![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Personal computers
This bestselling on-the-job reference and test preparation guide has been fully revised for new 2022 exam objectives This fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1101 & 220-1102. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CompTIA A+ exams with ease, this definitive guide also serves as an essential on-the-job IT reference. Covers all exam topics, including how to: Work with CPUs, RAM, BIOS, motherboards, power supplies, and other personal computer components Install, configure, and maintain hard drives Manage input devices and removable media Set up, upgrade, and maintain Microsoft Windows Troubleshoot and fix computer problems Install printers and other peripherals Configure and secure mobile devices >Connect to the Internet Set up wired and wireless networks Protect your personal computer and your network Implement virtualization and cloud-based technologies Online content includes: Practice exams for 1101 & 1102 with hundreds of questions One hour of video training from Mike Meyers TotalSim simulations of performance-based questions A collection of Mike Meyers' favorite shareware and freeware PC tools and utilities
A fully updated version of Pearson's bestselling Brilliant Windows titles, covering Windows 10 - the latest release of the widely-used Microsoft operating system. Brilliant Windows 10 gives you the information you need easily and without fuss. It guides you through all tasks and applications using a highly visual, full-colour, step-by-step approach and tells you exactly what you need to know, when you need to know it. For the first time, this book comes with FREE downloadable bonus material. An extra 140 pages, which cover chapters on advanced subjects like customising Windows, maintaining your computer and managing your hardware as well as the key, new features of Office 2016. Spend less time reading and more time doing with a simple step-by-step approach to beginner and intermediate level tasks. Brilliant guides provide the quick, easy-to-access information that you need: Numbered steps guide you through each task or problem Numerous colour screenshots illustrate each step Cross reference boxes point you to related tasks and information in the book "Did you know ?..." sections alert you to relevant expert tips, tricks and advice
Information and communication technologies (ICT) are a vital component of successful business models. As new technologies emerge, organizations must adapt quickly and strategically to these changes or risk falling behind. Evolution and Standardization of Mobile Communications Technology examines methods of developing and regulating compatibility standards in the ICT industry, assisting organizations in their application of the latest communications technologies in their business practices. Organizations maintain competitive advantage by implementing cutting-edge technologies as soon as they appear. This book serves as a compendium of the most recent research and development in this arena, providing readers with the insight necessary to take full advantage of a wide range of ICT solutions. This book is part of the Advances in IT Standards and Standardization Research series collection.
Use your laptop or tablet with confidence This practical book will have you achieving immediate results using: a friendly, visual approach simple language practical, task-based examples large, full-colour screenshots. Discover everything you want to know about choosing and using your laptop or tablet in this easy-to-use guide; from the most essential tasks that you'll want to perform, to solving the most common problems you'll encounter. Practical. Simple. Fast. Get the most out of your laptop or tablet with practical tips on every page: * ALERT: Solutions to common problems * HOT TIP: Time-saving shortcuts * SEE ALSO: Related tasks and information * DID YOU KNOW? Additional features to explore * WHAT DOES THIS MEAN? Jargon explained in plain English
This book collects multiple research articles studying the factors influencing wearable device usage. Based on multiple empirical studies, which research different kinds of wearable devices such as smartwatches, activity trackers, and smartglasses, potential drivers of wearable device usage are identified and evaluated. Overall, the book provides novel and important insights for both practitioners and academics, highlights their various practical implications for the development and marketing of wearable devices and offers outlooks on further research directions.
1 Die wirtschaftliche Bedeutung der Schutzmassnahmen fur EDV-Anlagen.- 2 Voraussetzungen und Anforderungen an die sicherheits-gerechte Konzipierung eines Hochsicherheitsbereichs.- 3 Unterschiedliche Gefahrdungen fur Rechenzentren.- 3.1 Einbruch/Diebstahl, Sabotage und Vandalismus.- 3.2 Brand, Verrauchung.- 3.3 Fehlfunktionen in der Klimatisierung.- 3.4 Wassereinbruch.- 3.5 Elektrische Versorgung.- 3.5.1 Aufrechterhaltung der Stromversorgung.- 3.5.2 UEberspannungen und Blitzschlag.- 3.6 Datenverlust.- 3.7 Sonstige Gefahren.- 4 Moegliche Analysemethoden.- 5 Schema der konkreten Risiko- und Schutzniveauermittlung.- 5.1 Massnahmen gegen Einbruch, Diebstahl, Sabotage und Vandalismus.- 5.2 Massnahmen gegen Feuer und Verrauchung.- 5.3 Massnahmen gegen Fehlfunktionen der Klimatisierung.- 5.4 Massnahmen gegen Beschadigungen durch Wasser bzw. fehlerhafte Versorgung.- 5.5 Massnahmen zur Aufrechterhaltung der gleichbleibenden Stromversorgung.- 5.6 Massnahmen gegen Datenverlust.- 5.7 Sonstige sicherheitsrelevante Kriterien.- 5.8 Zusammenfassende Benotung der analysierten Risiken.- 6 Sicherheitsmanagement: Organisation und Realisierung der sicherheitstechnischen Massnahmen.- 7 Sicherheitsgerechter EDV-Betrieb.- 8 Organisatorische Schritte zur permanenten Beibehaltung des Niveaus des ursprunglich entworfenen Sicherheitskonzepts.- 8.1 Menschliche Aspekte.- 8.2 Technische Massnahmen.- 9 Katastrophenvorsorge.- 9.1 Katastrophenplan.- 9.2 Backup-Konzepte.- 9.3 Versicherungskonzepte fur Hochsicherheitsbereiche.- 10 Schlussworte und Aussicht.
