Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
Interest has grown rapidly over the past dozen years in the application of object-oriented programming and methods to the development of distributed, open systems. This volume presents the proceedings of a workshop intended to assess the current state of research in this field and to facilitate interaction between groups working on very different aspects of object-oriented distributed systems. The workshop was held as part of the 1993 European Conference on Object-Oriented Programming (ECOOP '93). Over fifty people submitted position papers and participated in the workshop, and almost half presented papers. The presented papers were carefully reviewed and revised after the workshop, and 14 papers were selected for this volume.
The REX School/Symposium "A Decade of Concurrency - Reflections and
Perspectives" was the final event of a ten-year period of
cooperation between three Dutch research groups working on the
foundations of concurrency.
The International Conference on Compiler Construction provides a
forum for presentation and discussion of recent developments in the
area of compiler construction, language implementation and language
design. Its scope ranges from compilation methods and tools to
implementation techniques for specific requirements on languages
and target architectures. It also includes language design and
programming environment issues which are related to language
translation. There is an emphasis on practical and efficient
techniques.
Use your laptop or tablet with confidence This practical book will have you achieving immediate results using: a friendly, visual approach simple language practical, task-based examples large, full-colour screenshots. Discover everything you want to know about choosing and using your laptop or tablet in this easy-to-use guide; from the most essential tasks that you'll want to perform, to solving the most common problems you'll encounter. Practical. Simple. Fast. Get the most out of your laptop or tablet with practical tips on every page: * ALERT: Solutions to common problems * HOT TIP: Time-saving shortcuts * SEE ALSO: Related tasks and information * DID YOU KNOW? Additional features to explore * WHAT DOES THIS MEAN? Jargon explained in plain English
Systems, Models and Measures seeks to bridge the gap between the 'classical' and the newer technologies by constructing a systematic measurement framework for both. The authors use their experience as consultants in systems, software and quality engineering to take the subject from concept and theory, via strategy and procedure, to tools and applications. The book clarifies the key notions of system, model, measurement, product, process, specification and design. Practical examples demonstrate the 'architecture' of measurement schemes, extending them to object-oriented and subjective measurement. A detailed case study provides a measurement strategy for formal specifications, including Prolog, Z and VDM. The reader will be able to formulate problems in measurable terms, appraise and compare formal specifications, assess and enhance existing measurement practices, and devise measurement schemes for describing objective characteristics and expressing value judgements.
Formal specifications were first used in the description of program ming languages because of the central role that languages and their compilers play in causing a machine to perform the computations required by a programmer. In a relatively short time, specification notations have found their place in industry and are used for the description of a wide variety of software and hardware systems. A formal method - like VDM - must offer a mathematically-based specification language. On this language rests the other key element of the formal method: the ability to reason about a specification. Proofs can be empioyed in reasoning about the potential behaviour of a system and in the process of showing that the design satisfies the specification. The existence of a formal specification is a prerequisite for the use of proofs; but this prerequisite is not in itself sufficient. Both proofs and programs are large formal texts. Would-be proofs may therefore contain errors in the same way as code. During the difficult but inevitable process of revising specifications and devel opments, ensuring consistency is a major challenge. It is therefore evident that another requirement - for the successful use of proof techniques in the development of systems from formal descriptions - is the availability of software tools which support the manipu lation of large bodies of formulae and help the user in the design of the proofs themselves."
The offices of GMD-FOKUS in Berlin provided the venue for a meeting in December 1987 which signalled the birth of the ARGOSI project. The proposal gradually took shape over the following months, and after merging with another project proposal in the field of standardization of computer graphics, finally received funding from the Esprit programme in March 1989. The project stemmed from a recognition of the importance of computer graphics a'i an ena bling technology in many application areas, and of the need to build bridges between computer graphics and telecommunications. The overall aims of the pro ject were twofold: * Advance the state of the art in the transfer of graphical information across international networks. * Improve quality and applicability of standards in this area. This book records the key results of the project and the contributions the project has made to standardization related to the transfer of graphical information across open networks. Contributions have included a demonstration of a prototype appli cation - a road transport information system running over public international of a new data networks - shown at the Esprit '91 exhibition, the standardization FT AM document type allowing structured access to graphical information (represented according to the Computer Graphics Metafile (CGM) standard) and major contributions to a mapping of the X-Windows protocol onto an OSI stack. The project also organized two international workshops. the first on Graphics and Communications, and the second on Distributed Window Systems.
