![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
This book is about the advanced, object-oriented NEXTSTEp (TM) user envi ronment for NeXT and Intel-based computers. It is intended for those who already own a computer running NEXTSTEP and want to quickly learn what it can do and how to get the most out of it with the least effort. It's also for those who are considering the purchase of NEXTSTEP but want to learn more about how it works before making an investment. Why a book on NEXTSTEP? When I set out to learn how to use NEXT STEP several years ago, I found it extremely difficult to find information from the usual sources, such as books, magazines, user groups, and autho rized dealers. NEXTSTEP users were scarce and finding a computer store that sold NeXT-related products was even more rare. There were also only a handful of NeXT user groups in existence and those that did exist met so far away that joining one of them was impractical. The manuals I received from NeXT were helpful, but I had the feeling there must be something more to it than what was written in the User's Reference. It didn't describe many of the shortcuts that experienced users had found or the public domain and shareware utilities that were popular and how I could use them to make my work even easier and more fun.
This volume constitutes the proceedings of the Fifth International
Conference on Concurrency Theory, CONCUR '94, held at Uppsala,
Sweden in August 1994.
The REX School/Symposium "A Decade of Concurrency - Reflections and
Perspectives" was the final event of a ten-year period of
cooperation between three Dutch research groups working on the
foundations of concurrency.
This book describes the design and internals of the MOSIX distributed operating system. MOSIX, an acronym for Multicomputer Operating System for UNIX, integrates a cluster of loosely integrated computers into a virtual single-machine UNIX environment. The main property of MOSIX is the high degree of integration among the processors, which may include personal workstations and shared memory and non-shared memory multiprocessors, connected by fast communication links. This integration includes network transparency, cooperation between the processors to provide services across machine boundaries, support of dynamic configuration, and system-initiated load balancing by process migration. Another property of MOSIX is the ability to scale up the system configuration to encompass a large number of computers. The development of MOSIX was begun in 1981. The book is intended primarily for readers who are interested in distributed and multiprocessor systems. The reader is assumed to have some knowledge in programming and operating systems, preferably UNIX. Readers without this background will still benefit from thetechniques and algorithms discussed.
This volume presents the proceedings of the fifth Conference on Advanced Information Systems Engineering, CAiSE '93, held at the University of Paris-Sorbonne in June 1993. Initiated by J. Bubenko from the Swedish Institute for Systems Development in Stockhom, Sweden, and A. Solvberg from the Norwegian Institute of Technology in Trondheim, Norway, this series of conferences evolved from a Nordic audience to a truly European one. All the conferences have attracted international papers of high quality, indicating the needfor an international conference on advanced information systems engineering topics. The spectrum of contributions contained in the present proceedings extends from inevitable and still controversial issues regarding modeling of information systems, via development environments and experiences, to various novel views forsome specific aspects of information systems development such as reuse, schema integration, and evolution.
Enterprise operation efficiency is seriously constrained by the inability to provide the right information, in the right place, at the right time. In spite of significant advances in technology it is still difficult to access information used or produced by different applications due to the hardware and software incompatibilities of manufacturing and information processing equipment. But it is this information and operational knowledge which makes up most of the business value of the enterprise and which enables it to compete in the marketplace. Therefore, sufficient and timely information access is a prerequisite for its efficient use in the operation of enterprises. It is the aim of the ESPRIT project AMICE to make this knowledge base available enterprise-wide. During several ESPRIT contracts the project has developed and validated CIMOSA: Open System Architecture for CIM. The CIMOSA concepts provide operation structuring based on cooperating processes. Enterprise operations are represented in terms of functionality and dynamic behaviour (control flow). Information needed and produced, as well as resources and organisational aspects relevant in the course of the operation are modelled in the process model. However, the different aspects may be viewed separately for additional structuring and detailing during the enterprise engineering process.
The main aims of the series of volumes "Advances in Petri Nets" are: - to present to the "outside" scientific community a fair picture of recent advances in the area of Petri nets, and - to encourage those interested in the applications and the theory of concurrent systems to take a closer look at Petri nets and then join the group of researchers working in this fascinating and challenging area. This volume is based on the proceedings of the 12th International Conference on Applications and Theory of Petri Nets, held in Gjern, Denmark, in June 1991. It contains 18 selected and revised papers covering all aspects of recent Petri net research.
