![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
With this book, Christopher Kormanyos delivers a highly practical guide to programming real-time embedded microcontroller systems in C++. It is divided into three parts plus several appendices. Part I provides a foundation for real-time C++ by covering language technologies, including object-oriented methods, template programming and optimization. Next, part II presents detailed descriptions of a variety of C++ components that are widely used in microcontroller programming. It details some of C++'s most powerful language elements, such as class types, templates and the STL, to develop components for microcontroller register access, low-level drivers, custom memory management, embedded containers, multitasking, etc. Finally, part III describes mathematical methods and generic utilities that can be employed to solve recurring problems in real-time C++. The appendices include a brief C++ language tutorial, information on the real-time C++ development environment and instructions for building GNU GCC cross-compilers and a microcontroller circuit. For this fourth edition, the most recent specification of C++20 is used throughout the text. Several sections on new C++20 functionality have been added, and various others reworked to reflect changes in the standard. Also several new example projects ranging from introductory to advanced level are included and existing ones extended, and various reader suggestions have been incorporated. Efficiency is always in focus and numerous examples are backed up with runtime measurements and size analyses that quantify the true costs of the code down to the very last byte and microsecond. The target audience of this book mainly consists of students and professionals interested in real-time C++. Readers should be familiar with C or another programming language and will benefit most if they have had some previous experience with microcontroller electronics and the performance and size issues prevalent in embedded systems programming.
Mac users everywhere--even those who know nothing about programming--are discovering the value of the latest version of AppleScript, Apple's vastly improved scripting language for Mac OS X Tiger. And with this new edition of the top-selling "AppleScript: The Definitive Guide," anyone, regardless of your level of experience, can learn to use AppleScript to make your Mac time more efficient and more enjoyable by automating repetitive tasks, customizing applications, and even controlling complex workflows. Fully revised and updated--and with more and better examples than ever--"AppleScript: The Definitive Guide, 2nd Edition" explores AppleScript 1.10 from the ground up. You will learn how AppleScript works and how to use it in a variety of contexts: in everyday scripts to process automation, in CGI scripts for developing applications in Cocoa, or in combination with other scripting languages like Perl and Ruby. AppleScript has shipped with every Mac since System 7 in 1991, and its ease of use and English-friendly dialect are highly appealing to most Mac fans. Novices, developers, and everyone in between who wants to know how, where, and why to use AppleScript will find "AppleScript: The Definitive Guide, 2nd Edition" to be the most complete source on the subject available. It's as perfect for beginners who want to write their first script as it is for experienced users who need a definitive reference close at hand. "AppleScript: The Definitive Guide, 2nd Edition" begins with a relevant and useful AppleScript overview and then gets quickly to the language itself; when you have a good handle on that, you get to see AppleScript in action, and learn how to put it intoaction for you. An entirely new chapter shows developers how to make your Mac applications scriptable, and how to give them that Mac OS X look and feel with AppleScript Studio. Thorough appendixes deliver additional tools and resources you won't find anywhere else. Reviewed and approved by Apple, this indispensable guide carries the ADC (Apple Developer Connection) logo.
