0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (89)
  • R250 - R500 (365)
  • R500+ (2,375)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)

Data and Applications Security XIX - 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT,... Data and Applications Security XIX - 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings (Paperback, 2005 ed.)
Sushil Jajodia, Duminda Wijesekera
R1,656 Discovery Miles 16 560 Ships in 10 - 15 working days

The 19th Annual IFIP Working Group 11.3 Working Conference on Data and Applications Security was held August 7-10, 2005 at the University of C- necticut in Storrs, Connecticut. The objectives of the working conference were to discuss in depth the current state of the researchand practice in data and - plicationsecurity, enableparticipantstobene?tfrompersonalcontactwithother researchers and expand their knowledge, support the activities of the Working Group, and disseminate the research results. This volume contains the 24 papers that were presented at the working c- ference. These papers, which had been selected from 54 submissions, were rig- ously reviewed by the Working Group members. The volume is o?ered both to document progressand to provideresearcherswith a broadperspective of recent developments in data and application security. A special note of thanks goes to the many volunteers whose e?orts made the working conference a success. We wish to thank Divesh Srivastava for agreeing to deliver the invited talk, Carl Landwehr and David Spooner for organizing the panel, the authors for their worthy contributions, and the referees for their time and e?ort in reviewing the papers. We are grateful to T. C. Ting for serving as the General Chair, Steven Demurjian and Charles E. Phillips, Jr. for their hard work as Local Arrangements Chairs, and Pierangela Samarati, Working Group Chair, for managing the IFIP approval process. We would also like to acknowledge Sabrina De Capitani di Vimercati for managing the conference's Web site.

Formal Methods for Open Object-Based Distributed Systems - 7th IFIP WG 6.1 International Conference, FMOODS 2005, Athens,... Formal Methods for Open Object-Based Distributed Systems - 7th IFIP WG 6.1 International Conference, FMOODS 2005, Athens, Greece, June 15-17, 2005, Proceedings (Paperback, 2005 ed.)
Martin Steffen, Gianluigi Zavattaro
R1,641 Discovery Miles 16 410 Ships in 10 - 15 working days

This volume contains the proceedings of FMOODS2005, the 7th IFIPWG6. 1 International Conference on Formal Methods for Open Object-Based Distributed Systems. The conference was held in Athens, Greece on June 15-17, 2005. The eventwasthe seventhmeeting ofthis conferenceseries, whichis held roughly- eryyearandahalf, withtheearliereventsheldrespectivelyinParis, Canterbury, Florence, Stanford, Twente, and Paris. ThegoaloftheFMOODSseriesofconferencesistobringtogetherresearchers whose work encompasses three important and related ?elds: - formal methods; - distributed systems; - object-based technology. Sucha convergenceis representativeofrecentadvancesin the?eld ofdistributed systems, and provides links between several scienti?c and technological com- nities, as represented by the conferences FORTE, CONCUR, and ECOOP. The objective of FMOODS is to provide an integrated forum for the pres- tation of research in the above-mentioned ?elds, and the exchange of ideas and experiences in the topics concerned with the formal methods support for open object-based distributed systems. For the call for papers, aspects of interest - cluded, but were not limited to: formal models; formal techniques for speci?- tion, design, or analysis; veri?cation, testing, and validation; component-based design; formal aspects of service-oriented computing; semantics and type s- tems for programming, coordination, or modelling languages; behavioraltyping; multiple viewpoint modelling and consistency between di?erent models; tra- formations of models; integration of quality-of-service requirements into formal models; formal models for security; formal approachesto distributed component frameworks;andapplications andexperience, carefullydescribed. Work onthese aspects of (o?cial and de facto) standardnotation and languagesfor serviceo- ented design, e. g. web services orchestration languages, was explicitly welc

Guide to Assembly Language Programming in Linux (Paperback, 2005 ed.): Sivarama P Dandamudi Guide to Assembly Language Programming in Linux (Paperback, 2005 ed.)
Sivarama P Dandamudi
R4,401 Discovery Miles 44 010 Ships in 10 - 15 working days

This text provides comprehensive coverage of the key elements of Assembly language programming, specifically targeting professionals and students who would like to learn Assembly and intend to move to the Linux operating system.

