Computer hardware Books

363 products


  • Chip War

    Simon & Schuster Chip War

    2 in stock

    Book Synopsis

    2 in stock

    £20.95

  • Programming the Raspberry Pi Third Edition

    McGraw-Hill Education Programming the Raspberry Pi Third Edition

    2 in stock

    Book SynopsisAn up-to-date guide to creating your own fun and useful Raspberry Piâ programs This fully updated guide shows how to create inventive programs and fun games on your powerful Raspberry Piâwith no programming experience required. Programming the Raspberry Piâ: Getting Started with Python, Third Edition addresses physical changes and new setup procedures as well as OS updates to the current version 4. You will discover how to configure hardware and software, write Python scripts, create user-friendly GUIs, and control external electronics. Step-by-step projects include a digital clock prototype and a fully functioning Raspberry Pi robot. Configure your Raspberry Pi and explore its features Start writing and debugging Python programs Use strings, lists, functions, and dictionaries Work with modules, classes, and methods Apply object-oriented development methods Create user-friendly games using Pygame<Table of ContentsPrefaceIntroduction1 Introduction What Is the Raspberry Pi? What Can You Do with a Raspberry Pi? A Tour of the Raspberry Pi Setting Up Your Raspberry Pi Booting Up Summary2 Getting Started Linux The Desktop The Command Line Applications Internet Resources Summary3 Python Basics Mu Numbers Variables For Loops Simulating Dice If While The Python Shell from the Terminal Summary4 Strings, Lists, and Dictionaries String Theory Lists Functions Hangman Dictionaries Tuples Exceptions Summary of Functions Summary5 Modules, Classes, and Methods Modules Object Orientation Defining Classes Inheritance Summary6 Files and the Internet Files Pickling JSON Internet Summary7 Graphical User Interfaces guizero Hello World Temperature Converter Other GUI Widgets Pop-Ups Menus Summary8 Games Programming What Is Pygame? Coordinates Hello Pygame A Raspberry Game Summary9 Interfacing Hardware GPIO Pin Connections Breadboarding with Jumper Wires Digital Outputs Analog Outputs Digital Inputs Analog Inputs HATs Summary10 LED Fader Project What You Need Hardware Assembly Software Summary11 Prototyping Project (Clock) What You Need Hardware Assembly Software Phase Two Summary12 Raspberry Pi Robot Set Up the Raspberry Pi Zero W Web-Controlled Rover Autonomous Rover Summary13 What Next Linux Resources Python Resources Raspberry Pi Resources Programming Languages Other Languages Applications and Projects SummaryIndex

    2 in stock

    £11.39

  • UNIX For Dummies

    John Wiley & Sons Inc UNIX For Dummies

    15 in stock

    Book SynopsisManage files, set up networks, and go online with UNIX!UNIX For Dummies has been the standard for beginning UNIX references for nearly ten years, and this latest edition continues that tradition of success. This unparalled resource is updated to cover the latest applications of UNIX technology, including Linux and Mac desktops as well as how UNIX works with Microsoft server softwareThorough coverage of how to handle: UNIX installation file management software utilities networks Internet access ther basic tasks A great guide for the first-time UNIX desktop user growing accustomed to the ins and outs of the OS, as well as the beginning administrators who needs to get a handle on UNIX networking basics.Written by John Levine and Margaret Levine Young, longtime UNIX experts and highly experienced For Dummies authors.Table of ContentsIntroduction 1 Part I: Before the Beginning 7 Chapter 1: Log Me In, UNIX! 9 Chapter 2: What Is UNIX, Anyway? 19 Chapter 3: A Few Lines on Linux 33 Part II: Some Basic Stuff 39 Chapter 4: Opening Windows on UNIX 41 Chapter 5: Files for Fun and Profit 77 Chapter 6: Directories for Fun and Profit 91 Chapter 7: The Shell Game 103 Chapter 8: Where’s That File? 119 Chapter 9: Printing (The Gutenberg Thing) 133 Part III: Getting Things Done 147 Chapter 10: Writing Deathless Prose 149 Chapter 11: Umpteen Useful UNIX Utilities 175 Chapter 12: Installing Software Can Be Tricky 185 Chapter 13: Juggling a Bunch of Programs 199 Chapter 14: Taming Linux 211 Part IV: UNIX and the Net 217 Chapter 15: Your Computer Is Not Alone 219 Chapter 16: Across a Crowded Network 229 Chapter 17: Automating Your Office Gossip 243 Chapter 18: Web Surfing for UNIX Users 263 Chapter 19: Grabbing Files from the Net 279 Chapter 20: Now Serving the Internet 293 Part V: Help! 303 Chapter 21: Disaster Relief 305 Chapter 22: The Case of the Missing Files 311 Chapter 23: Some Programs Just Won’t Die 325 Chapter 24: “My Computer Hates Me” 3 31 Part VI: The Part of Tens 343 Chapter 25: Ten Common Mistakes 345 Chapter 26: Ten Times More Information Than You Want about UNIX 351 Index 361

    15 in stock

    £17.59

  • The History of Computing A Very Short

    Oxford University Press The History of Computing A Very Short

    Out of stock

    Book SynopsisVery Short Introductions: Brilliant, Sharp, InspiringThis lively Very Short Introduction reviews the central events, machines, and people that feature in established accounts of the history of computing, critically examining received perceptions and providing a fresh look at the nature and development of the modern electronic computer.The book begins by discussing a widely accepted linear narrative of the history of computing, centred around innovatory highlights that start with the use of knotted cords to aid calculation, all the way to the smartphones of the present day. It discusses the problems and simplifications present in such a narrative, and offers instead an account, centred on users, that identifies four distinct historical threads: calculation, automatic computing, information management, and communication. These threads are examined individually, tracing their paths and the convergences of related technologies into what has come to be called ''the information age''. ABOUT THE SERIES: The Very Short Introduction series from Oxford University Press contains hundreds of titles in almost every subject area. These pocket-sized books are the perfect way to get ahead in a new subject quickly. Our expert authors combine facts, analysis, perspective, new ideas, and enthusiasm to make interesting and challenging topics highly readable.Trade ReviewThis a wonderful personal introduction to the subject...this small volume may fit well in collections that value such treatments in support of a broader audience. * Choice *Table of ContentsAcknowledgements List of Illustrations 1: History and computing 2: Calculation 3: Automatic computation 4: Electronic computing 5: The computer boom 6: Revolution 7: The future of history Further reading

    Out of stock

    £9.49

  • Designing Embedded Hardware 2e

    O'Reilly Media Designing Embedded Hardware 2e

    Out of stock

    Book Synopsis'Designing Embedded Hardware' steers a course between those books dedicated to writing code for particular microprocessors, and those that stress the philosophy of embedded system design without providing any practical information. With real examples, the book also provides a roadmap to the pitfalls and traps to avoid.Table of ContentsPreface 1. An Introduction to Computer Architecture Concepts; Memory Input/Output DMA Embedded Computer Architecture; 2. Assembly Language Registers Machine Code Signed Numbers; Addressing Modes Coding in Assembly Disassembly Position-Independent Code Loops Masking Indexed Addressing; Stacks Timing of Instructions 3. Forth/Open Firmware Introducing Forth String Words Stack Manipulation Creating New Words Comments if ... else Loops Data Structures; Interacting with Hardware and Memory Forth Programming Guidelines; 4. Electronics 101 Voltage and Current Analog Signals; Power Reading Schematics Resistors Capacitors RC Circuits Inductors Transformers Diodes Crystals; Digital Signals Electrical Characteristics Logic Gates; The Importance of Reading the Datasheet 5. Power Sources The Stuff Out of the Wall Batteries Low Power Design Regulators LM78xx Regulators MAX603/MAX604 Regulators MAX1615 Regulator; MAX724 Regulator Electrical Noise and Interference 6. Building Hardware Tools Soldering Quick Construction Printed-Circuit Boards Building It JTAG 7. Adding Peripherals Using SPI Serial Peripheral Interface; 8. Adding Peripherals Using I2C Overview of I2C Adding a Real-Time Clock with I2C Adding a Small Display with I2C; 9. Serial Ports UARTs Error Detection Old Faithful: RS-232C RS-422 RS-485 10. IrDA Introduction to IrDA; 11. USB Introduction to USB USB Packets Physical Interface; Implementing a USB Interface 12. Networks Controller Area Network (CAN) Ethernet 13. Analog Amplifiers Analog to Digital Conversion Interfacing an External ADC Temperature Sensor Light Sensor Accelerometer Pressure Sensors; Magnetic-Field Sensor Digital to Analog Conversion PWM; Motor Control Switching Big Loads 14. The PIC Microcontrollers; A Tale of Two Processors Starting Simple A Bigger PIC; PIC-Based Environmental Datalogger Motor Control with a PIC; 15. The AVR Microcontrollers The AVR Architecture The ATtiny15 Processor Downloading Code A Bigger AVR AVR-Based Datalogger Bus Interfacing 16. 68HC11 Architecture of the 68HC11 A Simple 68HC11-Based Computer 17. MAXQ Architectural Overview Schematics 18. 68000-Series Computers The 68000 Architecture A Simple 68000-Based Computer 19. DSP-Based Controllers The DSP56800 A DSP56805-Based Computer JTAG; Index

    Out of stock

    £29.99

  • The Hardware Hacking Handbook: Breaking Embedded

    No Starch Press,US The Hardware Hacking Handbook: Breaking Embedded

    2 in stock

    Book SynopsisThe Hardware Hacking Handbook is a deep dive into embedded security, perfect for readers interested in designing, analysing, and attacking devices. You'll start with a crash course in embedded security and hardware interfaces and learn how to set up a test lab. Real-world examples and hands-on labs throughout allow you to explore hardware interfaces and practice various attacks.Trade Review"I really wished such a book existed when I started with researching hardware hacking a few years ago. It introduces all the relevant background that’s needed for hardware hacking along with references to further reading (the references are really nice to have for more intermediate readers). It also provides many practical examples that helps you see why the concepts are important and how they are applied."—Yifan Lu, Security Researcher"One of the most complete introductions to hardware hacking I’ve seen . . . provide[s] you something you wouldn't learn elsewhere."—Arya Voronova, HackadayTable of ContentsIntroductionChapter 1: Dental Hygiene: Introduction to Embedded SecurityChapter 2: Reaching Out, Touching Me, Touching You: Hardware Peripheral InterfacesChapter 3: Casing the Joint: Identifying Components and Gathering InformationChapter 4: Bull in a China Shop: Introducing Fault InjectionChapter 5: Don’t Lick the Probe: How to Inject FaultsChapter 6: Bench Time: Fault Injection LabChapter 7: X Marks the Spot: EMFI Memory Dumping of TrezorChapter 8: I’ve Got the Power: Introduction to Power AnalysisChapter 9: Bench Time: Simple Power AnalysisChapter 10: Splitting the Difference: Differential Power AnalysisChapter 11: Advanced Power AnalysisChapter 12: A DPA/SCA Lab: Breaking an AES-256 BootloaderChapter 13: No Kiddin’: Real-Life ExamplesChapter 14: Think of the Children: Countermeasures, Certifications, and GoodbytesAppendix A: Maxing Out Your Credit Card: Setting Up a Test LabAppendix B: All Your Base Are Belong to Us: Popular Pinouts

    2 in stock

    £38.39

  • iOS App Development For Dummies

    John Wiley & Sons Inc iOS App Development For Dummies

    15 in stock

    Book SynopsisIf you've got incredible iOS ideas, get this book and bring them to life! iOS 7 represents the most significant update to Apple's mobile operating system since the first iPhone was released, and even the most seasoned app developers are looking for information on how to take advantage of the latest iOS 7 features in their app designs.Table of ContentsIntroduction 1 A Bit of History 1 The iPhone stands alone 2 Enter the App Store 2 The iPad joins the party 3 The Plan for This Book 3 iOS and Xcode Game Changers 4 About This Book 5 Conventions Used in This Book 5 Icons Used in This Book 6 Foolish Assumptions 7 How This Book Is Organized 7 Part I: Getting Started 8 Part II: Building RoadTrip 8 Part III: Getting Your Feet Wet: Basic Functionality 8 Part IV: The Model and the App Structure 9 Part V: Adding the App Content 9 Part VI: The Part of Tens 9 Beyond the Book 10 Where to Go from Here 10 Part I: Getting Started 11 Chapter 1: What Makes a Great iOS App 13 Figuring Out What Makes a Great iOS App 14 Making your app work well 14 Handling networking, social media, and location 15 Designing a powerful and intuitive interface that disappears 15 Using the iOS Platform to the Fullest 16 Exploiting advantages of the system 16 Accessing the Internet 17 Knowing the location of the user 18 Tracking orientation and motion 18 Tracking users’ fingers on the screen 19 Playing content 19 Accessing information from Apple’s apps 19 Copying, cutting, and pasting between apps 20 Multitasking, background processing, and notifications 20 Living large on the big screen 21 Embracing Device Limitations 21 Designing for fingers 22 Balancing memory and battery life 22 Why Develop iOS Apps? 23 Developing with Apple’s Expectations in Mind 24 Thinking About You, Apps, and Money 25 Enter the Cloud 26 Developing an App the Right Way Using the Example App in This Book 27 What’s Next 27 Chapter 2: Getting to Know the SDK 29 Developing Using the SDK 29 Using Xcode to Develop an App 30 Creating an Xcode project 31 Developing the app 31 The Workspace Window 33 Workspace areas 34 Displaying an area’s content 36 The toolbar and Tab bar 40 The Organizer window 42 Chapter 3: The Nuts and Bolts of an Xcode Project 45 Creating Your Project 45 Exploring Your Project 50 The project 50 The Project editor 50 The Project navigator 53 Setting Your Xcode Preferences 57 Building and Running Your Application 59 Building an app 61 The iPad’s Split views 63 The Log navigator 64 Running in the Simulator 66 Interacting with your simulated hardware 66 Making gestures 67 Uninstalling apps and resetting your device 68 Living with the Simulator’s limitations 69 Using Asset Catalogs 70 Adding the Image and Sound Resources and an App Icon 74 Part II: Building RoadTrip 77 Chapter 4: Storyboards and the User Experience 79 Introducing the Storyboard 80 Telling your story 81 Working with object graphs 83 Defining What You Want an App to Do: The RoadTrip App 84 Creating the Application Architecture 88 What You Add Where 89 Using Frameworks 90 Using Design Patterns 91 The iOS design patterns 92 The Model-View-Controller (MVC) design pattern 92 Working with Windows and Views 95 Looking out the window 95 Admiring the view 96 The kinds of views you use 97 View Controllers — the Main Storyboard Players 101 What About the Model? 104 It’s Not That Neat 105 Taking a Look at Other Frameworks 106 The Foundation framework 106 The CoreGraphics framework 106 Even more frameworks 107 Understanding the MVC in the Project 107 Chapter 5: Creating the RoadTrip User Interface 111 Creating Your User Interface in the iPad Storyboard 111 It’s about the view controller 112 Using Interface Builder to add the user elements 113 Working within the Utility Area 115 Inspector and Quick Help pane 115 Library pane 116 Understanding iPad Navigation 117 Adding a New View Controller 121 Danger Will Robinson 128 Adding an identifier to the view controller 129 View Layout 130 Adding the User Interface Objects 131 Autosizing with Auto Layout 136 Adding the Test Drive button 141 Massaging the Template Code 144 Getting Rid of Warnings 148 Creating the iPhone User Interface 148 Chapter 6: The Runtime, Managing Memory, and Using Properties 151 Stepping Through the App Life Cycle 152 UIApplicationMain 153 Handling events while your application is executing 158 Knowing what to do when the normal processing of your application is interrupted 160 An overview of the view controller life cycle 163 Working within the Managed Memory Model Design Pattern 164 Understanding memory management 165 Using reference counting 165 Automatic Reference Counting (ARC) 167 Working with variable types according to ARC 169 Understanding the deadly retain cycle 170 Observing Low-Memory Warnings 172 The didReceiveMemoryWarning method 172 The applicationDidReceiveMemoryWarning: method 172 The UIApplicationDidReceiveMemoryWarningNotification: notification 173 Picking the right memory-management strategy for your application 173 Customizing the Behavior of Framework Classes 174 Subclassing 174 The Delegation pattern 175 Understanding Declared Properties 176 What comprises a declared property 176 Using dot syntax 177 Setting attributes for a declared property 178 Writing your own accessors 180 Accessing instance variables with accessors 181 Hiding Instance Variables 181 Chapter 7: Working with the Source Editor 183 Navigating in the Xcode Source Editors 183 Using the Jump bar 186 Organizing your code using the #pragma mark statement 190 Using the Xcode Source Editor 190 Using Live Issues and Fix-it 192 Compiler warnings 193 The Issue navigator 193 Accessing Documentation 195 Getting Xcode help 195 The Organizer window 198 The Help menu 199 Finding and Searching in Your Project 199 Using the Find command to locate an item in a file 199 Using the Search navigator to search your project or framework 200 Using the Symbol navigator 201 You’re Finally Ready to Write Code! 202 Part III: Getting Your Feet Wet: Basic Functionality 203 Chapter 8: It’s (Finally) T ime to Code 205 Checking for Network Availability 205 Downloading the Reachability sample 205 Adding the code to check for reachability 208 Exploring the Changes in iOS 7 211 The dated interface 211 Losing the content 212 Setting the Master View Controller Title 213 Understanding Autorotation 214 Writing Bug-Free Code 215 Working in the Debug area and Debug navigator 216 Managing breakpoints 218 What you’ll find in the Debug area 222 What you’ll find in the Debug navigator 223 Displaying variables in the Source editor 224 Tiptoeing through your program 225 Chapter 9: Adding Outlets and Actions to Your RoadTrip Code 227 Using Custom View Controllers 228 Adding the custom view controller 228 Setting up the TestDriveController in the MainStoryboard for iPad 229 Understanding Outlets 231 Adding Outlets 232 Opening the Assistant editor 232 Creating the outlet 234 The Connections inspector 237 Working with the Target-Action Design Pattern 239 Using the Target-Action pattern: It’s about controls 239 Adding an action 241 How Outlets and Actions Work 244 Update the iPhone storyboard file 244 Chapter 10: Adding Animation and Sound to Your App 247 Understanding iOS Animation 248 View geometry and coordinate systems 248 Points versus pixels 248 A view’s size and position 249 Working with data structures 250 Coordinating Auto Layout, Frames, and Constraints 250 Animating a View 251 Finally, More Code 252 Implementing the testDrive Method 252 Understanding Block Objects 256 Rotating the Object 259 Working with Audio 261 Tracking Touches 269 Animating a Series of Images “In Place” 272 iPhone versus iPad 273 Part IV: The Model and the App Structure 275 Chapter 11: The Trip Model 277 What the Model Contains 277 Adding the Model Data 278 Using property lists 278 Adding a property list to your project 280 Adding the First Two Model Classes 290 Understanding the Trip Interface 292 Implementing the Trip Class 294 Initializing objects 296 Invoking the superclass’s init method 297 Initializing instance variables 298 Returning self 299 Initializing the Destination Class 300 Creating the Trip Object 303 More Debugger Stuff 305 Chapter 12: Implementing the Master View Controller 309 Setting Up a Custom View Controller for the iPad 309 Adding a Background Image and Title 319 Updating the iPhone Storyboard File 321 Chapter 13: Working with Split View Controllers and the Master View 323 The Problem with Using a Navigation Controller in Detail View 323 Using a Navigation Controller in the Master View 326 Adding a Gesture Recognizer 330 The Split View Controller 333 The UISplitViewController delegate 335 Localization 340 Back to the main feature 340 Adding the Toolbar 346 Adding the button when the view controller is replaced 350 A Few More Tweaks to the MasterViewController 354 And (a Little Extra) One More Thing 355 Don’t Forget the iPhone 356 Chapter 14: Finishing the Basic App Structure 357 Extending the iPad Storyboard to Add More Functionality to Your App 358 Adding the Weather view controller 358 Adding the Events controller 364 Adding the remaining controllers 367 Changing the Split View Controller to a Detail View Controller Relationship 368 Repeat for iPhone 372 Part V: Adding the App Content 373 Chapter 15: How’s the Weather? Working with Web Views 375 The Plan 375 The iPad storyboard 376 The iPhone storyboard 377 Setting Up the Weather Controller 379 Adding the custom view controller 379 Setting Up WeatherController in the Main_iPad.storyboard file 380 The Weather Controller 385 Managing links in a Web view 388 More Opportunities to Use the Debugger 392 Unrecognized selector sent to instance 392 Repeat for the iPhone Storyboard 393 Adding the WeatherController to the iPhone storyboard file 393 Test in the iPhone Simulator 394 Chapter 16: Displaying Events Using a Page View Controller 395 The Plan 396 Setting Up the EventsController 397 Adding the custom view controller 397 Setting up the EventsController in the MainStoryboard 398 Adding and setting up the EventPageController in the MainStoryboard 399 Extending the Trip Model 401 Adding the Events Class 403 The EventsController and Its PageViewController 406 Data sources and delegates 406 Data source 407 Delegate 407 The EventsController 407 The EventPageController 412 Adding Events Support to the iPhone Storyboard 415 Chapter 17: Finding Your Way 417 The Plan 418 Setting Up the Map Controller 419 Adding the custom view controller 420 Setting up the MapController in the Main_iPad.Storyboard 420 Test 426 Putting MapKit through Its Paces 428 MKMapView 428 Enhancing the map 429 Changing the Map Type 435 Adding Annotations 437 Creating the annotation 437 Displaying the map title and annotations 441 Going to the Current Location 446 Fixing the Status Bar 451 Update the iPhone Storyboard 454 Chapter 18: Geocoding 455 Understanding Geocoding on the iPad 455 Reverse Geocoding 458 Chapter 19: Finding a Location 465 Setting Up the Find Controller 465 Adding the custom view controller 466 Setting up FindControllerin the Main_iPad File 466 Implementing the Find Controller 469 Adding the Map View 469 Getting the text 470 Disabling cell highlighting 477 Finding the Location 477 Making the Map Title the Found Location 484 Adding the FindController to the iPhone Storyboard 485 Chapter 20: Selecting a Destination 487 The Plan 487 Setting Up the DestinationController for the iPad Storyboard 488 Adding the custom view controller 488 Setting up the DestinationController in the Main_iPad.storyboard 489 Adding a Modal View 494 Implementing a Table View 497 Creating the Table View 498 Adding sections 499 Displaying the cell 501 Working with user selections 503 Saving the Destination Choice and Selecting a Destination 511 Displaying the Destination table 516 Testing 517 Adding Destination Support to the iPhone Storyboard 518 A Word about Adding Settings 519 What’s Next? 519 Part VI: The Part of Tens 521 Chapter 21: Ten Ways to Be Successful with Apps 523 Make a Million Dollars in a Week 523 Build a Portfolio 524 Build App Icons 524 Design User Interfaces 524 Build Back Ends 525 Socialize with Apps 525 Talk About Apps with People Who Want Them 525 Promote Apps 525 Provide Support to Users 526 Fix Bugs 526 Chapter 22: Ten Ways to Be a Happy Developer 527 Keep Things Loosely Coupled 527 Remember Memory 528 Don’t Reinvent the Wheel 528 Understand State Transitions 529 Do the Right Thing at the Right Time 530 Avoid Mistakes in Error Handling 530 Use Storyboards 531 Remember the User 531 Keep in Mind That the Software Isn’t Finished Until the Last User Is Dead 531 Keep It Fun 531 Index 533

