![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
Learn the skills and solutions required to secure your Mac's operating system, the underlying hardware, and allow users to get work done safely. This book will show you how to create a Mac that's made of steel and won't buckle when attacked! Ok, there's no such thing as unhackable. No magic tool or silver bullet will eliminate risk in all forms. Security is an ongoing journey - not a simple action or software application. And that is exactly what you'll learn to master-the foundational knowledge, skills, and mindset to holistically protect Macs. Regardless of whether it's your personal iMac or a fleet of MacBook Pro's assigned to the remote employees within your organization, you'll be able to limit access while identifying and mitigating risk unique to your environment. In addition to the information security best practices pertaining to protecting Apple computers, you'll pivot to a coherent, security-focused mindset to better understand macOS-specific security. You'll learn how it works and what tools and software are available to help. Both native and 3rd-party tool are covered. Safe guard your system's privacy data and capitalize on effectively locking down the security of your Mac computers against known threats and newer trends that continue to evolve. Hardening Your Macs is the perfect roadmap to stopping malicious attacks and bad actors from spying on users through cameras, microphones, and other built-in tools that could potentially be used against users and organizations alike. What You'll Learn Grasp the mindset of attackers-how they plan and execute malicious incursions Implement hardware solutions as well as software safeguards Take advantage of Apple's built-in macOS security features in addition to 3rd party tools Avoid attacks on your system that could compromise sensitive corporate data and personally identifiable information Who This Book Is For IT admins responsible for managing Mac device security. Additionally users of Apple products that may have some experience using the platform in general but are not versed in security, as well as, those switching from Windows platforms will find useful information here. And anyone that wishes to expand their information security skills and/or develop a security-focused mindset to better protect their personal information and privacy data from the numerous and growing threats in the wild, such as malware and phishing.
If you think "Modern" and "C" don't belong in the same sentence, think again. The C standards committee actively reviews and extends the language, with updated published C standards as recently as 2018. In Modern C, author Jens Gustedt teaches you the skills and features you need to write relevant programs in this tried-and-true language, including Linux and Windows, device drivers, web servers and browsers, smartphones, and much more! Modern C teaches you to take your C programming skills to new heights, whether you're just starting out with C or have more extensive experience. Organized by level, this comprehensive guide lets you jump in where it suits you best while still reaping the maximum benefits. Key Features Fundamentals of C programming Operators and functions Performance techniques C library functions For more than four decades, C has proved its usefulness and staying power for everything from massive systems for mainframes, satellites, and internet browsers to tiny embedded systems in vending machines, credit card readers, and alarm clocks. Today you'll find lightning-fast, elegant C programs running in smartphone kernels, databases, 3D movies, video games, and scores of other modern applications. For programmers comfortable writing simple programs in a language like Java, Python, Ruby, C#, C++, or C. Jens Gustedt has been a senior scientist at the French National Institute for Computer Science and Control (INRIA) since 1998, working in areas including algorithms, scientific experimentation, models for coarse-grained parallelism, and distributed locking. Currently, he's conducting the Modular C project, which has given rise to libraries such as arbogast and EiLck.
"This book is a comprehensive text for the design of safety critical, hard real-time embedded systems. It offers a splendid example for the balanced, integrated treatment of systems and software engineering, helping readers tackle the hardest problems of advanced real-time system design, such as determinism, compositionality, timing and fault management. This book is an essential reading for advanced undergraduates and graduate students in a wide range of disciplines impacted by embedded computing and software. Its conceptual clarity, the style of explanations and the examples make the abstract concepts accessible for a wide audience." Janos Sztipanovits, Director E. Bronson Ingram Distinguished Professor of Engineering Institute for Software Integrated Systems Vanderbilt University Real-Time Systems focuses on hard real-time systems, which are computing systems that must meet their temporal specification in all anticipated load and fault scenarios. The book stresses the system aspects of distributed real-time applications, treating the issues of real-time, distribution and fault-tolerance from an integral point of view. A unique cross-fertilization of ideas and concepts between the academic and industrial worlds has led to the inclusion of many insightful examples from industry to explain the fundamental scientific concepts in a real-world setting. Compared to the Second Edition, new developments in communication standards for time-sensitive networks, such as TSN and Time-Triggered Ethernet are addressed. Furthermore, this edition includes a new chapter on real-time aspects in cloud and fog computing. The book is written as a standard textbook for a high-level undergraduate or graduate course on real-time embedded systems or cyber-physical systems. Its practical approach to solving real-time problems, along with numerous summary exercises, makes it an excellent choice for researchers and practitioners alike.