Recently, the emergence of wireless and mobile networks has made possible the admission of electronic commerce to a new application and research subject: mobile commerce, defined as the exchange or buying and selling of commodities, services, or information on the Internet through the use of mobile handheld devices. In just a few years, mobile commerce has emerged from nowhere to become the hottest new trend in business transactions. However, the prosperity and popularity of mobile commerce will be brought to a higher level only if information is securely and safely exchanged among end systems (mobile users and content providers). Advances in Security and Payment Methods for Mobile Commerce includes high-quality research papers and industrial and practice articles in the areas of mobile commerce security and payment from academics and industrialists. It covers research and development results of lasting significance in the theory, design, implementation, analysis, and application of mobile commerce security and payment.
Before slim laptops that fit into briefcases, computers looked like strange vending machines, with cryptic switches and pages of encoded output. But in 1977 Steve Wozniak revolutionized the computer industry with his invention of the first personal computer. As the sole inventor of the Apple I and II computers, Wozniak has enjoyed wealth, fame, and the most coveted awards an engineer can receive, and he tells his story here for the first time.
Software-based cryptography can be used for security applications where data traffic is not too large and low encryption rate is tolerable. But hardware methods are more suitable where speed and real-time encryption are needed. Until now, there has been no book explaining how cryptographic algorithms can be implemented on reconfigurable hardware devices. This book covers computational methods, computer arithmetic algorithms, and design improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware platforms. The author emphasizes the practical aspects of reconfigurable hardware design, explaining the basic mathematics involved, and giving a comprehensive description of state-of-the-art implementation techniques.
This book examines the issue of design of fully-integrated frequency synthesizers suitable for system-on-a-chip (SOC) processors. This book takes a more global design perspective in jointly examining the design space at the circuit level as well as at the architectural level. The coverage of the book is comprehensive and includes summary chapters on circuit theory as well as feedback control theory relevant to the operation of phase locked loops (PLLs). On the circuit level, the discussion includes low-voltage analog design in deep submicron digital CMOS processes, effects of supply noise, substrate noise, as well device noise. On the architectural level, the discussion includes PLL analysis using continuous-time as well as discrete-time models, linear and nonlinear effects of PLL performance, and detailed analysis of locking behavior. The material then develops into detailed circuit and architectural analysis of specific clock generation blocks. This includes circuits and architectures of PLLs with high power supply noise immunity and digital PLL architectures where the loop filter is digitized. Methods of generating low-spurious sampling clocks for discrete-time analog blocks are then examined. This includes sigma-delta fractional-N PLLs, Direct Digital Synthesis (DDS) techniques and non-conventional uses of PLLs. Design for test (DFT) issues as they arise in PLLs are then discussed. This includes methods of accurately measuring jitter and built-in-self-test (BIST) techniques for PLLs. Finally, clocking issues commonly associated to system-on-a-chip (SOC) designs, such as multiple clock domain interfacing and partitioning, and accurate clock phase generation techniques usingdelay-locked loops (DLLs) are also addressed. The book provides numerous real world applications, as well as practical rules-of-thumb for modern designers to use at the system, architectural, as well as the circuit level. This book is well suited for practitioners as well as graduate level students who wish to learn more about time-domain analysis and design of frequency synthesis techniques.
