![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
This book gathers together research from three key application themes of modelling in operational research - modelling to support evaluation and change in organisations; modelling within the development and use of organisational information systems; and the use of modelling approaches to support, enable and enhance decision support in organisational contexts. The issues raised provide valuable insight into the range of ways in which operational research techniques and practices are being successfully applied in today's information-centred business world. Modelling for Added Value provides a window onto current research and practise in modelling techniques and highlights their rising importance across the business, industrial and commercial sectors. The book contains contributions from a mix of academics and practitioners and covers a range of complex and diverse modelling issues, highlighting the broad appeal of this increasingly important subject area.
This systematic overview for beginners, converts to LINUX, and system administrators gives full details of operating system architecture, LINUX basic commands, and typical development and application packages. Fred Hantelmann focuses on the LST distribution (Power LINUX), the basic distribution for Caldera LINUX products, to provide a quick route to practical deployment.
User modeling researchers look for ways of enabling interactive software systems to adapt to their users-by constructing, maintaining, and exploiting user models, which are representations of properties of individual users. User modeling has been found to enhance the effectiveness and/or usability of software systems in a wide variety of situations. Techniques for user modeling have been developed and evaluated by researchers in a number of fields, including artificial intelligence, education, psychology, linguistics, human-computer interaction, and information science. The biennial series of International Conferences on User Modeling provides a forum in which academic and industrial researchers from all of these fields can exchange their complementary insights on user modeling issues. The published proceedings of these conferences represent a major source of information about developments in this area.
This book is aimed at students who need to learn the basics of programming or who are studying computing. It is a "hands on" book containing many examples which start by illustrating basic Oberon-2 language features and gradually increase in scope to cover object-oriented programming concepts and constructs. Oberon-2 is a successor to the language Pascal, which was also designed by Prof. N. Wirth [Wir71J. It has quickly become a major language used for teaching purposes. The only thing you need for successfully working through the book is to have access to a computer running Windows 3. 11 or Windows 95. The material in the book is useful to students of schools, colleges, and universities for teaching Oberon-2 and programming at an introductory level. of the book is not focused on software engineering or object The scope oriented technology; other books mentioned in the reference section already cover these topics in much greater depth. However, the examples in the book have been designed with these topics firmly in mind. Currently the term "object-oriented" is very much in fashion, having taken over from structured programming of the 1970s and '80s. In this book we have taken the view that a structured programming approach can be used to teach the fundamentals of programming algorithms. The object-oriented approach is then brought in as a complementary way to think, analyze, design and program.
This book introduces the concepts and features of Linux. It describes the features and services of the Internet which have been instrumental in the rapid development and wide distribution of Linux and focuses on the graphical interface, network capability, and extended tools of Linux. It also gives an overview of the wide range of freeware applications available for Linux. Now completely revised and expanded to help the reader take full advantage of the high-performance of Linux 2.0, this third edition lists all of the currently supported hardware; provides the latest information on Linux as client/server; explains the newest applications including StarOffice 3.1, new graphics tools (including GIMP), Xemacs, and LyX; and presents the most up to date information on security and cryptography. Plus, there is a new UNIX command reference with entries grouped by purpose, as well as a new section on how to deal with errors. All in all, the most up-to-date information on Linux available!
This book presents the thoroughly refereed post-workshop
proceedings of the 9th International Workshop on Languages and
Compilers for Parallel Computing, LCPC'96, held in San Jose,
California, in August 1996.
ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATA-IN ONE BOOK From the basics to advanced techniques: no Linux security experience necessary Realistic examples & step-by-step activities: practice hands-on without costly equipment The perfect introduction to Linux-based security for all students and IT professionals Linux distributions are widely used to support mission-critical applications and manage crucial data. But safeguarding modern Linux systems is complex, and many Linux books have inadequate or outdated security coverage. Linux Essentials for Cybersecurity is your complete solution. Leading Linux certification and security experts William "Bo" Rothwell and Dr. Denise Kinsey introduce Linux with the primary goal of enforcing and troubleshooting security. Their practical approach will help you protect systems, even if one or more layers are penetrated. First, you'll learn how to install Linux to achieve optimal security upfront, even if you have no Linux experience. Next, you'll master best practices for securely administering accounts, devices, services, processes, data, and networks. Then, you'll master powerful tools and automated scripting techniques for footprinting, penetration testing, threat detection, logging, auditing, software management, and more. To help you earn certification and demonstrate skills, this guide covers many key topics on CompTIA Linux+ and LPIC-1 exams. Everything is organized clearly and logically for easy understanding, effective classroom use, and rapid on-the-job training. LEARN HOW TO: Review Linux operating system components from the standpoint of security Master key commands, tools, and skills for securing Linux systems Troubleshoot common Linux security problems, one step at a time Protect user and group accounts with Pluggable Authentication Modules (PAM), SELinux, passwords, and policies Safeguard files and directories with permissions and attributes Create, manage, and protect storage devices: both local and networked Automate system security 24/7 by writing and scheduling scripts Maintain network services, encrypt network connections, and secure network-accessible processes Examine which processes are running-and which may represent a threat Use system logs to pinpoint potential vulnerabilities Keep Linux up-to-date with Red Hat or Debian software management tools Modify boot processes to harden security Master advanced techniques for gathering system information
Dependability has always been an vital attribute of operational systems, regardless of whether they are highly-specialised (like electricity generating plants) or more general-purpose (like domestic appliances). This volume provides a highly-readable overview of the topic, concentrating on dependability as a life-cycle management issue rather than as a technical subject. Specifically avoiding technical language and complex mathematics, it is designed to be accessible to readers at all levels. It will be of particular interest to project managers and software engineers in industries where dependability is of particular importance, such as aerospace, process control, and mining. It will also provide useful reading material for students taking courses with modules in dependability. Felix Redmill and Chris Dale have both worked in industry for over 15 years, and now run successful consultancy businesses.
This book presents the refereed proceedings of the First
International Conference on Mobile Agents, MA '97, held in Berlin,
Germany, in April 1997.
This book constitutes the refereed proceedings of the First
International Workshop on Communication and Architectural Support
for Network-Based Parallel Computing, CANPC'97, held in San
Antonio, Texas, USA, in February 1997.
"Grep Pocket Reference" is the first guide devoted to grep, the powerful utility program that helps you locate content in any file on a Unix or Linux system. Several applications use grep, from mail filtering and system log management to malware analysis and application development, and there are many other ways to use the utility. This pocket reference is ideal for system administrators, security professionals, developers, and others who want to learn more about grep and take new approaches with it.With "Grep Pocket Reference", you will: learn methods for filtering large files for specific content; acquire information not included in the current grep documentation; get several tricks for using variants such as egrep; keep key information about grep right at your fingertips; and, find the answers you need about grep quickly and easily. If you're familiar with this utility, "Grep Pocket Reference" will help you refresh your basic knowledge, understand rare situations, and find more efficient uses. If you're new to grep, this book is the best way to get started.
Good software interface design is as crucial to a product's success
as is its functionality. With the availability of visual
development tools such as Visual Basic and Visual C]+, more and
more developers of applications will need to understand and use
principles of good interface design. This book will help guide the
reader to a better understanding of how to make Windows software
simple to navigate and a pleasure to use. The author concentrates
on the development of user-interfaces for Windows 95 and NT
software and introduces some important design techniques such as
prototyping, UI bulking, Rapid Layout Comparison, and the
Side-by-Side Design Approach.
This book constitutes the strictly refereed post-conference
proceedings of the International Conference on Worldwide Computing
and Its Applications, WWCA'97, held in Tsukuba, Japan, in March
1997.
This book constitutes the refereed proceedings of the Third
International Conference of the Austrian Center for Parallel
Computation, ACPC '96, held in Klagenfurt, Austria, in September
1996.
27 contributions treat the state of the art in Monte Carlo and Finite Element methods for radiosity and radiance. Further special topics dealt with are the use of image maps to capture light throughout space, complexity, volumetric stochastic descriptions, innovative approaches to sampling and approximation, and system architecture. The Rendering Workshop proceedings are an obligatory piece of literature for all scientists working in the rendering field, but they are also very valuable for the practitioner involved in the implementation of state of the art rendering system certainly influencing the scientific progress in this field.
