![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Systems management
Fundamentals Made Easy--Covers Struts 1.2 Create powerful Web applications with Struts, the dynamic application framework built for online Java programming. Through hands-on examples you'll quickly learn Struts basics--working in the MVC architecture, handling user input, and using Struts actions and tag libraries. Then, you'll find coverage of the Struts Validator framework, Tiles, and Eclipse--the most popular Java Integrated Development Environment (IDE). Start taking advantage of the all the powerful development features available in Struts right away. Designed for Easy Learning: Modules--Each concept is divided into logically organized modules (chapters), ideal for self-paced learning Critical Skills--Each module opens with the specific skills covered in the module Mastery Checks--End-of-module reviews test knowledge using short-answer, multiple-choice, and fill-in-the-blank questions Ask the Experts--Q&A sections throughout are filled with bonus information and helpful tips Progress Checks--Quick self-assessment sections check your progress Annotated Syntax--Example code annotated with commentary that describes the programming techniques being illustrated Steven Holzner is an award-winning author of more than 80 computing books, and a former contributing editor for PC Magazine. He is an expert in Struts, Java, and online programming.
This book constitutes the refereed proceedings of the 5th International Workshop on Hybrid Systems: Computation and Control, HSCC 2002, held in Stanford, California, USA, in March 2002.The 33 revised full papers presented were carefully reviewed and selected from 73 submissions. All current issues in hybrid systems are addressed including formal models and methods and computational representations, algorithms and heuristics, computational tools, and innovative applications.
The lambda-calculus lies at the very foundations of computer science. Besides its historical role in computability theory it has had significant influence on programming language design and implementation, denotational semantics, and domain theory. The book emphasises the proof theory for the type-free lambda-calculus. The first six chapters concern this calculus and cover the basic theory, reduction, models, computability, and the relationship between the lambda-calculus and combinatory logic. Chapter 7 presents a variety of typed calculi; first the simply typed lambda-calculus, then Milner-style polymorphism and, finally, the polymorphic lambda-calculus. Chapter 8 concerns two variants of the type-free lambda-calculus that have appeared in the research literature: the lazy lambda-calculus, and the lambda sigma-calculus. The final chapter contains references and a guide to further reading. There are exercises throughout. In contrast to earlier books on these topics, which were written by logicians, this book is written from a computer science perspective and emphasises the practical relevance of many of the key theoretical ideas. The book is intended as a course text for final year undergraduates or first year graduate students in computer science. Research students should find it a useful introduction to more specialist literature.
Novell ZENworks for Servers (ZENworks stands for Zero Effort Networking) is the cross-platform solution for server content and configuration management. It provides server consistency across Windows, Linux, Solaris and NetWare platforms, enables intelligent network automation, and increases management efficiency so everything works together as on Net. As a result, organizations get a stable server environment and significantly reduce networking costs. Novell?s ZENworks for Server 3 Administrator?s Handbook guides the reader through the potential rough spots. It explains how ZENworks for Server 3 functions and affects NetWare, Windows, Linux and/or Solaris networks.
COMPREHENSIVE EMERGENCY MANAGEMENT FOR LOCAL GOVERNMENTS: DEMYSTIFYING EMERGENCY PLANNING is a "how-to" guide for staff in small to mid-sized local governments. It is incumbent upon such local authorities to be as prepared as possible for the natural and human-caused emergencies that seem to be occurring with greater frequency throughout North America, whether large or small, urban or rural. Preparing for such an eventuality is not ad hoc or sporadic: it follows a logical process considering a wide range of important aspects well beyond what is traditionally considered emergency preparedness. Comprehensive Emergency Management (CEM) is a framework intended to guide novice emergency planners through the complete process of mitigation, preparedness, response and recovery. This work also includes an introductory chapter on the nature of local government emergency planning and a final chapter of tips on "putting it all together." Between these are detailed chapters on each of the four phases of comprehensive emergency management. The Mitigation chapter provides a thorough review of the concept of risk, risk assessment, management and communication. The Preparedness chapter constructs the preparedness plan which is an assembly of a general emergency management plan, four common priority plans covering public information, emergency social services, evacuation and telecommunications, and finally, hazard-specific preparedness plans for each hazard facing a community. The Response chapter covers the unique nature of response where the preparedness plan is put into use. Specifically, it addresses the scale of response by discussing mutual aid and supplementary resources. The Recovery chapter touches on the three cornerstones of recovery: staff, facilities and services. It also includes comments on the unique end to emergencies in addressing "Returning to Normal." Together they lead the emergency planner through the detailed process of compiling a comprehensive emergency management plan for their community. Beyond simply having the plan prepared, this book conveys the dynamic life of such a plan by stressing "the other 80%," which is training and exercising. Creating a training matrix for staff and developing a timetable of graduated exercises are those important steps beyond writing the plan that instill its principles and procedures. The book offers helpful advice on how a local government undertakes comprehensive emergency planning, who is assigned what tasks, and the ongoing obligations of those with such responsibilities. It is a treatment of the entire process of which writing a plan is only one part. There are many aspects to managing a successful, but more importantly effective, local government emergency program that are often overlooked by the novice or part-time emergency planner. This book provides a truly comprehensive view that any local government will benefit from.
