0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (70)
  • R250 - R500 (251)
  • R500+ (7,675)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer programming > Software engineering

Deep Learning in Gaming and Animations - Principles and Applications (Hardcover): Vikas Chaudhary, Mool Chand Sharma, Prerna... Deep Learning in Gaming and Animations - Principles and Applications (Hardcover)
Vikas Chaudhary, Mool Chand Sharma, Prerna Sharma, Deevyankar Agarwal
R3,570 Discovery Miles 35 700 Ships in 12 - 19 working days

Discusses core concepts and principles of deep learning in gaming and animation with applications. Covers application of neural networks for intelligent video game character. Discusses automated video generation and real time animation. Covers technological advancements in virtual reality (VR), and augmented reality (AR).

Computational Intelligence for Information Retrieval (Hardcover): Dharmender Saini, Gopal Chaudhary, Vedika Gupta Computational Intelligence for Information Retrieval (Hardcover)
Dharmender Saini, Gopal Chaudhary, Vedika Gupta
R3,560 Discovery Miles 35 600 Ships in 12 - 19 working days

provides a thorough understanding of the integration of computational intelligence with information retrieval includes discussion on protecting and analysing big data on cloud platforms provides a plethora of theoretical as well as experimental research, along with surveys and impact studies

Mathematical Foundations of Software Engineering - A Practical Guide to Essentials (Hardcover, 1st ed. 2023): Gerard... Mathematical Foundations of Software Engineering - A Practical Guide to Essentials (Hardcover, 1st ed. 2023)
Gerard O'Regan
R2,673 Discovery Miles 26 730 Ships in 10 - 15 working days

This textbook presents an introduction to the mathematical foundations of software engineering. It presents the rich applications of mathematics in areas such as error-correcting codes, cryptography, the safety and security critical fields, the banking and insurance fields, as well as traditional engineering applications. Topics and features: Addresses core mathematics for critical thinking and problem solving Discusses propositional and predicate logic and various proof techniques to demonstrate the correctness of a logical argument. Examines number theory and its applications to cryptography Considers the underlying mathematics of error-correcting codes Discusses graph theory and its applications to modelling networks Reviews tools to support software engineering mathematics, including automated and interactive theorem provers and model checking Discusses financial software engineering, including simple and compound interest, probability and statistics, and operations research Discusses software reliability and dependability and explains formal methods used to derive a program from its specification Discusses calculus, matrices, vectors, complex numbers, and quaternions, as well as applications to graphics and robotics Includes key learning topics, summaries, and review questions in each chapter, together with a useful glossary This practical and easy-to-follow textbook/reference is ideal for computer science students seeking to learn how mathematics can assist them in building high-quality and reliable software on time and on budget. The text also serves as an excellent self-study primer for software engineers, quality professionals, and software managers.

IAENG Transactions on Engineering Technologies - Special Edition of the World Congress on Engineering and Computer Science 2011... IAENG Transactions on Engineering Technologies - Special Edition of the World Congress on Engineering and Computer Science 2011 (Hardcover, 2013 ed.)
Haeng-kon Kim, Sio-Iong Ao, Burghard B. Rieger
R4,409 Discovery Miles 44 090 Ships in 10 - 15 working days

This volume contains thirty revised and extended research articles written by prominent researchers participating in an international conference in engineering technologies and physical science and applications. The conference serves as good platforms for the engineering community to meet with each other and to exchange ideas. The conference has also struck a balance between theoretical and application development. The conference is truly international meeting with a high level of participation from many countries. Topics covered include chemical engineering, circuits, communications systems, control theory, engineering mathematics, systems engineering, manufacture engineering, and industrial applications. The book offers the state of art of tremendous advances in engineering technologies and physical science and applications, and also serves as an excellent reference work for researchers and graduate students working with/on engineering technologies and physical science and applications.