Applications and Theory of Petri Nets 2005 - 26th International Conference, ICATPN 2005, Miami, FL, June 20-25, 2005,... Applications and Theory of Petri Nets 2005 - 26th International Conference, ICATPN 2005, Miami, FL, June 20-25, 2005, Proceedings (Paperback, 2005 ed.)
Gianfranco Ciardo, Philippe Darondeau
R1,729 Discovery Miles 17 290 Ships in 10 - 15 working days

This volume contains the proceedings of the 26th International Conference on Application and Theory of Petri Nets and Other Models of Concurrency (ICATPN 2005). The Petri net conferences serve to discuss yearly progress in the ?eld of Petri nets and related models of concurrency, and to foster new - vancesintheapplicationandtheoryofPetrinets.Theconferencestypicallyhave 100-150 participants, one third from industry and the others from universities and research institutions, and they always take place in the last week of June. SuccessiveeditionsoftheconferencearecoordinatedbytheSteeringCommittee, whose members are listed on the next page, which also supervises several other activities-see the Petri Nets World at the URLwww.daimi.au.dk/PetriNets. The 2005 conference was organized in Miami by the School of Computer Science at Florida International University (USA). We would like to express our deep thanks to the Organizing Committee, chaired by Xudong He, for the time and e?ort invested to the bene't of the community in making the event successful. Several tutorials and workshops were organized within the conf- ence, covering introductory and advanced aspects related to Petri nets. Detailed information can be found at the conference URLwww.cs.fiu.edu/atpn2005. We received altogether 71 submissions from authors in 22 countries. Two submissions were not in the scope of the conference. The Program Comm- tee selected 23 contributions from the remaining 69 submissions, classi?ed into three categories: application papers (6 accepted, 25 submitted), theory papers (14 accepted, 40 submitted), and tool presentations (3 accepted, 4 submitted).

Distributed Applications and Interoperable Systems - 5th IFIP WG 6.1 International Conference, DAIS 2005, Athens, Greece, June... Distributed Applications and Interoperable Systems - 5th IFIP WG 6.1 International Conference, DAIS 2005, Athens, Greece, June 15-17, 2005, Proceedings (Paperback, 2005 ed.)
Lea Kutvonen
R1,587 Discovery Miles 15 870 Ships in 10 - 15 working days

ThisvolumecontainstheproceedingsoftheIFIPWG6. 1InternationalWorking Conference on Distributed Applications and Interoperable Systems V held in Athens, Greece, on June 15-17, 2005. The conference program presented the state of the art in research concerning distributed and interoperable systems. The emergence of 4th-generation c- munication systems, the evolution of Internet technologies, the convergence of telecom and datacom, wireless and ?xed communication systems and appli- tions pave the path for ubiquitous service and application provision. Innovative solutions are required for the development, implementation and operation of distributed applications in complex IT environments full of diversity and h- erogeneity. Today, the emerging wide spectrum of distributed systems - ranging from ambient intelligence to global computing scenarios - lacks systematic - plication development support. Following the evolution of the ?eld, DAIS 2005 focuses on models, technologies and platforms for interoperable, scalable and adaptable distributed applications within all kinds of computing environments. The papers presented at DAIS 2005 cover methodological aspects of building and architecting distributed and interoperable services, interoperability te- nologies, context- and location-based applications, con?gurability of commu- cation services, performance issues, data-integration issues, and Web services. In comparison to earlier events, the submissions showed increased interest towards methodological aspects and large-scale system interoperability. These proceedings contain 16 regular and 5 short papers, which were - lected in a careful, international reviewing process.

Engineering Self-Organising Systems - Methodologies and Applications (Paperback, 2005 ed.): Sven A. Brueckner, Giovanna Di... Engineering Self-Organising Systems - Methodologies and Applications (Paperback, 2005 ed.)
Sven A. Brueckner, Giovanna Di Marzo Serugendo, Anthony Karageorgos, Radhika Nagpal
R1,527 Discovery Miles 15 270 Ships in 10 - 15 working days

Self-organisation, self-regulation, self-repair, and self-maintenance are promising conceptual approaches to deal with the ever increasing complexity of distributed interacting software and information handling systems. Self-organising applications are able to dynamically change their functionality and structure without direct user intervention to respond to changes in requirements and the environment.