The last decade has seen an enormous change in the capability of information technology and also in the expectations of what that technology can provide. The personal computer revolution at the start of the 1980s brought computing power to the desktop in a way that, for the first time, non-technical users could understand and use in their everyday work. The invisible wall of mystique that had separated computers from their potential users for so long had been demolished, and the world of business would never be the same again. As we entered the 1990s, a decade later, we witnessed the beginnings of another revolution. This revolution is not so obvious, but its implications are even more far-reaching. It is not so obvious because it is happening behind the scenes, in the communications and computing infrastructure that support the machines that can be seen sitting on office desks and, increasingly, being carried with business people as standard equipment along with a briefcase and umbrella. It is potentially more far-reaching for the following reason. The per sonal computer of the 1980s brought computing power to the user in a box that could fit on a desk. The revolution of the 1990s brings to the user computing power that is distributed across the whole planet."
This book is about the advanced, object-oriented NEXTSTEp (TM) user envi ronment for NeXT and Intel-based computers. It is intended for those who already own a computer running NEXTSTEP and want to quickly learn what it can do and how to get the most out of it with the least effort. It's also for those who are considering the purchase of NEXTSTEP but want to learn more about how it works before making an investment. Why a book on NEXTSTEP? When I set out to learn how to use NEXT STEP several years ago, I found it extremely difficult to find information from the usual sources, such as books, magazines, user groups, and autho rized dealers. NEXTSTEP users were scarce and finding a computer store that sold NeXT-related products was even more rare. There were also only a handful of NeXT user groups in existence and those that did exist met so far away that joining one of them was impractical. The manuals I received from NeXT were helpful, but I had the feeling there must be something more to it than what was written in the User's Reference. It didn't describe many of the shortcuts that experienced users had found or the public domain and shareware utilities that were popular and how I could use them to make my work even easier and more fun.
This work presents a new, abstract and comprehensive view of open distributed systems. The starting point is a small number of core concepts and basic principles, which are informally introduced and precisely defined using mathematical logic. It is shown how the basic concepts of open systems interconnection (OSI), which are currently the most important standardization activities in the context of open distributed systems, can be obtained by specialization and extension of these basic concepts. Application examples include the formal treatment of the interaction point concept and the hierarchical development of communication systems. This book is a contribution to the field of software engineering in general and to the design of open distributed systems in particular. It is oriented towards the design and implementation of real systems, and brings together both formal logical reasoning and current software engineering practice.
Technological advances are revolutionizing computers and networks to supportdigital video and audio, leading to new design spaces in computer systems and applications. Under the surface of exciting multimedia technologies liesa mine of research problems. This volume presents the proceedings of an international workshop which brought together the leading researchers in allaspects of multimedia computing, communication, storage, and applications. The field of multimedia has witnessed an explosive growth in the last few years and the selection of papers for this workshop was extremely competitive. The volume contains 26 full papers and 14 short papers selected from 128 contributions, organized into parts on: network and operating system support for multimedia; multimedia on-demand services; media synchronization; distributed multimedia systems; network andoperating system support for multimedia; multimedia models, frameworks, and document architectures; and multimedia workstations and platforms.
The main aims of the series of volumes "Advances in Petri Nets" are: - to present to the "outside" scientific community a fair picture of recent advances in the area of Petri nets, and - to encourage those interested in the applications and the theory of concurrent systems to take a closer look at Petri nets and then join the group of researchers working in this fascinating and challenging area. This volume is based on the proceedings of the 12th International Conference on Applications and Theory of Petri Nets, held in Gjern, Denmark, in June 1991. It contains 18 selected and revised papers covering all aspects of recent Petri net research.
This volume presents the proceedings of the fifth Conference on Advanced Information Systems Engineering, CAiSE '93, held at the University of Paris-Sorbonne in June 1993. Initiated by J. Bubenko from the Swedish Institute for Systems Development in Stockhom, Sweden, and A. Solvberg from the Norwegian Institute of Technology in Trondheim, Norway, this series of conferences evolved from a Nordic audience to a truly European one. All the conferences have attracted international papers of high quality, indicating the needfor an international conference on advanced information systems engineering topics. The spectrum of contributions contained in the present proceedings extends from inevitable and still controversial issues regarding modeling of information systems, via development environments and experiences, to various novel views forsome specific aspects of information systems development such as reuse, schema integration, and evolution.