You can set your watch to it: As soon as Apple comes out with another version of Mac OS X, David Pogue hits the streets with another meticulous Missing Manual to cover it with a wealth of detail. The new Mac OS X 10.4, better known as Tiger, is faster than its predecessors, but nothing's too fast for Pogue and "Mac OS X: The Missing Manual," There are many reasons why this is the most popular computer book of all time. With its hallmark objectivity, the Tiger Edition thoroughly explores the latest features to grace the Mac OS. Which ones work well and which do not? What should you look for? This book tackles Spotlight, an enhanced search feature that helps you find anything on your computer; iChat AV for videoconferencing; Automator for automating repetitive, manual or batch tasks; and the hundreds of smaller tweaks and changes, good and bad, that Apple's marketing never bothers to mention. "Mac OS X: The Missing Manual, Tiger Edition" is the authoritative book that's ideal for every user, including people coming to the Mac for the first time. Our guide offers an ideal introduction that demystifies the Dock, the unfamiliar Mac OS X folder structure, and the entirely new Mail application. There are also mini-manuals on iLife applications such as iMovie, iDVD, and iPhoto, those much-heralded digital media programs, and a tutorial for Safari, Mac's own web browser. And plenty more: learn to configure Mac OS X using the System Preferences application, keep your Mac secure with FileVault, and learn about Tiger's enhanced Firewall capabilities. If you're so inclined, this Missing Manual also offers an easy introduction to the Terminal application for issuing basic Unix commands. There's something new on practically every page, and David Pogue brings his celebrated wit and expertise to every one of them. Mac's brought a new cat to town and we have a great new way to tame it.
The fact that Linux has more multimedia application choices than Mac OS X and Windows combined may come as a surprise to many, but not to those who know Linux well. In "Linux Multimedia Hacks", author Kyle Rankin showcases the best available multimedia tools so you can maximize the entertainment capabilities of your favorite OS. Included are tips and tricks for connecting to iPods, creating MP3s and Oggs, watching and making DVDs, turning your Linux box into a Tivo ala MythTV, and much more. You don't have to be a Linux server guru to make use of this book. "Linux Multimedia Hacks" takes the best of Linux's multimedia tools and with step-by-step instructions shows even novice users how to do cool and useful things with images, audio, and video. It includes entry level hacks that nearly all Linux users will want, such as installing codecs for audio and video playback and managing thousands of photographs. Later, you'll find hacks that cover a variety of advanced projects, from ripping and organizing media files with metatags, to editing video and audio tracks, to creating your own DVDs. Basic or advanced, each hack stands on its own, so you can feel free to jump around to only the sections that interest you. The book is divided into five easy-to-understand chapters: Images: tips range from basic image edits to automated image manipulation; Audio: hacks include audio format conversion and tweaking metadata within audio files; Video: learn how to covert between video formats, plus how to create your own VCDs and DVDs; Broadcast Media: tips include how to access and create you own web broadcasts as well as watch and record TV; and Web: learn how to make your multimedia creations available to the world. As one of the most powerful multimedia platforms around, Linux has far more capabilities and features than meets the eye. This latest Hacks book gives you the technical chops to enjoy them all.
You may be contemplating your first Linux installation. Or you may have been using Linux for years and need to know more about adding a network printer or setting up an FTP server. "Running Linux," now in its fifth edition, is the book you'll want on hand in either case. Widely recognized in the Linux community as the ultimate getting-started and problem-solving book, it answers the questions and tackles the configuration issues that frequently plague users, but are seldom addressed in other books. This fifth edition of "Running Linux" is greatly expanded, reflecting the maturity of the operating system and the teeming wealth of software available for it. Hot consumer topics such as audio and video playback applications, groupware functionality, and spam filtering are covered, along with the basics in configuration and management that always have made the book popular. "Running Linux" covers basic communications such as mail, web surfing, and instant messaging, but also delves into the subtleties of network configuration--including dial-up, ADSL, and cable modems--in case you need to set up your network manually. The book can make you proficient on office suites and personal productivity applications--and also tells you what programming tools are available if you're interested in contributing to these applications. Other new topics in the fifth edition include encrypted email and filesystems, advanced shell techniques, and remote login applications. Classic discussions on booting, package management, kernel recompilation, and X configuration have also been updated. The authors of "Running Linux" have anticipated problem areas, selected stable andpopular solutions, and provided clear instructions to ensure that you'll have a satisfying experience using Linux. The discussion is direct and complete enough to guide novice users, while still providing the additional information experienced users will need to progress in their mastery of Linux. Whether you're using Linux on a home workstation or maintaining a network server, "Running Linux" will provide expert advice just when you need it.
