![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Systems management
Whether you're preparing for your service management foundation exam, or simply want to understand service management better, this new edition of our popular book covers the latest thinking and provides a comprehensive, practical introduction to IT service management. Building on their collective service management experience, the authors walk you through essential concepts including processes, functions and roles and illustrate these with real-life examples.
* Offers comprehensive coverage of all major modeling viewpoints
You did it. You successfully transformed your application into a microservices architecture. But now that you're running services across different environments-public to public, private to public, virtual machine to container-your cloud native software is beginning to encounter reliability issues. How do you stay on top of this ever-increasing complexity? With the Istio service mesh, you'll be able to manage traffic, control access, monitor, report, get telemetry data, manage quota, trace, and more with resilience across your microservice. In this book, Lee Calcote and Zack Butcher explain why your services need a service mesh and demonstrate step-by-step how Istio fits into the life cycle of a distributed application. You'll learn about the tools and APIs for enabling and managing many of the features found in Istio. Explore the observability challenges Istio addresses Use request routing, traffic shifting, fault injection, and other features essential to running a solid service mesh Generate and collect telemetry information Try different deployment patterns, including A/B, blue/green, and canary Get examples of how to develop and deploy real-world applications with Istio support
Presenting a reference model architecture for the design of intelligent systems Engineering of Mind presents the foundations for a computational theory of intelligence. It discusses the main streams of investigation that will eventually converge in a scientific theory of mind and proposes an avenue of research that might best lead to the development of truly intelligent systems. This book presents a model of the brain as a hierarchy of massive parallel computational modules and data structures interconnected by information pathways. Using this as the basic model on which intelligent systems should be based, the authors propose a reference model architecture that accommodates concepts from artificial intelligence, control theory, image understanding, signal processing, and decision theory. Algorithms, procedures, and data embedded within this architecture would enable the analysis of situations, the formulation of plans, the choice of behaviors, and the computation of uncertainties. The computational power to implement the model can be achieved in practical systems in the foreseeable future through hierarchical and parallel distribution of computational tasks. The authors’ reference model architecture is expressed in terms of the Real-time Control System (RCS) that has been developed primarily at the National Institute of Standards and Technology. Suitable for engineers, computer scientists, researchers, and students, Engineering of Mind blends current theory and practice to achieve a coherent model for the design of intelligent systems.
This book presents simple, elegant methods for dealing, both in theory and in application, with a variety of problems that have formulations in terms of flows in capacity-constrained networks. Since the theoretical considerations lead in all cases to computationally efficient solution procedures, the hook provides a common meeting ground for persons interested in operations research, industrial and communications engineering, or combinatorial mathematics. Originally published in 1962. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
This book constitutes the proceedings of the 19th International Conference on Theory and Practice of Digital Libraries, TPDL 2015, held in Poznan, Poland, in September 2015. The 22 full papers and 14 poster and demo papers presented in this volume were carefully reviewed and selected from 61 submissions. They were organized in topical sections named: interoperability and information integration; multimedia information management and retrieval and digital curation; personal information management and personal digital libraries; exploring semantic web and linked data; user studies for and evaluation of digital library systems and applications; applications of digital libraries; digital humanities; and social-technical perspectives of digital information.
This is an edited book based on the selected submissions made to the conference titled "International Conference in Smart Cities". The project provides an innovative and new approach to holistic management of cities physical, socio-economic, environmental, transportation and political assets across all domains, typically supported by ICT and open data.
With this essential guide to vehicular networking, you will learn about everything from conceptual approaches and state-of-the-art protocols, to system designs and their evaluation. Covering both in- and inter-vehicle communication, this comprehensive work outlines the foundations of vehicular networking as well as demonstrating its commercial applications, from improved vehicle performance, to entertainment, and traffic information systems. All of this is supported by in-depth case studies and detailed information on proposed protocols and solutions for access technologies and information dissemination, as well as topics on rulemaking, regulations, and standardization. Importantly, for a field which is attracting increasing commercial interest, you will learn about the future trends of this technology, its problems, and solutions to overcome them. Whether you are a student, a communications professional or a researcher, this is an invaluable resource.