This book comprises revised and extended papers presented at the International Workshop on Engineering Self-Organising Applications, ESOA 2004, held in New York, NY, USA in July 2004 at AAMAS as well as invited papers from leading researchers. The papers are organized in topical sections on state of the art, synthesis and design methods, self-assembly and robots, stigmergy and related topics, and industrial applications.

Information Security Practice and Experience - Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006,... Information Security Practice and Experience - Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings (Paperback, 2006 ed.)
Kefei Chen, Robert Deng, Xuejia Lai, Jianying Zhou
R1,682 Discovery Miles 16 820 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Information Security Practice and Experience Conference, ISPEC 2006, held in Hangzhou, China, in April 2006. The 35 revised full papers presented were carefully reviewed and selected from 307 submissions. The papers are organized in topical sections.

Pervasive Computing - Third International Conference, PERVASIVE 2005, Munich, Germany, May 8-13, 2005, Proceedings (Paperback,... Pervasive Computing - Third International Conference, PERVASIVE 2005, Munich, Germany, May 8-13, 2005, Proceedings (Paperback, 2005 ed.)
Hans W. Gellersen, Roy Want, Albrecht Schmidt
R1,656 Discovery Miles 16 560 Ships in 10 - 15 working days

WelcometotheproceedingsofPervasive2005, The3rdInternationalConference on Pervasive Computing. We were honored to serve as chairs in this conference series, which was founded in 2002 and is now emerging as one of the most respected venues for publication of research on pervasive and ubiquitous c- puting. The conference is attracting research submissions of very high quality from all over the world, and from researchers representing a variety of disciplines and perspectives. We thank everybody who submitted their papers to Pervasive, demonstrating the extensive work going on in this area; and the Program C- mittee and our external reviewers who spent countless hours providing feedback and guidance in order to create the ?nal program. This year we received 130 submissions. By the end of the review process, we had 566 reviews on ?le, as well as long email discussion threads for each paper. In an initial phase we had each paper reviewed by two members of the Program Committee and two external reviewers. In a second phase, each paper wasdiscussedbyitsfourreviewerstoreachconsensusastoitstechnicalmerit. At the end of this phase, the top-rated papers as well as those that were found to be most controversial were selected for discussion at the PC meeting and reviewed by an additional PC member. The result being that each paper discussed in the PC meeting had 5 reviews and was read by three people who participated in the meeting, leading to a very informed and lively discussion

Regular Expression Recipes for Windows Developers - A Problem-Solution Approach (Paperback, 1st ed.): Nathan Good Regular Expression Recipes for Windows Developers - A Problem-Solution Approach (Paperback, 1st ed.)
Nathan Good
R1,022 R884 Discovery Miles 8 840 Save R138 (14%) Ships in 10 - 15 working days

Regular expressions are an essential part of programming, but they can be difficult to cope with. Enter "Regular Expression Recipes for Windows Developers." This is the only book of its kind that presents material in a functional, concise manner. It contains over 100 of the most popular regular expressions, along with explanations of how to use each one. It also covers all of the major development languages, including JavaScript, VB, VB .NET, and C#.

Author -->Nathan A. Good -->teaches by example and provides concise syntax references as necessary throughout the book. You're sure to find his examples accurate and relevant. This book is an ideal solutions guide for you to keep in a handy place for quick reference.-->Table of Contents-->Words and Text URLs and Paths CSV and Tab-Delimited Files Formatting and Validating HTML and XML Source Code

Operational Semantics for Timed Systems - A Non-standard Approach to Uniform Modeling of Timed and Hybrid Systems (Paperback,... Operational Semantics for Timed Systems - A Non-standard Approach to Uniform Modeling of Timed and Hybrid Systems (Paperback, 2005 ed.)
Heinrich Rust
R1,581 Discovery Miles 15 810 Ships in 10 - 15 working days

