Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
Das vorliegende Handbuch wendet sich an Debian-User, die uber ein vollstandig installiertes und konfiguriertes System verfugen, und nun das breite Spektrum der Anwendungen nutzen mochten. Im einzelnen werden folgende Themen behandelt: Datenorganisation (Benutzer- und Terminverwaltung, Groupware), Datenhaltung in Datenbanken (PostgreSQL, MySQL), Gestaltung von Grafiken (xfig, gnuplot, freie CAD-Programme), Bildverarbeitung (Gimp), wichtige Anwendungen zur Netzwerkkommunikation (ftp, E-Mail, write, talk, IRC, Instant Messaging, Voice over IP). Ferner werden freie Programme zur Tabellenkalkulation (Gnumeric) und zur Textverarbeitung (vi, Emacs, LaTeX, RCS, CVS) vorgestellt, eine Einfuhrung in die Computer-Algebra mittels Maple gegeben und gangige UNIX-Werkzeuge sowie die Office-Suiten OpenOffice und StarOffice in ihrer Basisfunktionalitat dargestellt. Dieses Werk bietet die optimale Erganzung zum Buch Debian GNU/Linux Grundlagen, Installation Administration und Anwendung von Peter H. Ganten und Wulf Alex."
This book constitutes the refereed proceedings of the First International Conference on Soft-Ware 2002, held in Belfast, North Ireland in April 2002.The 24 revised full papers presented together with seven abstracts of invited presentations and the summary of a panel were carefully reviewed and selected for inclusion in the book. All presentations are devoted to the effective handling of soft issues in the design, development, and operation of computing systems, from an academic research point of view as well as from the point of view of industrial practice. The papers aim at integrating an interdisciplinary range of disciplines including artificial intelligence, information systems, software engineering, and systems engineering.
This volume continues the tradition established in 2001 of publishing the c- tributions presented at the Cryptographers' Track (CT-RSA) of the yearly RSA Security Conference in Springer-Verlag's Lecture Notes in Computer Science series. With 14 parallel tracks and many thousands of participants, the RSA - curity Conference is the largest e-security and cryptography conference. In this setting, the Cryptographers' Track presents the latest scienti?c developments. The program committee considered 49 papers and selected 20 for presen- tion. One paper was withdrawn by the authors. The program also included two invited talks by Ron Rivest ("Micropayments Revisited" - joint work with Silvio Micali) and by Victor Shoup ("The Bumpy Road from Cryptographic Theory to Practice"). Each paper was reviewed by at least three program committee members; paperswrittenbyprogramcommitteemembersreceivedsixreviews.Theauthors of accepted papers made a substantial e?ort to take into account the comments intheversionsubmittedtotheseproceedings.Inalimitednumberofcases, these revisions were checked by members of the program committee. I would like to thank the 20 members of the program committee who helped to maintain the rigorous scienti?c standards to which the Cryptographers' Track aims to adhere. They wrote thoughtful reviews and contributed to long disc- sions; more than 400 Kbyte of comments were accumulated. Many of them - tended the program committee meeting, while they could have been enjoying the sunny beaches of Santa Barbara.
This volume presents twelve case studies that use RAISE - Rigorous Approach to Industrial Software Engineering - to construct, analyse, develop and apply formal specifications. The case studies cover a wide range of application areas including government finance, case-based reasoning, multi-language text processing, object-oriented design patterns, component-based software design and natural resource management. By illustrating the variety of uses of formal specifications, the case studies also raise questions about the creation, purpose and scope of formal models before they are built. Additional resources and complete specifications for all of the case studies and the RAISE tools used to process them, are available on the World Wide Web. This book will be of particular interest to software engineers, especially those responsible for the initial stages of requirements engineering and software architecture and design. It will also be of interest to academics and students on advanced formal methods courses.
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Selected Areas in Cryptology, SAC 2001, held in Toronto, Ontario, Canada in August 2001.The 25 revised full papers presented together with the abstracts of two invited talks were carefully reviewed and selected during two rounds of refereeing and revision. The papers are organized in topical sections on cryptanalysis, Boolean functions, Rijndael, elliptic curves and efficient implementation, public key systems, and protocols and MAC.
This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Languages and Compilers for Parallel Computing, LCPC 2000, held in Yorktown Heights, NY, USA, in August 2000. The 22 revised full papers presented together with 5 posters were carefully selected during two rounds of reviewing and improvement. All current aspects of parallel processing are addressed with emphasis on issues in optimizing compilers, languages, and software environments in high-performance computing.
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Job Scheduling Strategies for Parallel Processing, JSSPP 2001, held in Cambridge, MA, USA, in June 2001.The 11 revised full papers presented were carefully selected and improved during two rounds of reviewing and revision, and present state-of-the-art results in the area.