While Mac OS X garners all the praise from pundits, and Windows XP attracts all the viruses, Linux is quietly being installed on millions of desktops every year. For programmers and system administrators, business users, and educators, desktop Linux is a breath of fresh air and a needed alternative to other operating systems. The "Linux Desktop Pocket Guide" is your introduction to using Linux on five of the most popular distributions: Fedora, Gentoo, Mandriva, SUSE, and Ubuntu. Despite what you may have heard, using Linux is not all that hard. Firefox and Konqueror can handle all your web browsing needs; GAIM and Kopete allow you to chat with your friends on the AOL, MSN, and Yahoo! networks; and the email programs Evolution and Kontact provide the same functionality as Microsoft Outlook, with none of the cost. All of these programs run within the beautiful, feature-packed, and easy-to-use GNOME or KDE desktop environments. No operating system truly "just works," and Linux is no exception. Although Linux is capable of running on most any computing hardware that Microsoft Windows can use, you sometimes need to tweak it just a little to make it work the way you really want. To help you with this task, "Linux Desktop Pocket Guide" covers essential topics, such as configuring your video card, screen resolution, sound, and wireless networking. And laptop users are not left out--an entire section is devoted to the laptop issues of battery life, sleep, and hibernate modes.
FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms. There are plenty of books to help you get a FreeBSD or OpenBSD system off the ground, and all of them touch on security to some extent, usually dedicating a chapter to the subject. But, as security is commonly named as the key concern for today's system administrators, a single chapter on the subject can't provide the depth of information you need to keep your systems secure. FreeBSD and OpenBSD are rife with security "building blocks" that you can put to use, and "Mastering FreeBSD and OpenBSD Security" shows you how. Both operating systems have kernel options and filesystem features that go well beyond traditional Unix permissions and controls. This power and flexibility is valuable, but the colossal range of possibilities need to be tackled one step at a time. This book walks you through the installation of a hardened operating system, the installation and configuration of critical services, and ongoing maintenance of your FreeBSD and OpenBSD systems. Using an application-specific approach that builds on your existing knowledge, the book provides sound technical information on FreeBSD and Open-BSD security with plenty of real-world examples to help you configure and deploy a secure system. By imparting a solid technical foundation as well as practical know-how, it enables administrators to push their server's security to the next level. Even administrators in other environments--like Linux and Solaris--can find useful paradigms to emulate. Written by security professionals with two decades of operating system experience, "Mastering FreeBSD and OpenBSD Security" features broad and deep explanations of how how to secure your most critical systems. Where other books on BSD systems help you achieve functionality, this book will help you more thoroughly secure your deployments.
A smart collection of insider tips and tricks, "Windows XP Hacks," Second Edition covers the XP operating system from start to finish. Among the multitude of topics addressed, this must-have resource includes extensive coverage of hot-button issues such as: security web browsing controlling the control panel removing uninstallable XP components pop-up ads You'll also find timesaving hacks for file distribution; digital media, such as iTunes; and high-visibility web software, services, and exploits that have emerged since the book's last edition. Each hack in the book can be read easily in just a few minutes, saving countless hours of searching for the right answer. Now completely revised and updated to cover Service Pack 2 (SP2), the second edition of this bestseller carefully breaks down the new features that come with SP2, including IE pop-up blocker, Windows Firewall, and the new wireless client. Written by Preston Gralla, the compact and affordable "Windows XP Hacks," Second Edition provides direct, hands-on solutions that can be applied to the challenges facing XP beginners, as well as the more experienced power user. Each year, Windows XP is pre-installed on 90 million PCs worldwide, making it the world's most popular operating system.