Designing Secure Systems (Hardcover): Michael Melone Designing Secure Systems (Hardcover)
Michael Melone
R2,166 Discovery Miles 21 660 Ships in 12 - 19 working days

Modern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over an otherwise protected operation. To expose these weaknesses, we need a single unified model that can be used to describe all aspects of the system on equal terms. Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems - from padlocks, to phishing, to enterprise software architecture. We discuss how weakness in one part of a system creates vulnerability in another, all the while applying standards and frameworks used in the cybersecurity world. Our goal: to analyze the security of the entire system - including people, processes, and technology - using a single model. We begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. Lastly, we discuss how to operate a secure system based on the NIST Cybersecurity Framework (CSF) concepts of "identify, protect, detect, respond, and recover." Other topics covered in this book include the NIST National Vulnerability Database (NVD), MITRE Common Vulnerability Scoring System (CVSS), Microsoft's Security Development Lifecycle (SDL), and the MITRE ATT&CK Framework.

Functional Reverse Engineering of Machine Tools (Paperback): Wasim Ahmed Khan, Ghulam Abbas, Khalid Rahman, Ghulam Hussain,... Functional Reverse Engineering of Machine Tools (Paperback)
Wasim Ahmed Khan, Ghulam Abbas, Khalid Rahman, Ghulam Hussain, Cedric Aimal Edwin
R1,590 Discovery Miles 15 900 Ships in 12 - 19 working days

The purpose of this book is to develop capacity building in strategic and non-strategic machine tool technology. The book contains chapters on how to functionally reverse engineer strategic and non-strategic computer numerical control machinery. Numerous engineering areas, such as mechanical engineering, electrical engineering, control engineering, and computer hardware and software engineering, are covered. The book offers guidelines and covers design for machine tools, prototyping, augmented reality for machine tools, modern communication strategies, and enterprises of functional reverse engineering, along with case studies. Features Presents capacity building in machine tool development Discusses engineering design for machine tools Covers prototyping of strategic and non-strategic machine tools Illustrates augmented reality for machine tools Includes Internet of Things (IoT) for machine tools

Software-Defined Networking for Future Internet Technology - Concepts and Applications (Hardcover): Kshira Sagar Sahoo,... Software-Defined Networking for Future Internet Technology - Concepts and Applications (Hardcover)
Kshira Sagar Sahoo, Bibhudatta Sahoo, Brojo Kishore Mishra
R3,860 Discovery Miles 38 600 Ships in 12 - 19 working days

Network infrastructures are growing rapidly to meet the needs of business, but the required repolicing and reconfiguration provide challenges that need to be addressed. The software-defined network (SDN) is the future generation of Internet technology that can help meet these challenges of network management. This book includes quantitative research, case studies, conceptual papers, model papers, review papers, and theoretical backing on SDN. This book investigates areas where SDN can help other emerging technologies deliver more efficient services, such as IoT, industrial IoT, NFV, big data, blockchain, cloud computing, and edge computing. The book demonstrates the many benefits of SDNs, such as reduced costs, ease of deployment and management, better scalability, availability, flexibility and fine-grained control of traffic, and security. The book demonstrates the many benefits of SDN, such as reduced costs, ease of deployment and management, better scalability, availability, flexibility and fine-grained control of traffic, and security. Chapters in the volume address: Design considerations for security issues and detection methods State-of-the-art approaches for mitigating DDos attacks using SDN Big data using Apache Hadoop for processing and analyzing large amounts of data Different tools used for attack simulation Network policies and policy management approaches that are widely used in the context of SDN Dynamic flow tables, or static flow table management A new four-tiered architecture that includes cloud, SDN-controller, and fog computing Architecture for keeping computing resources available near the industrial IoT network through edge computing The impact of SDN as an innovative approach for smart city development More. The book will be a valuable resource for SDN researchers as well as academicians, research scholars, and students in the related areas.

Nanoelectronic Devices for Hardware and Software Security (Hardcover): Balwinder Raj, Arun Kumar Singh Nanoelectronic Devices for Hardware and Software Security (Hardcover)
Balwinder Raj, Arun Kumar Singh
R3,297 Discovery Miles 32 970 Ships in 12 - 19 working days

Nanoelectronic Devices for Hardware and Software Security has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security. It also covers the future research directions in this domain. In this evolving era, nanotechnology is converting semiconductor devices dimensions from micron technology to nanotechnology. Nanoelectronics would be the key enabler for innovation in nanoscale devices, circuits, and systems. The motive for this research book is to provide relevant theoretical frameworks that include device physics, modeling, circuit design, and the latest developments in experimental fabrication in the field of nanotechnology for hardware/software security. There are numerous challenges in the development of models for nanoscale devices (e.g., FinFET, gate-all-around devices, TFET, etc.), short channel effects, fringing effects, high leakage current, and power dissipation, among others. This book will help to identify areas where there are challenges and apply nanodevice and circuit techniques to address hardware/software security issues.