    15 in stock

    £23.99

  • Windows Home Server For Dummies

    John Wiley & Sons Inc Windows Home Server For Dummies

    15 in stock

    Book SynopsisIf you work in an office, you probably don't lose much sleep worrying about whether your files are safe if your PC melts down. Company IT departments handle those things for business networks.Table of ContentsIntroduction 1 About This Book 1 Foolish Assumptions 2 How This Book Is Organized 2 Part I: Getting Windows Home Server to Serve 3 Part II: Setting Up the Network 3 Part III: Making the Most of Multimedia 3 Part IV: Sharing in the Wild 3 Part V: Backing Up 3 Part VI: Staying Alive and Well 4 Part VII: The Part of Tens 4 Icons Used in This Book 5 Where to Go from Here 5 Part I: Getting Windows Home Server to Serve 7 Chapter 1: Bringing Windows Home Server to Life 9 What Can You Do with Windows Home Server? 10 Backing up and restoring 10 Sharing folders 11 Managing disks 12 Accessing your network from far afield 14 Keeping the home fires burning 15 Streaming media 16 How Do You Control Windows Home Server? 16 Welcome to the Console 16 What happens behind the scenes 18 Knowing Windows Home Server’s Limitations 19 What Windows Home Server won’t do 20 Tapping into previous versions of a file 21 What Hardware Do You Need? 22 Choosing a Great Windows Home Server 24 Positioning the Server in Your Home or Office 26 Chapter 2: Installing the WHS Software 27 Do You Need to Install Windows Home Server? 28 Preparing to Install 29 Installing Windows Home Server 31 Part II: Setting Up the Network 37 Chapter 3: Bringing Computers into the Home Server Fold 39 Kick-Starting the Network 39 Installing Windows Home Server Connector on a Windows XP Machine 42 Installing Windows Home Server Connector on a Windows Vista Machine 46 Configuring Windows Home Server 49 Chapter 4: Adding Users and Controlling Passwords 55 Understanding User Control 56 Raising the Bar for Passwords 57 Adding New Users the Smart Way 60 Using the Guest Account 65 Synchronizing Passwords 68 Changing Passwords the Old-Fashioned Way 71 On the server 71 In Windows XP 72 In Windows Vista 73 Chapter 5: Using Built-In Shared Folders 75 Organizing Files with Shared Folders 76 Finding the Shared Folders 77 Opening shared files on the server 78 Pinpointing each user’s shared folder 79 Controlling Access to Shared Folders 80 Experiencing folder permissions firsthand 80 Changing shared folder permissions 82 Controlling Shared Folders from the Console 84 Creating new shared folders 86 Usin’ your noggin with sharin’ 89 Duplicating Shared Folders 90 Part III: Making the Most of Multimedia 95 Chapter 6: Sharing Music and Videos 97 Sharing from A to Z to PC to PC 98 Playing From (and With) the Server 102 Ripping to the Server 107 Sharing C.R.A.P Music on the Network 110 Chapter 7: Recording and Playing TV 113 Understanding Windows Home Server and Recorded TV 114 Storing Shows on Your Server 115 Creating a shared home for recorded TV 115 Moving recorded TV to the server 118 Recording TV directly to the server 124 Viewing TV Shows Stored on the Server 125 Why WHS Doesn’t Back Up Recorded TV 126 Chapter 8: Streaming with the Xbox 129 Using an Xbox in Server Land 130 Getting Your Xbox to Play with the Server 131 Using a Media Center PC to Stream to an Xbox 137 Connecting an Xbox to a Media Center computer 137 Playing media files with a connected Xbox 139 Chapter 9: Nailing Down Your Photos 141 Using the Windows Tools 142 Modifying XP for Shared Photos 144 Viewing photos in the shared Photos folder 144 Moving photos from your camera to the shared Photos folder 148 Modifying the screen saver to use the shared Photos folder 153 Modifying Vista for Shared Photos 155 Viewing photos in the shared Photos folder 155 Moving photos directly from your camera to the shared Photos folder 156 Creating a screen saver from the shared Photos folder 159 Part IV: Sharing in the Wild 163 Chapter 10: Starting Remote Access 165 Remote Access — the Good, the Bad, and the Really Frustrating 166 An Overview of Remote Access Setup 167 Setting up the Server 169 Configuring Your Router 171 Establishing a Permanent Domain Name 176 Spreading Out the Welcome Mat 179 Getting Connected for the First Time — or Maybe Not 182 My Encounter with the Seventh Ring 185 Chapter 11: Using Remote Access 189 Logging on to Your Windows Home Server Remotely 190 Accessing Shared Folders 192 Uploading files 194 Downloading files 196 Getting into the Windows Home Server Console 197 Pulling Puppet Strings on Your Home Network’s Computers 199 Reviewing the ground rules 200 Getting logged on 201 Part V: Backing Up 205 Chapter 12: Running Backups 207 Mired in Myriad Backups 208 Backing up files on network computers 208 Backing up shared folders with Folder Duplication 212 Shadow copies in Windows Home Server 214 Understanding what Vista is backing up 214 Checking Windows XP for backup routines 215 Unraveling the Mess 216 Setting Up Server Backups That Serve You 217 Backing up on your time 218 Choosing what gets backed up 220 Keeping backups 222 Checking That Backups Run Smoothly 224 Chapter 13: Restoring a Dead Computer from Backup 229 Dealing with Home Computer Restore Restrictions 230 Restoring a Hard Drive 231 Rolling Your Own Home Computer Restore CD 238 Chapter 14: Restoring Files from Backup 241 Restoring a Backed-Up File 242 Restoring a Shared Folder File with Windows XP, Media Center, or Tablet PC 246 Restoring a Shared Folder File with Vista Business, Enterprise, or Ultimate 250 Chapter 15: Backing Up the Server 255 Mapping Out Windows Home Server Storage 256 Using Folder Duplication 257 Making Offsite Backups of Shared Files 258 Copying files to an external drive 259 Choosing an online backup provider 263 Part VI: Staying Alive and Well 265 Chapter 16: Monitoring System Health 267 Understanding the Network Health Indicator 268 What Can Go Wrong? 271 How to Fix Health Problems 272 Chapter 17: Breaking into the Server 277 Deciding to Break In 278 Logging On to the Server with RDP 280 Attaching a Printer with RDP 283 Restoring a Previous Version of a Shared File with RDP 286 Giving Your Server a Permanent IP Address 290 Chapter 18: Adding and Retiring Drives 293 Knowing When and What to Feed the Maw 294 Adding a New Internal Hard Drive 297 Adding a New External Hard Drive 300 Retiring an Old Drive Safely 302 Chapter 19: Repairing and Recovering the Server 305 Dealing with Lost Passwords 306 Fixing a Broken Server Hard Drive 308 Primary versus secondary drives 309 Replacing a broken secondary drive 310 Repairing the primary drive 313 Part VII: The Part of Tens 319 Chapter 20: Top Ten Health Traps Triaged 321 No Spyware Protection 322 Backup Warning 323 Backup Warning, New Hard Drive 325 Backup Error 325 Backup Server Error 326 Storage Status, Not Enough Room 327 Storage Status, Failing Hard Drive 328 Passwords Do Not Match 329 Updates Are Ready 329 Antivirus Out of Date 330 Chapter 21: Ten More Tricks with Windows Home Server 331 Installing (and Uninstalling) Add-Ins 332 Launching Programs from Windows Home Server Console 334 Changing Your Remote Access Page with Whiist 335 Running uTorrent on the Server 336 Wake on LAN for Home Server 336 Uploading Photos to Flickr with PhotoSync 337 Streaming Away from Home with WebGuide 337 Streaming to Your TiVo 338 Streaming to Your Phone with LobsterTunes 338 Finding More Add-Ins 339 Index 341

    15 in stock

    £16.99

  • Getting Started with Soldering: A Hands-On Guide

    O'Reilly Media Getting Started with Soldering: A Hands-On Guide

    2 in stock

    Book SynopsisGetting Started with Soldering not only teaches new makers and experimenters the core principles of soldering, it also functions as an excellent reference and resource for beginners and more advanced makers alike. The book guides readers through the fundamentals of soldering, explains the tools and materials, demonstrates proper techniques, and shows how to fix mistakes or broken connections. It even includes guidance on more advanced techniques such as surface-mount soldering for electronics. From choosing the right soldering iron to making perfect connections, readers will acquire the knowledge and skills needed to form a strong foundation for a lifetime of making. Soldering is a core concept in making, electronics prototyping, and home repairs The many different types of soldering -- requiring different materials and tools -- are explained with easy-to-follow instructions Full-color photographs and illustrations throughout create a visually engaging format for learning Pricing and technical considerations help readers select the best tools for their budgets and needs Troubleshooting guidelines show how to repair solder connections that have failed from improper technique or from age

    2 in stock

    £13.59

  • Raspberry Pi For Dummies

    John Wiley & Sons Inc Raspberry Pi For Dummies

    15 in stock

    Book SynopsisA recipe for having fun and getting things done with the Raspberry Pi The Raspberry Pi makes it easy to learn about computers and computer programming, andRaspberry PiForDummiesmakes it even easier!Usingthis extremelyaffordableand compactcomputer, you can learn to code in languages like Scratch and Python, explore how electronics work,create computer-generated buildings in Minecraft and music in Sonic Pic,become Linux-savvy,make Internet-of-Thingsdevices,or just play around! This bookgetsyou up and running on your Raspberry Pi,starting withsetting it up, downloading the operating system, and using the desktop environment.Then, the only limit is your imagination!It doesn't matter whether you have a Raspberry Pi 4, Raspberry Pi 400, Raspberry Pi Zero W or an older model: we've got you covered. Raspberry PiForDummiesexplores the latesttechnologytheRaspberryPi 4and 400, Scratch 3 programming language, new games bundled with the Raspberry Pi, and the hottest Add-Ons out there. Thisintroductoryguide is the perfect place to start if you want to get a taste of everything the Raspberry Pi can do! Set up your Raspberry Pi, install the operating system, and connect to theInternetLearn the basics of the Linux desktop and Linux shell so you canprogram,work,and playUse Python, Scratch, and SonicPi to write your first programs and makegames anddigital musicDiscover how circuits work hand-in-hand with your Pi If youwant to make the most of the Raspberry Pi for school, work, or play, you'lllove this easy-to-read reference.Table of ContentsIntroduction 1 Part 1: Setting Up Your Raspberry Pi 5 Chapter 1: Introducing the Raspberry Pi 7 Chapter 2: Downloading the Operating System 25 Chapter 3: Connecting Your Raspberry Pi 33 Part 2: Getting Started with Linux 49 Chapter 4: Using the Desktop Environment 51 Chapter 5: Using the Linux Shell 79 Part 3: Using the Raspberry Pi for Both Work and Play 119 Chapter 6: Being Productive with the Raspberry Pi 121 Chapter 7: Editing Photos on the Raspberry Pi with GIMP 133 Chapter 8: Playing Audio and Video on the Raspberry Pi 143 Part 4: Programming the Raspberry Pi 155 Chapter 9: Introducing Programming with Scratch 157 Chapter 10: Programming an Arcade Game Using Scratch 177 Chapter 11: Writing Programs in Python 201 Chapter 12: Creating a Game with Python and Pygame Zero 233 Chapter 13: Programming Minecraft with Python 251 Chapter 14: Making Music with Sonic Pi 275 Part 5: Exploring Electronics with the Raspberry Pi 291 Chapter 15: Understanding Circuits 293 Chapter 16: Taking Control of Your Pi’s Circuitry 319 Chapter 17: Lots of Multicolored LEDs 357 Chapter 18: Old McDonald’s Farm and Other RFID Adventures. 391 Part 6: The Part of Tens 425 Chapter 19: Ten Great Software Packages for the Raspberry Pi 427 Chapter 20: Ten Inspiring Projects for the Raspberry Pi 439 Chapter 21: Ten Great Add-Ons for the Raspberry Pi 447 Appendix: Troubleshooting and Configuring the Raspberry Pi 455 Index 467

    15 in stock

    £17.59

  • Operating Systems Internals and Design Principles

    Pearson Education Limited Operating Systems Internals and Design Principles

    15 in stock

    Book SynopsisTable of ContentsOnline Chapters and Appendices VideoNotes Preface About the Author I. Background 1. Computer System Overview 1.1. Basic Elements 1.2. Evolution of the Microprocessor 1.3. Instruction Execution 1.4. Interrupts 1.5. The Memory Hierarchy 1.6. Cache Memory 1.7. Direct Memory Access 1.8. Multiprocessor and Multicore Organization 1.9. Key Terms, Review Questions, and Problems 1A. Performance Characteristics of Two-Level Memories 2. Operating System Overview 2.1. Operating System Objectives and Functions 2.2. The Evolution of Operating Systems 2.3. Major Achievements 2.4. Developments Leading to Modern Operating Systems 2.5. Fault Tolerance 2.6. Os Design Considerations for Multiprocessor and Multicore 2.7. Microsoft Windows Overview 2.8. Traditional Unix Systems 2.9. Modern Unix Systems 2.10. Linux 2.11. Android 2.12. Key Terms, Review Questions, and Problems II. Processes 3. Process Description and Control 3.1. What is a Process? 3.2. Process States 3.3. Process Description 3.4. Process Control 3.5. Execution of the Operating System 3.6. Unix Svr4 Process Management 3.7. Summary 3.8. Key Terms, Review Questions, and Problems 4. Threads 4.1. Processes and Threads 4.2. Types of Threads 4.3. Multicore and Multithreading 4.4. Windows Process and Thread Management 4.5. Solaris Thread and Smp Management 4.6. Linux Process and Thread Management 4.7. Android Process and Thread Management 4.8. Mac OS X Grand Central Dispatch 4.9. Summary 4.10. Key Terms, Review Questions, and Problems 5. Concurrency: Mutual Exclusion and Synchronization 5.1. Mutual Exclusion: Software Approaches 5.2. Principles of Concurrency 5.3. Mutual Exclusion: Hardware Support 5.4. Semaphores 5.5. Monitors 5.6. Message Passing 5.7. Readers/Writers Problem 5.8. Summary 5.9. Key Terms, Review Questions, and Problems 6. Concurrency: Deadlock and Starvation 6.1. Principles of Deadlock 6.2. Deadlock Prevention 6.3. Deadlock Avoidance 6.4. Deadlock Detection 6.5. An Integrated Deadlock Strategy 6.6. Dining Philosophers Problem 6.7. Unix Concurrency Mechanisms 6.8. Linux Kernel Concurrency Mechanisms 6.9. Solaris Thread Synchronization Primitives 6.10. Windows Concurrency Mechanisms 6.11. Android Interprocess Communication 6.12. Summary 6.13. Key Terms, Review Questions, and Problems III. Memory 7. Memory Management 7.1. Memory Management Requirements 7.2. Memory Partitioning 7.3. Paging 7.4. Segmentation 7.5. Summary 7.6. Key Terms, Review Questions, and Problems 7A. Loading and Linking 8. Virtual Memory 8.1. Hardware and Control Structures 8.2. Operating System Software 8.3. Unix and Solaris Memory Management 8.4. Linux Memory Management 8.5. Windows Memory Management 8.6. Android Memory Management 8.7. Summary 8.8. Key Terms, Review Questions, and Problems IV. Scheduling 9. Uniprocessor Scheduling 9.1. Types of Processor Scheduling 9.2. Scheduling Algorithms 9.3. Traditional Unix Scheduling 9.4. Summary 9.5. Key Terms, Review Questions, and Problems <

    15 in stock

    £72.09

  • Make Wearable and Flexible Electronics

    O'Reilly Media Make Wearable and Flexible Electronics

    Out of stock

    Book SynopsisPerfect for makers new to wearable tech, this book introduces you to the tools, materials, and techniques for creating interactive electronic circuits and embedding them in clothing and other things you can wear.