This monograph is dedicated to a novel approach for uniform modelling of timed and hybrid systems. Heinrich Rust presents a time model which allows for both the description of discrete time steps and continuous processes with a dense real-number time model. The proposed time model is well suited to express synchronicity of events in a real-number time model as well as strict causality by using uniform discrete time steps. Thus it integrates and reconciles two views of time that are commonly used separately in di?erent application domains. In many discrete systems time is modelled by discrete steps of uniform length, in continuous systems time is seen as a dense ?ow. Themainideatointegratethesedi?erentviewsisadiscretizationofthedense real-number time structure by using constant in?nitesimal time steps within each real-number point in time. The underlying mathematical structure of this time model is based on concepts of Non-standard Analysis as proposed by Abraham Robinson in the 1950s. The discrete modelling, i.e., the descr- tion of sequential discrete algorithms at di?erent abstraction levels, is done with Abstract State Machines along the formalisms developed by Yuri Gu- vich and temporal logic. These ingredients produce a rich formal basis for describing a large variety of systems with quantitative linear time prop- ties, by seamless integration, re?nement and embedding of continuous and discrete models into one uniform semantic framework called Non-standard Timed Abstract State Machines (NTASM)."

Information Security Practice and Experience - First International Conference, ISPEC 2005, Singapore, April 11-14, 2005,... Information Security Practice and Experience - First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings (Paperback, 2005 ed.)
Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou
R1,562 Discovery Miles 15 620 Ships in 10 - 15 working days

The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11-14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission, reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference

Embedded Systems Design - The ARTIST Roadmap for Research and Development (Paperback, 2005 ed.): Bruno Bouyssounouse, Joseph... Embedded Systems Design - The ARTIST Roadmap for Research and Development (Paperback, 2005 ed.)
Bruno Bouyssounouse, Joseph Sifakis
R3,095 Discovery Miles 30 950 Ships in 10 - 15 working days

Embedded systems now include a very large proportion of the advanced products designed in the world, spanning transport (avionics, space, automotive, trains), electrical and electronic appliances (cameras, toys, televisions, home appliances, audio systems, and cellular phones), process control (energy production and distribution, factory automation and optimization), telecommunications (satellites, mobile phones and telecom networks), and security (e-commerce, smart cards), etc. The extensive and increasing use of embedded systems and their integration in everyday products marks a significant evolution in information science and technology. We expect that within a short timeframe embedded systems will be a part of nearly all equipment designed or manufactured in Europe, the USA, and Asia. There is now a strategic shift in emphasis for embedded systems designers: from simply achieving feasibility, to achieving optimality. Optimal design of embedded systems means targeting a given market segment at the lowest cost and delivery time possible. Optimality implies seamless integration with the physical and electronic environment while respecting real-world constraints such as hard deadlines, reliability, availability, robustness, power consumption, and cost. In our view, optimality can only be achieved through the emergence of embedded systems as a discipline in its own right.

Security in Pervasive Computing - Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings... Security in Pervasive Computing - Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Paperback, 2005 ed.)
Dieter Hutter, Markus Ullmann
R1,589 Discovery Miles 15 890 Ships in 10 - 15 working days

This volume contains the papers presented at the 2nd International Conference on Se- rityinPervasiveComputing(SPC2005)heldApril6-8,2005inBoppard, Germany.The objective of this second conference was to develop new security concepts for complex application scenarios based on systems like handhelds, phones, smartcards, RFID-chips andsmartlabelshandinhandwiththeemergingtechnologyofubiquitousandpervasive computing. In particular the conference focused on methods and technologies conce- ing the identi?cation of risks, the de?nition of security policies, and the development of security and privacy measures, especially cryptographic protocols that are related to speci?c aspects of ubiquitous and pervasive computing like mobility, location-based services, adhocnetworking, resourceallocation/restriction, invisibility, andsecureha- ware/software platforms. We received 48 submissions. Each submission was reviewed by three independent reviewers and an electronic Program Committee meeting was held via the Internet. We are very grateful to the Program Committee members for their ef?ciency in processing the work and also for the quality of their reviews and discussions. Finally the Program Committee decided to accept 14 long papers and 3 short papers. Apart from the Program Committee, we would like to thank also the other persons who contributed to the success of this conference: the additional referees for revi- ing the papers, the authors for submitting the papers, and the local organizers, and in particular Hans-Peter Wagner, for the local organization of the conference in Boppard. SPC 2005 was hosted by the Bundesakademie fur ] of ] fentlicheVerwaltung of the Federal Ministry of the Interior, and was sponsored by the DFKI and BS