Multiagent Systems - Introduction and Coordination Control (Paperback): Magdi S. Mahmoud Multiagent Systems - Introduction and Coordination Control (Paperback)
Magdi S. Mahmoud
R1,019 Discovery Miles 10 190 Ships with 15 working days

Multiagent systems (MAS) are one of the most exciting and the fastest growing domains in the intelligent resource management and agent-oriented technology, which deals with modeling of autonomous decisions making entities. Recent developments have produced very encouraging results in the novel approach of handling multiplayer interactive systems. In particular, the multiagent system approach is adapted to model, control, manage or test the operations and management of several system applications including multi-vehicles, microgrids, multi-robots, where agents represent individual entities in the network. Each participant is modeled as an autonomous participant with independent strategies and responses to outcomes. They are able to operate autonomously and interact pro-actively with their environment. In recent works, the problem of information consensus is addressed, where a team of vehicles communicate with each other to agree on key pieces of information that enable them to work together in a coordinated fashion. The problem is challenging because communication channels have limited range and there are possibilities of fading and dropout. The book comprises chapters on synchronization and consensus in multiagent systems. It shows that the joint presentation of synchronization and consensus enables readers to learn about similarities and differences of both concepts. It reviews the cooperative control of multi-agent dynamical systems interconnected by a communication network topology. Using the terminology of cooperative control, each system is endowed with its own state variable and dynamics. A fundamental problem in multi-agent dynamical systems on networks is the design of distributed protocols that guarantee consensus or synchronization in the sense that the states of all the systems reach the same value. It is evident from the results that research in multiagent systems offer opportunities for further developments in theoretical, simulation and implementations. This book attempts to fill this gap and aims at presenting a comprehensive volume that documents theoretical aspects and practical applications.

A Knowledge-Based Approach to Program Understanding (Hardcover, 1995 ed.): Salwa K. Abd-El-Hafiz, Victor R. Basili A Knowledge-Based Approach to Program Understanding (Hardcover, 1995 ed.)
Salwa K. Abd-El-Hafiz, Victor R. Basili
R2,867 Discovery Miles 28 670 Ships in 10 - 15 working days

Program understanding plays an important role in nearly all software related tasks. It is vital to the development, maintenance and reuse activities. Program understanding is indispensable for improving the quality of software development. Several development activities such as code reviews, debugging and some testing approaches require programmers to read and understand programs. Maintenance activities cannot be performed without a deep and correct understanding of the component to be maintained. Program understanding is vital to the reuse of code components because they cannot be utilized without a clear understanding of what they do. If a candidate reusable component needs to be modified, an understanding how it is designed is also required. of This monograph presents a. knowledge-based approach to the automation of program understanding. This approach generates rigorous program documentation mechanically by combining and building on strengths of a practical program decomposition method, the axiomatic correctness notation, and the knowledge based analysis approaches. More specifically, this approach documents programs by generating first order predicate logic annotations of their loops. In this approach, loops are classified according to their complexity levels. Based on this taxonomy, variations on the basic analysis approach that best fit each of the different classes are described. In general, mechanical annotation of loops is performed by first decomposing them using data flow analysis. This decomposition encapsulates interdependent statements in events, which can be analyzed individually."