    Out of stock

    £26.59

  • Windows Server 2022  PowerShell AllinOne For

    John Wiley & Sons Inc Windows Server 2022 PowerShell AllinOne For

    1 in stock

    Book SynopsisAll the essentials for administering Windows Server 2022 in one book Looking for a little help installing, configuring, securing, or running a network running Windows Server 2022? Windows Server 2022 & PowerShell All-in-One For Dummies delivers a thorough guide to network administration in a single, convenient book. Whether you need to start from scratch and install a new server or want to jump right into a more advanced topiclike managing security or working in Windows PowerShellyou'll find what you need right here. In this 8-books-in-1 compilation, you'll: Learn what you need to install and set up a brand-new Windows server installationConfigure your Windows Server and customize its settings based on your needs and preferencesDiscover how to install, configure, and work with Containers The perfect book for server and system admins looking for a quick reference on Windows Server operation, this book is also a great resource for networking newcomers learning their way around the server software they'll encounter daily.Table of ContentsIntroduction 1 About This Book 1 Foolish Assumptions 2 Icons Used in This Book 2 Beyond the Book 3 Where to Go from Here 3 Book 1: Installing and Setting Up Windows Server 2022 5 Chapter 1: An Overview of Windows Server 2022 7 Extra! Extra! Read All About It! Seeing What’s New in Windows Server 2022 8 Deciding Which Windows Server 2022 Edition Is Right for You 9 Walking the Walk: Windows Server 2022 User Experiences 10 Seeing What Server Manager Has to Offer 13 Windows Admin Center: Your New Best Friend 15 Extending and Improving Your Datacenter 18 Chapter 2: Using Boot Diagnostics 19 Accessing Boot Diagnostics 19 Using Advanced Boot Options 22 Performing a Memory Test 28 Using the Command Prompt 30 Working with Third-Party Boot Utilities 31 Chapter 3: Performing the Basic Installation 33 Making Sure You Have What It Takes 34 Performing a Clean Install 38 Upgrading Windows 41 Performing a Network Install with Windows Deployment Services 43 Chapter 4: Performing Initial Configuration Tasks 45 Understanding Default Settings 46 Getting an Overview of the Configuration Process 47 Providing Computer Information 48 Updating Windows Server 2022 58 Customizing Windows Server 2022 62 Configuring Startup Options with BCDEdit 69 Book 2: Configuring Windows Server 2022 73 Chapter 1: Configuring Server Roles and Features 75 Using Server Manager 75 Understanding Server Roles 80 Understanding Server Features 87 Chapter 2: Configuring Server Hardware 103 Working with Device Manager 104 Using the Add Hardware Wizard 113 Performing Hard-Drive-Related Tasks 114 Performing Printer-Related Tasks 133 Performing Other Configuration Tasks 140 Chapter 3: Using the Settings Menu 145 Accessing the Settings Menu 145 Understanding Settings Menu Items 146 Chapter 4: Working with Workgroups 155 Knowing What a Workgroup Is 156 Knowing If a Workgroup Is Right for You 156 Comparing Centralized and Group Sharing 157 Configuring a Server for a Workgroup 157 Managing Workgroups 166 Examining the Peer Name Resolution Protocol 169 Chapter 5: Promoting Your Server to Domain Controller 171 Understanding Domains 172 Preparing to Create a Domain 175 Performing Domain Configuration Prerequisites 178 Configuring the Server as a Domain Controller 186 Wrapping Things Up 200 Chapter 6: Managing DNS and DHCP with IP Address Management 203 Installing IP Address Management 204 Configuring IP Address Management 205 Using IP Address Management 209 Book 3: Administering Windows Server 2022 217 Chapter 1: An Overview of the Tools Menu in Server Manager 219 Accessing the Server Manager Tools Menu 219 Working with Common Administrative Tools 222 Installing and Using Remote Server Administration Tools 229 Chapter 2: Setting Group Policy 233 Understanding How Group Policy Works 234 Starting the Group Policy Editor 235 Performing Computer Management 237 Performing User Configuration 241 Viewing Resultant Set of Policy 244 Chapter 3: Configuring the Registry 247 Starting Registry Editor 248 Importing and Exporting Registry Elements 248 Finding Registry Elements 250 Understanding Registry Data Types 251 Understanding the Hives 252 Loading and Unloading Hives 256 Connecting to Network Registries 257 Setting Registry Security 259 Chapter 4: Working with Active Directory 263 Active Directory 101 263 Configuring Objects in Active Directory 264 Chapter 5: Performing Standard Maintenance 279 Activating Windows 279 Configuring the User Interface 282 Understanding How User Access Control Affects Maintenance Tasks 290 Adding and Removing Standard Applications 291 Measuring Reliability and Performance 292 Protecting the Data on Your Server 296 Performing Disk Management Tasks 300 Automating Diagnostic Tasks with Task Scheduler 302 Working with Remote Desktop 306 Working with Remote Server Administration Tools 308 Working with Admin Center 310 Creating a Windows Recovery Drive 312 Chapter 6: Working at the Command Line 313 Opening an Administrative Command Prompt 313 Configuring the Command Line 314 Setting Environmental Variables 320 Getting Help at the Command Line 321 Understanding Command Line Symbols 323 Chapter 7: Working with PowerShell 325 Opening an Administrative PowerShell Window 326 Configuring PowerShell 327 Customizing PowerShell a Little Further 332 Using a Profile Script 333 Setting Environmental Variables 334 Getting Help in PowerShell 336 Understanding PowerShell Punctuation 337 Book 4: Configuring Networking in Windows Server 2022 339 Chapter 1: Overview of Windows Server 2022 Networking 341 Getting Acquainted with the Network and Sharing Center 342 Using the Network Connections Tools 344 Configuring TCP/IP 348 Understanding DHCP 351 Defining DNS 352 Chapter 2: Performing Basic Network Tasks 359 Viewing Network Properties 359 Connecting to Another Network 361 Managing Network Connections 365 Chapter 3: Accomplishing Advanced Network Tasks 371 Working with Remote Desktop Services 371 Working with Network Policy and Access Services 382 Troubleshooting at the Command Line 386 Chapter 4: Diagnosing and Repairing Network Connection Problems 389 Using Windows Network Diagnostics 390 Repairing Individual Connections 392 Network Troubleshooting at the Command Line 393 Working with Windows Firewall 395 Making Sense of Common Configuration Errors 397 Working with Other Troubleshooting Tools 398 Book 5: Managing Security with Windows Server 2022 401 Chapter 1: Understanding Windows Server 2022 Security 403 Understanding Basic Windows Server Security 403 Working with Files and Folders 409 Creating a Local Security Policy 413 Paying Attention to Windows Security 414 Chapter 2: Configuring Shared Resources 419 Comparing Share Security with File System Security 420 Sharing Resources 424 Configuring Access with Federated Rights Management 426 Working with Active Directory Rights Management Services 431 Chapter 3: Configuring Operating System Security 439 Understanding and Using User Account Control 439 Managing User Passwords 445 Understanding Credential Guard 446 Configuring Startup and Recovery Options 450 Hardening Your Server 452 Chapter 4: Working with the Internet 457 Firewall Basics 457 Configuring Windows Defender Firewall with Advanced Security 461 Chapter 5: Understanding Digital Certificates 471 Certificates in Windows Server 2022 472 Types of Certificates in Active Directory Certificate Services 475 Chapter 6: Installing and Configuring AD CS 479 Introducing Certificate Authority Architecture 480 Installing a Certificate Authority 481 Configuring Certificate Auto-Enrollment 496 Chapter 7: Securing Your DNS Infrastructure 499 Understanding DNSSEC 499 Understanding DANE 505 Protecting DNS Traffic with DNS-over-HTTPS 509 Book 6: Working with Windows Powershell 513 Chapter 1: Introducing PowerShell 515 Understanding the Basics of PowerShell 515 Using PowerShell 521 Running PowerShell Remotely 538 Getting Help in PowerShell 540 Identifying Security Issues with PowerShell 541 Chapter 2: Understanding the .NET Framework 547 Introducing the Various Versions of .NET Framework 547 Focusing on New Features in .NET 4.8 550 Viewing the Global Assembly Cache 551 Understanding .NET Standard and .NET Core 553 Chapter 3: Working with Scripts and Cmdlets 555 Introducing Common Scripts and Cmdlets 555 Executing Scripts or Cmdlets 557 Working from Another Location 559 Performing Simple Administrative Tasks with PowerShell Scripts 560 Chapter 4: Creating Your Own Scripts and Advanced Functions 565 Creating a PowerShell Script 566 Defining a Script Policy 572 Signing a PowerShell Script 573 Creating a PowerShell Advanced Function 573 Chapter 5: PowerShell Desired State Configuration 581 Getting an Overview of PowerShell Desired State Configuration 582 Creating a PowerShell Desired State Configuration Script 586 Applying the PowerShell Desired State Configuration Script 588 Push and Pull: Using PowerShell Desired State Configuration at Scale 590 Book 7: Installing and Administering Hyper-V 593 Chapter 1: What Is Hyper-V? 595 Introduction to Virtualization 595 Type 1 and Type 2 Hypervisors 596 Installing and Configuring Hyper-V 597 Chapter 2: Virtual Machines 607 Creating a Virtual Machine 607 Configuring a Virtual Machine 611 Shielded Virtual Machines 618 Chapter 3: Virtual Networking 619 Identifying the Types of Virtual Switches 620 Creating a Virtual Switch 621 Getting into Advanced Hyper-V Networking 625 Chapter 4: Virtual Storage 637 Understanding Virtual Disk Formats 637 Considering Types of Disks 638 Adding Storage to the Host 639 Adding Storage to the Virtual Machine 643 Chapter 5: High Availability in Hyper-V 651 Hyper-V Replica 651 Live Migration 656 Storage Migration 660 Failover Clustering 661 Book 8: Installing, Configuring, and Using Containers 667 Chapter 1: Introduction to Containers in Windows Server 2022 669 Understanding Containers 670 Considering Use Cases for Containers 672 Deciding What Type of Containers You Want to Use 673 Managing Containers at Scale 674 Chapter 2: Docker and Docker Hub 675 Introduction to Docker 675 Introduction to Docker Hub 677 Chapter 3: Installing Containers on Windows Server 2022 685 Installing Windows Containers 686 Installing Hyper-V Containers 687 Installing Docker 688 Testing Your Container Installation 689 Chapter 4: Configuring Docker and Containers on Windows Server 2022 695 Working with Dockerfile 695 Applying Custom Metadata to Containers and Other Objects 698 Configuring Containers 700 Configuring the Docker Daemon with daemon.json 702 Chapter 5: Managing Container Images 705 Making Changes to Images and Saving the Changes You Make 705 Pushing Images to Docker Hub 709 Pulling Images from Docker Hub 711 Handling Image Versioning 713 Chapter 6: Container Networking 715 Considering the Different Types of Network Connections 716 Viewing Your Network Adapters and Virtual Switches 717 Configuring a Network Address Translation Network Connection 718 Configuring a Transparent Network Connection 719 Configuring an Overlay Network Connection 720 Configuring an l2bridge Network Connection 721 Configuring an l2tunnel Network Connection 722 Removing a Network Connection 723 Connecting to a Network 723 Chapter 7: Container Storage 725 Getting Acquainted with Container Storage 725 Creating a Volume Inside of a Container 726 Working with Persistent Volumes 729 Index 733

    1 in stock

    £31.99

  • Mike Meyers CompTIA Network Guide to Managing and

    McGraw-Hill Education Mike Meyers CompTIA Network Guide to Managing and

    Out of stock

    Book SynopsisPractice the Skills Essential for a Successful IT Career 80+ lab exercises challenge you to solve problems based on realistic case studies Step-by-step scenarios require you to think critically Lab Analysis tests measure your understanding of lab results Key Term Quizzes help build your vocabulary Mike Meyersâ CompTIA Network+â Guide to Managing and Troubleshooting Networks Lab Manual, Sixth Edition covers: Network models Cabling and topology Ethernet basics Ethernet standards Installing a physical network TCP/IP basics Routing TCP/IP applications Network naming Securing TCP/IP Switch features IPv6 WAN connectivity Wireless networking Virtualization and cloud computing Data centers Integrating network devices Network operations Protecting your network Network mon

    Out of stock

    £31.49

  • How to Do Everything Pages Keynote  Numbers for

    McGraw-Hill Education - Europe How to Do Everything Pages Keynote Numbers for

    1 in stock

    Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Maximize your productivity--the Apple way!Get the most out of the iWork suite of apps on a Mac, an iOS device, and in iCloud. How to Do Everything: Pages, Keynote & Numbers for OS X and iOS shows you how to create great-looking documents, persuasive presentations, and number-crunching spreadsheets. Filled with clear explanations and detailed examples, this practical guide covers everything you need to know to use these powerful productivity apps on your Mac, iPad, iPhone, iPod touch, and web browser. Set up an iCloud account and download Pages, Keynote, and Numbers Create, edit, and format documents with Pages Add graphics, audio, video, tables, and charts to your documents Design and delivTable of ContentsIntroduction Ch 1. A Brief Overview of Apple's Productivity SoftwareCh 2. What is iCloudCh 3. Pages BasicsCh 4. Dazzling DocumentsCh 5. Tidying UpCh 6. Getting to Know KeynoteCh 7. Pleasantly Pleasing PresentationsCh 8. Getting Your Presentation to the MassesCh 9. Juggling NumbersCh 10. Filling In All of Those CellsCh 11. Looks Aren't Everything… but They Don't HurtAppendix A: Keyboard ShortcutsAppendix B: GlossaryIndex

    1 in stock

    £23.79

  • Build Your Own Combat Robot

    McGraw-Hill Education Build Your Own Combat Robot

    15 in stock

    Book SynopsisCreate your own powerful battling robot from start to finish using this easy-to-follow manual. Robotics experts Pete Miles and Tom Carroll explain the science and technology behind robots, and show you what materials you need to build and program a robot for home, school, and competition.

    15 in stock

    £18.04

  • How to Do Everything with Your Scanner

    McGraw-Hill Education How to Do Everything with Your Scanner

    15 in stock

    Book SynopsisScan this book! Or, read it cover-to-cover. Either way, youâll learn which scanner to purchase to suite your needs, important technical information about pixels and digital images, installation and calibration tips, and plenty of tricks to make scanning easier and more effective. Written for both PC and Mac users.

    15 in stock

    £19.22

  • Everquest Companion

    McGraw-Hill Education Everquest Companion

    15 in stock

    Book SynopsisTake a fascinating look at the EverQuest game itself, the worldwide following that has grown around it, and the phenomenon of Massively Multiplayer Online Role-Playing Games (MMORPGs). Beyond merely dealing with strategies for winning the game, this book offers a glimpse inside the game, offering a chance to understand the history and some of the underlying issues of the game.

    15 in stock

    £19.22

  • How to Do Everything with Your GPS

    McGraw-Hill Education How to Do Everything with Your GPS

    15 in stock

    Book SynopsisLocate this perfect teaching guide to GPS, and master GPS receivers and software. Technology guru Rick Broida, who has written many best-selling books in the How to Do Everything series, maps out the guts of GPS in a friendly, helpful way that shows you how to get the most from this new technology. Master GPS receivers and software, use GPS in cars, PDAs, and laptops, and even go GPS golfing or try geocaching, the new game featuring GPS.