Semantic Web services promise to automate tasks such as discovery, mediation, selection, composition, and invocation of services, enabling fully flexible automated e-business. Their usage, however, still requires a significant amount of human intervention due to the lack of support for a machine-processable description. In this book, Jos de Bruijn and his coauthors lay the foundations for understanding the requirements that shape the description of the various aspects related to Semantic Web services, such as the static background knowledge in the form of ontologies, the functional description of the service, and the behavioral description of the service. They introduce the Web Service Modeling Language (WSML), which provides means for describing the functionality and behavior of Web services, as well as the underlying business knowledge, in the form of ontologies, with a conceptual grounding in the Web Service Modeling Ontology. Academic and industrial researchers as well as professionals will find a comprehensive overview of the concepts and challenges in the area of Semantic Web services, the Web Services Modeling Language and its relation to the Web Services Modeling Ontology, and an in-depth treatment of both enabling technologies and theoretical foundations.
According to the W3C Semantic Web Activity [1]: The Semantic Web provides a common framework that allows data to be shared and reused across appli- tion, enterprise, and community boundaries. This statement clearly explains that the Semantic Web is about data sharing. Currently, the Web uses hyperlinks to connect Web pages. The Semantic Web goes beyond that and focuses on data and envisions the creation of the web of data. On the Semantic Web, anyone can say anything about any resource on the Web. This is fully based on the concept of semantic - notations, where each resource on the Web can have an assigned meaning. This is done through the use of ontologies as a formal and explicit representation of domain concepts and their relationships [2]. Ontologies are formally based on description logics. This enables agents and applications to reason over the data when searching the Web, which has not previously been possible. Web 2. 0 has gradually evolved from letting the Web users play a more active role. Unlike the initial version of the Web, where the users mainly "consumed" content, users are now offered easy-to-use services for content production and publication. Mashups, blogs, wikis, feeds, interface remixes, and social networking/tagging s- tems are examples of these well-known services. The success and wide adoption of Web 2. 0 was in its reliance on social interactions as an inevitable characteristic of the use and life of the Web. In particular, Web 2.
Hypermedia & the Web An Engineering Approach David Lowe, University of Technology, Sydney, Australia Wendy Hall, University of Southampton, UK The rich online world offered through the Web is marred by the chaos which underlies it. At the very early stages of understanding how to harness the power of this new medium, electronic document creators, managers and researchers often spend time on technology innovations at the expense of adopting the sound engineering principles which have paid such dividends in the software industry. Hypermedio & the Web approaches interactive information (concentrating on hypertext documents) as a structure requiring management, quantification and documentation. From analysing the purpose for which a website, CD-ROM or online archive is created, assessing the characteristics and resources needed for the process of building each one, to the assessment of the end product itself, this book attempts to carve out features that are essential to the successful structuring of information in an electronic environment. This is an ambitious book charting an emerging discipline. It is an essential tool to help developers and educators shape and maintain useful and relevant electronic information. 'Hypermedia Engineering hasn't produced many tangible benefits in real-life situations, because very few people practise it. That's why the book is needed.' David Barron, Southampton University 'This book is interesting and excellently fulfills a current need [by] providing an exhaustive and up-to-date vision of the hypermedia field.' Fabio Vitali, University of Bologna 'The strength of this book is its breadth - it covers many of the issues in hypermedia with examples from thetechnical to the managerial. Students could use these as starting points when designing or evaluating hypermedia systems.' David Sharp, Imperial College of Science and Technology 'Information systems developers and managers should find this a helpful guide for developing hypermedia applications.' H Ashman, University of Nottingham Visit our Website at: http: //www.wiley.com/compbooks/
This book constitutes the refereed proceedings of the 12th International Conference on Database and Expert Systems Applications, DEXA 2001, held in Munich, Germany in September 2001. The 93 revised full papers presented were carefully reviewed and selected from 175 submissions. The papers are organized in topical sections on advanced databases, information retrieval, digital libraries, user interfaces, multimedia databases, workflow aspects, active databases, spatial databases, distributed databases, web aspects, knowledge management aspects, datawarehouses, hypermedia, indexing, object-oriented databases, database queries, and transaction processing.