VLSI-SoC: Technology Advancement on SoC Design - 29th IFIP WG 10.5/IEEE International Conference on Very Large Scale... VLSI-SoC: Technology Advancement on SoC Design - 29th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2021, Singapore, October 4-8, 2021, Revised and Extended Selected Papers (Hardcover, 1st ed. 2022)
Victor Grimblatt, Chip-Hong Chang, Ricardo Reis, Anupam Chattopadhyay, Andrea Calimera
R1,549 Discovery Miles 15 490 Ships in 10 - 15 working days

This book contains extended and revised versions of the best papers presented at the 29th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2021, held in Singapore, in October 2021*. The 12 full papers included in this volume were carefully reviewed and selected from the 44 papers (out of 75 submissions) presented at the conference. The papers discuss the latest academic and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) design, considering the challenges of nano-scale, state-of-the-art and emerging manufacturing technologies. In particular they address cutting-edge research fields like low-power design of RF, analog and mixed-signal circuits, EDA tools for the synthesis and verification of heterogenous SoCs, accelerators for cryptography and deep learning and on-chip Interconnection system, reliability and testing, and integration of 3D-ICs. *The conference was held virtually.

Business Analysis, Requirements, and Project Management - A Guide for Computing Students (Hardcover): Karl Cox Business Analysis, Requirements, and Project Management - A Guide for Computing Students (Hardcover)
Karl Cox
R4,317 Discovery Miles 43 170 Ships in 12 - 19 working days

IT projects emerge from a business need. In practice, software developers must accomplish two big things before an IT project can begin: find out what you need to do (i.e., analyse business requirements) and plan out how to do it (i.e., project management). The biggest problem in IT projects is delivering the wrong product because IT people do not understand what business people require. This practical textbook teaches computer science students how to manage and deliver IT projects by linking business and IT requirements with project management in an incremental and straightforward approach. Business Analysis, Requirements, and Project Management: A Guide for Computing Students presents an approach to analysis management that scales the business perspective. It takes a business process view of a business proposal as a model and explains how to structure a technical problem into a recognisable pattern with problem frames. It shows how to identify core transactions and model them as use cases to create a requirements table useful to designers and coders. Linked to the analysis are three management tools: the product breakdown structure (PBS), the Gantt chart, and the Kanban board. The PBS is derived in part from the problem frame. The Gantt chart emerges from the PBS and ensures the key requirements are addressed by reference to use cases. The Kanban board is especially useful in Task Driven Development, which the text covers. This textbook consists of two interleaving parts and features a single case study. Part one addresses the business and requirements perspective. The second integrates core project management approaches and explains how both requirements and management are connected. The remainder of the book is appendices, the first of which provides solutions to the exercises presented in each chapter. The second appendix puts together much of the documentation for the case study into one place. The case study presents a real-word business scenario to expose students to professional practice.

Infrastructure as Code, Patterns and Practices: With examples in Python and Terraform (Paperback): Rosemary Wang Infrastructure as Code, Patterns and Practices: With examples in Python and Terraform (Paperback)
Rosemary Wang
R1,263 Discovery Miles 12 630 Ships in 12 - 19 working days

Essential Infrastructure as Code teaches patterns for scaling systems and supporting infrastructure for mission-critical applications. The book is fullof flexible automation techniques and universal principles that are easy toapply to almost any use case, from data centers, to public cloud, to software-as-a-Service. The book is full of techniques that work whether you're managing your personal projects or making live network changes across a large enterprise. Infrastructure as Code (IaC) replaces time-consuming manual provisioning and configuration with automation via configuration managers or provisioning tools like Hashicorp Terraform. Managing your infrastructure as code makes it easy to test changes and implement new features, scale systems without downtime or operational toil, and rapidly roll back mistakes.

Graph Transformation for Software Engineers - With Applications to Model-Based Development and Domain-Specific Language... Graph Transformation for Software Engineers - With Applications to Model-Based Development and Domain-Specific Language Engineering (Hardcover, 1st ed. 2020)
Reiko Heckel, Gabriele Taentzer
R2,669 Discovery Miles 26 690 Ships in 10 - 15 working days

This book is an introduction to graph transformation as a foundation to model-based software engineering at the level of both individual systems and domain-specific modelling languages. The first part of the book presents the fundamentals in a precise, yet largely informal way. Besides serving as prerequisite for describing the applications in the second part, it also provides a comprehensive and systematic survey of the concepts, notations and techniques of graph transformation. The second part presents and discusses a range of applications to both model-based software engineering and domain-specific language engineering. The variety of these applications demonstrates how broadly graphs and graph transformations can be used to model, analyse and implement complex software systems and languages. This is the first textbook that explains the most commonly used concepts, notations, techniques and applications of graph transformation without focusing on one particular mathematical representation or implementation approach. Emphasising the research and engineering methodologies used, it will be a valuable resource for graduate students, practitioners and researchers in software engineering, foundations of programming and formal methods.

