOS: Porting UNIX
Applications will help you move your favorite UNIX software to an
environment designed from the ground up for high-performance
applications.
|
You may like...
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright
Paperback
R1,491
Discovery Miles 14 910
Windows Server 2012 Security from End to…
Thomas W. Shinder, Yuri Diogenes, …
Paperback
R2,156
Discovery Miles 21 560
|