Endorsed by The Business Continuity Institute.- Contains a comprehensive, detailed business continuity audit plan- Includes sample audit report and work papers- An ideal resource for consultants or auditors, as well as internal business continuity planners - International in scope - includes country-specific guidelines.This book presents a general methodology and a framework for auditing Business Continuity Management (BCM). The main purpose is to provide a single work of reference for auditors, managers working in business continuity and consultants.BCM is a complex field. It covers business issues and technology with a perspective on the entire enterprise. The business continuity manager, and the auditor, require a diversified set of skills and extensive knowledge to assess business continuity as a question of business survival. There has been a lot of confusion about the terms "business continuity," "disaster recovery," "IT security" and many other words attempting to describe the continuation of critical business processes under adverse circumstances. However, for the auditor these terms refer to one and the same notion: businesses should take adequate precautions to ensure that no going concern issues arise from crises or disasters.Some companies decide to take a cautious stance with regard to continuing their operations come what may: they prefer to "err on the safe side" and rely on preventative measures. Other firms, perhaps in an industry where "speed to market" and competitive pressure require a faster pace, may prefer to reduce investments on prevention, while putting in place a robust crisis and disaster management mechanism. Both types of corporations nevertheless pursue the overall goal of business continuity, by either avoiding risks or disasters (if they can), or by making sure they can deal with these events.In a sense, BCM means "reading the future" or trying to safeguard an organization against unforeseen events. Management is still forced to address precisely this issue, by carefully evaluating their options and then making an entrepreneurial decision about the acceptable level of remaining risk. To the auditor, it is important to understand how this decision has been reached and whether it can be justified from a financial, operational and managerial point of view. Neither the overly cautious nor the reckless manager will succeed in today's market - the BCM auditor should provide a sounding board and an objective business partnership to the management of the company being reviewed. BCM audit is therefore an important element of ensuring corporate survival. The audit result incorporates issues of compliance, highlights weaknesses and provides reasonable recommendations to management, whose experience may be enhanced and improved by the auditor's objective input from other corporations or industries. It is not to be confused with the much narrower field of IT audit. This book has been deliberately restricted to business continuity rather than IT continuity to highlight the all-important differences between the two. The contents have been arranged around the Business Continuity Institute (BCI) / Disaster Recovery Institute International (DRII) Professional Practices for business continuity as well as other standards such as CobIT or ISO / IEC 17799. Some elements may look familiar to the experienced auditor who may still benefit from using this book as a reference manual or as an instructive tool for groups of auditors. This is intentional, as BCM and related audit questions should "fit in" with tools and models that are recognized and proven in the field.
"Database Management Systems" provides comprehensive and up-to-date coverage of the fundamentals of database systems. Coherent explanations and practical examples have made this one of the leading texts in the field. The third edition continues in this tradition, enhancing it with more practical material. The new edition has been reorganized to allow more flexibility in the way the course is taught. Now, instructors can easily choose whether they would like to teach a course which emphasizes database application development or a course that emphasizes database systems issues. New overview chapters at the beginning of parts make it possible to skip other chapters in the part if you don't want the detail. More applications and examples have been added throughout the book, including SQL and Oracle examples. The applied flavor is further enhanced by the two new database applications chapters.