Digitising Enterprise in an Information Age - In an Information Age (Hardcover): David L. Olson, Subodh Kesharwani Digitising Enterprise in an Information Age - In an Information Age (Hardcover)
David L. Olson, Subodh Kesharwani
R3,423 Discovery Miles 34 230 Ships in 12 - 19 working days

Digitising Enterprise in an Information Age is an effort that focuses on a very vast cluster of Enterprises and their digitising technology involvement and take us through the road map of the implementation process in them, some of them being ICT, Banking, Stock Markets, Textile Industry & ICT, Social Media, Software Quality Assurance, Information Systems Security and Risk Management, Employee Resource Planning etc. It delves on increased instances of cyber spamming and the threat that poses to e-Commerce and Banking and tools that help and Enterprise toward of such threats. To quote Confucius, "As the water shapes itself to the vessel that contains it, so does a wise man adapts himself to circumstances." And the journey of evolution and progression will continue and institutions and enterprises will continue to become smarter and more and more technology savvy. Enterprises and businesses across all genre and spectrum are trying their level best to adopt to change and move on with the changing requirements of technology and as enterprises and companies upgrade and speed up their digital transformations and move their outdate heirloom systems to the cloud, archaic partners that don't keep up will be left behind. Note: T&F does not sell or distribute the Hardback in India, Pakistan, Nepal, Bhutan, Bangladesh and Sri Lanka.

Partnering with HMS: A Guide for App Developers (Hardcover): Xihai Wang, Yue Wang, Hailiang Wu Partnering with HMS: A Guide for App Developers (Hardcover)
Xihai Wang, Yue Wang, Hailiang Wu; Contributions by Zhang Zhou
R3,283 Discovery Miles 32 830 Ships in 12 - 19 working days

Partnering with HMS: A Guide for App Developers is the first book to introduce readers to the Huawei Mobile Services (HMS) ecosystem. It gives developers a fundamental understanding of the ecosystem and how to leverage kit and tool capabilities to make their apps better. This book is also a quick start guide for kit integration and practical environment setup, detailing the functions and principles behind each kit. By demonstrating how to integrate kits, the authors teach these kits by action: Account Kit, IAP, Push Kit, Location Kit, Map Kit, Site Kit, Safety Detect, and FIDO. Readers are fully introduced to how they can use HMS open capabilities to develop quality apps, acquire users, and monetize their hard work. In addition, the ecosystem background - the business model and value chain that underpin the entire ecosystem as well as its privacy compliance framework - is crucial to operations and illustrated in this book.

Software Development Patterns and Antipatterns (Hardcover): Capers Jones Software Development Patterns and Antipatterns (Hardcover)
Capers Jones
R4,199 Discovery Miles 41 990 Ships in 12 - 19 working days

Software development has been a troubling since it first started. There are seven chronic problems that have plagued it from the beginning: Incomplete and ambiguous user requirements that grow by >2% per month. Major cost and schedule overruns for large applications > 35% higher than planned. Low defect removal efficiency (DRE) < 85% on large systems. Cancelled projects that are not completed: > 30% above 10,000 function points. Poor quality and low reliability after the software is delivered: > 5 bugs per FP. Breach of contract litigation against software outsource vendors. Expensive maintenance and enhancement costs after delivery. These are endemic problems for software executives, software engineers and software customers but they are not insurmountable. In Software Development Patterns and Antipatterns, software engineering and metrics pioneer Capers Jones presents technical solutions for all seven. The solutions involve moving from harmful patterns of software development to effective patterns of software development. The first section of the book examines common software development problems that have been observed in many companies and government agencies. The data on the problems comes from consulting studies, breach of contract lawsuits, and the literature on major software failures. This section considers the factors involved with cost overruns, schedule delays, canceled projects, poor quality, and expensive maintenance after deployment. The second section shows patterns that lead to software success. The data comes from actual companies. The section's first chapter on Corporate Software Risk Reduction in a Fortune 500 company was based on a major telecom company whose CEO was troubled by repeated software failures. The other chapters in this section deal with methods of achieving excellence, as well as measures that can prove excellence to C-level executives, and with continuing excellence through the maintenance cycle as well as for software development.

