Computer hardware Books
Simon & Schuster Chip War
Book Synopsis
£20.95
McGraw-Hill Education Programming the Raspberry Pi Third Edition
Book SynopsisAn up-to-date guide to creating your own fun and useful Raspberry Piâ programs This fully updated guide shows how to create inventive programs and fun games on your powerful Raspberry Piâwith no programming experience required. Programming the Raspberry Piâ: Getting Started with Python, Third Edition addresses physical changes and new setup procedures as well as OS updates to the current version 4. You will discover how to configure hardware and software, write Python scripts, create user-friendly GUIs, and control external electronics. Step-by-step projects include a digital clock prototype and a fully functioning Raspberry Pi robot. Configure your Raspberry Pi and explore its features Start writing and debugging Python programs Use strings, lists, functions, and dictionaries Work with modules, classes, and methods Apply object-oriented development methods Create user-friendly games using Pygame<Table of ContentsPrefaceIntroduction1 Introduction What Is the Raspberry Pi? What Can You Do with a Raspberry Pi? A Tour of the Raspberry Pi Setting Up Your Raspberry Pi Booting Up Summary2 Getting Started Linux The Desktop The Command Line Applications Internet Resources Summary3 Python Basics Mu Numbers Variables For Loops Simulating Dice If While The Python Shell from the Terminal Summary4 Strings, Lists, and Dictionaries String Theory Lists Functions Hangman Dictionaries Tuples Exceptions Summary of Functions Summary5 Modules, Classes, and Methods Modules Object Orientation Defining Classes Inheritance Summary6 Files and the Internet Files Pickling JSON Internet Summary7 Graphical User Interfaces guizero Hello World Temperature Converter Other GUI Widgets Pop-Ups Menus Summary8 Games Programming What Is Pygame? Coordinates Hello Pygame A Raspberry Game Summary9 Interfacing Hardware GPIO Pin Connections Breadboarding with Jumper Wires Digital Outputs Analog Outputs Digital Inputs Analog Inputs HATs Summary10 LED Fader Project What You Need Hardware Assembly Software Summary11 Prototyping Project (Clock) What You Need Hardware Assembly Software Phase Two Summary12 Raspberry Pi Robot Set Up the Raspberry Pi Zero W Web-Controlled Rover Autonomous Rover Summary13 What Next Linux Resources Python Resources Raspberry Pi Resources Programming Languages Other Languages Applications and Projects SummaryIndex
£11.99
John Wiley & Sons Inc UNIX For Dummies
Book SynopsisManage files, set up networks, and go online with UNIX!UNIX For Dummies has been the standard for beginning UNIX references for nearly ten years, and this latest edition continues that tradition of success. This unparalled resource is updated to cover the latest applications of UNIX technology, including Linux and Mac desktops as well as how UNIX works with Microsoft server softwareThorough coverage of how to handle: UNIX installation file management software utilities networks Internet access ther basic tasks A great guide for the first-time UNIX desktop user growing accustomed to the ins and outs of the OS, as well as the beginning administrators who needs to get a handle on UNIX networking basics.Written by John Levine and Margaret Levine Young, longtime UNIX experts and highly experienced For Dummies authors.Table of ContentsIntroduction 1 Part I: Before the Beginning 7 Chapter 1: Log Me In, UNIX! 9 Chapter 2: What Is UNIX, Anyway? 19 Chapter 3: A Few Lines on Linux 33 Part II: Some Basic Stuff 39 Chapter 4: Opening Windows on UNIX 41 Chapter 5: Files for Fun and Profit 77 Chapter 6: Directories for Fun and Profit 91 Chapter 7: The Shell Game 103 Chapter 8: Where’s That File? 119 Chapter 9: Printing (The Gutenberg Thing) 133 Part III: Getting Things Done 147 Chapter 10: Writing Deathless Prose 149 Chapter 11: Umpteen Useful UNIX Utilities 175 Chapter 12: Installing Software Can Be Tricky 185 Chapter 13: Juggling a Bunch of Programs 199 Chapter 14: Taming Linux 211 Part IV: UNIX and the Net 217 Chapter 15: Your Computer Is Not Alone 219 Chapter 16: Across a Crowded Network 229 Chapter 17: Automating Your Office Gossip 243 Chapter 18: Web Surfing for UNIX Users 263 Chapter 19: Grabbing Files from the Net 279 Chapter 20: Now Serving the Internet 293 Part V: Help! 303 Chapter 21: Disaster Relief 305 Chapter 22: The Case of the Missing Files 311 Chapter 23: Some Programs Just Won’t Die 325 Chapter 24: “My Computer Hates Me” 3 31 Part VI: The Part of Tens 343 Chapter 25: Ten Common Mistakes 345 Chapter 26: Ten Times More Information Than You Want about UNIX 351 Index 361
£17.59
No Starch Press,US The Hardware Hacking Handbook: Breaking Embedded