Wired/Wireless Internet Communications - Third International Conference, WWIC 2005, Xanthi, Greece, May 11-13, 2005,... Wired/Wireless Internet Communications - Third International Conference, WWIC 2005, Xanthi, Greece, May 11-13, 2005, Proceedings (Paperback, 2005 ed.)
Torsten Braun, Georg Carle, Yevgeni Koucheryavy, Vassilis Tsaoussidis
R1,668 Discovery Miles 16 680 Ships in 10 - 15 working days

Welcome to the 3rd International Conference on Wired/Wireless Internet C- munications (WWIC). After a successful start in Las Vegas and a selective c- ference in Germany, this year s WWIC demonstrated the event s maturity. The conference was supported by several sponsors, both international and local, and became the o?cial venue for COST Action 290. That said, WWIC has now been established as a top-quality conference to promote research on the convergence of wired and wireless networks. This year we received 117 submissions, which allowed us to organize an - citing program with excellent research results, but required more e?ort from the 54 members of the international Program Committee and the 51 additional reviewers. For each of the 117 submitted papers we asked three independent - viewers to provide their evaluation. Based on an online ballot phase and a TPC meeting organized in Colmar (France), we selected 34 high-quality papers for presentation at the conference. Thus, the acceptance rate for this year was 29%."

Digital Watermarking - Third International Workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected... Digital Watermarking - Third International Workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected Papers (Paperback, 2005 ed.)
Ingemar J. Cox, Ton Kalker, Heung-Kyu Lee
R1,629 Discovery Miles 16 290 Ships in 10 - 15 working days

We are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since its modern reappearance in the academic community in the early 1990s, great progress has been made in understanding both the capabilities and the weaknesses of digital watermarking. On the theoretical side, we all are now well aware of the fact that digital watermarking is best viewed as a form of communication using side information. In the case of digital watermarking the side information in question is the document to be watermarked. This insight has led to a better understanding of the limits of the capacity and robustness of digital watermarking algorithms. It has also led to new and improved watermarking algorithms, both in terms of capacity and imperceptibility. Similarly, the role of human perception, and models thereof, has been greatly enhanced in the study and design of digital watermarking algorithms and systems. On the practical side, applications of watermarking are not yet abundant. The original euphoria on the role of digital watermarking in copy protection and copyright protection has not resulted in widespread use in practical systems. With hindsight, a number of reasons can be given for this lack of practical applications.

Honeypots for Windows (Paperback, 1st ed.): Roger A. Grimes Honeypots for Windows (Paperback, 1st ed.)
Roger A. Grimes
R1,138 R972 Discovery Miles 9 720 Save R166 (15%) Ships in 10 - 15 working days

* Talks about hardening a Windows host before deploying Honeypot * Covers how to create your own emulated services to fool hackers * Discusses physical setup of Honeypot and network necessary to draw hackers to Honeypot * Discusses how to use Snort to co-exist with Honeypot * Discusses how to use a Unix-style Honeypot to mimic a Windows host * Discusses how to fine-tune a Honeypot * Discusses OS fingerprinting, ARP tricks, packet sniffing, and exploit signatures

Systems Aspects in Organic and Pervasive Computing - ARCS 2005 - 18th International Conference on Architecture of Computing... Systems Aspects in Organic and Pervasive Computing - ARCS 2005 - 18th International Conference on Architecture of Computing Systems, Innsbruck, Austria, March 14-17, 2005, Proceedings (Paperback, 2005 ed.)
Michael Beigl, Paul Lukowicz
R1,605 Discovery Miles 16 050 Ships in 10 - 15 working days