Software Development Patterns and Antipatterns (Paperback): Capers Jones Software Development Patterns and Antipatterns (Paperback)
Capers Jones
R1,655 Discovery Miles 16 550 Ships in 12 - 19 working days

Software development has been a troubling since it first started. There are seven chronic problems that have plagued it from the beginning: Incomplete and ambiguous user requirements that grow by >2% per month. Major cost and schedule overruns for large applications > 35% higher than planned. Low defect removal efficiency (DRE) < 85% on large systems. Cancelled projects that are not completed: > 30% above 10,000 function points. Poor quality and low reliability after the software is delivered: > 5 bugs per FP. Breach of contract litigation against software outsource vendors. Expensive maintenance and enhancement costs after delivery. These are endemic problems for software executives, software engineers and software customers but they are not insurmountable. In Software Development Patterns and Antipatterns, software engineering and metrics pioneer Capers Jones presents technical solutions for all seven. The solutions involve moving from harmful patterns of software development to effective patterns of software development. The first section of the book examines common software development problems that have been observed in many companies and government agencies. The data on the problems comes from consulting studies, breach of contract lawsuits, and the literature on major software failures. This section considers the factors involved with cost overruns, schedule delays, canceled projects, poor quality, and expensive maintenance after deployment. The second section shows patterns that lead to software success. The data comes from actual companies. The section's first chapter on Corporate Software Risk Reduction in a Fortune 500 company was based on a major telecom company whose CEO was troubled by repeated software failures. The other chapters in this section deal with methods of achieving excellence, as well as measures that can prove excellence to C-level executives, and with continuing excellence through the maintenance cycle as well as for software development.

Research Software Engineering with Python - Building software that makes research possible (Paperback): Damien Irving, Kate... Research Software Engineering with Python - Building software that makes research possible (Paperback)
Damien Irving, Kate Hertweck, Luke Johnston, Joel Ostblom, Charlotte Wickham, …
R1,874 Discovery Miles 18 740 Ships in 12 - 19 working days

Based on the practical experiences of its authors, who collectively have spent several decades teaching software skills to scientists. Readers only need a basic understanding of Python includes over a hundred exercises to allow readers to practice their skills

Learn PowerShell in a Month of Lunches: Covers Windows, Linux, and macOS (Paperback): Travis Plunk, James Petty, Tyler... Learn PowerShell in a Month of Lunches: Covers Windows, Linux, and macOS (Paperback)
Travis Plunk, James Petty, Tyler Leonhardt, Don Jones, Jeffery Hicks
R1,058 R928 Discovery Miles 9 280 Save R130 (12%) Ships in 12 - 19 working days