This book constitutes the refereed proceedings of the Third International COST264 Workshop on Networked Group Communication, NGC 2001, held in London, UK, in November 2001.The 14 revised full papers presented were carefully reviewed and selected from 40 submissions. All current issues in the area are addressed. The papers are organized in topical sections on application-level aspects, group management, performance topics, security, and topology.
This book constitutes the refereed proceedings of the IFIP/ACM
International Conference on Distributed Systems Platforms,
Middleware 2001, held in Heidelberg, Germany, in November
2001.
The chapters in this book are revised, updated, and edited versions of 13 selected papers from the Second International Conference on Cooperative Multimodal Communication (CMC'98), held in Tilburg, The Netherlands, in 1998.This wasthesecondconferencein a series,ofwhichthe ?rstonewasheld inEindhoven,TheNetherlands,in1995.Threeofthesepaperswerepresentedby invitedspeakers;thosebyDoniaScott(co-authoredwithRichardPower),Steven Feiner (co-authored with Michele Zhou), and Oliviero Stock (co-authored with Carlo Strapparava and Massimo Zancanaro). The other ten were among the submitted papers that were accepted by the CMC'98 program committee. The editors contributed an introductory chapter to set the stage for the rest of the book. We thank the programcommittee for their excellent and timely feedback to the authors of the submitted papers, and at a later stage for advising on the contents of this volume and for providing additional suggestions for improving theselectedcontributions.Theprogramcommittee consistedofNicholasAsher, NormannBadler,DonBouwhuis,HarryBunt,WalthervonHahn,DieterHuber, Hans Kamp, John Lee, Joseph Mariani, Jean-Claude Martin, Mark Maybury, PaulMcKevitt, RobNederpelt, KeesvanOverveld,RayPerrault,Donia Scott, Jan Treur, Wolfgang Wahlster, Bonnie Webber, Kent Wittenburg, and Henk Zeevat. WethanktheRoyalDutchAcademyofSciences(KNAW)andtheOrga- zationforCooperationamongUniversitiesinBrabant(SOBU)fortheirgrants that supported the conference.
Building on classical queueing theory mainly dealing with single node queueing systems, networks of queues, or stochastic networks has been a field of intensive research over the last three decades. Whereas the first breakthrough in queueing network theory was initiated by problems and work in operations research, the second breakthrough, as well as subsequent major work in the area, was closely related to computer science, particularly to performance analysis of complex systems in computer and communication science.The text reports on recent research and development in the area. It is centered around explicit expressions for the steady behavior of discrete time queueing networks and gives a moderately positive answer to the question of whether there can be a product form calculus in discrete time. Originating from a course given by the author at Hamburg University, this book is ideally suited as a text for courses on discrete time stochastic networks.
Linux has become increasingly popular as an alternative operating system to Microsoft Windows as its ease of installation and use has improved. This, combined with an ever growing range of applications, makes it an attractive alternative to Windows for many people.Essential Linux fast covers areas such as:- The essential preliminaries that should be carried out before installing Linux- Installing a Linux system- Configuring peripherals- Using X windows- Basic and intermediate Unix commands- Using the Internet with Linux- Using Linux for document preparation- Using Linux for programmingIf you want to make the switch from Windows, this is the book you need. Ian Chivers tells you how to get and install Linux and explains why Linux is becoming the hottest operating system of the millennium.
Shell scripting skills never go out of style. It's the shell that unlocks the real potential of Unix. Shell scripting is essential for Unix users and system administrators-a way to quickly harness and customize the full power of any Unix system. With shell scripts, you can combine the fundamental Unix text and file processing commands to crunch data and automate repetitive tasks. But beneath this simple promise lies a treacherous ocean of variations in Unix commands and standards. "Classic Shell Scripting" is written to help you reliably navigate these tricky waters. Writing shell scripts requires more than just a knowledge of the shell language, it also requires familiarity with the individual Unix programs: why each one is there, how to use them by themselves, and in combination with the other programs. The authors are intimately familiar with the tips and tricks that can be used to create excellent scripts, as well as the traps that can make your best effort a bad shell script. With "Classic Shell Scripting" you'll avoid hours of wasted effort. You'll learn not only write useful shell scripts, but how to do it properly and portably. The ability to program and customize the shell quickly, reliably, and portably to get the best out of any individual system is an important skill for anyone operating and maintaining Unix or Linux systems. "Classic Shell Scripting" gives you everything you need to master these essential skills.