    15 in stock

    £19.22

  • FaultTolerant Systems

    Elsevier Science & Technology FaultTolerant Systems

    Out of stock

    Book SynopsisTable of Contents1. Preliminaries 2. Hardware Fault Tolerance 3. Information Redundancy 4. Fault-Tolerant Networks 5. Software Fault Tolerance 6. Checkpointing 7. Fault-Tolerance in Cyber-Physical Systems (CPS) 8. Case Studies 9. Simulation Techniques 10. Defect Tolerance in VLSI Circuits 11. Fault Detection in Cryptographic Systems

    Out of stock

    £67.49

  • Principles of Computer Hardware

    Oxford University Press Principles of Computer Hardware

    1 in stock

    Book SynopsisThe understanding of fundamental computer components and systems lies at the heart of those enabling computer technologies that pervade our lives. Principles of Computer Hardware explores the fundamentals of computer structure, architecture, and programming that underpin the array of computerized technologies around which our lives are built.Trade ReviewThe fourth edition of this classic textbook continues to encompass the range of topics that comprise a typical introductory university level course in computer hardware. As with the previous edition the author writes with great clarity, and conveys both his expertise and enthusiasm for the subject. This is a great choice for adoption in an introductory hardware course in computer science and related disciplines. * ITNow, 2006 *Table of Contents1. Introduction to computer hardware ; 2. Gates, Circuits, and Combinational Logic ; 3. Sequential logic ; 4. Computer arithmetic ; 5. The Instruction Set Architecture ; 6. Assembly language programming ; 7. Structure of the CPU ; 8. Accelerating Performance ; 9. Processor Architectures ; 10. Buses and Input/Output Mechanisms ; 11. Peripherals for Computers ; 12. Computer memory ; 13. The CPU, memory and the operating system ; 14. Computer communications ; Appendices ; Bibliography ; Index

    1 in stock

    £78.84

  • Makers of the Microchip A Documentary History of

    MIT Press Ltd Makers of the Microchip A Documentary History of

    2 in stock

    Book SynopsisThe first years of the company that developed the microchip and created the model for a successful Silicon Valley start-up.In the first three and a half years of its existence, Fairchild Semiconductor developed, produced, and marketed the device that would become the fundamental building block of the digital world: the microchip. Founded in 1957 by eight former employees of the Schockley Semiconductor Laboratory, Fairchild created the model for a successful Silicon Valley start-up: intense activity with a common goal, close collaboration, and a quick path to the market (Fairchild's first device hit the market just ten months after the company's founding). Fairchild Semiconductor was one of the first companies financed by venture capital, and its success inspired the establishment of venture capital firms in the San Francisco Bay area. These firms would finance the explosive growth of Silicon Valley over the next several decades. This history of the early years of Fairchi

    2 in stock

    £34.20

  • Handbook of PeertoPeer Networking

    Springer Handbook of PeertoPeer Networking

    1 in stock

    Book SynopsisPeer-to-peer networking is a disruptive technology for large scale distributed app- cations that has recently gained wide interest due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications.Trade ReviewFrom the reviews:“This handbook serves as a foundation work on P2P networks covering a broad spectrum of topics … . Within each subject area, many notable researchers contribute their seminal work to make up the contents. Hence this volume is invaluable not only to those primarily doing research in P2P network technologies, but also to those interested in network-related issues and their impact on society. Summing Up: Recommended. Graduate students and above.” (J. Y. Cheung, Choice, Vol. 48 (1), September, 2010)Table of ContentsPart 1: Introduction to Peer-to-Peer Networking: Peer-to-Peer Networking and Applications: Synopsis and Research Directions John Buford, Heather Yu.- The social impact of P2P systems Andrea Glorioso, Ugo Pagallo, Giancarlo Ruffo.- From Client- Server to P2P Networking Lu Liu, Nick Antonopoulos.- Examining the Use of Peer-to-Peer Networks from an Activity Perspective Jorn De Boever, Dirk De Groof.- Part 2: Unstructured P2P Overlay Architectures: Unstructured Peer-to-Peer Network Architectures Xing Jin, S.-H. Gary Chan.- Exchanging Peers to Establish P2P Networks Mursalin Akon, Mohammad Towhidul Islam, Xuemin Shen, Ajit Singh.- Peer-to-Peer Topology Formation Using Random Walk Kin-Wah Kwong, Danny H.K. Tsang.- Semantic Social Overlay Networks Alexander Lser, Steffen Staab, Christoph Tempich.- Part 3: Structured P2P Overlay Architectures: Overview of Structured Overlay Algorithms Krishna Dhara, Yang Guo, Mario Kolberg, Xiaotao Wu.- Distributed Hash Tables: Design and Applications C.-F. Michael Chan, S.-H. Gary Chan, - The Gamut of Bootstrapping Mechanisms for Structured Overlay Networks Anwitaman Datta.- Network Aware DHT-based P2P Systems Marguerite Fayçal, Ahmed Serhrouchni.- On Adding Structure to Unstructured Overlay Networks João Leitão, Nuno A.Carvalho, José Orlando Pereira, Rui Oliveira, Luis Rodrigues.- Mathematical Modeling of Routing in DHTs Peter Kersch, Robert Szabo.- Part 4: Search and Query Processing: Keyword Search in Unstructured P2P Networks Dingyi Han, Yong Yu.- Distributed Search and Pattern Matching Reaz Ahmad, Raouf Boutaba.- Distributed Semantic Overlay Networks Christos Doulkeridis, Akrivi Vlachou, Kjetil Nørvåg, Michalis Vazirgiannis.- Self-adaptation and Self-organization for Search in Social-like Peer-to-Peer Networks LuLiu, Jie Xu, Duncan Russell, Zongyang Luo.- Data Sharing in P2P Systems Rabab Hayek, Guillaume Raschia, Patrick Valduriez, Noureddine Mouaddib.- Managing Linguistic Data Summaries in Advanced P2P Applications R.Hayek, G. Raschia, P. Valduriez, N. Mouaddib.- Case Study: Scoop for Partial Read from P2P Database Farnoush Banaei-Kashani, Cyrus Shahabi.- Part 5: Incentive Mechanisms: Incentive Mechanisms for Cooperation in Peer-to-Peer Networks Daniel A. G. Manzato, Nelson L. S. da Fonseca.- Bandwidth Trading as Incentive Kolja Eger, Ulrich Killat.- Part 6: Trust, Anonymity, and Privacy: Reputation-based Trust Management in Peer-to-Peer Systems: Taxonomy and Anatomy Loubna Mekouar, Youssef Iraqi, Raouf Boutaba.- P2P Reputation Management Through Social Networking Zoran Despotovic .- State of the Art in Trust and Reputation Models in P2P Networks Felix Gómez Mármol, Gregorio Martinez Pérez.- Anonymity in P2P Systems Pilar Manzanares-Lopez, Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Juan Carlos Sanchez-Aarnoutse.- Private Peer-to-Peer Network Michael Rogers, Saleem Bhatti.- Part 7: Broadcast and Multicast Services: Gossip-based Broadcast João Leitão, José Pereira, Luís Rodrigues.- Employing Multicast in P2P Overlay Networks Mario Kolberg.- Multicast Services Over Structured P2P Networks P. Manzanares-Lopez, J. Malgosa-Sanahuja, J.P. Muñoz-Gea, J. Sanchez-Aarnoutse.- Multicast Routing in Structured Overlays and Hybrid Networks Matthias Wählisch, Thomas C. Schmidt.- Multicast and Bulk Lookup in Structured Overlay Networks Ali Ghodsi.-Part 8: Multimedia Content Delivery: Peer-to-Peer Content Distribution and Over-The-Top TV: An Analysis of Value Networks J. De Boever, D. De Grooff.- Live video and IP-TV Maria Luisa Merani, Daniela Saladino.- Providing VoD streaming using P2P networks J. P. Muñoz-Gea, J. Malgosa-Sanahuja, P. Manzanares-Lopez, J. C. Sanchez-Aarnoutse.- Part 9: Mobile P2P: Peer-to-Peer Overlay in Mobile Ad-hoc Networks Marcel C. Castro, Andreas J. Kassler, Carla-Fabiana Chiasserini, Claudio Casetti, Ibrahim Korpeoglu.- Opportunistic Information Retrieval in Sparsely Connected Ad Hoc Networks Mooi-Choo Chuah, Jian-bin Han.- The MOBI-DIK Approach to

    1 in stock

    £314.99

  • Embedded Memories for Nanoscale VLSIs Integrated

    Springer Us Embedded Memories for Nanoscale VLSIs Integrated

    Out of stock

    Book SynopsisKevin Zhang Advancement of semiconductor technology has driven the rapid growth of very large scale integrated (VLSI) systems for increasingly broad applications, incl- ing high-end and mobile computing, consumer electronics such as 3D gaming, multi-function or smart phone, and various set-top players and ubiquitous sensor and medical devices.Table of ContentsEmbedded Memory Architecture for Low-Power Application Processor.- Embedded SRAM Design in Nanometer-Scale Technologies.- Ultra Low Voltage SRAM Design.- Embedded DRAM in Nano-scale Technologies.- Embedded Flash Memory.- Embedded Magnetic RAM.- FeRAM.- Statistical Blockade: Estimating Rare Event Statistics for Memories.

    Out of stock

    £129.99

  • Wiley Pathways Personal Computer Hardware

    John Wiley & Sons Inc Wiley Pathways Personal Computer Hardware

    1 in stock

    Book SynopsisFrom multicore CPUs and SATA hard drives to PCIe expansion buses and peripherals, this text offers practical and concise explanations of contemporary and popular PC hardware. Along with detailed coverage of essential A+ hardware topics, students will find an indispensable guide to building, maintaining, upgrading, and troubleshooting desktop computers and laptops. Packaged Set (Text + PC Hardware Essentials Project Manual): 0470-221089Table of Contents1. Understanding and Working with Personal Computers 2. Electricity and Power 3. Motherboards 4. Central Processing Units 5. Memory 6. Bus Structures 7. Hard Drives 8. Removable Storage 9. Input and Output Devices 10. Printers 11. Portable Systems 12. Network Fundamentals

    1 in stock

    £83.66

  • Collaborative Process Improvement

    John Wiley & Sons Inc Collaborative Process Improvement

    15 in stock

    Book SynopsisThis practical, user-friendly handbook specifically addresses software companies that are interested in implementing effective improvement processes into the daily work life of every employee. A wealth of checklists, templates, exercises, tips, and pitfalls to avoid make it easy for readers to integrate quality awareness into their organization's day-to-day processes at every level.Trade Review"..perfectly suitable for an audience with no or little previous knowledge…experienced readers can also find…reading it worthwhile." (Computing Reviews.com, June 22, 2007)Table of ContentsList of Figures. Preface. How to Read This Book. Introduction. Special Thanks and Acknowledgments. Chapter 1. Your World-Understanding Your Situation and Preparing First Steps. Chapter 2. Welcome to the World-Establishing Advocates and Champions. Chapter 3. Drawing Your Map-Initiating your CPI Program. Chapter 4. World Vision-Training the Organization. Chapter 5. World Views-Addressing the Capital Q. Chapter 6. Around the World-Acknowledging Cultural Diversity. Chapter 7. Move Your World-Managing Change. Chapter 8. Rock Your World-Encouraging Process Perpetual Motion. Chapter 9. Your World of Influence-Sneezing and Spreading the Improvement Virus. Chapter 10. World Climate-Checking for Vital Signs. Chapter 11. World Health-Evaluating Progress. Chapter 12. World News-Rewarding and Recognizing Work. Chapter 13. Modern World-Building Meaningful Quality Pictures. Chapter 14. One World-Uniting Your Change Maps with the New World View. Definitions. Acronyms. References and Resources. Index.

    15 in stock

    £72.86

  • The Grid Core Technologies

    John Wiley & Sons Inc The Grid Core Technologies

    15 in stock

    Book SynopsisThis book gives readers a complete, clear and practical understanding of the technologies that enable the hot topic of Grid computing. It systematically explains OGSA (Open Grid Service Architecture), Web Service technologies (SOAP, WSDL, UDDI), GMA (Grid Monitoring Architecture), Grid Portals, Grid Workflow.Trade Review"It could serve as a good textbook and would certainly be a good addition to the reference libraries of technologists, academics, and students." (IEEE Distributed Systems Online, December 2006) "…lots of valuable information." (Computing Reviews.com, May 11, 2006) "…a complete, clear, systematic, and practical understanding of the technologies that enable the Grid." (IEEE Computer Magazine, August 2005) "…a good addition to the reference library…" (IEEE DS Online, January 2007)Table of ContentsAbout the Authors xiii Preface xv Acknowledgements xix List of Abbreviations xxi 1 An Introduction to the Grid 1 1.1 Introduction 1 1.2 Characterization of the Grid 1 1.3 Grid-Related Standards Bodies 4 1.4 The Architecture of the Grid 5 1.5 References 6 Part One System Infrastructure 9 2 OGSA and WSRF 11 Learning Objectives 11 Chapter Outline 11 2.1 Introduction 12 2.2 Traditional Paradigms for Distributed Computing 13 2.2.1 Socket programming 14 2.2.2 RPC 15 2.2.3 Java RMI 16 2.2.4 DCOM 18 2.2.5 CORBA 19 2.2.6 A summary on Java RMI, DCOM and CORBA 20 2.3 Web Services 21 2.3.1 SOAP 23 2.3.2 WSDL 24 2.3.3 UDDI 26 2.3.4 WS-Inspection 27 2.3.5 WS-Inspection and UDDI 28 2.3.6 Web services implementations 29 2.3.7 How Web services benefit the Grid 33 2.4 OGSA 34 2.4.1 Service instance semantics 35 2.4.2 Service data semantics 37 2.4.3 OGSA portTypes 38 2.4.4 A further discussion on OGSA 40 2.5 The Globus Toolkit 3 (GT3) 40 2.5.1 Host environment 41 2.5.2 Web services engine 42 2.5.3 Grid services container 42 2.5.4 GT3 core services 43 2.5.5 GT3 base services 44 2.5.6 The GT3 programming model 50 2.6 OGSA-DAI 53 2.6.1 OGSA-DAI portTypes 54 2.6.2 OGSA-DAI functionality 56 2.6.3 Services interaction in the OGSA-DAI 58 2.6.4 OGSA-DAI and DAIS 59 2.7 WSRF 60 2.7.1 An introduction to WSRF 60 2.7.2 WSRF and OGSI/GT3 66 2.7.3 WSRF and OGSA 69 2.7.4 A summary of WSRF 70 2.8 Chapter Summary 70 2.9 Further Reading and Testing 72 2.10 Key Points 72 2.11 References 73 3 The Semantic Grid and Autonomic Computing 77 Learning Outcomes 77 Chapter Outline 77 3.1 Introduction 78 3.2 Metadata and Ontology in the Semantic Web 79 3.2.1 RDF 81 3.2.2 Ontology languages 83 3.2.3 Ontology editors 87 3.2.4 A summary of Web ontology languages 88 3.3 Semantic Web Services 88 3.3.1 DAML-S 89 3.3.2 OWL-S 90 3.4 A Layered Structure of the Semantic Grid 91 3.5 Semantic Grid Activities 92 3.5.1 Ontology-based Grid resource matching 93 3.5.2 Semantic workflow registration and discovery in myGrid 94 3.5.3 Semantic workflow enactment in Geodise 95 3.5.4 Semantic service annotation and adaptation in ICENI 98 3.5.5 PortalLab – A Semantic Grid portal toolkit 99 3.5.6 Data provenance on the Grid 106 3.5.7 A summary on the Semantic Grid 107 3.6 Autonomic Computing 108 3.6.1 What is autonomic computing? 108 3.6.2 Features of autonomic computing systems 109 3.6.3 Autonomic computing projects 110 3.6.4 A vision of autonomic Grid services 113 3.7 Chapter Summary 114 3.8 Further Reading and Testing 115 3.9 Key Points 116 3.10 References 116 Part Two Basic Services 121 4 Grid Security 123 4.1 Introduction 123 4.2 A Brief Security Primer 124 4.3 Cryptography 127 4.3.1 Introduction 127 4.3.2 Symmetric cryptosystems 128 4.3.3 Asymmetric cryptosystems 129 4.3.4 Digital signatures 130 4.3.5 Public-key certificate 130 4.3.6 Certification Authority (CA) 132 4.3.7 Firewalls 133 4.4 Grid Security 134 4.4.1 The Grid Security Infrastructure (GSI) 134 4.4.2 Authorization modes in GSI 136 4.5 Putting it all Together 140 4.5.1 Getting an e-Science certificate 140 4.5.2 Managing credentials in Globus 146 4.5.3 Generate a client proxy 148 4.5.4 Firewall traversal 148 4.6 Possible Vulnerabilities 149 4.6.1 Authentication 149 4.6.2 Proxies 149 4.6.3 Authorization 150 4.7 Summary 151 4.8 Acknowledgements 151 4.9 Further Reading 151 4.10 References 152 5 Grid Monitoring 153 5.1 Introduction 153 5.2 Grid Monitoring Architecture (GMA) 154 5.2.1 Consumer 155 5.2.2 The Directory Service 156 5.2.3 Producers 157 5.2.4 Monitoring data 159 5.3 Review Criteria 161 5.3.1 Scalable wide-area monitoring 161 5.3.2 Resource monitoring 161 5.3.3 Cross-API monitoring 161 5.3.4 Homogeneous data presentation 162 5.3.5 Information searching 162 5.3.6 Run-time extensibility 162 5.3.7 Filtering/fusing of data 163 5.3.8 Open and standard protocols 163 5.3.9 Security 163 5.3.10 Software availability and dependencies 163 5.3.11 Projects that are active and supported; plus licensing 163 5.4 An Overview of Grid Monitoring Systems 164 5.4.1 Autopilot 164 5.4.2 Control and Observation in Distributed Environments (CODE) 168 5.4.3 GridICE 172 5.4.4 Grid Portals Information Repository (GPIR) 176 5.4.5 GridRM 180 5.4.6 Hawkeye 185 5.4.7 Java Agents for Monitoring and Management (JAMM) 189 5.4.8 MapCenter 192 5.4.9 Monitoring and Discovery Service (MDS3) 196 5.4.10 Mercury 201 5.4.11 Network Weather Service 205 5.4.12 The Relational Grid Monitoring Architecture (R-GMA) 209 5.4.13 visPerf 214 5.5 Other Monitoring Systems 217 5.5.1 Ganglia 217 5.5.2 GridMon 219 5.5.3 GRM/PROVE 220 5.5.4 Nagios 221 5.5.5 NetLogger 222 5.5.6 SCALEA-G 223 5.6 Summary 225 5.6.1 Resource categories 225 5.6.2 Native agents 225 5.6.3 Architecture 226 5.6.4 Interoperability 226 5.6.5 Homogeneous data presentation 226 5.6.6 Intrusiveness of monitoring 227 5.6.7 Information searching and retrieval 231 5.7 Chapter Summary 233 5.8 Further Reading and Testing 236 5.9 Key Points 236 5.10 References 236 Part Three Job Management and User Interaction 241 6 Grid Scheduling and Resource Management 243 Learning Objectives 243 Chapter Outline 243 6.1 Introduction 244 6.2 Scheduling Paradigms 245 6.2.1 Centralized scheduling 245 6.2.2 Distributed scheduling 246 6.2.3 Hierarchical scheduling 248 6.3 How Scheduling Works 248 6.3.1 Resource discovery 248 6.3.2 Resource selection 251 6.3.3 Schedule generation 251 6.3.4 Job execution 254 6.4 A Review of Condor, SGE, PBS and LSF 254 6.4.1 Condor 254 6.4.2 Sun Grid Engine 269 6.4.3 The Portable Batch System (PBS) 274 6.4.4 LSF 279 6.4.5 A comparison of Condor, SGE, PBS and LSF 288 6.5 Grid Scheduling with QoS 290 6.5.1 AppLeS 291 6.5.2 Scheduling in GrADS 293 6.5.3 Nimrod/G 293 6.5.4 Rescheduling 295 6.5.5 Scheduling with heuristics 296 6.6 Chapter Summary 297 6.7 Further Reading and Testing 298 6.8 Key Points 298 6.9 References 299 7 Workflow Management for the Grid 301 Learning Outcomes 301 Chapter Outline 301 7.1 Introduction 302 7.2 The Workflow Management Coalition 303 7.2.1 The workflow enactment service 305 7.2.2 The workflow engine 306 7.2.3 WfMC interfaces 308 7.2.4 Other components in the WfMC reference model 309 7.2.5 A summary of WfMC reference model 310 7.3 Web Services-Oriented Flow Languages 310 7.3.1 XLANG 311 7.3.2 Web services flow language 311 7.3.3 WSCI 313 7.3.4 BPEL4WS 315 7.3.5 BPML 317 7.3.6 A summary of Web services flow languages 318 7.4 Grid Services-Oriented Flow Languages 318 7.4.1 GSFL 318 7.4.2 SWFL 321 7.4.3 GWEL 321 7.4.4 GALE 322 7.4.5 A summary of Grid services flow languages 323 7.5 Workflow Management for the Grid 323 7.5.1 Grid workflow management projects 323 7.5.2 A summary of Grid workflow management 329 7.6 Chapter Summary 330 7.7 Further Reading and Testing 331 7.8 Key Points 332 7.9 References 332 8 Grid Portals 335 Learning Outcomes 335 Chapter Outline 335 8.1 Introduction 336 8.2 First-Generation Grid Portals 337 8.2.1 A three-tiered architecture 337 8.2.2 Grid portal services 338 8.2.3 First-generation Grid portal implementations 339 8.2.4 First-generation Grid portal toolkits 341 8.2.5 A summary of the four portal tools 348 8.2.6 A summary of first-generation Grid portals 349 8.3 Second-Generation Grid Portals 350 8.3.1 An introduction to portlets 350 8.3.2 Portlet specifications 355 8.3.3 Portal frameworks supporting portlets 357 8.3.4 A Comparison of Jetspeed, WebSphere Portal and GridSphere 368 8.3.5 The development of Grid portals with portlets 369 8.3.6 A summary on second-generation Grid portals 371 8.4 Chapter Summary 372 8.5 Further Reading and Testing 373 8.6 Key Points 373 8.7 References 374 Part Four Applications 377 9 Grid Applications – Case Studies 379 Learning Objectives 379 Chapter Outline 379 9.1 Introduction 380 9.2 GT3 Use Cases 380 9.2.1 GT3 in broadcasting 381 9.2.2 GT3 in software reuse 382 9.2.3 A GT3 bioinformatics application 387 9.3 OGSA-DAI Use Cases 387 9.3.1 eDiaMoND 387 9.3.2 ODD-Genes 388 9.4 Resource Management Case Studies 388 9.4.1 The UCL Condor pool 388 9.4.2 SGE use cases 389 9.5 Grid Portal Use Cases 390 9.5.1 Chiron 390 9.5.2 GENIUS 390 9.6 Workflow Management – Discovery Net Use Cases 391 9.6.1 Genome annotation 391 9.6.2 SARS virus evolution analysis 391 9.6.3 Urban air pollution monitoring 392 9.6.4 Geo-hazard modelling 394 9.7 Semantic Grid – myGrid Use Case 394 9.8 Autonomic Computing – AutoMate Use Case 395 9.9 Conclusions 397 9.10 References 398 Glossary 401 Index 419