Create apps with rich capabilities to receive, process, and intelligently store data that work across multiple devices in the Apple ecosystem. This book will show you how to organize your app's data and make it work for you and your users! With many frameworks, there's a point in the learning curve where you stop fearing the mountain of knowledge to learn and just enjoy the power to play and develop. For some reason many developers feel that point seems harder to reach with Core Data. And that's unjustified-Core Data is a great framework that with powerful, optimized tools right out of the box. So it's time you stopped fearing the journey and took your steps further out into the world of enjoying the power of Core Data. With what you learn, you can build apps to deal with a large amount of data and complex relationships in intelligent and efficient ways. Core Data has many secrets underneath the hood that can power up your persistent store like never before. Tools such as Undo, objects deletion, migration, and more. Set up your store and your data model, handle objects with a multi-threading environment, write integration tests, and share your data with an Apple Watch app and iCloud.What You'll Learn Work with Core Data objects across apps and platforms Write integration tests with your persistent store Fetch, organize, write, and process data efficiently and intelligently Who This Book Is For Experienced iOS developers with Swift knowledge creating iOS apps that require saving complex data on the device other than a few numbers or text.
Dieses Buch erlautert, was hinter den aktuellen Buzzwords aus der Business-IT wirklich steckt. Dabei konzentriert es sich auf die vier wichtigen Kernthemen SOA (Service Orientierte Architekturen), BI (Business Intelligence), CRM (Customer Relationship Management) und ECM (Enterprise Content Management). Sie erfahren, welche Ziele mit diesen Technologien erreicht werden sollen, welche Komponenten daran beteiligt sind, welche Produkte der Markt anbietet und worauf Sie bei einer Einfuhrung unbedingt achten sollten. Dabei richtet sich das Buch an technisch orientierte Leser, die diese Themen von der IT-Seite her angehen. Nach einer kurzen Einfuhrung folgen die technischen Grundlagen und dazu passende praxisrelevante Beispiele. So werden etwa Datamining-Verfahren fur Business Intelligence erlautert, die mehr liefern als die banale Aussage Wer Bier kauft, kauft auch Chips." Zudem bietet dieses Buch auch einen Uberblick uber die wichtigsten Hersteller und Losungsanbieter in den jeweiligen Produktkategorien. Entscheidungshilfen und konkrete, praxisbezogenen Produktempfehlungen runden die jeweiligen Schwerpunktthemen ab.
This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you're new to the job or have years of experience. With "Linux Networking Cookbook", you'll dive straight into the gnarly hands-on work of building and maintaining a computer network. Running a network doesn't mean you have all the answers. Networking is a complex subject with reams of reference material that's difficult to keep straight, much less remember. If you want a book that lays out the steps for specific tasks, that clearly explains the commands and configurations, and does not tax your patience with endless ramblings and meanderings into theory and obscure RFCs, this is the book for you.You will find recipes for: building a gateway, firewall, and wireless access point on a Linux network; building a VoIP server with Asterisk; secure remote administration with SSH; building secure VPNs with OpenVPN, and a Linux PPTP VPN server; single sign-on with Samba for mixed Linux/Windows LANs; centralized network directory with OpenLDAP; network monitoring with Nagios or MRTG; getting acquainted with IPv6; setting up hands-free networks installations of new systems; Linux system administration via serial console, and a lot more. Each recipe includes a clear, hands-on solution with tested code, plus a discussion on why it works. When you need to solve a network problem without delay, and don't have the time or patience to comb through reference books or the Web for answers, "Linux Networking Cookbook" gives you exactly what you need.