This book describes the design and internals of the MOSIX distributed operating system. MOSIX, an acronym for Multicomputer Operating System for UNIX, integrates a cluster of loosely integrated computers into a virtual single-machine UNIX environment. The main property of MOSIX is the high degree of integration among the processors, which may include personal workstations and shared memory and non-shared memory multiprocessors, connected by fast communication links. This integration includes network transparency, cooperation between the processors to provide services across machine boundaries, support of dynamic configuration, and system-initiated load balancing by process migration. Another property of MOSIX is the ability to scale up the system configuration to encompass a large number of computers. The development of MOSIX was begun in 1981. The book is intended primarily for readers who are interested in distributed and multiprocessor systems. The reader is assumed to have some knowledge in programming and operating systems, preferably UNIX. Readers without this background will still benefit from thetechniques and algorithms discussed.
Enterprise operation efficiency is seriously constrained by the inability to provide the right information, in the right place, at the right time. In spite of significant advances in technology it is still difficult to access information used or produced by different applications due to the hardware and software incompatibilities of manufacturing and information processing equipment. But it is this information and operational knowledge which makes up most of the business value of the enterprise and which enables it to compete in the marketplace. Therefore, sufficient and timely information access is a prerequisite for its efficient use in the operation of enterprises. It is the aim of the ESPRIT project AMICE to make this knowledge base available enterprise-wide. During several ESPRIT contracts the project has developed and validated CIMOSA: Open System Architecture for CIM. The CIMOSA concepts provide operation structuring based on cooperating processes. Enterprise operations are represented in terms of functionality and dynamic behaviour (control flow). Information needed and produced, as well as resources and organisational aspects relevant in the course of the operation are modelled in the process model. However, the different aspects may be viewed separately for additional structuring and detailing during the enterprise engineering process.
This volume gives the proceedings of the Fourth Workshop on Computer-Aided Verification (CAV '92), held in Montreal, June 29 - July 1, 1992. The objective of this series of workshops is to bring together researchers and practitioners interested in the development and use of methods, tools and theories for the computer-aided verification of concurrent systems. The workshops provide an opportunity for comparing various verification methods and practical tools that can be used to assist the applications designer. Emphasis is placed on new research results and the application of existing results to real verification problems. The volume contains 31 papers selected from 75 submissions. These are organized into parts on reduction techniques, proof checking, symbolic verification, timing verification, partial-order approaches, case studies, model and proof checking, and other approaches. The volume starts with an invited lecture by Leslie Lamport entitled "Computer-hindered verification (humans can do it too)."
Writing a compiler is a very good practice for learning how complex problems could be solved using methods from software engineering. It is extremely important to program rather carefully and exactly, because we have to remember that a compiler is a program which has to handle an input that is usually incorrect. Therefore, the compiler itself must be error-free. Referring to Niklaus Wirth, we postulate that the grammatical structure of a language must be reflected in the structure of the compiler. Thus, the complexity of a language determines the complexity of the compiler (cf. Compilerbau. B. G. Teubner Verlag, Stuttgart, 1986). This book is about the translation of programs written in a high level programming language into machine code. It deals with all the major aspects of compilation systems (including a lot of examples and exercises), and was outlined for a one session course on compilers. The book can be used both as a teacher's reference and as a student's text book. In contrast to some other books on that topic, this text is rather concentrated to the point. However, it treats all aspects which are necessary to understand how compilation systems will work. Chapter One gives an introductory survey of compilers. Different types of compilation systems are explained, a general compiler environment is shown, and the principle phases of a compiler are introduced in an informal way to sensitize the reader for the topic of compilers.