This book constitutes the refereed proceedings of the 8th International Conference on User Modeling, UM 2001, held in Sonthofen, Germany in July 2001.The 19 revised full papers and 20 poster summaries presented together with summaries of 12 selected student presentations were carefully reviewed and selected from 79 submissions. The book offers topical sections on acquiring user models from multi-modal user input; learning interaction models; user models for natural language interpretation, processing, and generation; adaptive interviewing for acquiring user preferences and product customization; supporting user collaboration through adaptive agents; student modeling; and adaptive information filtering, retrieval, and browsing.
The importance of typed languages for building robust software systems is, by now, an undisputed fact. Years of research have led to languages with richly expressive, yet easy to use, type systems for high-level programming languages. Types provide not only a conceptual framework for language designers, but also a ord positive bene ts to the programmer, principally the ability to express and enforce levels of abstraction within a program. Early compilers for typed languages followed closely the methods used for their untyped counterparts. The role of types was limited to the earliest s- ges of compilation, and they were thereafter ignored during the remainder of the translation process. More recently, however, implementors have come to - cognize the importance of types during compilation and even for object code. Several advantages of types in compilation have been noted to date: { They support self-checking by the compiler. By tracking types during c- pilation it is possible for an internal type checker to detect translation errors at an early stage, greatly facilitating compiler development. { They support certi cation of object code. By extending types to the ge- rated object code, it becomes possible for a code user to ensure the basic integrity of that code by checking its type consistency before execution. { They support optimized data representations and calling conventions, even in the presence of modularity. By passing types at compile-, link-, and even run-time, it is possible to avoid compromises of data representation imposed by untyped compilation techniques.
This book constitutes the refereed proceedings of the 10th International Conference on Compiler Construction, CC 2001, held in Genova, Italy in April 2001.The 22 revised full papers presented were carefully reviewed and selected from a total of 69 submissions. The papers are organized in topical sections on program analysis, program transformation, intraprocessor parallelism, parsing, memory hierarchy, profiling, and demos.
This volume contains the papers presented at the International Workshop on Tools for Working with Guidelines, (TFWWG 2000), held in Biarritz, France, in October 2000. It is the final outcome of the International Special Interest Group on Tools for Working with Guidelines.Human-computer interaction guidelines have been recognized as a uniquely relevant source for improving the usability of user interfaces for interactive systems. The range of interactive techniques exploited by these interactive systems is rapidly expanding to include multimodal user interfaces, virtual reality systems, highly interactive web-based applications, and three-dimensional user interfaces. Therefore, the scope of guidelines' sources is rapidly expanding as well, and so are the tools that should support users who employ guidelines to ensure some form of usability.Tools For Working With Guidelines (TFWWG) covers not only software tools that designers, developers, and human factors experts can use to manage multiple types of guidelines, but also looks at techniques addressing organizational, sociological, and technological issues.
Jurgen Glag's book points out how to ensure professional and
efficient database software development in DB2 mainframe and
client/server environments. The asset of this book is that
technical aspects (performance, tuning) and organizational measures
(economical performance) are covered. Consequently, this book is
suitable particularly for organizations that want to use DB2 in an
economical and safe way.
This volume contains the papers prepared for the 2nd International Conference on Natural Language Processing, held 2-4 June in Patras, Greece. The conference program features invited talks and submitted papers, c- ering a wide range of NLP areas: text segmentation, morphological analysis, lexical knowledge acquisition and representation, grammar formalism and s- tacticparsing, discourse analysis, languagegeneration, man-machineinteraction, machine translation, word sense disambiguation, and information extraction. The program committee received 71 abstracts, of which unfortunately no more than 50% could be accepted. Every paper was reviewed by at least two reviewers. The fairness of the reviewing process is demonstrated by the broad spread of institutions and countries represented in the accepted papers. So many have contributed to the success of the conference. The primary credit, ofcourse, goes to theauthors andto the invitedspeakers. By theirpapers and their inspired talks they established the quality of the conference. Secondly, thanks should go to the referees and to the program committee members who did a thorough and conscientious job. It was not easy to select the papers to be presented. Last, but not least, my special thanks to the organizing committee for making this conference happ
This is the first book designed to help Windows developers decide not only which technologies to use but also how to use them. It teaches them to combine the wide variety of technologies that make up Windows DNA into effective solutions for their own enterprise application requirements. The author makes use of his long consulting experience in the client-server world to describe "best practices" that apply to building Windows DNA applications.
ETAPS2000 was the third instance of the EuropeanJoint Conferenceson Theory and Practice of Software. ETAPS is an annual federated conference that was established in 1998 by combining a number of existing and new conferences. This year it comprised ?ve conferences (FOSSACS, FASE, ESOP, CC, TACAS), ?ve satellite workshops (CBS, CMCS, CoFI, GRATRA, INT), seven invited lectures, a panel discussion, and ten tutorials. The events that comprise ETAPS address various aspects of the system - velopment process, including speci?cation, design, implementation, analysis, and improvement. The languages, methodologies, and tools which support these - tivities are all well within its scope. Di?erent blends of theory and practice are represented, with an inclination towards theory with a practical motivation on one hand and soundly-based practice on the other. Many of the issues involved in software design apply to systems in general, including hardware systems, and the emphasis on software is not intended to be exclusive.