Ready to build mobile apps that out-perform the rest? If you're an iOS developer with app-building experience, this practical guide provides tips and best practices to help you solve many common performance issues. You'll learn how to design and optimize iOS apps that deliver a smooth experience even when the network is poor and memory is low. Today's picky users want fast and responsive apps that don't hog resources. In this book, author Gaurav Vaish demonstrates methods for writing optimal code from an engineering perspective, using reusable Objective-C code that you can use right away. Up your game and create high-performance native iOS apps that truly stand out from the crowd. Measure key performance indicators-attributes that constitute and affect app performance Write efficient apps by minimizing memory and power consumption, and explore options for using available CPU cores Optimize your app's lifecycle and UI, as well as its networking, data sharing, and security features Learn about application testing, debugging and analysis tools, and monitoring your app in the wild Collect data from real users to analyze app usage, identify bottlenecks, and provide fixes Use iOS 9 upgrades to improve your app's performance
Prepare for Microsoft Exam 70-774-and help demonstrate your real-world mastery of performing key data science activities with Azure Machine Learning services. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the MCSA level. Focus on the expertise measured by these objectives: Prepare data for analysis in Azure Machine Learning and export from Azure Machine Learning Develop machine learning models Operationalize and manage Azure Machine Learning Services Use other services for machine learning This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you are familiar with Azure data services, machine learning concepts, and common data science processes About the Exam Exam 70-774 focuses on skills and knowledge needed to prepare data for analysis with Azure Machine Learning; find key variables describing your data's behavior; develop models and identify optimal algorithms; train, validate, deploy, manage, and consume Azure Machine Learning Models; and leverage related services and APIs. About Microsoft Certification Passing this exam as well as Exam 70-773: Analyzing Big Data with Microsoft R earns your MCSA: Machine Learning certifi?cation, demonstrating your expertise in operationalizing Microsoft Azure machine learning and Big Data with R Server and SQL R Services. See full details at: microsoft.com/learning
Discover the latest information for working on Windows, Mac OS, and UNIX/Linux platforms with GUIDE TO OPERATING SYSTEMS, 5E. You examine operating system theory, installation, upgrading, configuring operating system and hardware, file systems, virtualization, security, hardware options, storage, resource sharing, network connectivity, maintenance, and troubleshooting. Easily understood and highly practical, GUIDE TO OPERATING SYSTEMS, 5E is the resource you need to deepen your understanding of different operating systems. This edition helps you understand the fundamental concepts of computer operating systems. The book specifically addresses Windows 10 and earlier Windows client OSs, Windows Server 2012 R2 and earlier Windows server OSs with a preview of Windows Server 2016, Fedora Linux, and Mac OS X El Capitan and earlier. In addition, general information prepares you to work with many other operating systems.
Create music CDs and photo DVDs or even watch TV Move your files to a new computer, or get your old PC ready for Vista The thing that's made "Windows For Dummies" so successful is that it's packed with the basics you need to make Windows work. This book gets you through all the Windows Vista tasks and tripwires, including starting programs, finding files, navigating the new see-through interface, staying safe while you cruise the Internet, and much more. Discover how to Find files when they?re hiding Hook up with another computer Make Vista work like XP Block Internet bad guys Share a PC without sharing your files Fix problems yourself
"Drag & Drop" is a series of 12 books, mainly aimed at beginners and students. It is based on the WYSIWYG (What You See is What You Get) method, so the reader can easily correlate what is written in the book with what is displayed on the computer screen. The programs can be learnt by the simple process of dragging, dropping and clicking on the command with the mouse. Each book in the series focuses on a particular software and explains it in a clear and concise manner.
You can set your watch to it: As soon as Apple comes out with another version of Mac OS X, David Pogue hits the streets with another meticulous Missing Manual to cover it with a wealth of detail. The new Mac OS X 10.4, better known as Tiger, is faster than its predecessors, but nothing's too fast for Pogue and "Mac OS X: The Missing Manual," There are many reasons why this is the most popular computer book of all time. With its hallmark objectivity, the Tiger Edition thoroughly explores the latest features to grace the Mac OS. Which ones work well and which do not? What should you look for? This book tackles Spotlight, an enhanced search feature that helps you find anything on your computer; iChat AV for videoconferencing; Automator for automating repetitive, manual or batch tasks; and the hundreds of smaller tweaks and changes, good and bad, that Apple's marketing never bothers to mention. "Mac OS X: The Missing Manual, Tiger Edition" is the authoritative book that's ideal for every user, including people coming to the Mac for the first time. Our guide offers an ideal introduction that demystifies the Dock, the unfamiliar Mac OS X folder structure, and the entirely new Mail application. There are also mini-manuals on iLife applications such as iMovie, iDVD, and iPhoto, those much-heralded digital media programs, and a tutorial for Safari, Mac's own web browser. And plenty more: learn to configure Mac OS X using the System Preferences application, keep your Mac secure with FileVault, and learn about Tiger's enhanced Firewall capabilities. If you're so inclined, this Missing Manual also offers an easy introduction to the Terminal application for issuing basic Unix commands. There's something new on practically every page, and David Pogue brings his celebrated wit and expertise to every one of them. Mac's brought a new cat to town and we have a great new way to tame it.