    15 in stock

    £84.56

  • Mac OS X Snow Leopard For Dummies

    John Wiley & Sons Inc Mac OS X Snow Leopard For Dummies

    15 in stock

    Book SynopsisMac OS X Snow Leopard is the newest version of the Macintosh operating system, and "Dr. Mac" Bob LeVitus is the ideal expert to introduce you to Snow Leopard.Table of ContentsIntroduction. Part I: Introducing Mac OS X Snow Leopard: The Basics. Chapter 1: Mac OS X Snow Leopard 101 (Prerequisites: None). Chapter 2: The Desktop and Windows and Menus (Oh My)! Chapter 3: Have It Your Way. Chapter 4: What’s Up, Dock? Chapter 5: The Finder and Its Icons. Part II: Snow Leopard Taming (Or “Organization for Smart People”). Chapter 6: Organizing and Managing Files and Folders. Chapter 7: Dealing with Disks. Chapter 8: Organizing Your Life. Part III: Do Unto Snow Leopard: Getting Things Done. Chapter 9: Internet-Working. Chapter 10: E-Mail Made Easy. Chapter 11: The Musical Mac. Chapter 12: The Multimedia Mac. Chapter 13: Words and Letters. Part IV: Making This Snow Leopard Your Very Own. Chapter 14: Publish or Perish: The Fail-Safe Guide to Printing. Chapter 15: Sharing Your Mac and Liking It. Chapter 16: Features for the Way You Work. Part V: The Care and Feeding of Your Snow Leopard. Chapter 17: Safety First: Backups and Other Security Issues. Chapter 18: Utility Chest. Chapter 19: Troubleshooting Mac OS X. Part VI: The Part of Tens. Chapter 20: Almost Ten Ways to Speed Up Your Mac Experience. Chapter 21: Ten Ways to Make Your Mac Better by Throwing Money at It. Chapter 22: Ten (Or So) Great Web Sites for Mac Freaks. Appendix: Installing or Reinstalling Mac OS X Snow Leopard (Only If You Have To). Index.

    15 in stock

    £15.29

  • Software Performance and Scalability A

    John Wiley and Sons Ltd Software Performance and Scalability A

    15 in stock

    Book SynopsisGives the reader the ability to set up a proper test environment and conduct software performance and scalability tests. Uses many examples showing software performance problems and applicable solutions. Contains a number of case studies to assist the reader with comprehending all aspects of software performance and scalability.Table of ContentsPREFACE xv ACKNOWLEDGMENTS xxi Introduction 1 Performance versus Scalability 1 PART 1 THE BASICS 3 1. Hardware Platform 5 1.1 Turing Machine 6 1.2 von Neumann Machine 7 1.3 Zuse Machine 8 1.4 Intel Machine 9 1.5 Sun Machine 17 1.6 System Under Test 18 1.7 Odds Against Turing 30 1.8 Sizing Hardware 35 1.9 Summary 37 2. Software Platform 41 2.1 Software Stack 42 2.2 APIs 44 2.3 Multithreading 47 2.4 Categorizing Software 535 2.5 Enterprise Computing 55 2.6 Summary 63 3. Testing Software Performance and Scalability 65 3.1 Scope of Software Performance and Scalability Testing 67 3.2 Software Development Process 83 3.3 Defining Software Performance 86 3.4 Stochastic Nature of Software Performance Measurements 95 3.5 Amdahl’s Law 97 3.6 Software Performance and Scalability Factors 99 3.7 System Performance Counters 111 3.8 Software Performance Data Principles 129 3.9 Summary 131 PART 2 APPLYING QUEUING THEORY 135 4. Introduction to Queuing Theory 137 4.1 Queuing Concepts and Metrics 139 4.2 Introduction to Probability Theory 143 4.3 Applying Probability Theory to Queuing Systems 145 4.4 Queuing Models for Networked Queuing Systems 153 4.5 Summary 172 5. Case Study I: Queuing Theory Applied to SOA 177 5.1 Introduction to SOA 178 5.2 XML Web Services 179 5.3 The Analytical Model 181 5.4 Service Demand 183 5.5 MedRec Application 188 5.6 MedRec Deployment and Test Scenario 189 5.7 Test Results 191 5.8 Comparing the Model with the Measurements 198 5.9 Validity of the SOA Performance Model 200 5.10 Summary 200 6. Case Study II: Queuing Theory Applied to Optimizing and Tuning Software Performance and Scalability 205 6.1 Analyzing Software Performance and Scalability 207 6.2 Effective Optimization and Tuning Techniques 220 6.3 Balanced Queuing System 240 6.4 Summary 244 PART 3 APPLYING API PROFILING 249 7. Defining API Profiling Framework 251 7.1 Defense Lines Against Software Performance and Scalability Defects 252 7.2 Software Program Execution Stack 253 7.3 The PerfBasic API Profiling Framework 254 7.4 Summary 260 8. Enabling API Profiling Framework 263 8.1 Overall Structure 264 8.2 Global Parameters 265 8.3 Main Logic 266 8.4 Processing Files 266 8.5 Enabling Profiling 267 8.6 Processing Inner Classes 270 8.7 Processing Comments 271 8.8 Processing Method Begin 272 8.9 Processing Return Statements 274 8.10 Processing Method End 275 8.11 Processing Main Method 276 8.12 Test Program 277 8.13 Summary 279 9. Implementing API Profiling Framework 281 9.1 Graphics Tool—dot 281 9.2 Graphics Tool—ILOG 284 9.3 Graphics Resolution 286 9.4 Implementation 287 9.5 Summary 300 10. Case Study: Applying API Profiling to Solving Software Performance and Scalability Challenges 303 10.1 Enabling API Profiling 304 10.2 API Profiling with Standard Logs 313 10.3 API Profiling with Custom Logs 320 10.4 API Profiling with Combo Logs 325 10.5 Applying API Profiling to Solving Performance and Scalability Problems 333 10.6 Summary 337 APPENDIX A STOCHASTIC EQUILIBRIUM AND ERGODICITY 339 A.1 Basic Concepts 339 A.2 Classification of Random Processes 343 A.3 Discrete-Time Markov Chains 345 A.4 Continuous-Time Markov Chains 349 A.5 Stochastic Equilibrium and Ergodicity 351 A.6 Birth–Death Chains 357 APPENDIX B MEMORYLESS PROPERTY OF THE EXPONENTIAL DISTRIBUTION 361 APPENDIX C M/M/1 QUEUES AT STEADY STATE 363 C.1 Review of Birth–Death Chains 363 C.2 Utilization and Throughput 364 C.3 Average Queue Length in the System 365 C.4 Average System Time 365 C.5 Average Wait Time 366 INDEX 367

    15 in stock

    £87.26

  • Green Gadgets For Dummies

    John Wiley & Sons Inc Green Gadgets For Dummies

    15 in stock

    Book SynopsisGreen gadgets encompass everything from iPods to energy-efficient home entertainment devices to solar laptop chargers and crank-powered gizmos. This book explains how to research green gadgets, make a smart purchasing decision, use products you already own in a more environmentally friendly way, and say goodbye to electronics that zap both energy.Table of ContentsForeword xix Introduction 1 About Green Gadgets For Dummies 1 Foolish Assumptions 2 Conventions Used in This Book 3 What You Don’t Have to Read 3 How This Book Is Organized 4 Part I: Settling into a Green Gadget Mindset 4 Part II: Getting Green with Gadgets You Own 4 Part III: Minimizing Your Computer’s Carbon Footprint 4 Part IV: Acquiring Green Gadgets and Gear 5 Part V: Ridding Yourself of Gadgets the Green Way 5 Part VI: The Part of Tens 5 The companion Web site 5 Icons Used in This Book 6 Where to Go from Here 6 Part I: Settling into a Green Gadget Mindset 7 Chapter 1: Mother Nature’s Green-Eyed View of Gadgets 9 Hey, Joe, Where You Goin’ with That Green Gadget in Your Hand? 10 Assessing “green” companies 12 Defining gadgets 14 Defining green gadgets 15 Relating the Four Rs to Green Gadgets 16 Following a Green Gadget’s Carbon Footprint 17 Thoughtful manufacturing 18 Ecofriendly features 19 Other green electronics 20 Understanding Energy Star and EPEAT Green Gadget Labels 22 Implementing Green Living Habits with Gadgets You Already Own 24 Taking a bite out of “energy vampires” 24 Calculating your gadgets’ carbon footprints 25 Taking other simple green gadget steps 26 Staying Informed about Green Gadget Developments 27 Chapter 2: Practicing Green Gadget Living 29 Evaluating Your Energy Waste, er, Usage 30 Reducing Your Gadgets’ Carbon Footprints and E-Waste 33 Reusing Your Gadgets and Electronics Gear 34 Recycling Gadgets the Green Way 35 Rethinking Your Gadget Purchases 36 Sharing Your Gadget Greenness with Others 38 Part II: Getting Green with Gadgets You Own 41 Chapter 3: Saving Money (and the Planet) with Rechargeable Batteries 43 Understanding Basic Battery Pluses and Minuses 44 Hunting and Gathering Battery-Powered Gadgets in Your House 44 Sorting Out and Choosing Rechargeable Batteries and Chargers 46 Gauging matters of size, type, power, and price 47 Picturing how long battery types last 50 Getting a charge out of chargers 50 Choosing rechargeable batteries and chargers 53 Finding Rechargeable Battery Packs 55 Buying rechargeable batteries for less 56 Replacing rechargeable batteries in iPods, iPhones, and other sealed gadgets 56 Properly Disposing of Dead Batteries 57 Disposable batteries 57 Rechargeable batteries 59 Chapter 4: Maximizing Energy Savings for Your Portable Gadgets 61 Getting a Grip on a Gadget’s Energy-Saving Settings 61 Battery-draining items 63 Cellphones and smartphones 65 MP3 and media players 69 Digital cameras and camcorders 71 Running Mobile Applications to Monitor and Adjust Power 72 Chapter 5: Energy Savings All Around the House 75 Practicing Green Living in Your House 75 Reviewing Energy-Saving Opportunities in Your House 77 Televisions 78 Computers and peripheral devices 79 Mobile phones, MP3 players, GPS trackers, and other personal gadgets 79 Adjusting Power-Saving Options on TVs and Entertainment Gear 80 Taming TV power 80 Reducing power consumption in DVD, video game, and other types of players 82 Part III: Minimizing Your Computer’s Carbon Footprint 87 Chapter 6: Your Computer’s Energy Use 89 Quashing Computer Power Myths 89 Evaluating Your Everyday Computer Needs 93 Understanding Computer Energy-Saving Settings 94 Changing your computer’s energy settings the easy way 97 Taking greater control of your computer’s energy settings 98 iPods, Printers, Hard Drives, and Other Connected Devices 101 Chapter 7: Reducing Energy Consumption in Windows 103 Minimizing Windows Energy Use On-the-Fly 106 Adjusting the Windows Automatic Power Options Settings 107 Choosing and customizing Windows Vista’s power plans 109 Customizing Windows Vista’s advanced power settings 112 Choosing and Customizing Windows XP Power Schemes 113 Power Schemes 114 Alarms 115 Power Meter 116 Advanced 116 Hibernate 117 UPS 117 Making Additional Windows Vista and XP Power Options Adjustments 117 Windows Mobility Center (Vista only) 118 Brightness 118 Screen saver 120 Keyboard brightness 121 Wireless networking 121 Bluetooth 122 Sound 123 Indexing options (Vista only) 124 Chapter 8: Conserving Power with Your Mac’s Energy-Saver Settings 127 Minimizing Your Mac’s Energy Use On-the-Fly 128 Adjusting Your Mac’s Automatic Energy- Saver Settings 129 Making Additional Mac Energy-Saving Adjustments 132 Brightness 133 Screen saver 134 Keyboard brightness 135 AirPort 136 Bluetooth 136 Sound 138 Spotlight 138 Part IV: Acquiring Green Gadgets and Gear 141 Chapter 9: Knowing the Difference Between Truly Green and Greenwash Hype 143 Paying to Be (Seen As) Green Is Big Business 143 Reviewing the Greenpeace Guide to Greener Electronics 145 Tapping In to the Greenpeace Electronics Survey 147 Considering Another Take on Green Gadgets: The Consumer Electronics Association 149 Taking Companies at Their Own Green Word, Sort Of 151 Browsing gadget-makers’ ecocentric Web sites 151 Seeking a second, third, or tenth opinion 154 Chapter 10: Choosing Green Mac and Windows Computers 155 Considering Upgrades to Make Your Computer Feel New Again 156 Upgrading hardware 156 Upgrading operating systems and applications 158 Choosing and installing upgrades 158 Getting Up-to-Speed on Computer Energy Standards and Ratings 159 Evaluating Computer Manufacturers’ Levels of Greenness 160 Getting a Handle on Green Computers 161 Picking Green Macs 163 Breaking down the MacBook, piece by piece 164 Considering other Macs and products 165 Looking at Green Windows Computers 166 Two green Windows desktops 167 A pair of green Windows notebooks 169 Chapter 11: Buying Green Mobile Phones and Handheld Gadgets 173 Getting Up to Speed on Green Gadget Matters 173 Dialing in to Green Mobile Phones 175 Motorola MOTO W233 Renew 177 Samsung SGH-W510, SGH-F268, and E200 Eco 178 Nokia 3110 Evolve and N79 eco 179 Looking at Green MP3 and Video Players, and Other Entertaining Gadgets 181 iPod nano 181 Shiro SQ-S solar-powered media player 182 Baylis Eco Media Player 182 eMotion Solar Portable media player 183 Saving Trees by Reading E-Books 184 Mobile phone and computer e-book readers 184 Dedicated e-book readers 187 Electronic bookstores 190 Getting Wound Up Over Green Windup Gadgets 191 Chapter 12: Getting Green Gadgets for on the Go 195 Driving Your Car More Efficiently 195 Tricking Out Your Car with Efficiency Gizmos 197 Tapping into GPS and Mobile Phone Applications for Green Getting-around 199 Talking mobile phone GPS navigator apps 201 Portable GPS navigators 202 GPS and green mobile phone apps 203 Tracking Green Gadgets for Fitness and Outdoor Activities 206 Staying in Charge with Portable Power Chargers and Extenders 208 Leafing Through Green Garments, Bags, and Cases 211 Chapter 13: Adding Green Gadgets around the House 215 Considering Green Gadgets for Every Room in the House 215 Monitoring and Controlling Household Energy Usage 217 Turning Things On and Off Automatically 219 Controlling Your Entire House with Home Automation Systems 221 Looking at Green HDTV, Music, Movie-Watching, and Audio Products 225 Fiddling with Other Ecofriendly Home Gadgets 229 Part V: Ridding Yourself of Gadgets the Green Way 233 Chapter 14: Donating, Gifting, and Selling Unwanted Gadgets 235 Determining whether an Unwanted Gadget Is of Use to Anyone 236 Weighing the Risks and Rewards of Donating, Gifting, and Selling Unwanted Gadgets 238 Giving the Gift of Unwanted Gadgets 240 Doing Good by Donating Computers and Other Gadgets 240 Trading In or Selling Gadgets for Greenbacks 243 The basics of the trade-in process 244 Finding a trade-in site for you 246 Selling Your Old Electronics on Craigslist 249 Auctioning Unwanted Gadgets on eBay and Other Auction Web Sites 251 Chapter 15: Erasing Your Personal Information before Getting Rid of Gadgets 255 Deleting Your Personal Stuff — The Short Way and the Long Way 256 Considering Trust to Decide How to Erase Personal Information 258 To know you is to trust you 258 I want to trust you, but I’m just not sure 259 Deauthorizing Computer Programs before Giving Away Your PC 260 Deleting Your User Account Files before Getting Rid of a Computer 264 Deleting your Windows XP user account and creating a new one 265 Deleting your Windows Vista user account and creating a new one 267 Deleting your Mac user account and creating a new one 270 Restoring Computers to Factory-Fresh Condition 273 Formatting and restoring a Windows hard drive 273 Formatting and restoring a Mac hard drive 277 Completely Erasing Deleted Files and Hard Drives 279 Wiping Windows hard drives 279 Wiping Mac hard drives 280 Chapter 16: Recycling and Properly Disposing of Hopelessly Useless Gadgets 283 Understanding E-Waste and E-Cycling 284 Finding E-Cyclers 286 Reputable or not? 286 Local or from a distance? 286 Finding a local e-cycler 288 National and corporate e-cycling programs 290 Erasing Personal Information 296 Deciding Whether to Break Down E-Waste or Leave It Whole 297 Keeping useful parts 297 Peripherals and other parts and pieces 298 Part VI: The Part of Tens 301 Chapter 17: Ten Cool Green PC Peripherals and Accessories 303 PC TrickleSaver 303 Ecobutton 303 Bamboo Laptop Stand Workstation 304 SimpleTech [re]drive R500U 500 GB Turbo 304 Lenovo ThinkVision L197 Wide 19-inch LCD Display 304 Apple 24-inch LED Cinema Display 305 Ink2image Bulk Ink System 305 Canon Generation Green Printers 305 D-Link DGL-4500 Xtreme N Gaming Router 306 Netgear 3G Broadband Wireless Router 306 Chapter 18: Ten Green Gadget Designs 307 Bware Water Meter 307 Laundry Pod 307 Social-Environmental Station: The Environmental Traffic Light 308 Indoor Drying Rack 308 Thermal Touch 308 Fastronauts 308 Tweet-a-Watt 309 Standby Monsters 309 Power-Hog 309 WattBlocks 309 And the Winners Are 310 Chapter 19: Ten Green Gadget Buying Tips 313 Don’t Buy! 313 Do Your Homework 313 Buy Recycled and Highly Recyclable 314 Buy Reconditioned or Preowned 315 Buy Small, Think Big Picture 315 Take a Bite Out of Energy Vampires 316 Make the Most of Multifunction Gadgets 316 Charge Your Gadgets the Green Way 317 Get Rid of Gadgets the Green Way 317 Buy Carbon Offsets to Minimize Your Carbon Footprint 318 Chapter 20: Ten Frequently Asked Questions about Green Gadgets 319 What Is a Green Gadget? 319 Why Should I Care about Buying Green Gadgets? 320 What Is EPEAT? 321 Which Electronic Products Does EPEAT Cover? 321 What Is Energy Star? 321 How Does a Product Earn the Energy Star Seal of Approval? 322 What Is the “Change the World, Start with Energy Star” Campaign? 322 Should I Donate or Recycle My Old Computer? 323 Should I Donate or Recycle My Old Cellphone? 323 Should I Recycle My Old Rechargeable Batteries? 324 Index 325