The keychallengeforfuture computersystemis dealingwithcomplexity.Onone hand this involves internal system complexity which has increased exponentially over recent years. Here the main objectives are to maintain system reliability and to keep the design and maintenance e?ort manageable, while at the same timecontinuingtoprovidenewfunctionalityandincreasingsystemperformance. This hasbeenthe focus ofso-calledautonomouscomputing, whichaimsto bring self-con?guration and repair to a wide range of computing systems. On the other hand future computer systems are more and more becoming integrated into the fabric of everyday life and thus have to deal with the c- plexities of the real world. They will become smaller, more appropriate for their use, integrated into everyday objects, and often virtually or physically invisible to the users.They will alsobe deployedin a muchhigher quantity andpenetrate many moreapplicationareasthan traditional notionsof computer systems.This requirescomputersystemstobeadaptablewithinamuchwiderrangeofpossible tasks, subjected to much harsher conditions. To provide such features and functionality, computer devices will become tinieryetstillincreaseinsystemcomplexity;theymustconsumelesspower, while still supporting advanced computation and communications, such that they are highlyconnectedyetstilloperateasautonomousunits.Pervasiveandubiquitous computing researchaddressessuchissues by developingconcepts and technology for interweaving computers into our everyday life. The principal approach is to enhance system functionality and adaptability by recognizing context and situations in the environment

Information Networking - Convergence in Broadband and Mobile Networking. International Conference, ICOIN 2005, Jeju Island,... Information Networking - Convergence in Broadband and Mobile Networking. International Conference, ICOIN 2005, Jeju Island, Korea, January 31 - February 2, 2005, Proceedings (Paperback, 2005 ed.)
Cheeha Kim
R4,538 Discovery Miles 45 380 Ships in 10 - 15 working days

Welcome to ICOIN 2005,the International Conference on Information Netwo- ing, held at Ramada Plaza Jeju Hotel, Jeju Island, Korea during January 31- February2,2005.ICOIN2005followedthesuccessofpreviousconferences.Since 1986, the conference has provided a technical forum for various issues in inf- mation networking. The theme of each conference re?ects the historic events in the computer communication industry. (Please refer to www.icoin2005.or.kr for details.) The theme of ICOIN 2004, "Convergence in Broadband and Mobile Networking," was used again for ICOIN 2005 since we believed it was ongoing. This year we received 427 submissions in total, which came from 22 co- tries. Upon submission, authors were asked to select one of the categories listed in the Call for Papers. The most popular category chosen was network se- rity, followed by mobile networks and wireless LANs. Other areas with strong showings included QoS and resource management, ad hoc and sensor networks, and wireless multimedia systems. From the outset, we could see where recent research interest lay and could make sure that the theme was still going in the right direction.

Grid Computing in Life Science - First International Workshop on Life Science Grid, LSGRID 2004 Kanazawa, Japan, May 31-June 1,... Grid Computing in Life Science - First International Workshop on Life Science Grid, LSGRID 2004 Kanazawa, Japan, May 31-June 1, 2004, Revised Selected and Invited Papers (Paperback, 2005 ed.)
Akihiko Konagaya
R1,495 Discovery Miles 14 950 Ships in 10 - 15 working days

Researchers in the ?eld of life sciences rely increasingly on information te- nology to extract and manage relevant knowledge. The complex computational and data management needs of life science research make Grid technologies an attractive support solution. However, many important issues must be addressed before the Life Science Grid becomes commonplace. The 1st International Life Science Grid Workshop (LSGRID 2004) was held in Kanazawa Japan, May 31-June 1, 2004. This workshop focused on life s- ence applications of grid systems especially for bionetwork research and systems biology which require heterogeneous data integration from genome to phenome, mathematical modeling and simulation from molecular to population levels, and high-performance computing including parallel processing, special hardware and grid computing. Fruitful discussions took place through 18 oral presentations, including a keynote address and ?ve invited talks, and 16 poster and demonstration p- sentations in the ?elds of grid infrastructure for life sciences, systems biology, massive data processing, databases and data grids, grid portals and pipelines for functional annotation, parallel and distributed applications, and life science grid projects. The workshop emphasized the practical aspects of grid techno- gies in terms of improving grid-enabled data/information/knowledge sharing, high-performance computing, and collaborative projects. There was agreement among the participants that the advancement of grid technologies for life science research requires further concerted actions and promotion of grid applications. We therefore concluded the workshop with the announcement of LSGRID 2005.