This work presents a new, abstract and comprehensive view of open distributed systems. The starting point is a small number of core concepts and basic principles, which are informally introduced and precisely defined using mathematical logic. It is shown how the basic concepts of open systems interconnection (OSI), which are currently the most important standardization activities in the context of open distributed systems, can be obtained by specialization and extension of these basic concepts. Application examples include the formal treatment of the interaction point concept and the hierarchical development of communication systems. This book is a contribution to the field of software engineering in general and to the design of open distributed systems in particular. It is oriented towards the design and implementation of real systems, and brings together both formal logical reasoning and current software engineering practice.
This volume gives the proceedings of the Fourth Workshop on Computer-Aided Verification (CAV '92), held in Montreal, June 29 - July 1, 1992. The objective of this series of workshops is to bring together researchers and practitioners interested in the development and use of methods, tools and theories for the computer-aided verification of concurrent systems. The workshops provide an opportunity for comparing various verification methods and practical tools that can be used to assist the applications designer. Emphasis is placed on new research results and the application of existing results to real verification problems. The volume contains 31 papers selected from 75 submissions. These are organized into parts on reduction techniques, proof checking, symbolic verification, timing verification, partial-order approaches, case studies, model and proof checking, and other approaches. The volume starts with an invited lecture by Leslie Lamport entitled "Computer-hindered verification (humans can do it too)."
Move into iOS development by getting a firm grasp of its fundamentals, including the Xcode 13 IDE, Cocoa Touch, and the latest version of Apple's acclaimed programming language, Swift 5.5. With this thoroughly updated guide, you'll learn the Swift language, understand Apple's Xcode development tools, and discover the Cocoa framework. Explore Swift's object-oriented concepts Become familiar with built-in Swift types Dive deep into Swift objects, protocols, and generics Tour the life cycle of an Xcode project Learn how nibs are loaded Understand Cocoa's event-driven design Communicate with C and Objective-C In this edition, catch up on the latest iOS programming features: Structured concurrency: async/await, tasks, and actors Swift native formatters and attributed strings Lazy locals and throwing getters Enhanced collections with the Swift Algorithms and Collections packages Xcode tweaks: column breakpoints, package collections, and Info.plist build settings Improvements in Git integration, localization, unit testing, documentation, and distribution And more!
The offices of GMD-FOKUS in Berlin provided the venue for a meeting in December 1987 which signalled the birth of the ARGOSI project. The proposal gradually took shape over the following months, and after merging with another project proposal in the field of standardization of computer graphics, finally received funding from the Esprit programme in March 1989. The project stemmed from a recognition of the importance of computer graphics a'i an ena bling technology in many application areas, and of the need to build bridges between computer graphics and telecommunications. The overall aims of the pro ject were twofold: * Advance the state of the art in the transfer of graphical information across international networks. * Improve quality and applicability of standards in this area. This book records the key results of the project and the contributions the project has made to standardization related to the transfer of graphical information across open networks. Contributions have included a demonstration of a prototype appli cation - a road transport information system running over public international of a new data networks - shown at the Esprit '91 exhibition, the standardization FT AM document type allowing structured access to graphical information (represented according to the Computer Graphics Metafile (CGM) standard) and major contributions to a mapping of the X-Windows protocol onto an OSI stack. The project also organized two international workshops. the first on Graphics and Communications, and the second on Distributed Window Systems.
ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATA-IN ONE BOOK From the basics to advanced techniques: no Linux security experience necessary Realistic examples & step-by-step activities: practice hands-on without costly equipment The perfect introduction to Linux-based security for all students and IT professionals Linux distributions are widely used to support mission-critical applications and manage crucial data. But safeguarding modern Linux systems is complex, and many Linux books have inadequate or outdated security coverage. Linux Essentials for Cybersecurity is your complete solution. Leading Linux certification and security experts William "Bo" Rothwell and Dr. Denise Kinsey introduce Linux with the primary goal of enforcing and troubleshooting security. Their practical approach will help you protect systems, even if one or more layers are penetrated. First, you'll learn how to install Linux to achieve optimal security upfront, even if you have no Linux experience. Next, you'll master best practices for securely administering accounts, devices, services, processes, data, and networks. Then, you'll master powerful tools and automated scripting techniques for footprinting, penetration testing, threat detection, logging, auditing, software management, and more. To help you earn certification and demonstrate skills, this guide covers many key topics on CompTIA Linux+ and LPIC-1 exams. Everything is organized clearly and logically for easy understanding, effective classroom use, and rapid on-the-job training. LEARN HOW TO: Review Linux operating system components from the standpoint of security Master key commands, tools, and skills for securing Linux systems Troubleshoot common Linux security problems, one step at a time Protect user and group accounts with Pluggable Authentication Modules (PAM), SELinux, passwords, and policies Safeguard files and directories with permissions and attributes Create, manage, and protect storage devices: both local and networked Automate system security 24/7 by writing and scheduling scripts Maintain network services, encrypt network connections, and secure network-accessible processes Examine which processes are running-and which may represent a threat Use system logs to pinpoint potential vulnerabilities Keep Linux up-to-date with Red Hat or Debian software management tools Modify boot processes to harden security Master advanced techniques for gathering system information
Writing a compiler is a very good practice for learning how complex problems could be solved using methods from software engineering. It is extremely important to program rather carefully and exactly, because we have to remember that a compiler is a program which has to handle an input that is usually incorrect. Therefore, the compiler itself must be error-free. Referring to Niklaus Wirth, we postulate that the grammatical structure of a language must be reflected in the structure of the compiler. Thus, the complexity of a language determines the complexity of the compiler (cf. Compilerbau. B. G. Teubner Verlag, Stuttgart, 1986). This book is about the translation of programs written in a high level programming language into machine code. It deals with all the major aspects of compilation systems (including a lot of examples and exercises), and was outlined for a one session course on compilers. The book can be used both as a teacher's reference and as a student's text book. In contrast to some other books on that topic, this text is rather concentrated to the point. However, it treats all aspects which are necessary to understand how compilation systems will work. Chapter One gives an introductory survey of compilers. Different types of compilation systems are explained, a general compiler environment is shown, and the principle phases of a compiler are introduced in an informal way to sensitize the reader for the topic of compilers.
The International Conference on Compiler Construction provides a
forum for presentation and discussion of recent developments in the
area of compiler construction, language implementation and language
design. Its scope ranges from compilation methods and tools to
implementation techniques for specific requirements on languages
and target architectures. It also includes language design and
programming environment issues which are related to language
translation. There is an emphasis on practical and efficient
techniques.
About this Book This book is a detailed introduction to programming with the OSF /MotifI'M graphical user interface. It is an introduction in that it does not require the reader to have experience programming in the X Window environment. It is detailed in that it teaches you how to use the interface components provided by Motif in a complex application. Although it contains a great deal of reference material, it is not meant as an authoritative reference - that is the job of the OSF/Motif Programmer's Reference, which uses over 900 pages in the process. Instead, this book provides its reference material in a practical, "how to" manner and allows the reader to use the Programmer's Reference effectively. The target reader is an experienced C programmer and user of the X Window System under the UNIX operating system. 'the reader should be familiar with the tools provided by UNIX for the compilation and testing of programs; while this book does examine the process by which a Motif program is compiled, it does not explain that process. It also assumes that the reader is familiar with "x" terms such as 'pointer' and 'display'.