    15 in stock

    £15.29

  • Trustworthy Compilers

    John Wiley & Sons Inc Trustworthy Compilers

    1 in stock

    Book SynopsisThis unique guide book explains and teaches the concept oftrustworthy compilers based on 50+ years of worldwide experience inthe area of compilers, and on the author s own 30+ years ofexpertise in development and teaching compilers.Trade Review"Overall, however, it is an excellent addition to a computer scientist's bookshelf, and complements the classics in compiler design." (Computing Reviews, 22 November 2011)Table of ContentsPreface. Acknowledgments. 1. Introduction. 1.1. The Concept of a Trustworthy Compiler. 1.2. Kinds of Compilers. 1.3. Evolution of Java Compilers. 1.4. Compilation for .NET. 1.5. Phases of Compilation. 1.6. Overview of Compiler Development Principles and Technologies. 1.7. History of Compiler Development in the U.S.S.R. and in Russia. Exercises to Chapter 1. 2. Theoretical Foundations and Principles of Trustworthy Compilers. 2.1. The Trustworthy Computing (TWC) Initiative. 2.2. TWC and Trustworthy Compilers. 2.3. Verified Compilers. 2.4. Spec#: Microsoft’s Approach to Verifying Compilers. 2.5. Perspectives of Verified and Verifying Compilation. Exercises to Chapter 2. 3. Lexical Analysis and Its Trustworthiness Principles. 3.1. Token Classes. 3.2. The Output of the Lexical Analyzer. 3.3. Processing White Spaces, Comments, and New Lines. 3.4. Theoretical Models of Lexical Analysis. 3.5. Lexical Errors, Error Diagnostics, and Recovery. 3.6. Processing Identifiers and Keywords. 3.7. The Architecture of a Lexical Analyzer and the Principles of Its Implementation. 3.8. The Lexical Analyzer Generator Lex. 3.9. Lexical Analyzer Generation in ANTLR. Exercises to Chapter 3. 4. Parsing and Trustworthy Methods of Syntax Error Recovery. 4.1. Basic Concepts and Principles of Parsing. 4.2. Recursive Descent and Simple Lookahead Mechanism. 4.3. Overview of Error Recovery in Parsing: Error Recovery for Recursive Descent. 4.4. LR(1) and LALR(1) Parsing. 4.5. Error Recovery in LR Parsing. 4.6. The Yacc Parser Generator. 4.7. The Bison Parser Generator: Generalized LR Parsing. 4.8. The Yacc++, JavaCC, SableCC, ANTLR, and CoCo/R Object-Oriented Parser Generators. Exercises to Chapter 4. 5. Semantic Analysis and Typing: Efficient and Trustworthy Techniques. 5.1. Basic Concepts and Principles of Semantic Analysis. 5.2. Formal Model of Semantic Analysis: Attributed Grammars. 5.3. Definition Systems with Forward References and the Algorithm of Their One-Pass Analysis. 5.4. Commonly Used Semantic Attributes for Program Constructs. 5.5. Design Flaws of the Semantic Attribute Evaluation and Our Efficient Methods to Speed It Up. 5.6. Lookup—Traditional and Novel Techniques. 5.7. Typing and Type-Checking: Basic Concepts. 5.8. Representing Types at Compile Time. 5.9. Efficient Method and Algorithm to Represent and Handle Types with Structural Identity. 5.10. Type Identity and Type Compatibility. 5.11. Type-Checking, Typing Error Diagnostics, and Recovery. 5.12. Code Trustworthiness Checks During Semantic Analysis. 5.13. Checks for Context Restrictions in Semantic Analysis. 5.14. Intermediate Code Generation—Principles and Architectural Models. 5.15. Postfix (Reverse Polish) Notation. 5.16. PCC Trees. 5.17. Triples. 5.18. Summary of the Chapter. Exercises to Chapter 5. 6. Trustworthy Optimizations. 6.1. Basic Concepts and Trustworthiness of Optimizations. 6.2. Optimizations as Mixed Computations. 6.3. Overview of the Most Common Kinds of Optimizations. 6.4. Control Flow and Data Flow Dependencies. 6.5. Static Single Assignment (SSA). 6.6. Data Structures Constructed and Used by the Optimizer. 6.7. Optimization in Sun Studio Compilers. 6.8. Optimizations of the Java Bytecode. 6.9. Optimizations of the .NET Common Intermediate Language (CIL) Code. 6.10. Optimizations during JIT Compilation. Exercises to Chapter 6. 7. Code Generation and Runtime Data Representation. 7.1. Target Platforms for Code Generation. 7.2. Overview of Code Generation Tasks and Goals. 7.3. Specifics of Code Generation for .NET. 7.4. Specifics of Code Generation for SPARC Architecture. 7.5. Representing Types and Addressing Variables. 7.6. Representing Procedures, Functions, and Methods. 7.7. Principles of SPARC Architecture. 7.8. Example of Code Generation for SPARC Architecture. 7.9. Generation of Debugging Information. 7.10. Code Generation for Declarations (Definitions), Expressions, and Statements. Exercises to Chapter 7. 8. Runtime, JIT, and AOT Compilation. 8.1. The Tasks of the Runtime. 8.2. The Relationship of the Runtime and the Operating System (OS). 8.3. JIT Compilation. 8.4. The Architecture of FJIT––JIT Compiler for SSCLI/Rotor. 8.5. The Architecture of Optimizing JIT Compiler for SSCLI/Rotor. 8.6. AOT Compilation. Exercises to Chapter 8. 9. Graph Grammars and Graph Compilers. 9.1. Basic Concepts of Graph Grammars and Graph Compilers. 9.2. Categorical Approach to Graph Transformations. 9.3. Reserved Graph Grammars (RGGs). 9.4. Layered Graph Grammars. 9.5. Meta-Modeling Approach to Graph Grammars and Diameta Editor. 9.6. Hypergraph Approach to Graph Grammars in Diagen. 9.7. Graph Compiler Generation Tools. Exercises to Chapter 9. 10. Microsoft Phoenix, Phoenix-Targeted Tools, and Our Phoenix Projects. 10.1. History of Phoenix and of Our Phoenix Projects. 10.2. Overview of Phoenix Architecture. 10.3. Phoenix-Based Tools, Passes, Phases, and Plug-Ins. 10.4. Phoenix Primitives: Strings and Names. 10.5. Phoenix Intermediate Representation (IR). 10.6. Phoenix Symbol System. 10.7. Phoenix Type System. 10.8. Data Flow Analysis, Control Flow Analysis, Graphs, and Static Single Assignment (SSA) in Phoenix. 10.9. Overview of Other Phoenix Features. 10.10. Example of a Phoenix-Based Plug-In. 10.11. Phoenix-Fete—A Compiler Front-End Development Toolkit and Environment Targeted to Phoenix. Exercises to Chapter 10. Conclusions. References. Index.

    1 in stock

    £121.46

  • Windows 7 for Seniors for Dummies

    John Wiley & Sons Inc Windows 7 for Seniors for Dummies

    15 in stock

    Book SynopsisThis easy-to-understand guide helps seniors get started with Windows 7! Many seniors use a home computer to stay connected to family and friends.Table of ContentsIntroduction 1 Part I: Getting to Know Windows 7 7 1: Getting Comfortable with the Windows 7 Desktop 9 2: Examining the Anatomy of a Window 29 3: Creating Your First Documents 45 4: Organizing Your Documents 69 Part II: Getting Things Done in Windows 7 93 5: Taking Advantage of the Windows Accessories 95 6: Installing and Removing Programs 115 7: Working with Printers and Other Add-On Devices 127 Part III: Discovering the Internet 141 8: Connecting to the Internet 143 9: Finding What You Need on the Web 153 10: Sending and Receiving E-Mail 179 Part IV: Having Fun with Windows 7 201 11: Playing Games 203 12: Enjoying Photos in Windows 7 213 13: Listening to Music and Watching DVDs 235 Part V: Having It Your Way with Windows 7 259 14: Making Windows 7 More Fun to Use 261 15: Using the Taskbar and Start Menu Smartly 285 16: Making Windows 7 Easier to Use 303 Part VI: Staying Safe and Keeping Windows 7 Healthy 323 17: Updating Windows 7 325 18: Protecting Your Computer 341 19: Keeping Your Data Safe 359 Index 377

    15 in stock

    £15.29

  • Microsoft Exchange Server 2010 Administration

    John Wiley & Sons Inc Microsoft Exchange Server 2010 Administration

    15 in stock

    Book SynopsisQuestions about Exchange Server 2010? Flip open this easy-access guide! Have all your questions about Microsoft's new Exchange Server 2010 answered on the spot with this handy reference guide.Table of ContentsPart I Getting Started. 1 Deploying Exchange Servers. 2 Using the Exchange Management Console and the Exchange Management Shell. 3 Managing the Organization. 4 Administering Recipients. 5 Managing Client Access. 6 Managing Message Routing. Part II Managing Exchange Server Roles. 7 Managing Mailbox Databases. 8 Managing Public Folders. 9 Administering Mailbox Content. 10 Maintaining Reliability and Availability. Part III Mitigating Risk. 11 Monitoring Health and Performance. 12 Securing Exchange Server.

    15 in stock

    £21.84

  • Nonlinear Optical Communication Networks

    John Wiley & Sons Inc Nonlinear Optical Communication Networks

    15 in stock

    Book SynopsisThis book presents coverage of the performance, design principles and analysis of optical communication systems operating under nonlinear propagation regimes. It includes an application based comparison of different systems, so that the reader can determine the right system for his application.Table of ContentsOptical Fiber Propagation. Optical Amplifiers. Optical Transmission Systems. Soliton Optical Communications. Repeaterless Systems. Long Distance TDM Transmission. WDM Optically Amplified Systems. Transmission in All-Optical Networks. Appendices. Index.

    15 in stock

    £159.26

  • Digital Logic Design

    John Wiley & Sons Inc Digital Logic Design

    15 in stock

    Book SynopsisThe perfect complement to computer architecture and logic texts. This widely praised tutorial and lab book gives practice in the fundamentals of digital logic and circuitry, with special emphasis on how the machine operates at the gate and register level.Table of ContentsReview of Fundamental Concepts and Introduction to the TTLFamily. Basic Two-level Circuits. Implementation with One Gate Type. Expression Reduction Techniques. Important Combinatorial Networks--1. Important Combinatorial Networks--2. Latches and Flip-flops. Counters. State Sequencers and Controllers. Registers. Appendix A: Boolean Algebra. Appendix B: TTL Parts, Layout. Appendix C: References. Appendix D: Recommended Parts List and Lab Equipment.

    15 in stock

    £129.56

  • Windows Vista For Dummies

    John Wiley & Sons Inc Windows Vista For Dummies

    15 in stock

    Book SynopsisCreate music CDs and photo DVDs or even watch TV Move your files to a new computer, or get your old PC ready for Vista The thing that's made Windows For Dummies so successful is that it's packed with the basics you need to make Windows work.Table of ContentsIntroduction 1 Part I: Windows Vista Stuff Everybody Thinks You Already Know 7 Chapter 1: What Is Windows Vista? 9 Chapter 2: The Desktop, Start Menu, and Other Windows Vista Mysteries 21 Chapter 3: Basic Windows Mechanics 47 Chapter 4: Flipping Through Files, Folders, Floppies, and CDs 69 Part II: Working with Programs and Files 95 Chapter 5: Playing with Programs and Documents 97 Chapter 6: Briefly Lost, but Quickly Found 119 Chapter 7: Printing Your Work 133 Part III: Getting Things Done on the Internet 145 Chapter 8: Cruising the Web 147 Chapter 9: Sending and Receiving E-mail 171 Chapter 10: Safe Computing 189 Part IV: Customizing and Upgrading Windows Vista 207 Chapter 11: Customizing Windows Vista with the Control Panel 209 Chapter 12: Keeping Windows from Breaking 235 Chapter 13: Sharing One Computer with Several People 249 Chapter 14: Connecting Two or More Computers with a Network 259 Part V: Music, Movies, Memories (and Photos, Too) 277 Chapter 15: Playing and Copying Music in Media Player 279 Chapter 16: Fiddling with Photos and Movies 303 Part VI: Help! 331 Chapter 17: The Case of the Broken Window 333 Chapter 18: Strange Messages: What You Did Does Not Compute 345 Chapter 19: Moving from an Old Computer to a New One 353 Chapter 20: Help on the Windows Vista Help System 365 Part VII: The Part of Tens 371 Chapter 21: Ten or So Things You’ll Hate about Windows Vista (and How to Fix Them) 373 Chapter 22: Ten or So Tips for Laptop Owners 381 Appendix: Upgrading to Windows Vista 387 Index 391

    15 in stock

    £13.49

  • The Best of MAKE

    O'Reilly Media The Best of MAKE

    Out of stock

    Book SynopsisWith the surge of interest in tech DIY and the rising popularity of MAKE, this title is suitable for loyal MAKE readers seeking a collectible reference resource as well as newcomers to the making movement who want to catch up on what they missed in earlier volumes. It includes the best DIY projects from the first 10 volumes.

    Out of stock

    £25.19

  • DOS For Dummies 3e

    John Wiley & Sons Inc DOS For Dummies 3e

    15 in stock

    Book SynopsisDOS made easy!Windows may rule the world of popular computing on PCs around theglobe, but DOS still has a place in the hearts and minds ofcomputer users who vaguely remember what a C prompt looks like.Even if DOS (with all its arcane commands and its drab, boringlook) isn''t your idea of the best way to get things done on a PC,you''ll find plenty of fast and friendly help on hand with the thirdedition of DOS For Dummies. Here''s a plain-speaking reference guide to all the command-linestuff and nonsense that makes DOS work, whether you''re a native DOSuser or are an occasional dabbler who needs the operating system torun all those cool games under Windows. DOS For Dummies, 3rd Edition, avoids all the technicaljargon to cut to the heart of things with clear, easy-to-understandexplanations and step-by-step help for * Changing disks and drives * Dealing with the DOS prompt * Managing files * Running DOS inside WindowsTrade Review“…excellent and fun to read…” (Mourne Observer & County Down News, 23 July 2003)Table of ContentsIntroduction. PART I: The Absolute Basics. Chapter 1: Getting On with It. Chapter 2: The PC Hokey-Pokey (Or That's What It's AllAbout). Chapter 3: Life at the DOS Prompt. Chapter 4: Easier DOS: The DOS Shell. Chapter 5: The Way Windows Was. Chapter 6: DOS in Windows 95/98. PART II: The Non-Nerd's Guide to PC Hardware. Chapter 7: Your Basic Hardware: What It Is and Why. Chapter 8: RAM (Or Memory, the Way We Were). Chapter 9: The Video Display (That's the Computer Screen). Chapter 10: Keyboard and Mouse (Or Where Is the "Any" Key?). Chapter 11: The Printer (Making the Right Impression). Chapter 12: More on Modems. Chapter 13: All You (Don't) Want to Know about Disks. PART III: The Non-Nerd's Guide to PC Software. Chapter 14: Basic Software Setup. Chapter 15: Software Mystery Grab Bag. Chapter 16: Playing with the Editor. Chapter 17: The Hard Drive: Where You Store Stuff. Chapter 18: File Fitness (Stuff You Do with Files). Chapter 19: Files -- Lost and Found. PART IV: Yikes! (Or Help Me Out of This One!). Chapter 20: When It's Time to Toss In the Towel (And Call a DOSGuru). Chapter 21: After You Panic, Do This. Chapter 22: Diagnosing, Disinfecting, and Getting Help. Chapter 23: DOS Error Messages (What They Mean, What to Do). PART V: The Part of Tens. Chapter 24: Ten Things You Should Do All the Time. Chapter 25: Ten Common Beginner Mistakes. Chapter 26: Ten Things You Should Never Do. Chapter 27: Ten Favorite DOS Commands. DOS Command Reference. Glossary. Index. Book Registration Information.