Durch die Weiterentwicklung der kommunikationstechnischen Infrastruktur ergeben sich neue Freiraume bei der Distribuierung von Informations- und Kommunikationssystemen (IKS). Das Buch stellt ein computergestutztes Entscheidungsmodell zur Bestimmung des optimalen Distribuierungsgrades von IKS vor und dokumentiert die Entwicklung eines Prototyps. Die Diskussion der Rahmenbedingungen baut auf einem kybernetischen Unternehmensmodell auf, das es ermoeglicht, die Lebensfahigkeit eines Systems in seiner Umwelt zu untersuchen. Die geforderte Eigenschaft der Rekursivitat des Modells fuhrt zu dem Schluss, dass auch das IKS in einem Unternehmen hinsichtlich seiner Lebensfahigkeit beschrieben werden kann. In der Folge wird die Organisation unter einem strukturellen Aspekt untersucht. Dabei wird die Dimension der Distribuierung und das Distribuierungskontinuum beschrieben. Der Prozess der strategischen Unternehmensplanung, die Ableitung von Informatikprojekten (Projektportfolio) und Informatikzielen und die darin begrundeten Einflusse auf eine Distribuierungsentscheidung bilden den Gegenstand weiterer Untersuchungen. Als dritte Rahmenbedingung wird dann die Bedeutung der Entwicklung von Normen und Standards diskutiert. Dabei steht weniger der technische Aspekt im Vordergrund. Vielmehr werden die Anforderungen untersucht, denen ein IKS genugen muss, wenn der Distributionsgrad nicht von den technischen Moeglichkeiten sondern von anderen Faktoren bestimmt wird. Der zweite Teil der Arbeit beinhaltet eine Beschreibung der logischen Struktur des Prototyps, der Entwicklungsumgebung, der zugrundeliegenden Datenstruktur und der Benutzerschnittstelle anhand einer Beispiel-Konsultation.
Analytics in Healthcare: An Introduction provides a clear, straightforward roadmap to achieving your goals within the domain of healthcare analytics. Whether you are a student looking for a career path or a staff member within a healthcare organization needing to apply the value that your institution's data can provide, this manual will give you direction. Building on chapters that describe the evolution of healthcare analytics, others then address current and upcoming challenges including productive data mining from electronic health records, data governance, and the DELTA analytics maturity model. An appendix with learning modules for healthcare providers on secondary use of data as well as a comprehensive glossary are unique features of the book. The authors' varied experiences and perspectives demonstrate the range of opportunities where healthcare analytics can be applied to make a difference in the current healthcare climate. As a quick and manageable read, this to-the-point resource serves as an invaluable tool to building your analytics program.
A guide to applying software design principles and coding practices to VHDL to improve the readability, maintainability, and quality of VHDL code. This book addresses an often-neglected aspect of the creation of VHDL designs. A VHDL description is also source code, and VHDL designers can use the best practices of software development to write high-quality code and to organize it in a design. This book presents this unique set of skills, teaching VHDL designers of all experience levels how to apply the best design principles and coding practices from the software world to the world of hardware. The concepts introduced here will help readers write code that is easier to understand and more likely to be correct, with improved readability, maintainability, and overall quality. After a brief review of VHDL, the book presents fundamental design principles for writing code, discussing such topics as design, quality, architecture, modularity, abstraction, and hierarchy. Building on these concepts, the book then introduces and provides recommendations for each basic element of VHDL code, including statements, design units, types, data objects, and subprograms. The book covers naming data objects and functions, commenting the source code, and visually presenting the code on the screen. All recommendations are supported by detailed rationales. Finally, the book explores two uses of VHDL: synthesis and testbenches. It examines the key characteristics of code intended for synthesis (distinguishing it from code meant for simulation) and then demonstrates the design and implementation of testbenches with a series of examples that verify different kinds of models, including combinational, sequential, and FSM code. Examples from the book are also available on a companion website, enabling the reader to experiment with the complete source code.