With the release of Windows XP Service Pack 2 (SP2), Microsoft latest and most reliable corporate desktop operating system now provides better protection against viruses, worms, and malicious hackers. SP2 includes Windows Firewall, Pop-up Blocker for Internet Explorer, and the new Windows Security Center. But it still comes without a single page of printed instructions. This superbly written guide fills the gap. Coauthored by David Pogue, "New York Times" technology columnist and Missing Manuals creator, "Windows XP Pro: The Missing Manual" uses wit, technical insight, and scrupulous objectivity to light the way for first-time and intermediate network and standalone PC users. In fact, this jargon-free book explains XP's features so clearly revealing which work well and which don't that it should have been in the box in the first place. The book reveals which features work well and which don't, such as the Remote Desktop software that enables people to connect to the office from home, the encryption file system that protects sensitive information, and the Windows Messenger that enables real-time text, voice and video communication. Contents include: Getting started. The book's early chapters cover using menus, finding lost files, reducing window clutter, and taming the new, multi-column Start menu. Mastering the network. Special chapters help you navigate the corporate network, dial in from the road, and even set up your own small-office (peer-to-peer) network, step by step. Understanding security. User accounts, file encryption, and the NTFS file system keep your private files private, while still offering network access to coworkers you specify. Flying the Net.This book demystifies Outlook Express 6 for email, Internet Explorer 6 for Web browsing, and the new Windows Messenger for voice, chat, and video conferencing. "Windows XP Pro: The Missing Manual" isn't for system administrators or OS theory geeks; it's for the novice or budding power user who wants to master the machine and get down to work. Yet, anyone who uses XP Pro (including hardcore techies) will find this new system much easier-- and more fun--to digest with this new Missing Manual.
Mac OS X has captured the attention of consumers and programmers alike with its ability to run existing Mac programs along with Unix and Open Source software. The latest version, Panther, includes more than a hundred new features and improves many of the technologies underlying Mac OS X, including graphics and the Unix-based core. With more than 500 power tips and tricks for Mac aficionados like yourself, Mac OS X Power Hound, Panther Edition helps you unleash the power of Panther. Mac OS X Panther is a complex and powerful operating system with a personality all its own. To make your computing experience with Panther as efficient and enjoyable as possible, you need to learn its secrets, appreciate its idiosyncrasies, and be able to customize it to your needs and wants. Author Rob Griffiths shows you how. Creator and editor of the extremely popular Mac OS X Hints Web site (www macosxhints.com), Griffiths knows Panther inside and out. His Mac OS X Power Hound lifts the hood on the sleek and elegant, Formula-One-powered operating system and delivers over 500 high-octane secrets in every conceivable category, including the Desktop and Finder, iApps, Mac OS X programs, Mastering the system and Terminal, and much more. Consider this book your pit crew, helping you find easier, faster, and better ways of using the Finder, the Dock, the assortment of programs that come with Mac OS X, and a bunch of programs that don't. And if you want to become your own master mechanic, it also includes two rich chapters on Unix, the engine under Mac OS X's hood. With this collection of stand-alone hints, notes, tips, and tricks--every one of them organized, indexed, tested for compatibility with the latest version of Mac OS X 10.3, and, in many cases, illustrated--you'll rapidly progress from an anybody-can-do-this user to a power user.
If you're seeking ways to build network-based applications or XML-based web services, Microsoft provides most of the tools you'll need. XML is integrated into the .NET Framework and Visual Studio .NET, but if you want to get a grasp on how .NET and XML actually work together, that's a different story. With ."NET & XML," you can get under the hood to see how the .NET Framework implements XML, giving you the skills to write understandable XML-based code that interoperates with code written with other tools, and even other languages. ."NET & XML" starts by introducing XML and the .NET Framework, and then teaches you how to read and write XML before moving on to complex methods for manipulating, navigating, transforming, and constraining it. To demonstrate the power of XML in .NET, author Niel Bornstein builds a simple hardware store inventory system throughout the book. As you move from chapter to chapter, you'll absorb increasingly complex information until you have enough knowledge to successfully program your own XML-based applications. This tutorial also contains a quick reference to the API, plus appendices present additional .NET assemblies that you can use to work with XML, and how to work with the .NET XML configuration file format. One study puts the potential market for new software based on XML at or near $100 billion over the next five years. The .NET Framework gives you a way to become a part of it. But to use XML and .NET effectively, you need to understand how these two technologies work together. This book gives you the insight to take full advantage of the power the two provide.