Find hundreds of readily accessible tips for upgrading and tuning your PC inside this organized resource. Written by best-selling computer book author Kris Jamsa, you’ll get inside information and best practices on everything from system settings to adding and upgrading peripherals, and much more.
Essential Skills Made Easy! Learn the fundamentals of UNIX administration--from both a network and single system perspective--using this easy-to-follow introductory guide. You'll find clear instructions for setting up such important system services sas DNS, FTP, file systems, basic security tools, and much more. Designed for easy learning, this book walks you through each step of key processes--from installation to using TCP/IP tools and network and system management. Also, the book reviews SNMP and related tools. Organized by topic and filled with step-by-step exercises, tips, and quizzes, this book is an ideal starting point on the path to becoming a successful system administrator. This Beginner's Guide is Designed for Easy Learning: Modules--Each concept is divided into logically organized modules (chapters), ideal for self-paced learning Critical Skills--Each module opens with the specific skills covered in the module Ask the Experts--Q&A sections throughout are filled with bonus information and helpful tips 1-Minute Drills--Quick self-assessment sections check your progress Mastery Checks--End-of-module reviews test knowledge using short-answer, multiple-choice, and fill-in-the-blank questions Projects--Practical exercises show how to apply the critical skills learned in each module Blueprints--Key networking configurations are illustrated in detail
Essential Skills--Made Easy! Learn to set up, run, and support Solaris 9 across your network using this hands-on introductory guide. Beginning with an overview of this powerful operating system, this practical resource will show you how to install the SPARC version of Solaris 9 and manage Internet and intranet services, and will help you become familiar with the new features of Solaris 9--including role-based access control, Kerberos 5, and the LDAP directory service. You'll also learn how to integrate Windows NT/2000 or Linux with the Solaris platform. Filled with step-by-step exercises, self-assessment sections, and tips from a leading Solaris expert--this is a premier learning tool for every administrator new to Solaris.Modules--Each concept is divided into logically organized modules (chapters), ideal for self-paced learning Critical Skills--Each module opens with the specific skills covered in the module Ask-the-Experts--Q&A sections throughout are filled with bonus information and helpful tips 1-Minute Drills--Quick self-assessment sections check your progress Mastery Checks--End-of-module reviews test knowledge using short-answer, multiple-choice, and fill-in-the-blank questions Projects--Practical exercises show how to apply the critical skills learned in each module Blueprints--Key networking configurations are illustrated in detail
This book presents a new approach to on-line observation and concurrent checking of processors by refining and improving known techniques and introducing new ideas.The proposed on-line error detection and fast recover techniques support and complement other established methods. In combination with other on-line observation priniciples and with a combined hardware-software test, these techniques are used to fulfill a complete self-check scheme for an embedded processor.
*Fully revised updated edition. first edition was strong seller - over 30,000 sold.
Practice the Skills You'll Need on the Job! Perfect for both classroom and self-paced learningLabs that challenge you to solve problems based on realistic case studies Step-by-step scenarios that require you to think critically Post-lab observation questions that measure your understanding of lab results and key term quizzes that help build your vocabulary End-of-chapter solutions that explain not only what happened, but why In this lab manual, you'll practice: Identifying, Adding, and Removing System Components Diagnosing and Troubleshooting Common Computer Problems Protecting Your Computer's Power and Utilizing Important Safety Procedures Identifying Your PC's Motherboard, Processors, and Memory Installing and Maintaining Peripheral Devices Including Printers Performing Basic Networking Skills Installing and Upgrading Operating Systems Diagnosing and Troubleshooting Operating System Problems Configuring and Troubleshooting Network Utilities
The survival guide for system administrators!
Call on Admin911 to learn what’s going on with your network, to understand your options, and pick the right solutions. -David Chernicoff, Windows 2000 Magazine
Install, configure, and manage Microsoft's Exchange 2000 Server Build, maintain, and troubleshoot a scaleable, reliable messaging infrastructure using Exchange 2000 Server. Logically organized into task-based sections, Administering Exchange 2000 Server explains how to manage sites, clients, address lists, and Internet protocols. The book also covers the new features of Exchange, such as Active Directory integration, the Windows 2000 security model, instant messaging, and video conferencing services. The step-by-step walk-throughs, task-at-a-glance sections, and detailed screen shots make this the perfect day-to-day reference for administrators working with or migrating to Exchange 2000 Server.