"Not only for MacOS and Linux users, but also a great resource for Windows PS users." - Bruce Bergman Learn PowerShell in a Month of Lunches: Covers Windows, Linux, and macOS is a task-focused tutorial for administering Linux and macOS systems using Microsoft PowerShell. Adapted by PowerShell team members Travis Plunk and Tyler Leonhardt from the bestselling Learn Windows PowerShell in a Month of Lunches by community legends Don Jones and Jeffrey Hicks, it features Linux-based examples covering core language features and admin tasks. Designed for busy IT professionals, this innovative guide will take you from the basics to PowerShell proficiency through 25 tutorials you can do in your lunch break. about the technology The PowerShell scripting language and administrative shell was initially created for Windows, providing a high-quality command-line interface and awesome automation features. As part of Microsoft's ongoing strategy to support non-Windows platforms with its Azure cloud service and .NET Core framework, PowerShell now runs on Linux and macOS. Like Bash, PowerShell can execute and script nearly any aspect of Linux, so you can easily manage repetitive daily tasks, servers, Cloud resources, Continuous Integration pipelines, and more. Because PowerShell is a full-featured programming language, however, it provides capability well beyond traditional shell scripting languages, such as the ability to treat OS components as objects. about the book Learn PowerShell in a Month of Lunches: Covers Windows, Linux, and macOS is a user-friendly tutorial to managing Linux and macOS systems with PowerShell. It's based on the bestselling Learn Windows PowerShell in a Month of Lunches, which has introduced PowerShell to nearly 100,000 readers. You'll learn how PowerShell shapes up to Bash or Python scripting as you write and run simple scripts that automate boring daily tasks. As you progress through the book, you'll use PowerShell to write Continuous Integration Pipelines and manage cloud-based servers. Just set aside one hour a day for a month, and you'll be automating tasks faster than you ever thought possible! what's inside - Why you should use PowerShell on Linux and macOS - Background jobs and automation techniques - Simple scripting to automate repetitive daily tasks - Common syntax and commands cheat sheet - Each lesson takes you an hour or less about the reader For IT professionals comfortable administering Windows or Linux. No previous experience with PowerShell or Bash required. about the author Travis Plunk has been a Software Engineer on various PowerShell teams since 2013, and at Microsoft since 1999. He was involved in open sourcing PowerShell and has worked on the project full time since shortly after the project was announced. James Petty is a Microsoft MVP, and the CEO and Executive Director for the DevOps Collective and PowerShell.org. Tyler Leonhardt has been a Software Engineer on the PowerShell team since 2017, and at Microsoft since 2016. He is a core maintainer of the PowerShell extension for Visual Studio Code. Learn Windows PowerShell in a Month of Lunches was written by PowerShell community legends Don Jones and Jeffrey Hicks, who have years of experience as successful PowerShell trainers.

Software Craftsmanship - The New Imperative (Paperback): Pete McBreen, Mike Hendrickson Software Craftsmanship - The New Imperative (Paperback)
Pete McBreen, Mike Hendrickson
R656 Discovery Miles 6 560 Ships in 12 - 19 working days

Computational Design - Technology, Cognition and Environments (Hardcover): Rongrong Yu, Ning Gu, Michael J. Ostwald Computational Design - Technology, Cognition and Environments (Hardcover)
Rongrong Yu, Ning Gu, Michael J. Ostwald
R4,638 Discovery Miles 46 380 Ships in 12 - 19 working days

New computational design tools have evolved rapidly and been increasingly applied in the field of design in recent years, complimenting and even replacing the traditional design media and approaches. Design as both the process and product are changing due to the emergence and adoption of these new technologies. Understanding and assessing the impact of these new computational design environments on design and designers is important for advancing design in the contemporary context. Do these new computational environments support or hinder design creativity? How do those tools facilitate designers' thinking? Such knowledge is also important for the future development of design technologies. Research shows that design is never a mysterious non-understandable process, for example, one general view is that design process shares a common analysis-synthesis-evaluation model, during which designers interact between design problem and solution spaces. Understanding designers' thinking in different environments is the key to design research, education and practice. This book focuses on emerging computational design environments, whose impact on design and designers have not been comprehensively and systematically studied. It comprises three parts. The history and recent developments of computational design technologies are introduced in Part I. The main categories of technologies cover from computer-aided drafting and modelling tools, to visual programming and scripting tools for algorithmic design, to advanced interfaces and platforms for interactions between designers, between designers and computers, and between the virtual environment and the physical reality. To critically explore design thinking, especially in these new computational design environments, formal approaches to studying design thinking and design cognition are introduced and compared in Part II, drawing on literature and studies from the 70s to the current era. Part III concludes the book by exploring the impact of different computational design technologies on design and designers, using a series of case studies conducted by the author team building on their close collaboration over the past five years. The book offers new insights into designers' thinking in the rapidly evolving computational design environments, which have not been critically and systematically studied and reported in the current literature. The book is meant for design researchers, educators and students, professional practitioners and consultants, as well as people who are interested in computational design in general.