Is it possible for JavaScript programmers to learn Apple's iOS 4 SDK and live to tell the tale? Technology guru Danny Goodman did, and with this book he leaves a well-marked trail for you to follow. An authority on JavaScript since its inception, Goodman understands the challenges you might face in creating native iOS apps with this SDK, and introduces Xcode, Objective-C, and Cocoa Touch in a context you'll readily understand. Why bother with the SDK when you can simply build web apps for Apple's iOS devices? Web apps can't access an iPhone's music library, camera, or iOS system software for maps, audio, and more. Nor can you sell web apps in the App Store. If you want to take full advantage of the iPhone and iPad, iOS 4 SDK is your tool -- and this is your book. Includes full coverage of iOS SDK 4.2. Learn the distinction between web app and iOS native app programming Create a workbench app to test code snippets throughout the learning process Get a structural view of an iOS app, and compare the process of building objects in Objective-C versus JavaScipt Discover how your code launches iOS apps and makes them user-ready Learn about iOS memory management details that are different from JavaScript, including pointers and data types Use Objective-C and Cocoa Touch to implement common JavaScript tasks
Master the art of identifying and exploiting vulnerabilities with Metasploit, Empire, PowerShell, and Python, turning Kali Linux into your fighter cockpit Key Features Map your client's attack surface with Kali Linux Discover the craft of shellcode injection and managing multiple compromises in the environment Understand both the attacker and the defender mindset Book DescriptionLet's be honest-security testing can get repetitive. If you're ready to break out of the routine and embrace the art of penetration testing, this book will help you to distinguish yourself to your clients. This pen testing book is your guide to learning advanced techniques to attack Windows and Linux environments from the indispensable platform, Kali Linux. You'll work through core network hacking concepts and advanced exploitation techniques that leverage both technical and human factors to maximize success. You'll also explore how to leverage public resources to learn more about your target, discover potential targets, analyze them, and gain a foothold using a variety of exploitation techniques while dodging defenses like antivirus and firewalls. The book focuses on leveraging target resources, such as PowerShell, to execute powerful and difficult-to-detect attacks. Along the way, you'll enjoy reading about how these methods work so that you walk away with the necessary knowledge to explain your findings to clients from all backgrounds. Wrapping up with post-exploitation strategies, you'll be able to go deeper and keep your access. By the end of this book, you'll be well-versed in identifying vulnerabilities within your clients' environments and providing the necessary insight for proper remediation. What you will learn Get to know advanced pen testing techniques with Kali Linux Gain an understanding of Kali Linux tools and methods from behind the scenes Get to grips with the exploitation of Windows and Linux clients and servers Understand advanced Windows concepts and protection and bypass them with Kali and living-off-the-land methods Get the hang of sophisticated attack frameworks such as Metasploit and Empire Become adept in generating and analyzing shellcode Build and tweak attack scripts and modules Who this book is forThis book is for penetration testers, information technology professionals, cybersecurity professionals and students, and individuals breaking into a pentesting role after demonstrating advanced skills in boot camps. Prior experience with Windows, Linux, and networking is necessary.
Deploy, set up, and deliver network services with Windows Server 2022, along with exploring Microsoft's role-based certifications Key Features Get started with server installation, performance monitoring, and server maintenance Develop the skills necessary to manage an enterprise environment Implement networking and security best practices in your Windows Server environment Book DescriptionThis third edition gets you up and running with Windows Server 2022, Microsoft's new server operating system, as part of the Windows NT family of operating systems, developed concurrently with Windows 10, version 21H2. The book begins by introducing computer networking and Windows Server concepts, gradually moving towards Windows Server 2022. With the help of step-by-step instructions and easy-to-understand graphics, you'll become well versed with the roles, features, and functionalities of Windows Server 2022. Topics such as the installation process, upgrades, post-installation tasks, and initial server configuration are covered in detail. As you make progress, you'll explore roles, features, and role services such as Active Directory, DNS, Hyper-V, remote access, storage, and printers, among others. The book then takes you through maintenance and troubleshooting tasks to guide you in efficiently managing Windows Server 2022. Finally, by working with numerous questions in each chapter and detailed answers at the end, you can test your understanding of the concepts covered. By the end of this Windows Server book, you'll be equipped with the knowledge needed to update, maintain, and troubleshoot servers to ensure business continuity by relying on best practices and using step-by-step graphic-driven examples. What you will learn Grasp the fundamentals of Windows Server 2022 Understand how to deploy Windows Server 2022 Discover Windows Server post-installation tasks Add roles to your Windows Server environment Apply Windows Server 2022 GPOs to your network Delve into virtualization and Hyper-V concepts Tune, maintain, update, and troubleshoot Windows Server 2022 Get familiar with Microsoft's role-based certifications Who this book is forIf you are an IT professional who wants to deploy and configure Windows Server 2022, then this book is for you. You can also use this book to learn about Microsoft's role-based certifications if you're planning to enroll in a course. No prior experience with Windows Server operating systems or familiarity with networking concepts is required.