"As an author, editor, and publisher, I never paid much attention to the competition-except in a few cases. This is one of those cases. The UNIX System Administration Handbook is one of the few books we ever measured ourselves against." -From the Foreword by Tim O'Reilly, founder of O'Reilly Media "This book is fun and functional as a desktop reference. If you use UNIX and Linux systems, you need this book in your short-reach library. It covers a bit of the systems' history but doesn't bloviate. It's just straightfoward information delivered in colorful and memorable fashion." -Jason A. Nunnelley"This is a comprehensive guide to the care and feeding of UNIX and Linux systems. The authors present the facts along with seasoned advice and real-world examples. Their perspective on the variations among systems is valuable for anyone who runs a heterogeneous computing facility." -Pat ParseghianThe twentieth anniversary edition of the world's best-selling UNIX system administration book has been made even better by adding coverage of the leading Linux distributions: Ubuntu, openSUSE, and RHEL. This book approaches system administration in a practical way and is an invaluable reference for both new administrators and experienced professionals. It details best practices for every facet of system administration, including storage management, network design and administration, email, web hosting, scripting, software configuration management, performance analysis, Windows interoperability, virtualization, DNS, security, management of IT service organizations, and much more. UNIX (R) and Linux (R) System Administration Handbook, Fourth Edition, reflects the current versions of these operating systems:Ubuntu (R) LinuxopenSUSE (R) LinuxRed Hat (R) Enterprise Linux (R)Oracle America (R) Solaris (TM) (formerly Sun Solaris)HP HP-UX (R)IBM AIX (R)
This handy cookbook teaches new-to-intermediate Linux users the essential skills necessary to manage a Linux system, using both graphical and command-line tools. Whether you run Linux in embedded, desktop, server, or cloud or virtual environments, the fundamental skills are the same. This book aims to get you up and running quickly, with copy-paste examples. Carla Schroder provides recipes that cover specific problems, with discussions that explain how each recipe works, as well as references for additional study. You'll learn how to: Use systemd, the new comprehensive service manager Build simple or complex firewalls with firewalld Set up secure network connections for Linux systems and mobile devices Rescue nonbooting systems Reset lost passwords on Linux and Windows Use dnsmasq to simplify managing your LAN name services Manage users and groups and control access to files Probe your computer hardware and monitor hardware health Manage the GRUB bootloader and multiboot Linux and Windows Keep accurate time across your network with the newest tools Build an internet router/firewall on Raspberry Pi Manage filesystems and partitioning
There is a rapid growth of automation in server rooms and data centers. The days of having many administrators running around busily configuring and maintaining servers are gone and have been replaced with droves of Salt-Minions; agents beavering away on the target nodes ensuring the configuration is as specified. This book covers Salt Open (also known as SaltStack Open) from the ground up and shows you how to work with two Linux distributions. You'll see how Salt Open is duplicated with ArubaOS and IOS networking devices, which can be configured without the underlying OS. As you step through the configuration options, you'll learn how to run remote execution modules from the CLI before looking at stateful configuration using SLS files. Moving on, you'll learn how to configure the systems where you also need to monitor your devices and that is when reactors and beacons come into play. Creating beacons to alert the server when thresholds are exceeded, you will be able to create reactors to mitigate the issues identified by the beacons. By the end of this book, you will be able to deploy Salt to your servers and network infrastructure. You will be able to install the Salt-Master and Salt-Minion, executing commands from both the Master and the Minion. The networking devices you need to manage will be controlled through the Salt_Proxy Minions that you have configured. Finally, you will be able to load-balance connections to the master with Salt-Syndic. What You'll Learn Install Salt Services on Ubuntu and CentOS based systems Work with remote execution modules Format YAML files correctly Provide defined configuration using state files Use Salt-Proxy to configure network devices Automate the configuration of Linux servers and networking devices Add value for both the server and network automation team Who This Book Is For System administrators experienced in Linux administration, who desire to expand their horizons into the world of automation, moving from scripts to states.