Research Software Engineering with Python - Building software that makes research possible (Hardcover): Damien Irving, Kate... Research Software Engineering with Python - Building software that makes research possible (Hardcover)
Damien Irving, Kate Hertweck, Luke Johnston, Joel Ostblom, Charlotte Wickham, …
R4,372 Discovery Miles 43 720 Ships in 12 - 19 working days

Based on the practical experiences of its authors, who collectively have spent several decades teaching software skills to scientists. Readers only need a basic understanding of Python includes over a hundred exercises to allow readers to practice their skills

Software Quality Assurance - Integrating Testing, Security, and Audit (Paperback): Abu Sayed Mahfuz Software Quality Assurance - Integrating Testing, Security, and Audit (Paperback)
Abu Sayed Mahfuz
R1,338 Discovery Miles 13 380 Ships in 12 - 19 working days

Software Quality Assurance: Integrating Testing, Security, and Audit focuses on the importance of software quality and security. It defines various types of testing, recognizes factors that propose value to software quality, and provides theoretical and real-world scenarios that offer value and contribute quality to projects and applications. The practical synopsis on common testing tools helps readers who are in testing jobs or those interested in pursuing careers as testers. It also helps test leaders, test managers, and others who are involved in planning, estimating, executing, and maintaining software. The book is divided into four sections: The first section addresses the basic concepts of software quality, validation and verification, and audits. It covers the major areas of software management, software life cycle, and life cycle processes. The second section is about testing. It discusses test plans and strategy and introduces a step-by-step test design process along with a sample test case. It also examines what a tester or test lead needs to do before and during test execution and how to report after completing the test execution. The third section deals with security breaches and defects that may occur. It discusses documentation and classification of incidences as well as how to handle an occurrence. The fourth and final section provides examples of security issues along with a security policy document and addresses the planning aspects of an information audit. This section also discusses the definition, measurement, and metrics of reliability based on standards and quality metrics methodology CMM models. It discusses the ISO 15504 standard, CMMs, PSP, and TSP and includes an appendix containing a software process improvement sample document.

Software Configuration Management Implementation Roadmap +Website (Hardcover): M.E. Moreira Software Configuration Management Implementation Roadmap +Website (Hardcover)
M.E. Moreira
R3,314 R2,716 Discovery Miles 27 160 Save R598 (18%) Ships in 12 - 19 working days

While many other SCM (Software Configuration Management) related books provide focus on what SCM is, this book will guide you through SCM tasks. "Software Configuration Management Implementation Roadmap" provides the reader with the building blocks and concrete steps for implementing SCM. It does this by focusing on several areas: Aligns SCM tasks to the appropriate target levels within the workplace. The three target levels include: the Organization, the Application, and the Project level. This increases the chances of a more effective SCM implementation.

Provides a customizable set of SCM tasks and templates for establishing a unique roadmap for implementing SCM. Within this book, each task includes step-by-step guidance to implement the SCM need.

Provides a focus on distributed and offshore development since development is more distributed than ever before. This book can help you plan for and guide you through the strategies of establishing distributed development infrastructures. The materials in this book may help you significantly reduce the time it takes to plan and prepare for an SCM implementation or an SCM task. It will be particularly useful for Software Engineers especially as a reference guide for junior and mid-level SCM persons (SCM managers, engineers, Release Engineers. Build Engineers, etc.)

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Hedgerow Apothecary Forager's…
Christine Iverson Paperback R324 R285 Discovery Miles 2 850
Cloud Computing & Virtualization
R Rajeswara Rao, V Subba Ramaiah Hardcover R1,885 R1,615 Discovery Miles 16 150
102 Things to Do in Winter
Alex Quick Paperback  (1)
R277 Discovery Miles 2 770
AWS Database Migration Service…
Documentation Team Hardcover R1,235 Discovery Miles 12 350
Resilience Journal
Breathe Magazine Hardcover R329 R262 Discovery Miles 2 620
Amazon Sumerian User Guide
Documentation Team Hardcover R1,231 Discovery Miles 12 310
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,420 R1,316 Discovery Miles 13 160
The Little Book of Manifestation - A…
Astrid Carvel Paperback R202 R177 Discovery Miles 1 770
Flower Colour Guide
Darroch Putnam, Michael Putnam Paperback R825 R693 Discovery Miles 6 930
AWS Encryption SDK Developer Guide
Documentation Team Hardcover R968 Discovery Miles 9 680

 

Partners