We are extremely pleased to present a comprehensive book comprising a collection of research papers which is basically an outcome of the Second IFIP TC 13.6 Working Group conference on Human Work Interaction Design, HWID2009. The conference was held in Pune, India during October 7-8, 2009. It was hosted by the Centre for Development of Advanced Computing, India, and jointly organized with Copenhagen Business School, Denmark; Aarhus University, Denmark; and Indian Institute of Technology, Guwahati, India. The theme of HWID2009 was Usability in Social, C- tural and Organizational Contexts. The conference was held under the auspices of IFIP TC 13 on Human-Computer Interaction. 1 Technical Committee TC13 on Human-Computer Interaction The committees under IFIP include the Technical Committee TC13 on Human-Computer Interaction within which the work of this volume has been conducted. TC13 on Human-Computer Interaction has as its aim to encourage theoretical and empirical human science research to promote the design and evaluation of human-oriented ICT. Within TC13 there are different working groups concerned with different aspects of human- computer interaction. The flagship event of TC13 is the bi-annual international conference called INTERACT at which both invited and contributed papers are presented. Contributed papers are rigorously refereed and the rejection rate is high.
This book looks at the future of advertising from the perspective of pervasive computing. Pervasive computing encompasses the integration of computers into everyday devices, like the covering of surfaces with interactive displays and networked mobile phones. Advertising is the communication of sponsored messages to inform, convince, and persuade to buy. We believe that our future cities will be digital, giving us instant access to any information we need everywhere, like at bus stops, on the sidewalk, inside the subway and in shopping malls. We will be able to play with and change the appearance of our cities effortlessly, like making flowers grow along a building wall or changing the colour of the street we are in. Like the internet as we know it, this digitalization will be paid for by adverts, which unobtrusively provide us suggestions for nearby restaurants or cafes. If any content annoys us, we will be able to effortlessly say so and change it with simple gestures, and content providers and advertisers will know what we like and be able to act accordingly. This book presents the technological foundations to make this vision a reality.
How did the Commodore 64 conquer the hearts of millions and become a platform people still actively develop for even today? What made it so special? This book will appeal to both those who like tinkering with old technology as a hobby and nostalgic readers who simply want to enjoy a trip down memory lane. It discusses in a concise but rigorous format the different areas of home gaming and personal computing where the C64 managed to innovate and push forward existing boundaries. Starting from Jack Tramiel's vision of designing computers "for the masses, not the classes," the book introduces the 6510, VIC-II and SID chips that made the C64 unique. It briefly discusses its Basic programming language and then proceeds to illustrate not only many of the games that are still so fondly remembered but also the first generation of game engines that made game development more approachable among other topics that are often neglected but are necessary to provide a comprehensive overview of how far reaching theC64 influence was. Written in a straightforward and accessible style, readers will relive the dawn of modern technology and gain a better understanding of the legacy that was built, bit by bit, in those pioneering days by computers that had only a tiny fraction of the power modern machines have and, yet, were used to create the technological world we are now living in. With a foreword by Michael Tomczyk
As almost no other technology, embedded systems is an essential element of many innovations in automotive engineering. New functions and improvements of already existing functions, as well as the compliance with traffic regulations and customer requirements, have only become possible by the increasing use of electronic systems, especially in the fields of driving, safety, reliability, and functionality. Along with the functionalities that increase in number and have to cooperate, the complexity of the entire system will increase. Synergy effects resulting from distributed application functionalities via several electronic control devies, exchanging information through the network brings about more complex system architectures with many different sub-networks, operating with different velocities and different protocol implementations. To manage the increasing complexity of these systems, a deterministic behaviour of the control units and the communication network must be provided for, in particular when dealing with a distributed functionality. From Specification to Embedded Systems Application documents recent approaches and results presented at the International Embedded Systems Symposium (IESS 2005), which was held in August 2005 in Manaus (Brazil) and sponsored by the International Federation for Information Processing (IFIP). The topics which have been chosen for this working conference
are very timely: design methodology, modeling, specification,
software synthesis, power management, formal verification, testing,
network, communication systems, distributed control systems,
resource management and special aspects in system design.
A tutorial approach to using the UML modeling language in system-on-chip design Based on the DAC 2004 tutorial, applicable for students and professionals Contributions by top-level international researchers The best work at the first UML for SoC workshop Unique combination of both UML capabilities and SoC design issues Condenses research and development ideas that are only found in multiple conference proceedings and many other books into one place Will be the seminal reference work for this area for years to come |
![]() ![]() You may like...
New Frontiers for Entertainment…
Paolo Ciancarini, Ryohei Nakatsu, …
Hardcover
R1,683
Discovery Miles 16 830
Pervasive Health - State-of-the-art and…
Andreas Holzinger, Martina Ziefle, …
Hardcover
|