More often than not, the words "sendmail configuration" strike dread in the hearts of sendmail and system administrators--and not without reason. sendmail configuration languages are as complex as any other programming languages, but used much more infrequently--only when sendmail is installed or configured. The average system administrator doesn't get enough practice to truly master this inscrutable technology. Fortunately, there's help. The "sendmail Cookbook" provides step-by-step solutions for the administrator who needs to solve configuration problems fast. Say you need to configure sendmail to relay mail for your clients without creating an open relay that will be abused by spammers. A recipe in the Cookbook shows you how to do just that. No more wading through pages of dense documentation and tutorials and creating your own custom solution--just go directly to the recipe that addresses your specific problem. Each recipe in the "sendmail Cookbook" outlines a configuration problem, presents the configuration code that solves that problem, and then explains the code in detail. The discussion of the code is critical because it provides the insight you need to tweak the code for your own circumstances. The "sendmail Cookbook" begins with an overview of the configuration languages, offering a quick how-to for downloading and compiling the sendmail distribution. Next, you'll find a baseline configuration recipe upon which many of the subsequent configurations, or recipes, in the book are based. Recipes in the following chapters stand on their own and offer solutions for properly configuring important sendmail functions such as: Delivering and forwarding mail Relaying Masquerading Routing mail Controlling spam Strong authentication Securing the mail transport Managing the queue Securing sendmail "sendmail Cookbook" is more than just a new approach to discussing sendmail configuration. The book also provides lots of new material that doesn't get much coverage elsewhere--STARTTLS and AUTH are given entire chapters, and LDAP is covered in recipes throughout the book. But most of all, this book is about saving time--something that most system administrators have in short supply. Pick up the "sendmail Cookbook" and say good-bye to sendmail dread.
Fully updated for version 1.1 of the .NET Framework, .NET Framework Essentials, 3rd Edition is an objective, concise, no-nonsense overview of the Microsoft .NET Framework for developing web applications and services. Written for intermediate to advanced VB, C/C++, Java, and Delphi developers, .NET Framework Essentials, 3rd Edition is also useful to system architects and leaders who are assessing tools for future projects.
Any programmer working with text files today needs a way to deal with Microsoft® Word documents and their underlying Rich Text Format. RTF is notoriously difficult to work with, and our handy quick reference is the only book available on what many developers call "this maddeningly unstructured format." Small and easy to use on the job, RTF Pocket Guide focuses on the "workhorse" codes that programmers can't do without, including text style codes, paragraph formatting codes, and page formatting codes-- all with many examples of real use.
With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of experience can still allow a program to be used in an unintended way, Programming .NET Security shows you how the various tools will help you write secure applications.
Cocoa in a Nutshell begins with a complete overview of Cocoa's object classes. It provides developers who may be experienced with other application toolkits the grounding they'll need to start developing Cocoa applications. A complement to Apple's documentation, it is the only reference to the classes, functions, types, constants, protocols, and methods that make up Cocoa's Foundation and Application Kit frameworks, based on the Jaguar release (Mac OS X 10.2).
The current edition of Samba Pocket Reference covers Samba 2.x and the most important features of 3.0, which was under development as this book went to print. New options pertain to Samba's acting as a primary domain controller and as a domain member server, its support for the use of Windows NT/2000/XP authentication and filesystem security on the host Unix system, and access to shared files and printers from Unix clients.
Any Microsoft Outlook® user knows that the program is about more than just email: it's a suite of organizational tools that can help you manage your schedule, contacts, and deadlines with remarkable efficiency. Regardless of experience, you'll find that the Outlook Pocket Guide significantly decreases the amount of time you spend trying to figure out tricky problems and decipher the various settings.