Data is an intrinsic part of our daily lives. Everything we do is a data point. Many of these data points are recorded with the intent to help us lead more efficient lives. We have apps that track our workouts, sleep, food intake, and personal finance. We use the data to make changes to our lives based on goals we have set for ourselves. Businesses use vast collections of data to determine strategy and marketing. Data scientists take data, analyze it, and create models to help solve problems. You may have heard of companies having data management teams or chief information officers (CIOs) or chief data officers (CDOs), etc. They are all people who work with data, but their function is more related to vetting data and preparing it for use by data scientists. The jump from personal data usage for self-betterment to mass data analysis for business process improvement often feels bigger to us than it is. In turn, we often think big data analysis requires tools held only by advanced degree holders. Although advanced degrees are certainly valuable, this book illustrates how it is not a requirement to adequately run a data science project. Because we are all already data users, with some simple strategies and exposure to basic analytical software programs, anyone who has the proper tools and determination can solve data science problems. The process presented in this book will help empower individuals to work on and solve data-related challenges. The goal of this book is to provide a step-by-step guide to the data science process so that you can feel confident in leading your own data science project. To aid with clarity and understanding, the author presents a fictional restaurant chain to use as a case study, illustrating how the various topics discussed can be applied. Essentially, this book helps traditional businesspeople solve data-related problems on their own without any hesitation or fear. The powerful methods are presented in the form of conversations, examples, and case studies. The conversational style is engaging and provides clarity.
Thoroughly updated to reflect the CompTIA (R) Network+ N10-008 exam, Networking Essentials, Sixth Edition is a practical, up-to-date, and hands-on guide to the basics of networking. Written from the viewpoint of a working network administrator, it requires absolutely no experience with either network concepts or day-to-day network management. Networking Essentials, Sixth Edition guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet networks; router configuration; TCP/IP networks; routing protocols; local, campus, and wide area network configuration; network security; wireless networking; optical networks; Voice over IP; the network server; and Linux networking. This edition reflects the latest exam topics and objectives associated with network security and hardening, cloud networking, virtualization, 5G, and other recent advances in wireless technology, infrastructure management, and current hardware and devices. It also explains many new terms now addressed by CompTIA's N10-008 exam. Clear goals are outlined for each chapter, and every concept is introduced in easy-to-understand language that explains how and why networking technologies are used. Each chapter is packed with real-world examples and practical exercises that reinforce all concepts and guide you through using them to configure, analyze, and fix networks. CHALLENGE SIMULATION SOFTWARE provides hands-on experience with entering router and switch commands, setting up functions, and configuring interfaces and protocols WIRESHARK NETWORK PROTOCOL ANALYZER presents techniques and examples of data traffic analysis throughout PROVEN TOOLS FOR MORE EFFECTIVE LEARNING AND NETWORK+ PREP, including chapter outlines, summaries, and Network+ objectives WORKING EXAMPLES IN EVERY CHAPTER to reinforce key concepts and promote mastery KEY TERM DEFINITIONS, LISTINGS, AND EXTENSIVE GLOSSARY to help you master the language of networking QUESTIONS, PROBLEMS, AND CRITICAL THINKING QUESTIONS to help you deepen your understanding
A comprehensive guide to understanding network architecture, communication protocols, and network analysis to build secure applications compatible with the latest versions of C# 8 and .NET Core 3.0 Key Features Explore various network architectures that make distributed programming possible Learn how to make reliable software by writing secure interactions between clients and servers Use .NET Core for network device automation, DevOps, and software-defined networking Book DescriptionThe C# language and the .NET Core application framework provide the tools and patterns required to make the discipline of network programming as intuitive and enjoyable as any other aspect of C# programming. With the help of this book, you will discover how the C# language and the .NET Core framework make this possible. The book begins by introducing the core concepts of network programming, and what distinguishes this field of programming from other disciplines. After this, you will gain insights into concepts such as transport protocols, sockets and ports, and remote data streams, which will provide you with a holistic understanding of how network software fits into larger distributed systems. The book will also explore the intricacies of how network software is implemented in a more explicit context, by covering sockets, connection strategies such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), asynchronous processing, and threads. You will then be able to work through code examples for TCP servers, web APIs served over HTTP, and a Secure Shell (SSH) client. By the end of this book, you will have a good understanding of the Open Systems Interconnection (OSI) network stack, the various communication protocols for that stack, and the skills that are essential to implement those protocols using the C# programming language and the .NET Core framework. What you will learn Understand the breadth of C#'s network programming utility classes Utilize network-layer architecture and organizational strategies Implement various communication and transport protocols within C# Discover hands-on examples of distributed application development Gain hands-on experience with asynchronous socket programming and streams Learn how C# and the .NET Core runtime interact with a hosting network Understand a full suite of network programming tools and features Who this book is forIf you're a .NET developer or a system administrator with .NET experience and are looking to get started with network programming, then this book is for you. Basic knowledge of C# and .NET is assumed, in addition to a basic understanding of common web protocols and some high-level distributed system designs.