Code Generation - Concepts, Tools, Techniques is based upon the proceedings of the Dagstuhl workshop on code generation which took place from 20-24 May 1991. The aim of the workshop was to evaluate current methods of code generation and to indicate the main directions which future research is likely to take. It provided an excellent forum for the exchange of ideas and had the added advantage of bringing together European and American experts who were unlikely to meet at less specialised gatherings. This volume contains 14 of the 30 papers presented at the Dagstuhl workshop. The papers deal mainly with the following four topics: tools and techniques for code generation, code generation for parallel architectures, register allocation and phase ordering problems, and formal methods and validations. Most of the papers assess the progress of on-going research work, much of which is published here for the first time, while others provide a review of recently completed projects. The volume also contains summaries of two discussion groups which looked at code generation tools and parallel architectures. As a direct result of one of these discussions, a group of the participants have collaborated to make a pure BURS system available for public distribution. This system, named BURG, is currently being beta-tested. Code Generation - Concepts, Tools, Techniques provides a representative summary of state-of-the-art code generation techniques and an important assessment of possible future innovations. It will be an invaluable reference work for researchers and practitioners in this important area.
The trend towards powerful workstations and high-speed networks has enabled applications to communicate and manipulate digital audio and video. These are continuous media and differ from discrete media such as text and graphics in that they have stringent delay and bandwidth requirements. Neither the mechanisms used to transport ordinary data over networks nor present communication protocols are sufficient to communicate continuous media. Special operating system support must also be provided to meet the requirements of both discrete and continuous media in future multimedia applications. This volume contains the proceedings of the Second International Workshop on Network and Operating System Support for Digital Audio and Video, held in cooperation with ACM SIGCOMM and SIGOPSat the IBM European Networking Center in Heidelberg, Germany, in November 1991. The volume contains 33 selected papers together with summaries of the workshop sessions compiled by the session chairmen.
The main aims of the series of volumes "Advances in Petri Nets" are: - to present to the "outside" scientific community a fair picture of recent advances in the area of Petri nets, and - to encourage those interested in the applications and theory of concurrent systems to take a closer look at Petri nets and then join the group of researchers working in this fascinating and challenging area. The ESPRIT Basic Research Action DEMON (DEsign Methods based On Nets) has been a focus of developments withinthe Petri net community for the last three years. The papers presented in this special volume have been selected from papers submitted by participants in DEMON. The papers have been refereed and appear in revised form. The volume contains technical contributions giving insights into a number of major achievements of the DEMON project. It also contains four survey papers covering important research areas. The volume begins witha description of DEMON given by its coordinator E. Best.
Technological advances are revolutionizing computers and networks to supportdigital video and audio, leading to new design spaces in computer systems and applications. Under the surface of exciting multimedia technologies liesa mine of research problems. This volume presents the proceedings of an international workshop which brought together the leading researchers in allaspects of multimedia computing, communication, storage, and applications. The field of multimedia has witnessed an explosive growth in the last few years and the selection of papers for this workshop was extremely competitive. The volume contains 26 full papers and 14 short papers selected from 128 contributions, organized into parts on: network and operating system support for multimedia; multimedia on-demand services; media synchronization; distributed multimedia systems; network andoperating system support for multimedia; multimedia models, frameworks, and document architectures; and multimedia workstations and platforms.
This volume contains the proceedings of the fifth International Workshop on Distributed Algorithms (WDAG '91) held in Delphi, Greece, in October 1991. The workshop provided a forum for researchers and others interested in distributed algorithms, communication networks, and decentralized systems. The aim was to present recent research results, explore directions for future research, and identify common fundamental techniques that serve as building blocks in many distributed algorithms. The volume contains 23 papers selected by the Program Committee from about fifty extended abstracts on the basis of perceived originality and quality and on thematic appropriateness and topical balance. The workshop was organizedby the Computer Technology Institute of Patras University, Greece.
In general, distributed systems can be classified into Distributed File Systems (DFS) and Distributed Operating Systems (DOS). The survey which follows distinguishes be tween DFS approaches in Chapters 2-3, and DOS approaches in Chapters 4-5. Within DFS and DOS, I further distinguish "traditional" and object-oriented approaches. A traditional approach is one where processes are the active components in the systems and where the name space is hierarchically organized. In a centralized environment, UNIX would be a good example of a traditional approach. On the other hand, an object-oriented approach deals with objects in which all information is encapsulated. Some systems of importance do not fit into the DFS/DOS classification. I call these systems "closely related" and put them into Chapter 6. Chapter 7 contains a table of comparison. This table gives a lucid overview summarizing the information provided and allowing for quick access. The last chapter is added for the sake of completeness. It contains very brief descriptions of other related systems. These systems are of minor interest or do not provide transparency at all. Sometimes I had to assign a system to this chapter simply for lack of adequate information about it."