About this Book This book is a detailed introduction to programming with the OSF /MotifI'M graphical user interface. It is an introduction in that it does not require the reader to have experience programming in the X Window environment. It is detailed in that it teaches you how to use the interface components provided by Motif in a complex application. Although it contains a great deal of reference material, it is not meant as an authoritative reference - that is the job of the OSF/Motif Programmer's Reference, which uses over 900 pages in the process. Instead, this book provides its reference material in a practical, "how to" manner and allows the reader to use the Programmer's Reference effectively. The target reader is an experienced C programmer and user of the X Window System under the UNIX operating system. 'the reader should be familiar with the tools provided by UNIX for the compilation and testing of programs; while this book does examine the process by which a Motif program is compiled, it does not explain that process. It also assumes that the reader is familiar with "x" terms such as 'pointer' and 'display'.
Code Generation - Concepts, Tools, Techniques is based upon the proceedings of the Dagstuhl workshop on code generation which took place from 20-24 May 1991. The aim of the workshop was to evaluate current methods of code generation and to indicate the main directions which future research is likely to take. It provided an excellent forum for the exchange of ideas and had the added advantage of bringing together European and American experts who were unlikely to meet at less specialised gatherings. This volume contains 14 of the 30 papers presented at the Dagstuhl workshop. The papers deal mainly with the following four topics: tools and techniques for code generation, code generation for parallel architectures, register allocation and phase ordering problems, and formal methods and validations. Most of the papers assess the progress of on-going research work, much of which is published here for the first time, while others provide a review of recently completed projects. The volume also contains summaries of two discussion groups which looked at code generation tools and parallel architectures. As a direct result of one of these discussions, a group of the participants have collaborated to make a pure BURS system available for public distribution. This system, named BURG, is currently being beta-tested. Code Generation - Concepts, Tools, Techniques provides a representative summary of state-of-the-art code generation techniques and an important assessment of possible future innovations. It will be an invaluable reference work for researchers and practitioners in this important area.
The trend towards powerful workstations and high-speed networks has enabled applications to communicate and manipulate digital audio and video. These are continuous media and differ from discrete media such as text and graphics in that they have stringent delay and bandwidth requirements. Neither the mechanisms used to transport ordinary data over networks nor present communication protocols are sufficient to communicate continuous media. Special operating system support must also be provided to meet the requirements of both discrete and continuous media in future multimedia applications. This volume contains the proceedings of the Second International Workshop on Network and Operating System Support for Digital Audio and Video, held in cooperation with ACM SIGCOMM and SIGOPSat the IBM European Networking Center in Heidelberg, Germany, in November 1991. The volume contains 33 selected papers together with summaries of the workshop sessions compiled by the session chairmen.
The main aims of the series of volumes "Advances in Petri Nets" are: - to present to the "outside" scientific community a fair picture of recent advances in the area of Petri nets, and - to encourage those interested in the applications and theory of concurrent systems to take a closer look at Petri nets and then join the group of researchers working in this fascinating and challenging area. The ESPRIT Basic Research Action DEMON (DEsign Methods based On Nets) has been a focus of developments withinthe Petri net community for the last three years. The papers presented in this special volume have been selected from papers submitted by participants in DEMON. The papers have been refereed and appear in revised form. The volume contains technical contributions giving insights into a number of major achievements of the DEMON project. It also contains four survey papers covering important research areas. The volume begins witha description of DEMON given by its coordinator E. Best.
This volume contains the proceedings of the fifth International Workshop on Distributed Algorithms (WDAG '91) held in Delphi, Greece, in October 1991. The workshop provided a forum for researchers and others interested in distributed algorithms, communication networks, and decentralized systems. The aim was to present recent research results, explore directions for future research, and identify common fundamental techniques that serve as building blocks in many distributed algorithms. The volume contains 23 papers selected by the Program Committee from about fifty extended abstracts on the basis of perceived originality and quality and on thematic appropriateness and topical balance. The workshop was organizedby the Computer Technology Institute of Patras University, Greece. |
You may like...
PowerShell for Administration, IT Pro…
William R. Stanek, William Stanek
Hardcover
R1,482
Discovery Miles 14 820
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, …
Hardcover
R1,297
Discovery Miles 12 970
|