Leverage the full potential of IoT with the combination of Raspberry Pi 3 and Python and architect a complete IoT system that is the best fit for your organization Key Features Build complex Python-based applications with IoT Explore different concepts, technologies, and tradeoffs in the IoT architectural stack Delve deep into each element of the IoT design-from sensors to the cloud Book DescriptionThe Internet of Things (IoT) is the fastest growing technology market. Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. We'll begin our journey with an introduction to Raspberry Pi and quickly jump right into Python programming. We'll learn all concepts through multiple projects, and then reinforce our learnings by creating an IoT robot car. We'll examine modern sensor systems and focus on what their power and functionality can bring to our system. We'll also gain insight into cloud and fog architectures, including the OpenFog standards. The Learning Path will conclude by discussing three forms of prevalent attacks and ways to improve the security of our IoT infrastructure. By the end of this Learning Path, we will have traversed the entire spectrum of technologies needed to build a successful IoT system, and will have the confidence to build, secure, and monitor our IoT infrastructure. This Learning Path includes content from the following Packt products: Internet of Things Programming Projects by Colin Dow Internet of Things for Architects by Perry Lea What you will learn Build a home security dashboard using an infrared motion detector Receive data and display it with an actuator connected to the Raspberry Pi Build an IoT robot car that is controlled via the Internet Use IP-based communication to easily and quickly scale your system Explore cloud protocols, such as Message Queue Telemetry Transport (MQTT) and CoAP Secure communication with encryption forms, such as symmetric key Who this book is forThis Learning Path is designed for developers, architects, and system designers who are interested in building exciting projects with Python by understanding the IoT ecosphere, various technologies, and tradeoffs. Technologists and technology managers who want to develop a broad view of IoT architecture, will also find this Learning Path useful. Prior programming knowledge of Python is a must.
Enhance your skills in expert module development, deployment, security, DevOps, and cloud Key Features A step-by-step guide to get you started with PowerShell Core 6.0 Harness the capabilities of PowerShell Core 6.0 to perform simple to complex administration tasks Learn core administrative concepts such as scripting, pipelines, and DSC Book DescriptionBeginning with an overview of the different versions of PowerShell, Learn PowerShell Core 6.0 introduces you to VSCode and then dives into helping you understand the basic techniques in PowerShell scripting. You will cover advanced coding techniques, learn how to write reusable code as well as store and load data with PowerShell. This book will help you understand PowerShell security and Just Enough Administration, enabling you to create your own PowerShell repository. The last set of chapters will guide you in setting up, configuring, and working with Release Pipelines in VSCode and VSTS, and help you understand PowerShell DSC. In addition to this, you will learn how to use PowerShell with Windows, Azure, Microsoft Online Services, SCCM, and SQL Server. The final chapter will provide you with some use cases and pro tips. By the end of this book, you will be able to create professional reusable code using security insight and knowledge of working with PowerShell Core 6.0 and its most important capabilities. What you will learn Get to grips with Powershell Core 6.0 Explore basic and advanced PowerShell scripting techniques Get to grips with Windows PowerShell Security Work with centralization and DevOps with PowerShell Implement PowerShell in your organization through real-life examples Learn to create GUIs and use DSC in production Who this book is forIf you are a Windows administrator or a DevOps user who wants to leverage PowerShell to automate simple to complex tasks, then this book is for you. Whether you know nothing about PowerShell or just enough to get by, this guide will give you what you need to go to take your scripting to the next level. You'll also find this book useful if you're a PowerShell expert looking to expand your knowledge in areas such as PowerShell Security and DevOps.