This special volume contains the Proceedings of a Workshop on "Parallel Algorithms and Transputers for Optimization" which was held at the University of Siegen, on November 9, 1990. The purpose of the Workshop was to bring together those doing research on 2.lgorithms for parallel and distributed optimization and those representatives from industry and business who have an increasing demand for computing power and who may be the potential users of nonsequential approaches. In contrast to many other conferences, especially North-American, on parallel processing and supercomputers the main focus of the contributions and discussion was "problem oriented". This view reflects the following philosophy: How can the existing computing infrastructure (PC's, workstations, local area networks) of an institution or a company be used for parallel and/or distributed problem solution in optimization. This volume of the LECfURE NOTES ON ECONOMICS AND MA THEMA TICAL SYSTEMS contains most of the papers presented at the workshop, plus some additional invited papers covering other important topics related to this workshop. The papers appear here grouped according to four general areas. (1) Solution of optimization problems using massive parallel systems (data parallelism). The authors of these papers are: Lootsma; Gehne. (II) Solution of optimization problems using coarse-grained parallel approaches on multiprocessor systems (control parallelism). The authors of these papers are: Bierwirth, Mattfeld, and Stoppler; Schwartz; Boden, Gehne, and Grauer; and Taudes and Netousek.
What is eBPF? With this revolutionary technology, you can write custom code that dynamically changes the way the kernel behaves. It's an extraordinary platform for building a whole new generation of security, observability, and networking tools. This practical book is ideal for developers, system administrators, operators, and students who are curious about eBPF and want to know how it works. Author Liz Rice, chief open source officer with cloud native networking and security specialists Isovalent, also provides a foundation for those who want to explore writing eBPF programs themselves. With this book, you will: Learn why eBPF has become so important in the past couple of years Write basic eBPF code, and manipulate eBPF programs and attach them to events Explore how eBPF components interact with Linux to dynamically change the operating system's behavior Learn how tools based on eBPF can instrument applications without changes to the apps or their configuration Discover how this technology enables new tools for observability, security, and networking
Apply the principles of DevOps in software development-automated builds, automated tests, and continuous deployment and delivery-to iOS application development on Amazon Web Services (AWS) cloud. This book provides detailed walkthroughs and example source code is provided for the concepts discussed so you can put theory into practical application. You'll start by building a basic iOS application and then dive deep into key AWS Developer tools and services to see how they can be used in iOS application development. Then review the details of the integration of these fully managed AWS services with open-source tools such as Jenkins and Fastlane that allow developers to get the best of both worlds and further help to enhance and increase agility in the development lifecycle of iOS apps. You'll also investigate the Amazon EC2 Mac instance, which allows you to run XCode in a cloud environment for the first time to leverage the flexibility, elasticity, and scale of AWS. It also allows for seamless integration of XCode with fully managed AWS Services from source code control to application deployment. Finally, the book covers how a fully managed Continuous Integration Continuous Deployment (CICD) pipeline can be used to orchestrate all the different components of iOS application development to achieve a fully automated development lifecycle. Get started building your iOS applications using a fully automated process on the AWS Cloud today! What You'll Learn Build an iOS application using AWS DevOps tools Incorporate continuous deployment in your iOS application development Integrate AWS tooling with Xcode and open source tools such as Jenkins and Fastlane Who This Book Is For iOS application developers wanting to incorporate DevOps and Cloud Architecture into their development process.
|
You may like...
Design Thinking Research - Looking…
Christoph Meinel, Larry Leifer
Hardcover
R3,355
Discovery Miles 33 550
Secure Image Transmission in Wireless…
K Shankar, Mohamed Elhoseny
Hardcover
R2,653
Discovery Miles 26 530
Intentional Perspectives on Information…
Selmin Nurcan, Camille Salinesi, …
Hardcover
R4,083
Discovery Miles 40 830
|