Delphi is a new Windows software development environment from
Borland. Released in 1995, it has quickly built up an excellent
reputation as one of the best Windows software development
tools.
This book presents the refereed proceedings of the International
Workshop on Parallel Symbolic Languages and Systems, PSLS '95, held
in Beaune, France, in October 1995.
Hailed in previous editions for its user-friendliness, this third
edition of Linux Universe contains the newest Linux Kernel 2.0.25
on two fully configured CD-ROMs for easy installation. The new
edition contains several powerful new features, including Java SDK
(binary), Xemacs, Netatalk (Appletalk connectivity), and IP
firewall administration tools.
This book presents the refereed proceedings of the Sixth
International Conference on Compiler Construction, CC '96, held in
Link ping, Sweden in April 1996.
This book presents the refereed proceedings of the Second
International Workshop on Tools and Algorithms for the Construction
and Analysis of Systems, TACAS '96, held in Passau, Germany in
March 1996.
This book presents the refereed proceedings of the Eighth Annual
Workshop on Languages and Compilers for Parallel Computing, held in
Columbus, Ohio in August 1995.
This book presents 12 revised refereed papers selected as the best
from 32 submissions for the First International Workshop on Tools
and Algorithms for the Construction and Analysis of Systems, TACAS
'95, held in Aarhus, Denmark, in May 1995.
and Overview book: to undertake an expedition into these new and to a large extent unexplored territories, explaining along the way what all these things mean to existing programs and their native use under Win32 systems. After all, before putting such nice things as multiple threads or Unicode into their applications, developers have to port them to Win32 in the first place! And this is, in spite of all the promises from Microsoft, somewhat more difficult than I'd expected - at the very least in certain sections. The book is not focused so much on the detailed explanation of all the new functions and possibilities (these won't escape you anyway!); rather, its main concern is to make the transition from 16 to 32 bit as easy and smooth as possible for you as the developer and/or project lead. So, let's have a closer look at the individual parts of the text! Chapter 1: Fundamental The first chapter is for project leads and developers alike. It gives an Aspects and Preliminary overview of the new Win32 systems, describes the most important fea- Considerations tures, and compares them with Win16 and also with the competition coming along in the form of OS/2 3. x and UNIX. I'll show the important architectural and implementation issues, concentrating on Windows NT and detailing the differences for Windows 95 when required.
This book is the proceedings of the Structures in Concurrency Theory workshop (STRICT) that was held from 11 th to l3th May 1995 in Berlin, Germany. It includes three invited contributions - by J. de Bakker, E. Best et aI, and E. R. Olderog and M. Schenke - and all papers which were submitted and accepted for presentation. Concurrency Theory deals with formal aspects of concurrent systems. It uses partly competing and partly complementary formalisms and structures. The aim of this workshop was to present and compare different formalisms and results in Concurrency Theory. STRICT was organized by the Humboldt-University Berlin and the ESPRIT Basic Research Working Group CALIBAN. Original papers had been sought from all scientists in the field of Concurrency Theory. The Programme Committee selected twenty contributions with various different topics, including Petri Nets, Process Algebras, Distributed Algorithms, Formal Semantics, and others. I am grateful to the Programme Committee and to the other referees for the careful evaluation of the submitted papers. |
![]() ![]() You may like...
Essential Java for Scientists and…
Brian Hahn, Katherine Malan
Paperback
R1,341
Discovery Miles 13 410
Continuous-Time Markov Decision…
Xianping Guo, Onesimo Hernandez-Lerma
Hardcover
R3,260
Discovery Miles 32 600
Soft Computing Techniques for…
Kaushik Kumar, Supriyo Roy, …
Paperback
R1,576
Discovery Miles 15 760
Application of Intelligent Control…
Dipayan Guha, Provas Kumar Roy, …
Hardcover
R4,237
Discovery Miles 42 370
Analysis and Synthesis of Delta Operator…
Hongjiu Yang, Yuanqing Xia, …
Hardcover
R2,945
Discovery Miles 29 450
|