Learn how to hack systems like black hat hackers and secure them like security experts Key Features Understand how computer systems work and their vulnerabilities Exploit weaknesses and hack into machines to test their security Learn how to secure systems from hackers Book DescriptionThis book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. You will explore network hacking, where you will see how to test the security of wired and wireless networks. You'll also learn how to crack the password for any Wi-Fi network (whether it uses WEP, WPA, or WPA2) and spy on the connected devices. Moving on, you will discover how to gain access to remote computer systems using client-side and server-side attacks. You will also get the hang of post-exploitation techniques, including remotely controlling and interacting with the systems that you compromised. Towards the end of the book, you will be able to pick up web application hacking techniques. You'll see how to discover, exploit, and prevent a number of website vulnerabilities, such as XSS and SQL injections. The attacks covered are practical techniques that work against real systems and are purely for educational purposes. At the end of each section, you will learn how to detect, prevent, and secure systems from these attacks. What you will learn Understand ethical hacking and the different fields and types of hackers Set up a penetration testing lab to practice safe and legal hacking Explore Linux basics, commands, and how to interact with the terminal Access password-protected networks and spy on connected clients Use server and client-side attacks to hack and control remote computers Control a hacked system remotely and use it to hack other systems Discover, exploit, and prevent a number of web application vulnerabilities such as XSS and SQL injections Who this book is forLearning Ethical Hacking from Scratch is for anyone interested in learning how to hack and test the security of systems like professional hackers and security experts.
Automation through Chef Opscode provides an in-depth understanding of Chef, which is written in Ruby and Erlang for configuration management, cloud infrastructure management, system administration, and network management. Targeted at administrators, consultants, and architect, the book guides them through the advanced features of the tool which are necessary for infrastructure automation, devops automation, and reporting. The book presumes knowledge of Ruby and Erlang which are used as reference languages for creating recipes and cookbooks and as a refresher on them to help the reader get on speed with the flow of book. The book provides step by step instructions on installation and configuration of Chef, usage scenarios of Chef, in infrastructure automation by providing common scenarios like virtual machine provisioning, OS configuration for Windows, Linux, and Unix, provisioning and configuration of web servers like Apache along with popular databases like MySQL. It further elaborates on the creation of recipes, and cookbooks, which help in deployment of servers and applications to any physical, virtual, or cloud location, no matter the size of the infrastructure. The books covers advanced features like LWRPs and Knife and also contains several illustrative sample cookbooks on MySQL, Apache, and CouchDB deployment using a step by step approach. |
You may like...
Governance of Picture Archiving and…
Carrison K.S. Tong, Eric T.T. Wong
Hardcover
R5,612
Discovery Miles 56 120
Meeting People via WiFi and Bluetooth
Joshua Schroeder, Henry Dalziel
Paperback
R777
Discovery Miles 7 770
Wireless Communication Networks…
Hailong Huang, Andrey V. Savkin, …
Paperback
R2,763
Discovery Miles 27 630
Inclusive Radio Communications for 5G…
Claude Oestges, Francois Quitin
Paperback
R2,896
Discovery Miles 28 960
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,018
Discovery Miles 10 180
Intelligent Image and Video Compression…
David R. Bull, Fan Zhang
Paperback
R2,606
Discovery Miles 26 060
Computing in Communication Networks…
Frank H. P. Fitzek, Fabrizio Granelli, …
Paperback
R2,667
Discovery Miles 26 670
|