    15 in stock

    £16.14

  • TI83 Plus Graphing Calculator for Dummies

    John Wiley & Sons Inc TI83 Plus Graphing Calculator for Dummies

    15 in stock

    Book SynopsisIf you have a TI-83 Plus graphing calculator, you have a veritable feast of features and functions at your fingertips, but chances are you don't take full advantage of them. This book helps you explore your TI-83 Plus Graphing Calculator. It also helps you to discover how your TI-83 Plus Graphing Calculator can solve various kinds of problems.Table of ContentsIntroduction 1 Part I: Making Friends with the Calculator 7 Chapter 1: Coping with the Basics 9 Chapter 2: Doing Basic Arithmetic 21 Part II: Advanced Functions, Complex Numbers, and Solving Equations 29 Chapter 3: The Math and Angle Menus 31 Chapter 4: Dealing with Complex Numbers 41 Chapter 5: Solving Equations 45 Part III: Dealing with Finances 51 Chapter 6: Finding the Best Deal 53 Chapter 7: Loans and Mortgages 57 Chapter 8: Savings and Investments 63 Part IV: Graphing and Analyzing Functions 67 Chapter 9: Graphing Functions 69 Chapter 10: Exploring Functions 83 Chapter 11: Evaluating Functions 95 Chapter 12: Drawing on a Graph 105 Part V: Sequences, Parametric Equations, and Polar Equations 115 Chapter 13: Graphing Sequences 117 Chapter 14: Exploring Sequences 127 Chapter 15: Parametric Equations 139 Chapter 16: Polar Equations 157 Part VI: Probability and Statistics 177 Chapter 17: Probability 179 Chapter 18: Dealing with Statistical Data 183 Chapter 19: Analyzing Statistical Data 191 Part VII: Dealing with Matrices 203 Chapter 20: Creating and Editing Matrices 205 Chapter 21: Using Matrices 211 Part VIII: Communicating with PCs and Other Calculators 217 Chapter 22: Communicating with a PC with TI Connect TM 219 Chapter 23: Communicating Between Calculators 223 Part IX: The Part of Tens 229 Chapter 24: Ten Great Applications 231 Chapter 25: Eight Common Errors 235 Chapter 26: Eleven Common Error Messages 239 Index 243

    15 in stock

    £13.59

  • TI89 Graphing Calculator For Dummies For Dummies S

    Wiley TI89 Graphing Calculator For Dummies For Dummies S

    15 in stock

    Book SynopsisHelps you with: equations and systems of equations; factor polynomials; derivatives and integrals; graph functions, parametric equations, polar equations, and sequences; differential equations and systems of differential equations. This book also helps transfer files between two or more calculators; and save calculator files on your computer.Table of ContentsIntroduction. Part I: Making Friends with the Calculator. Chapter 1: Coping with the Basics. Chapter 2: Doing Basic Arithmetic. Part II: Doing Algebra and Trigonometry. Chapter 3: Solving Equations, Factoring, and Other Great Stuff. Chapter 4: Dealing with Complex Numbers. Part III: Graphing and Analyzing Functions. Chapter 5: Graphing Functions of One Variable. Chapter 6: Exploring Functions. Chapter 7: Analyzing Functions. Part IV: Working with Sequences, Parametric Equations, and Polar Equations. Chapter 8: Graphing Sequences. Chapter 9: Exploring Sequences. Chapter 10: Parametric Equations. Chapter 11: Polar Equations. Part V: Doing Calculus. Chapter 12: Dealing with Differential and Integral Calculus. Chapter 13: Dealing with Vector Calculus. Chapter 14: Graphing Surfaces and Contour Maps. Chapter 15: Dealing with Differential Equations. Part VI: Dealing with Matrices. Chapter 16: Creating and Editing Matrices. Chapter 17: Using Matrices. Part VII: Dealing with Probability and Statistics. Chapter 18: Probability. Chapter 19: Dealing with Statistical Data. Chapter 20: Analyzing Statistical Data. Part VIII: Communicating with PCs and Other Calculators. Chapter 21: Communicating with a PC Using TI Connect. Chapter 22: Communicating between Calculators. Part IX: The Part of Tens. Chapter 23: Ten Great Applications. Chapter 24: Ten Common Errors and Messages. Appendix: Creating Custom Menus. Index.

    15 in stock

    £13.29

  • Scarecrow Press Audiovisual Equipment and Materials v 1 A Basic

    Out of stock

    Book Synopsis

    Out of stock

    £72.00

  • The Mathematics of Internet Congestion Control Systems  Control Foundations  Applications

    Birkhauser Boston The Mathematics of Internet Congestion Control Systems Control Foundations Applications

    15 in stock

    Book Synopsis* Recommended by T.Basar, SC series ed.* This text addresses a new, active area of research and fills a gap in the literature. * Bridges mathematics, engineering, and computer science; * Useful as a supplementary text & reference for grad students with some background in control theory;Trade Review"This first book on the mathematics of congestion control [is] very useful for both students and researchers, but also for system engineers developing new Internet protocols. This is an elementary book for graduate students that uses a rich pallet of mathematical tools: convex optimization and control theory (Lyapunov stability and Nyquist criteria and stochastic processes). The tools are summarized well in appendices which makes the book self-contained and easy to read. The book is very well written and will undoubtedly remain a major reference on the topic for years to come." —Mathematical Reviews "This well-written book presents an overview of the mathematics behind internet congestion control. Focusing on the well-established TCP protocol, it starts with a gentle introduction on TCP and the packet/acknowledgement structure of the internet, before proceeding to congestion and the principles of congestion control…. Overall, this book presents in an easy-to-understand way the principles of internet congestion control with a focus on the mathematical concepts behind them. The book concludes with a useful index and a rich source of bibliographical references." —Zentralblatt Math "The investigation of fairness, efficiency, and dynamics of TCP led to the development of a new fast-growing research domain of mathematical models for congestion control. The Mathematics of Internet Congestion Control by R. Srikant provides a valuable comprehensive introduction to this new exciting research area. …Using mathematical models, Srikant successfully explains the principal ideas behind Internet congestion control. The publication of the book is very timely. Currently, there are no other books on mathematical models for congestion control. …All material in the book is accessible to graduate or even undergraduate students of mathematical and electrical engineering disciplines. Many chapters are supplied with appendices which review the necessary background material and make the book self-contained. In conclusion, this book can be equally recommended for beginners as well as for expert researchers working in the domain of congestion control. For beginners, the book will be a good starting point from which to explore a vast and rapidly growing body of literature on the subject of Internet congestion control. For expert researchers, the book will definitely help to place congestion control in perspective and will point to new avenues in this exciting research domain." —SIAM Book Reviews Table of ContentsPreface Introduction Resource Allocation Congestion Control: A Decentralized Solution Relationship to Current Internet Protocols Linear Analysis with Delay: The Single Link Case Linear Analysis with Delay: The Network Case Global Stability for a Single Link and Single Flow Stochastic Models and Their Deterministic Limits Connection-level Models Real-Time Sources and Distributed Admission Control Conclusions References Index

    15 in stock

    £42.74

  • AI at the Edge

    O'Reilly Media AI at the Edge

    2 in stock

    Book SynopsisThis practical guide gives engineering professionals, including product managers and technology leaders, an end-to-end framework for solving real-world industrial, commercial, and scientific problems with edge AI.

    2 in stock

    £47.99

  • Digital Design Using VHDL

    Cambridge University Press Digital Design Using VHDL

    15 in stock

    Book SynopsisProvides students with a system-level perspective and the tools they need to understand, analyze and design complete digital systems using VHDL. It goes beyond the design of simple combinational and sequential modules to show how such modules are used to build complete systems, reflecting digital design in the real world.Table of ContentsPart I. Introduction: 1. The digital abstraction; 2. The practice of digital system design; Part II. Combinational Logic: 3. Boolean algebra; 4. CMOS logic circuits; 5. Delay and power of CMOS circuits; 6. Combinational logic design; 7. VHDL descriptions of combinational logic; 8. Combinational building blocks; 9. Combinational examples; Part III. Arithmetic Circuits: 10. Arithmetic circuits; 11. Fixed- and floating-point numbers; 12. Fast arithmetic circuits; 13. Arithmetic examples; Part IV. Synchronous Sequential Logic: 14. Sequential logic; 15. Timing constraints; 16. Datapath sequential logic; 17. Factoring finite-state machines; 18. Microcode; 19. Sequential examples; Part V. Practical Design: 20. Verification and test; Part VI. System Design: 21. System-level design; 22. Interface and system-level timing; 23. Pipelines; 24. Interconnect; 25. Memory systems; Part VII. Asynchronous Logic: 26. Asynchronous sequential circuits; 27. Flip-flops; 28. Metastability and synchronization failure; 29. Synchronizer design; Appendix A. VHDL coding style; Appendix B. VHDL syntax guide; References; Index.

    15 in stock

    £62.99

  • Switching to a Mac For Dummies

    John Wiley & Sons Inc Switching to a Mac For Dummies

    15 in stock

    Book SynopsisLearn how to make the switch from PC to Mac a completely smooth transition The number of Mac users continues to increase significantly each year.Table of ContentsIntroduction 1 Part I: Informed Switching Starts Here 7 Chapter 1: Why Switch? Demystifying the Mac Mantra 9 Chapter 2: Meet the Mac Family 23 Chapter 3: Deciding What to Buy 49 Part II: Making the Switch 83 Chapter 4: The Big Day: Setting Up Your Mac 85 Chapter 5: Mac OS X for Windows Users 99 Chapter 6: Moving Files from Your PC to the Mac 131 Chapter 7: Switching Applications 149 Part III: Connecting Hither and Yon 169 Chapter 8: Getting Your Mac Online 171 Chapter 9: Networking the Mac Way 195 Chapter 10: Staying Secure in a Connected World 215 Chapter 11: Connecting with iDevices, iTunes, and iCloud 235 Part IV: More Software, More Choices 247 Chapter 12: Picturing iPhoto 249 Chapter 13: Producing Movies and Music on Your Mac 261 Chapter 14: Building Your Space on the Web 273 Chapter 15: Enjoying Other OS X Goodies 283 Chapter 16: Oops, It’s a PC: Running Windows on Your Mac 297 Part V: Specialty Switching Scenarios 307 Chapter 17: Switching with the Whole Family in Mind 309 Chapter 18: Switching Your Business to Macs 329 Chapter 19: Desktop to Dashcode: OS X Advanced 335 Part VI: The Part of Tens 347 Chapter 20: Ten Terrific Troubleshooting Tips 349 Chapter 21: Ten Ways Your Mac Can Help the Planet 361 Chapter 22: Ten Creative Uses for Your Old PC 369 Appendix: Mac Speak versus Windows Speak: A Translation Glossary 373 Index 401 Bonus Chapter 1: Converting from OS 9 and Other Operating Systems BC 1

    15 in stock

    £16.99

  • VMware vSphere Design

    John Wiley & Sons Inc VMware vSphere Design

    15 in stock

    Book SynopsisAchieve the performance, scalability, and ROI your business needs What can you do at the start of a virtualization deployment to make things run more smoothly? If you plan, deploy, maintain, and optimize vSphere solutions in your company, this unique book provides keen insight and solutions. From hardware selection, network layout, and security considerations to storage and hypervisors, this book explains the design decisions you''ll face and how to make the right choices. Written by two virtualization experts and packed with real-world strategies and examples, VMware vSphere Design, Second Edition will help you design smart design decisions. Shows IT administrators how plan, deploy, maintain, and optimize vSphere virtualization solutions Explains the design decisions typically encountered at every step in the process and how to make the right choices Covers server hardware selection, network topology, security, storage, vTable of ContentsIntroduction xxi Chapter 1 • An Introduction to Designing VMware Environments 1 What is Design? 1 The Facets of vSphere Design 5 The Technical Facet 6 The Organizational Facet 7 The Operational Facet 8 The Principles of Design 9 Availability 9 Manageability 10 Performance 10 Recoverability 10 Security 11 The Process of Design 11 Gathering and Defining Functional Requirements 11 Assessing the Environment 13 Performing a Gap Analysis 14 Assembling the Design 15 Documenting the Design 16 Performing the Implementation 17 Summary 17 Chapter 2 • The ESXi Hypervisor 19 Evolution of the vSphere Hypervisor 19 The ESXi Concept 21 ESXi Design 22 ESXi Components 22 ESXi Agents 23 ESXi System Image 24 ESXi Customized Images 25 ESXi Disk Layout 27 Tardisks and Ramdisks 29 ESXi Deployment 29 Hardware Requirements 29 ESXi Flavors: Installable, Embedded, and Stateless 29 Auto Deploy Infrastructure 36 Comparing Deployments Options 38 Upgrading ESXi 41 Migrating from ESX 42 Testing 42 Deployment 43 Management 44 Postinstallation Design Options 45 Management Tools Overview 51 Host-Management Tools 51 Centralized Management Tools 54 Hardware Monitoring 56 Logging 57 Summary 58 Chapter 3 • The Management Layer 59 Reviewing the Components of the Management Layer 59 VMware vCenter Server 59 vSphere Client and vSphere Web Client 62 vSphere Update Manager 63 Management Applications 64 Examining Key Management Layer Design Decisions 69 Virtual or Physical vCenter Server? 70 vCenter Server on Windows or vCenter Server Appliance? 72 Local or Remote Database Server? 73 Which Operating System for vCenter Server? 75 Creating the Management Layer Design 76 Availability 76 Manageability 82 Performance 86 Recoverability 92 Security 92 Summary 94 Chapter 4 • Server Hardware 95 Hardware Considerations 95 Factors in Selecting Hardware 96 Computing Needs 99 Server Constraints 101 Differentiating among Vendors 104 Server Components 106 CPU 107 RAM 110 NUMA 117 Motherboard 118 Storage 118 Network 119 PCI 119 Preparing the Server 121 Configuring the BIOS 122 Other Hardware Settings 122 Burn-in 123 Preproduction Checks 123 Scale-Up vs Scale-Out 123 Advantages of Scaling Up 125 Advantages of Scaling Out 126 Scaling is a Matter of Perspective 127 Risk Assessment 127 Choosing the Right Size 128 CPU to Memory Design Ratio 129 Sizing the Hosts 130 Blade Servers vs Rack Servers 131 Blade Servers 132 Rack Servers 135 Form-Factor Conclusions 136 Alternative Hardware Approaches 136 Cloud Computing 136 Converged Hardware 138 Summary 139 Chapter 5 • Designing Your Network 141 Examining Key Network Components 141 Physical Connectivity 142 Network Traffic Types 142 Software Components 144 Exploring Factors Influencing the Network Design 144 Physical Switch Support 145 vSwitches and Distributed vSwitches 152 IP-Based Storage 154 10Gb Ethernet 156 I/O Virtualization 158 SR-IOV and DirectPath I/O 159 Server Architecture 160 Crafting the Network Design161 Availability 161 Manageability 168 Performance 171 Recoverability 173 Security 174 Design Scenarios 177 Two NICs 177 Four NICs 178 Six NICs 178 Eight NICs 179 Looking to the Future 180 Summary 180 Chapter 6 • Storage 181 Dimensions of Storage Design 181 Storage Design Factors 182 Storage Efficiency 183 vSphere Storage Features 186 Designing for Capacity 186 RAID Options 187 Estimating Capacity Requirements 189 VMFS Capacity Limits 190 Large or Small Datastores? 191 Thin Provisioning 193 Data Deduplication 195 Array Compression 196 Downside of Saving Space 197 Designing for Performance197 Measuring Storage Performance 197 How to Calculate a Disk’s IOPS 197 What Can Affect a Storage Array’s IOPS? 198 Measuring Your Existing IOPS Usage 206 Local Storage vs Shared Storage 207 Local Storage 207 What about Local Shared Storage? 209 Shared Storage 212 Choosing a Protocol 212 Fibre Channel 215 iSCSI 218 NFS 221 Protocol Choice 224 Multipathing 225 SAN Multipathing 225 NAS Multipathing 229 vSphere Storage Features 229 vSphere Storage APIs 230 Performance and Capacity 233 Storage Management 242 Summary 247 Chapter 7 • Virtual Machines 249 Components of a Virtual Machine 249 Base Virtual Machine Hardware 251 Hardware Versions 251 Virtual Machine Maximums 253 Hardware Choices 253 Removing or Disabling Unused Hardware 259 Virtual Machine Options 259 SDRS Rules 263 vApp Options 263 vServices 263 Naming Virtual Machines 263 VMware Tools 264 Notes, Custom Attributes, and Tagging 264 Sizing Virtual Machines 265 Virtual Machine CPU Design 265 Cores per Socket 267 CPU Hot Plug 267 Resources 268 Additional CPU Settings 269 Virtual Machine Memory Design 270 Resources 271 Additional Memory Settings 272 Virtual Machine Storage Design 272 Disks 273 Disk Types 274 Disk Shares and IOPS Limits 275 Disk Modes 275 SCSI Controllers 276 RDMs 277 Storage vMotion 279 Cross-Host vMotion 279 VM Storage Profile 280 Virtual Machine Network Design 280 vNIC Drivers 281 MAC Addresses 284 VLAN Tagging 284 Guest Software 285 Selecting an OS 285 Guest OS and Application Licensing 286 Disk Alignment 287 Defragmentation 288 Optimizing the Guest for the Hypervisor 289 Clones, Templates, and vApps 291 Clones 291 Templates 292 Preparing a Template 293 Virtual Appliances 294 OVF Standard 295 vApps 295 Virtual Machine Availability 295 vSphere VM Availability 296 Third-Party VM Clustering 298 vCenter Infrastructure Navigator 302 Summary 303 Chapter 8 • Datacenter Design 305 vSphere Inventory Structure 305 Inventory Root 306 Folders 307 Datacenters 307 Clusters 309 Resource Pools 309 Hosts 309 Virtual Machines 309 Templates 309 Storage 309 Networks 310 Why and How to Structure 310 Clusters 311 EVC 313 Swapfile Policy 313 Cluster Sizing 314 Resource Pools 315 Resource Pool Settings 317 Admission Control 319 Distributed Resource Scheduling 319 Load Balancing 319 Affinity Rules 324 Distributed Power Management 327 High Availability and Clustering 331 High Availability 331 Fault Tolerance 347 Summary 355 Chapter 9 • Designing with Security in Mind 357 Why is Security Important? 357 Separation of Duties 358 Risk Scenario 358 Risk Mitigation 359 vCenter Server Permissions 360 Risk Scenario 360 Risk Mitigation 360 Security in vCenter Linked Mode 363 Risk Scenario 363 Risk Mitigation 363 Command-Line Access to ESXi Hosts 365 Risk Scenario 365 Risk Mitigation 366 Managing Network Access 368 Risk Scenario 368 Risk Mitigation 369 The DMZ 371 Risk Scenario 371 Risk Mitigation 372 Firewalls in the Virtual Infrastructure 375 The Problem 375 The Solution 376 Change Management 378 Risk Scenario 378 Risk Mitigation 378 Protecting the VMs 379 Risk Scenario 379 Risk Mitigation 380 Protecting the Data 381 Risk Scenario 382 Risk Mitigation 382 Cloud Computing 383 Risk Scenario 383 Risk Mitigation 384 Auditing and Compliance 385 The Problem 385 The Solution 385 Summary 387 Chapter 10 • Monitoring and Capacity Planning 389 Nothing is Static 389 Building Monitoring into the Design 390 Determining the Tools to Use 390 Selecting the Items to Monitor 396 Selecting Thresholds 398 Taking Action on Thresholds 399 Alerting the Operators 400 Incorporating Capacity Planning in the Design 400 Planning before Virtualization 401 Planning during Virtualization 405 Summary 408 Chapter 11 • Bringing a vSphere Design Together 411 Sample Design 411 Business Overview for XYZ Widgets 411 Hypervisor Design 413 vSphere Management Layer 413 Server Hardware 413 Networking Configuration 414 Shared Storage Configuration 414 VM Design 415 VMware Datacenter Design 415 Security Architecture 415 Monitoring and Capacity Planning 416 Examining the Design 416 Hypervisor Design 416 vSphere Management Layer 417 Server Hardware 418 Networking Configuration 419 Shared Storage Configuration 421 VM Design 423 VMware Datacenter Design 423 Security Architecture 424 Monitoring and Capacity Planning 424 Summary 425 Chapter 12 • vCloud Design 427 Differences between Cloud and Server Virtualization 428 Role of vCloud Director in Cloud Architecture 429 vCloud Director Use Cases 430 Use Case #1 432 Use Case #2 432 Use Case #3 432 Use Case #4 433 Components of the vCloud Management Stack 433 vCloud Cell and NFS Design Considerations 435 Management vs Consumable Resources 437 Database Concepts 438 vCenter Design 439 vCloud Management: Physical Design 442 The Physical Side of Provider Virtual Datacenters 444 The Logical Side of Provider Virtual Datacenters 449 Network Pool Decisions 455 External Networks 456 Designing Organizations, Catalogs, and Policies 461 Correlating Organizational Networks to Design 464 End Users and vApp Networking 466 Designing Organization Virtual Datacenters 470 Multiple Sites 476 Backup and Disaster Recovery 477 Summary 478 Index 479