The Macintosh Troubleshooting Pocket Guide covers the most common user hardware and software trouble. It's not just a book for Mac OS X (although it includes tips for OS X and Jaguar), it's for anyone who owns a Mac of any type-- there are software tips going back as far as OS 6. This slim guide distills the answers to the urgent questions that Tekserve's employee's answer every week into a handy guide that fits in your back pocket or alongside your keyboard.
This comprehensive tutorial teaches programmers the skills they need to develop XML web services hosted on the Microsoft .NET platform. Programming .NET Web Services also shows you how to consume these services on both Microsoft and non-Windows clients, and how to weave them into well-designed and scalable applications. For those interested in building industrial-strength web services, this book is full of practical information and good old-fashioned advice.
The DNS & BIND Cookbook presents solutions to the many problems faced by network administrators responsible for a name server. This title is an indispensable companion to DNS & BIND, 4th Edition, the definitive guide to the critical task of name server administration. The cookbook contains dozens of code recipes showing solutions to everyday problems, ranging from simple questions, like, "How do I get BIND?" to more advanced topics like providing name service for IPv6 addresses.
Building Cocoa Applications takes a step-by-step approach to teaching developers how to build real graphics applications using Cocoa. By showing the basics of an application in one chapter and then layering additional functionality onto that application in subsequent chapters, the book keeps readers interested and motivated. Readers will see immediate results, and then go on to build onto what they've already achieved. By the end of the book, readers who have built the applications as they have read will have a solid understanding of what it really means to develop complete and incrementally more complex Cocoa applications.
System Performance Tuning covers two distinct areas: performance tuning, or the art of increasing performance for a specific application, and capacity planning, or deciding what hardware best fulfills a given role. Underpinning both subjects is the science of computer architecture. This book focuses on the operating system, the underlying hardware, and their interactions. For system administrators who want a hands-on introduction to system performance, this is the book to recommend.
"Malicious mobile code" is a new term to describe all sorts of destructive programs: viruses, worms, trojans, and rogue Internet content. Malicious mobile code is more prevalent today than ever before, and both home users and system administrators need to be on the alert to protect their network or company against attacks. Malicious Mobile Code reveals what such code can and can't do and how to recognize, remove, and prevent it. Readers learn effective strategies, tips, and tricks for securing any system.
Move into iOS development by getting a firm grasp of its fundamentals, including the Xcode 13 IDE, Cocoa Touch, and the latest version of Apple's acclaimed programming language, Swift 5.5. With this thoroughly updated guide, you'll learn the Swift language, understand Apple's Xcode development tools, and discover the Cocoa framework. Explore Swift's object-oriented concepts Become familiar with built-in Swift types Dive deep into Swift objects, protocols, and generics Tour the life cycle of an Xcode project Learn how nibs are loaded Understand Cocoa's event-driven design Communicate with C and Objective-C In this edition, catch up on the latest iOS programming features: Structured concurrency: async/await, tasks, and actors Swift native formatters and attributed strings Lazy locals and throwing getters Enhanced collections with the Swift Algorithms and Collections packages Xcode tweaks: column breakpoints, package collections, and Info.plist build settings Improvements in Git integration, localization, unit testing, documentation, and distribution And more! |
You may like...
Advances in Signal Processing and…
Banmali S. Rawat, Aditya Trivedi, …
Hardcover
R5,267
Discovery Miles 52 670
Probabilistic Nodes Combination (PNC…
Dariusz Jacek Jakobczak
Hardcover
R4,406
Discovery Miles 44 060
Intelligent Image and Video Compression…
David R. Bull, Fan Zhang
Paperback
R2,606
Discovery Miles 26 060
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, …
Paperback
R1,452
Discovery Miles 14 520
|