With more than 60 practical and creative hacks, this book helps you turn Raspberry Pi into the centerpiece of some cool electronics projects. Want to create a controller for a camera or a robot? Set up Linux distributions for media centers or PBX phone systems? That's just the beginning of what you'll find inside "Raspberry Pi Hacks." If you're looking to build either a software or hardware project with more computing power than Arduino alone can provide, Raspberry Pi is just the ticket. And the hacks in this book will give you lots of great ideas.Use configuration hacks to get more out of your PiBuild your own web server or remote print serverTake the Pi outdoors to monitor your garden or control holiday lightsConnect with SETI or construct an awesome Halloween costumeHack the Pi's Linux OS to support more complex projectsDecode audio/video formats or make your own music playerAchieve a low-weight payload for aerial photographyBuild a Pi computer cluster or a solar-powered lab
Develop UI-heavy applications more easily, faster, and error-free. Based on several enhancements to the Swift language, SwiftUI takes a declarative approach to building UIs. Instead of imperatively coding the UI, this book will show you how to describe how you want your UI to look. SwiftUI treats the UI as a function of its state, thereby making managing your app's state a lot easier. Change the underlying data model to redraw all parts of the UI that are connected to that particular slice of data. Likewise, easily update the underlying data model from the UI elements your data model is connected to. Combine is Apple's Functional Reactive Programming framework. It complements SwiftUI and other frameworks, such as the networking APIs, in a natural way. Using Combine, you can subscribe to events and describe data processing in a way that is free of side effects. This allows for an easier implementation of event-driven applications. Using SwiftUI and Combine build more error-free apps in a shorter amount of time, targeting all of Apple's platforms (iOS, iPadOS, watchOS, macOS, tvOS) with little to no overhead. By the end of the book you will have a solid understanding for architecting and implementing UI-heavy apps in a declarative and functional reactive way using SwiftUI, Combine, and async/await. You will: - Build simple and gradually more complex UIs in SwiftUI - Understand SwiftUI's state management system - Work with Combine and Swift's new async/await APIs to access the network and access other asynchronous APIs - Architect and structure modern applications on Apple platforms using SwiftUI, Combine, and async/await
This book constitutes the proceedings of the 29th International Conference on Web Services, ICWS 2022, held in Honolulu, USA, as part of SCF 2022, during December 10-14, 2022.The 9 full papers presented in this volume were carefully reviewed and selected from 20 submissions. The papers cover aspects of services computing and applications. Centered around services computing, it covers various systems and networking research pertaining to cloud, edge and Internet-of-Things (IoT), as well as technologies for intelligent computing, learning, big data and blockchain applications.
Harbor is a major CNCF open source project, with thousands of production users all over the world. This book provides a comprehensive explanation of the open source cloud native registry: Harbor. Written by experts who contributed to and now maintain Harbor, the content covers its architecture, principles, functions, deployment and configuration, scanning artifacts, remote replication, operation and maintenance, customized development, API usage and success stories. The book offers a valuable guide for Harbor users, developers and contributors, cloud native software development engineers, test engineers, operational and maintenance engineers, IT architects and IT technical managers. It will also benefit university students in computer-related disciplines.
This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022. The 32 full papers and 4 short papers included in this book were carefully reviewed andselected from 159 submissions. They were organized in topical sections as follows: tokenomics; MPC (mostly); privacy; ZKP; old-school consensus; mostly payment networks; incentives; not proof of work; performance; measurements.