From Bash to Z Shell - Conquering the Command Line (Paperback, 1st Corrected ed., Corr. 2nd printing): Oliver Kiddle, Peter... From Bash to Z Shell - Conquering the Command Line (Paperback, 1st Corrected ed., Corr. 2nd printing)
Oliver Kiddle, Peter Stephenson, Jerry Peek
R1,690 R1,388 Discovery Miles 13 880 Save R302 (18%) Ships in 10 - 15 working days

* In-depth, unique coverage of ZSH, one of most modern and powerful of all shells. Also covers Bash, the preferred shell for most serious Linux and Unix users. * Very strong author and tech review team: Co-author Peter Stephenson has been involved in the development of Zsh since the 1990s when he started to write the FAQ. For the last few years, he has served as coordinator of the shell's development. Tech Reviewers: Ed Schaefer is the "Shell Corner" columnist for SysAdmin Magazine and Bart Schaefer is one of the lead developers of Zsh development. * Book is immediately useful, packed with short example and suggestions that the reader can put to use in their shell environment. * Extensive coverage of interactive and advanced shell features, including shell extensions, completion functions, and shortcuts. * Great book for users of all expertise; perennial seller.

Architecting Dependable Systems II (Paperback, 2004 ed.): Rogerio De Lemos, Cristina Gacek, Alexander Romanovsky Architecting Dependable Systems II (Paperback, 2004 ed.)
Rogerio De Lemos, Cristina Gacek, Alexander Romanovsky
R1,656 Discovery Miles 16 560 Ships in 10 - 15 working days

As software systems become ubiquitous, the issues of dependability become more and more critical. Given that solutions to these issues must be taken into account from the very beginning of the design process, it is appropriate that dependability is addressed at the architectural level.

This book results from an effort to bring together the research communities of software architectures and dependability. Inspired by the ICSE 2003 Workshop on Software Architectures for Dependable Systems, the book focuses on topics relevant to improving the state of the art in architecting dependable systems. The 15 thoroughly reviewed papers originate partly from the workshop; others were solicited in order to achieve complete coverage of all relevant aspects. The papers are organized into topical sections on architectures for dependability, fault-tolerance in software architectures, dependability analysis in software architectures, and industrial experience.

Foundation Mac OS X Web Development (Paperback, Softcover reprint of the original 1st ed.): Phil Sherry Foundation Mac OS X Web Development (Paperback, Softcover reprint of the original 1st ed.)
Phil Sherry
R902 R791 Discovery Miles 7 910 Save R111 (12%) Ships in 10 - 15 working days

This book aims to teach all the essentials of developing dynamic Web sites in OS X in a linear style. This book is not for hardcore developers, but rather for those new to the OS or the Mac, and looking for a primer on Web site development. Typical readers are Web development professionals who are exploring development on the Mac for the first time and Mac-loyal designers expanding from print into Web design.

Pro DNS and BIND (Paperback, 1st ed.): Ron Aitchison Pro DNS and BIND (Paperback, 1st ed.)
Ron Aitchison
R1,531 R1,283 Discovery Miles 12 830 Save R248 (16%) Ships in 10 - 15 working days

The Domain Name System (DNS) is the system created to map domain names to IP addresses, and is largely responsible for the widespread popularity of the Internet due to the convenience it offers in calling system resources by an easily recognizable name rather than a cryptic number. Given the critical nature of this technology for ensuring smooth operation of Internet-based resources such as Web and mail servers, ita (TM)s imperative that users fully understand key configuration, management and security principles.