ThePKC2000conferencewasheldattheMelbourneExhibitionCentre, Victoria, Australia, January 18-20, 2000. It was the third conference in the international workshop series dedicated to practice and theory in public key cryptography. The program committee of the conference received 70 full submissions from around the world, of which 31 were selected for presentation. All submissions were reviewed by experts in the relevant areas. The program committee consisted of 19 experts in cryptography and data se- rity drawn from the international research community, these being Chin-Chen Chang (National Chung Cheng University, Taiwan), Claude Cr epeau (McGill University, Canada), Ed Dawson (Queensland University of Technology, A- tralia), Yvo Desmedt (Florida State University, USA), Hideki Imai (Co-chair, UniversityofTokyo, Japan), MarkusJakobsson(BellLabs, USA), KwangjoKim (Information and Communications University, Korea), Arjen Lenstra (Citibank, USA), TsutomuMatsumoto(YokohamaNationalUniversity, Japan), DavidN- cache (Gemplus, France), Eiji Okamoto (University of Wisconsin-Milwaukee, USA), TatsuakiOkamoto(NTTLabs, Japan), JosefPieprzyk(UniversityofW- longong, Australia), Jean-Jacques Quisquater (Universit e Catholique de L- vain, Belgium), Nigel Smart (HP Labs Bristol, UK), Vijay Varadharajan (U- versity of Western Sydney, Australia), Serge Vaudenay (Ecole Polytechnique F ed erale de Lausanne, Switzerland), Moti Yung (CertCo, USA), and Yuliang Zheng (Co-chair, Monash University, Australia). Members of the committee spent numerous hours in reviewing the submissions and providing advice and comments on the selection of paper
This comprehensive guide is directed at Linux and UNIX users but is also the best how-to book on the use of LaTeX in preparing articles, books and theses. Unlike other LaTeX books, this one is particularly suitable for anyone coming to LaTeX for the first time.
Approaches to project scheduling under resource constraints are discussed in this book. After an overview of different models, it deals with exact and heuristic scheduling algorithms. The focus is on the development of new algorithms. Computational experiments demonstrate the efficiency of the new heuristics. Finally, it is shown how the models and methods discussed here can be applied to projects in research and development as well as market research.
ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATA-IN ONE BOOK From the basics to advanced techniques: no Linux security experience necessary Realistic examples & step-by-step activities: practice hands-on without costly equipment The perfect introduction to Linux-based security for all students and IT professionals Linux distributions are widely used to support mission-critical applications and manage crucial data. But safeguarding modern Linux systems is complex, and many Linux books have inadequate or outdated security coverage. Linux Essentials for Cybersecurity is your complete solution. Leading Linux certification and security experts William "Bo" Rothwell and Dr. Denise Kinsey introduce Linux with the primary goal of enforcing and troubleshooting security. Their practical approach will help you protect systems, even if one or more layers are penetrated. First, you'll learn how to install Linux to achieve optimal security upfront, even if you have no Linux experience. Next, you'll master best practices for securely administering accounts, devices, services, processes, data, and networks. Then, you'll master powerful tools and automated scripting techniques for footprinting, penetration testing, threat detection, logging, auditing, software management, and more. To help you earn certification and demonstrate skills, this guide covers many key topics on CompTIA Linux+ and LPIC-1 exams. Everything is organized clearly and logically for easy understanding, effective classroom use, and rapid on-the-job training. LEARN HOW TO: Review Linux operating system components from the standpoint of security Master key commands, tools, and skills for securing Linux systems Troubleshoot common Linux security problems, one step at a time Protect user and group accounts with Pluggable Authentication Modules (PAM), SELinux, passwords, and policies Safeguard files and directories with permissions and attributes Create, manage, and protect storage devices: both local and networked Automate system security 24/7 by writing and scheduling scripts Maintain network services, encrypt network connections, and secure network-accessible processes Examine which processes are running-and which may represent a threat Use system logs to pinpoint potential vulnerabilities Keep Linux up-to-date with Red Hat or Debian software management tools Modify boot processes to harden security Master advanced techniques for gathering system information |
You may like...
PowerShell, IT Pro Solutions…
William R. Stanek, William Stanek
Hardcover
R1,498
Discovery Miles 14 980
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, …
Hardcover
R1,297
Discovery Miles 12 970
|