    15 in stock

    £28.49

  • Windows Server 2012 HyperV Installation and

    John Wiley & Sons Inc Windows Server 2012 HyperV Installation and

    10 in stock

    Book SynopsisGo-to guide for using Microsoft''s updated Hyper-V as a virtualization solution Windows Server 2012 Hyper-Voffers greater scalability, new components, and more options than ever before for large enterprise systems and small/medium businesses. Windows Server 2012 Hyper-V Installation and Configuration Guide is the place to start learning about this new cloud operating system. You''ll get up to speed on the architecture, basic deployment and upgrading, creating virtual workloads, designing and implementing advanced network architectures, creating multitenant clouds, backup, disaster recovery, and more. The international team of expert authors offers deep technical detail, as well as hands-on exercises and plenty of real-world scenarios, so you thoroughly understand all features and how best to use them. Explains how to deploy, use, manage, and maintain the Windows Server 2012 Hyper-V virtualization solutions in large enterprises and small- to mTable of ContentsIntroduction xxv Part 1 • The Basics 1 Chapter 1 • Introducing Windows Server 2012 Hyper-V 3 Virtualization and Cloud Computing 4 Computing of the Past: Client/Server 4 Computing of the Recent Past: Virtualization 5 Computing of the Present: Cloud Computing 8 Windows Server 2012: Beyond Virtualization 9 Windows Server 2012 Hyper-V 11 The Technical Requirements of Hyper-V 11 The Architecture of Hyper-V 12 Maximum Scalability 15 Supported Guest Operating Systems 18 Licensing Windows Server 2012 in Virtualization 18 Common Misunderstandings in Licensing 19 Windows Server 2012 Licensing 20 Hyper-V Server 2012 23 Virtualization Scenarios 24 VMware 26 Migrating from VMware 27 Transferring Skills to Hyper-V 27 Other Essential Knowledge 28 Microsoft Assessment and Planning Toolkit 28 PowerShell 29 Chapter 2 • Deploying Hyper-V 33 Preparing a Hyper-V Deployment 33 Design and Architecture 33 Hardware 36 Operating System 39 Don’t Forget the Documentation 41 Windows PowerShell 42 Building the First Hyper-V Host 43 Preparing Windows Server 43 Installing the Hyper-V Role 47 Configuring the Hyper-V Host 48 Providing Security 54 Managing Hyper-V 56 Hyper-V Management Console 57 Hyper-V PowerShell 57 Server Core 59 Upgrading Hyper-V 61 Performing In-Place Migration 62 Using the Windows Server Migration Tools 62 Exporting and Importing Virtual Machines 62 Upgrading Integration Services 64 Real World Solutions 65 Chapter 3 • Managing Virtual Machines 71 Creating Virtual Machines 71 Create a Virtual Machine by Using the New Virtual Machine Wizard 72 Create a Virtual Machine by Using PowerShell 77 Designing Virtual Machines 78 Virtual Machine Maximums 78 Auto-Start and Auto-Stop Actions 81 Dynamic Memory 83 Processors 95 Virtual Storage 100 Network Adapters 111 Performing Virtual Machine Operations 117 Adding and Removing Virtual Hardware 117 Working with Snapshots 118 Using Live Migration 124 Importing and Exporting Virtual Machines 138 Installing Operating Systems and Applications 140 Installing Operating Systems 140 Using Virtual Machine Templates 142 Designing Virtual Machines for Applications 143 Performance Monitoring of Guest Operating Systems 143 Real World Solutions 144 Replacing Virtual Switches 144 Performing Simultaneous Live Migration 144 Rapid Virtual Machine Creation 146 Part 2 • Advanced Networking and Cloud Computing 153 Chapter 4 • Networking 155 Basic Hyper-V Networking 155 Using the Hyper-V Extensible Virtual Switch 156 Supporting VLANs 166 Supporting NIC Teaming 171 Networking Hardware Enhancements 183 Single-Root I/O Virtualization 183 Receive-Side Scaling 187 Dynamic Virtual Machine Queuing 190 IPsec Task Offload 191 Advanced Networking 191 Quality of Service 191 Converged Fabrics 201 Real World Solutions 210 Implementing RSS and DVMQ 210 Creating Converged Fabrics with Isolated SMB Storage 213 Creating Converged Fabrics with DCB and SR-IOV 216 Chapter 5 • Cloud Computing 219 Clouds, Tenants, and Segregation 220 The Multi-Tenancy Era 220 Segregation by Isolation 221 Microsoft Network Virtualization 223 Encapsulated Network Virtualization 224 Network Virtualization Abstraction 225 Network Virtualization at Work 232 Network Virtualization Gateways 251 PVLANs 252 Understanding PVLAN Structure 254 Understanding How PVLANs Work 255 Configuring Private VLANs 259 Summary 263 Port Access Control Lists 263 How ACLs Work 263 Extensible Switch Packet Filter 264 DHCP Guard 266 Router Advertisement Guard 267 Hyper-V Virtual Machine Metrics 268 Real World Solutions 270 Part 3 • Storage and High Availibility 273 Chapter 6 • Microsoft iSCSI Software Target 275 Introducing the Microsoft iSCSI Software Target 275 The Microsoft iSCSI Solution 276 Changes in Windows Server 2012 278 Design and Architecture 280 Building the iSCSI Target 283 Installing a Stand-Alone iSCSI Target 283 Installing a Clustered iSCSI Target 284 Transforming a Stand-Alone to a Clustered iSCSI Target 285 Configuring the iSCSI Target 286 Connecting the Initiator 288 Managing the iSCSI Target Server 289 Storage Providers 289 iSCSI Target SMI-S Provider 289 Best Practice Analyzer 292 PowerShell 293 Migrating 295 Migration to Windows Server 2012 295 VHD Conversion 295 Chapter 7 • Using File Servers 297 Introducing Scale-Out File Servers 298 Limitations in Availability and Performance with Windows Server 2008 R2 299 Technical Overview of the Key Changes 300 Installing and Configuring Scale-Out File Servers 309 Complying with Installation Prerequisites 310 Configuring Failover Clustering 311 Configuring Scale-Out File Services 315 Configuring a Continuously Available File Share 316 Windows Server 2012 SMB PowerShell 318 Windows Server 2012 Hyper-V over SMB 30 319 Some Real-World Examples 320 Configuring Windows Server 2012 Hyper-V to Use Scale-Out File Server Cluster 322 Configuring SQL Server to Use Scale-Out File Server Cluster 325 Troubleshooting Scale-Out File Servers 329 Using Troubleshooting Tools 329 Troubleshooting Client Network Connectivity Issues 332 Troubleshooting Access Denied Issues 333 Troubleshooting Cluster Resource Issues 333 Real World Solutions 333 Chapter 8 • Building Hyper-V Clusters 335 Introduction to Building Hyper-V Clusters 335 Active Directory Integration 337 Failover Clustering Installation 337 Performing Validation 338 Running Cluster Validation 338 Creating a Failover Cluster 342 Adding Disks 344 Configuring Network Prioritization 345 Cluster Shared Volumes 346 Cluster Shared Volumes Compatibility 346 Prerequisites 347 Enabling Cluster Shared Volumes 348 CSV Namespace 348 CSV Resiliency 348 CSV Optimizations 349 CSV Best Practices 350 BitLocker 351 Prerequisites 351 Installing BitLocker 351 Configuring BitLocker on Cluster Shared Volumes 352 Cluster-Aware Updating 357 Prerequisites 359 Installing and Configuring CAU 360 Highly Available Virtual Machine 370 Implementing a Highly Available Virtual Machine 370 Examining the Virtual Machine Role 371 Virtual Machine Mobility 375 Live-Migrating Virtual Machines 376 Using Live Storage Migration 376 Real World Solutions 378 Chapter 9 • Virtual SAN Storage and Guest Clustering 379 Introduction to Virtual SAN Storage 379 Overview of Virtual Fibre Channel 380 Guest Clustering 388 Guest Clustering on a Single Host 388 Guest Clustering across Physical Hosts 389 Guest Clustering across Physical Hosts and Virtual Machines 390 Creating a Guest-Based Cluster 391 Virtual Machine Preparation 391 Virtual Machine Monitoring 393 Configuring Virtual Machine Monitoring 395 Real World Solutions 399 Part 4 • Advanced Hyper-V 401 Chapter 10 • Backup and Recovery 403 How Backup Works with Hyper-V 403 Volume Shadow Copy Service Framework 403 Virtual Machine Backup Strategies 406 Choosing a Backup Strategy 409 Improvements in Windows Server 2012 Hyper-V Backup 410 Incremental Backup 410 Windows Server Backup 411 Distributed CSV Snapshots 412 VSS for SMB File Shares 414 Using Windows Server Backup 418 Installing Windows Server Backup 419 Protecting Nonclustered Hyper-V Hosts 419 Protecting Hyper-V Clusters 425 The Impact of Backup on the Network 426 Real World Solutions 427 Using WSB to Back up a Hyper-V Host and Retain Backup Data 427 Performing Automated WSB Backup of a Hyper-V Cluster 429 Chapter 11 • Disaster Recovery 431 Introducing Disaster Recovery 431 The Evolution of Disaster Recovery 432 Virtualization Simplifies DR 433 DR Architecture for Windows Server 2012 Hyper-V 434 DR Requirements 435 Synchronous and Asynchronous Replication 436 DR Architectures 438 DR Replication Solutions 440 Virtual Machine Connectivity 446 Implementation of a Hyper-V Multi-site Cluster 456 Replication Link Networking 456 Multi-site Cluster Quorum 457 Tuning Cluster Heartbeat 462 Preferred Owners (Hosts) 463 Summarizing Multi-site Clusters 465 Real World Solutions 465 Designing Hybrid DR 465 Designing Hosted Disaster Recovery 466 Chapter 12 • Hyper-V Replica 469 Introducing Hyper-V Replica 469 How Hyper-V Replica Works 470 Target Markets for Hyper-V Replica 471 Hyper-V Replica Requirements 472 Bandwidth Requirements 472 What Can You Replicate Between? 473 Enabling Hyper-V Replica between Nonclustered Hosts 475 Enabling Virtual Machine Replication 478 Understanding Copy Methods 479 Replicating a Virtual Machine with Network Copy 480 Replicating a Virtual Machine with Removable Media 486 Replicating a Virtual Machine with Offsite Recovery 488 Using Authentication with Certificates 489 Understanding Certificate Requirements 489 Enabling Hyper-V Replica with HTTPS 490 Replicating Virtual Machines via HTTPS 491 Using Advanced Authorization and Storage 491 Using Hyper-V Replica with Clusters 493 Understanding the Hyper-V Replica Broker 493 Creating the Hyper-V Replica Broker 495 Allowing Replication from a Cluster 497 Allowing Replication to a Cluster 498 Exploring Hyper-V Replica in Greater Detail 498 Hyper-V Replica Logging and Swapping 499 Resynchronization 499 The Performance Impact of Hyper-V Replica 500 Managing Hyper-V Replica 501 Monitoring Replication 501 Managing Replication 504 Setting Up Failover Networking 505 Failover TCP/IP 505 Test Failover Virtual Switch 506 Failing Over Virtual Machines 508 Performing a Test Failover 508 Returning to the Production Site 510 Performing a Planned Failover 510 Performing an Unplanned Failover 512 Summarizing Hyper-V Replica 513 Real World Solutions 514 Enabling Replication for Lots of Virtual Machines 514 Running a Planned Failover 515 Scripting an Ordered Unplanned Failover 517 Chapter 13 • Using Hyper-V for Virtual Desktop Infrastructure 521 Using Virtual Desktops, the Modern Work Style 521 What Is VDI? 521 The Benefits of Using Hyper-V for VDI 522 Changes in Windows Server 2012 523 Design and Architecture 524 Building a Microsoft VDI Environment 529 Installing Remote Desktop Services 529 Installing RD Virtualization Hosts 534 Deploying Virtual Guests 536 Connecting to the VDI Environment 539 Real World Solutions 541 Index 543

    10 in stock

    £42.75

  • Cabling

    John Wiley & Sons Inc Cabling

    1 in stock

    Book SynopsisDevelop the skills you need to design and build a reliable, cost-effective cabling infrastructure Fully updated for the growing demand of fiber optics for large-scale communications networks and telecommunication standards, this new edition is organized into two parts.Table of ContentsIntroduction xxxiii Part I LAN Networks and Cabling Systems 1 Chapter 1 Introduction to Data Cabling 3 Chapter 2 Cabling Specifications and Standards 57 Chapter 3 Choosing the Correct Cabling 103 Chapter 4 Cable System and Infrastructure Constraints 133 Chapter 5 Cabling System Components 157 Chapter 6 Tools of the Trade 183 Chapter 7 Copper Cable Media 215 Chapter 8 Fiber-Optic Media 255 Chapter 9 Wall Plates 281 Chapter 10 Connectors 299 Chapter 11 Network Equipment 325 Chapter 12 Wireless Networks 343 Chapter 13 Cabling System Design and Installation 367 Chapter 14 Cable Connector Installation 401 Chapter 15 Cable System Testing and Troubleshooting 433 Chapter 16 Creating a Request for Proposal 467 Chapter 17 Cabling @ Work: Experience from the Field 493 Part II Fiber-Optic Cabling and Components 507 Chapter 18 History of Fiber Optics and Broadband Access 509 Chapter 19 Principles of Fiber-Optic Transmission 519 Chapter 20 Basic Principles of Light 539 Chapter 21 Optical Fiber Construction and Theory 555 Chapter 23 Safety 605 Chapter 24 Fiber-Optic Cables 621 Chapter 25 Splicing 653 Chapter 26 Connectors 693 Chapter 27 Fiber-Optic Light Sources and Transmitters 763 Chapter 28 Fiber-Optic Detectors and Receivers 793 Chapter 29 Passive Components and Multiplexers 819 Chapter 30 Passive Optical Networks 849 Chapter 31 Cable Installation and Hardware 869 Chapter 32 Fiber-Optic System Design Considerations 903 Chapter 33 Test Equipment and Link/Cable Testing 941 Chapter 34 Troubleshooting and Restoration 995 Appendices 1037 Appendix A The Bottom Line 1039 Appendix B Cabling Resources 1097 Appendix C Registered Communications Distribution Designer (RCDD) Certification 1103 Appendix D Home Cabling: Wiring Your Home for Now and the Future 1109 Appendix E Overview of IEEE 1394 and USB Networking 1115 Appendix F The Electronics Technicians Association, International (ETA) Certifications 1121 Glossary Index 1241

    1 in stock

    £66.60

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account