Pro DNS and BIND guides readers through the often challenging array of features surrounding DNS with a special focus on the Worlda (TM)s most diffuse DNS implementation, BIND (Berkeley Internet Name Domain). Readers will learn not only about key DNS concepts, but also how to effectively install, configure, deploy and manage BIND in enterprise environments.

Automating Windows Administration (Paperback, Softcover reprint of the original 1st ed.): Stein Borge Automating Windows Administration (Paperback, Softcover reprint of the original 1st ed.)
Stein Borge
R1,519 R1,299 Discovery Miles 12 990 Save R220 (14%) Ships in 10 - 15 working days

While the Windows Script Host (WSH) is capable of performing a number of common tasks such as file handling and network connections, WSH's great strength is its ability to use COM components. This allows WSH to perform database, E-mail, security, user administration, network, and system administration through objects built into Windows. This book provides practical solutions to common problems as well as detailed discussions of the underlying technology used in the solutions.Stein Borge provides a general introduction to new features in recent versions of WSH, and then covers the file, shell and network operations using built-in WSH objects. Borge also provides chapters on lesser-known but important recent additions to WSH of standard input/output streams and regular expressions, as well as covering registry operations using the built-in Shell objects and WMI objects.Automating Windows Administration is targeted towards administrative and support staff in Microsoft networked environments who desperately want a way to automate common administrative tasks. common administrative tasks for all business-oriented versions of Windows from NT to Windows 2003 Server using the Windows Script Host (WSH). WSH is a replacement for Microsoft batch scripts.

Linux-Systemadministration - Grundlagen, Konzepte, Anwendung (German, Hardcover, 2005 ed.): Christine Wolfinger, Jurgen... Linux-Systemadministration - Grundlagen, Konzepte, Anwendung (German, Hardcover, 2005 ed.)
Christine Wolfinger, Jurgen Gulbins, Carsten Hammer
R2,038 Discovery Miles 20 380 Ships in 12 - 19 working days

Linux ist eine fest etablierte, fur vielfaltige Rechnerarchitekturen verfugbare Plattform und zeichnet sich insbesondere durch die hohe Stabilitat und Sicherheit des Systems aus. Dieses Buch bietet einen fundierten Einstieg in die Linux-Systemadministration unter besonderer Berucksichtigung von SuSE-Linux. Dabei werden systematisch die Installation, Konfiguration und Aktualisierung des Systems, der Umgang mit Dateisystemen sowie die Konfiguration wichtiger Netzwerkdienste dargestellt. Ferner werden zentrale Client/Server-Funktionen und andere fur die Systemadministration wichtige Aufgaben, wie Benutzerverwaltung, Sicherung von Daten und die Lokalisierung von Fehlfunktionen, detailliert erlautert.

Der Text enthalt viele praktische Hinweise zur kompetenten Administration von Linux-Systemen, geht aber auch auf grundlegende Mechanismen von UNIX/Linux-Systemen ein. Eine Kurzreferenz gibt Auskunft uber haufig verwendete Befehle, und ein Glossar erlautert wichtige Stichworte an zentraler Stelle."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
PowerShell for Administration, IT Pro…
William R. Stanek, William Stanek Hardcover R1,533 Discovery Miles 15 330
Mac Unlocked - Everything You Need to…
David Pogue Paperback R776 R692 Discovery Miles 6 920
Essential Windows 10: 1st Anniversary…
Kevin Wilson Paperback R459 R288 Discovery Miles 2 880
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright Paperback R1,581 Discovery Miles 15 810
IBM Mainframe Developer Training and…
Robert Wingate Hardcover R1,514 Discovery Miles 15 140
DNSSEC Mastery, 2nd Edition
Michael W Lucas Hardcover R947 R853 Discovery Miles 8 530
Kubernetes - The Ultimate Beginners…
Mark Reed Hardcover R599 R543 Discovery Miles 5 430
Linux Command - A Comprehensive…
William Vance Hardcover R631 R575 Discovery Miles 5 750
Windows 10 - A Complete Guide to Using…
Sam Griffin Hardcover R602 R545 Discovery Miles 5 450
Linux for Hackers - A Comprehensive…
William Vance Hardcover R625 R568 Discovery Miles 5 680

 

Partners