Configure, manage, and optimize Active Directory on your Windows
2000 network Deploy and administer a distributed, interoperable, and secure Windows 2000 directory system using Active Directory and this hands-on resource. Administering Active Directory explains how to configure and implement Active Directory as your enterprise directory service and improve network performance. You'll learn to use the core AD components and services, including DNS, replication, and group policy, and take advantage of the centralized management capabilities. With step-by-step walk-throughs, task-at-a-glance sections, and detailed screen shots, this is the ideal desktop reference to Active Directory-the fully integrated directory service feature at the heart of Windows 2000.
-- Step by step approach shows how to analyze networks carrying
mission critical data such as voice over IP applications, streaming
video and e-commerce.
Self-stabilization, an important concept to theoreticians and practitioners in distributed computing and communication networks, refers to a system's ability to recover automatically from unexpected faults. In this book Shlomi Dolev presents the fundamentals of self-stabilization and demonstrates the process of designing self-stabilizing distributed systems. He details the algorithms that can be started in an arbitrary state, allowing the system to recover from the faults that brought it to that state. The book proceeds from the basic concept of self-stabilizing algorithms to advanced applications.
-- The hands-on daily bible for administrators working with SMS on
large-scale Microsoft networks. Task-by-task instruction rather
than overviews of the software and tools. Other essential tasks are
covered in detail to get the network administrator quickly up to
speed and on to the next job in their inbox.
Computer Networks and Open Systems: An Application Development Perspective covers principles, theory, and techniques of networks and open systems from a practical perspective, using real system and network applications as its basis. The selection of topics forms a core of material in computer networking, emphasizing methods and the environment for application development. The text aims to make readers immediately comfortable in today's networking environment while equipping them to keep pace in one of the fastest moving and most exciting areas of computer system development. Students will enter the study of networking through their own experience as a network users, and they will have the opportunity to practice the kind of networking tasks they will perform in the workplace. The authors take an application development perspective. This point of view reverses that traditional order of networking topics- instead of proceeding from the Physical Layer upward, the authors move from the Application Layer downward.
ONE-STOP GUIDE TO CONFIGURING CISCO ACCESS LISTS.
Implement and manage Microsoft's revolutionary directory-enabled
platform. Plan, deploy, and administer Windows 2000 in your enterprise. Windows 2000 Administration offers expert advice on all installation, migration, and management issues and provides in-depth details on Windows 2000 features, including the Active Directory, Microsoft Management Console (MMC), and Intellimirror. You'll also get complete information on the new security, backup, and disaster recovery options. No network administrator should be without this essential guide.
This guide provides a complete overview of all facets of Unix backup and recovery and offers practical, affordable backup and recovery solutions for environments of all sizes and budgets. It explains everything from freely available backup systems to large-scale commercial utilities. |
You may like...
Inclusive Radio Communications for 5G…
Claude Oestges, Francois Quitin
Paperback
R2,896
Discovery Miles 28 960
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,018
Discovery Miles 10 180
Intelligent Image and Video Compression…
David R. Bull, Fan Zhang
Paperback
R2,606
Discovery Miles 26 060
Channel Coding: Theory, Algorithms, and…
David Declercq, Marc Fossorier, …
Paperback
Meeting People via WiFi and Bluetooth
Joshua Schroeder, Henry Dalziel
Paperback
R777
Discovery Miles 7 770
Computing in Communication Networks…
Frank H. P. Fitzek, Fabrizio Granelli, …
Paperback
R2,667
Discovery Miles 26 670
Securing the Information Infrastructure
Joseph Migga Kizza, Florence Migga Kizza
Hardcover
R2,630
Discovery Miles 26 300
Enterprise Information Systems IV
Mario G. Piattini, Joaquim Filipe, …
Hardcover
R4,172
Discovery Miles 41 720
|