Gain a solid understanding of how Linux C and C++ compilers generate binary code. This book explains the reversing and binary analysis of ARM64 architecture now used by major Linux cloud providers and covers topics ranging from writing programs in assembly language, live debugging, and static binary analysis of compiled C and C++ code. It is ideal for those working with embedded devices, including mobile phones and tablets. Using the latest version of Red Hat, you'll look closely at the foundations of diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems. You'll also work with the GDB debugger and use it for disassembly and reversing. This book uses practical step-by-step exercises of increasing complexity with explanations and many diagrams, including some necessary background topics. In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct original C/C++ code. And as you'll see, memory forensics, malware, and vulnerability analysis, require an understanding of ARM64 assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the background knowledge and practical foundations you'll need to understand internal Linux program structure and behavior. Foundations of ARM64 Linux Debugging, Disassembling, and Reversing is the perfect companion to Foundations of Linux Debugging, Disassembling, and Reversing for readers interested in the cloud or cybersecurity. What You'll Learn Review the basics of ARM64 assembly language Examine the essential GDB debugger commands for debugging and binary analysis Study C and C++ compiler code generation with and without compiler optimizations Look at binary code disassembly and reversing patterns See how pointers in C and C++ are implemented and used Who This Book Is ForSoftware support and escalation engineers, cloud security engineers, site reliability engineers, DevSecOps, platform engineers, software testers, Linux C/C++ software engineers and security researchers without ARM64 assembly language background, and beginners learning Linux software reverse engineering techniques.
Working effectively with Apple platforms at a corporate or business level includes not only infrastructure, but a mode of thinking that administrators have to adopt to find success. A mode of thinking that forces you to leave 30 years of IT dogma at the door. This book is a guide through how to integrate Apple products in your environment with a minimum of friction. Because the Apple ecosystem is not going away. You'll start by understanding where Apple, third-party software vendors, and the IT community is taking us. What is Mobile Device Management and how does it work under the hood. By understanding how MDM works, you will understand what needs to happen on your networks in order to allow for MDM, as well as the best way to give the least amount of access to the servers or services that's necessary. You'll then look at management agents that do not include MDM, as well as when you will need to use an agent as opposed to when to use other options. Once you can install a management solution, you can deploy profiles on a device or you can deploy profiles on Macs using scripts. With Apple Device Management as your guide, you'll customize and package software for deployment and lock down devices so they're completely secure. You'll also work on getting standard QA environments built out, so you can test more effectively with less effort. This thoroughly revised and expanded Second Edition provides new coverage and updates on daemons and agents, declarative management, Gatekeeper, script options, SSO tools, Azure/Apple Business Essentials integrations and much more. You will Deploy profiles across devices effectively and securely Install apps remotely both from the app store and through custom solutions Work natively with Apple environments rather than retrofitting older IT solutions Who This Book Is ForMac administrators within organizations that want to integrate with the current Apple ecosystem, including Windows administrators learning how to use/manage Macs, mobile administrators working with iPhones and iPads, and mobile developers tasked with creating custom apps for internal, corporate distribution.
This book constitutes the refereed proceedings of the 5th CCF China Blockchain Conference, CBCC 2022, held in Wuxi, China, in December 2022. The 7 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers deal with research results and development activities in all aspects of blockchain science and technology.
This book constitutes the revised selected papers of the 10th International Conference on Networked Systems, NETYS 2022, held as virtual event, in May 17-19, 2022. The conference was held virtually due to the COVID-19 crisis.The 18 full papers and 2 short papers presented were carefully reviewed and selected from 100 submissions. The scope of the conference covers all aspects related to the design and the development of these systems, including multi-core architectures, Concurrent and distributed algorithms, parallel/concurrent/distributed programming, distributed databases, big data applications and systems, cloud systems, networks, security, and formal verification. They were organized in topical sections as follows: Distributed System; Networking; Verification; Security.
This book constitutes the thoroughly refereed post conference papers of the 4th International Conference on Blockchain and Trustworthy Systems, Blocksys 2022, held in Chengdu, China, in August 2022. The 26 full papers were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections: Trustworthy Systems; Blockchain; Private Computing. |
You may like...
OS X Exploits and Defense - Own…
Paul Baccas, Kevin Finisterre, …
Paperback
R1,278
Discovery Miles 12 780
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,018
Discovery Miles 10 180
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, …
Hardcover
R1,285
Discovery Miles 12 850
PowerShell for Administration, IT Pro…
William R. Stanek, William Stanek
Hardcover
R1,418
Discovery Miles 14 180
PowerShell, IT Pro Solutions…
William R. Stanek, William Stanek
Hardcover
R1,434
Discovery Miles 14 340
|