Book SynopsisThe Hardware Hacking Handbook is a deep dive into embedded security, perfect for readers interested in designing, analysing, and attacking devices. You'll start with a crash course in embedded security and hardware interfaces and learn how to set up a test lab. Real-world examples and hands-on labs throughout allow you to explore hardware interfaces and practice various attacks.Trade Review"I really wished such a book existed when I started with researching hardware hacking a few years ago. It introduces all the relevant background that’s needed for hardware hacking along with references to further reading (the references are really nice to have for more intermediate readers). It also provides many practical examples that helps you see why the concepts are important and how they are applied."—Yifan Lu, Security Researcher"One of the most complete introductions to hardware hacking I’ve seen . . . provide[s] you something you wouldn't learn elsewhere."—Arya Voronova, HackadayTable of ContentsIntroductionChapter 1: Dental Hygiene: Introduction to Embedded SecurityChapter 2: Reaching Out, Touching Me, Touching You: Hardware Peripheral InterfacesChapter 3: Casing the Joint: Identifying Components and Gathering InformationChapter 4: Bull in a China Shop: Introducing Fault InjectionChapter 5: Don’t Lick the Probe: How to Inject FaultsChapter 6: Bench Time: Fault Injection LabChapter 7: X Marks the Spot: EMFI Memory Dumping of TrezorChapter 8: I’ve Got the Power: Introduction to Power AnalysisChapter 9: Bench Time: Simple Power AnalysisChapter 10: Splitting the Difference: Differential Power AnalysisChapter 11: Advanced Power AnalysisChapter 12: A DPA/SCA Lab: Breaking an AES-256 BootloaderChapter 13: No Kiddin’: Real-Life ExamplesChapter 14: Think of the Children: Countermeasures, Certifications, and GoodbytesAppendix A: Maxing Out Your Credit Card: Setting Up a Test LabAppendix B: All Your Base Are Belong to Us: Popular Pinouts
£35.99
John Wiley & Sons Inc iOS App Development For Dummies
Book SynopsisIf you've got incredible iOS ideas, get this book and bring them to life! iOS 7 represents the most significant update to Apple's mobile operating system since the first iPhone was released, and even the most seasoned app developers are looking for information on how to take advantage of the latest iOS 7 features in their app designs.Table of ContentsIntroduction 1 A Bit of History 1 The iPhone stands alone 2 Enter the App Store 2 The iPad joins the party 3 The Plan for This Book 3 iOS and Xcode Game Changers 4 About This Book 5 Conventions Used in This Book 5 Icons Used in This Book 6 Foolish Assumptions 7 How This Book Is Organized 7 Part I: Getting Started 8 Part II: Building RoadTrip 8 Part III: Getting Your Feet Wet: Basic Functionality 8 Part IV: The Model and the App Structure 9 Part V: Adding the App Content 9 Part VI: The Part of Tens 9 Beyond the Book 10 Where to Go from Here 10 Part I: Getting Started 11 Chapter 1: What Makes a Great iOS App 13 Figuring Out What Makes a Great iOS App 14 Making your app work well 14 Handling networking, social media, and location 15 Designing a powerful and intuitive interface that disappears 15 Using the iOS Platform to the Fullest 16 Exploiting advantages of the system 16 Accessing the Internet 17 Knowing the location of the user 18 Tracking orientation and motion 18 Tracking users’ fingers on the screen 19 Playing content 19 Accessing information from Apple’s apps 19 Copying, cutting, and pasting between apps 20 Multitasking, background processing, and notifications 20 Living large on the big screen 21 Embracing Device Limitations 21 Designing for fingers 22 Balancing memory and battery life 22 Why Develop iOS Apps? 23 Developing with Apple’s Expectations in Mind 24 Thinking About You, Apps, and Money 25 Enter the Cloud 26 Developing an App the Right Way Using the Example App in This Book 27 What’s Next 27 Chapter 2: Getting to Know the SDK 29 Developing Using the SDK 29 Using Xcode to Develop an App 30 Creating an Xcode project 31 Developing the app 31 The Workspace Window 33 Workspace areas 34 Displaying an area’s content 36 The toolbar and Tab bar 40 The Organizer window 42 Chapter 3: The Nuts and Bolts of an Xcode Project 45 Creating Your Project 45 Exploring Your Project 50 The project 50 The Project editor 50 The Project navigator 53 Setting Your Xcode Preferences 57 Building and Running Your Application 59 Building an app 61 The iPad’s Split views 63 The Log navigator 64 Running in the Simulator 66 Interacting with your simulated hardware 66 Making gestures 67 Uninstalling apps and resetting your device 68 Living with the Simulator’s limitations 69 Using Asset Catalogs 70 Adding the Image and Sound Resources and an App Icon 74 Part II: Building RoadTrip 77 Chapter 4: Storyboards and the User Experience 79 Introducing the Storyboard 80 Telling your story 81 Working with object graphs 83 Defining What You Want an App to Do: The RoadTrip App 84 Creating the Application Architecture 88 What You Add Where 89 Using Frameworks 90 Using Design Patterns 91 The iOS design patterns 92 The Model-View-Controller (MVC) design pattern 92 Working with Windows and Views 95 Looking out the window 95 Admiring the view 96 The kinds of views you use 97 View Controllers — the Main Storyboard Players 101 What About the Model? 104 It’s Not That Neat 105 Taking a Look at Other Frameworks 106 The Foundation framework 106 The CoreGraphics framework 106 Even more frameworks 107 Understanding the MVC in the Project 107 Chapter 5: Creating the RoadTrip User Interface 111 Creating Your User Interface in the iPad Storyboard 111 It’s about the view controller 112 Using Interface Builder to add the user elements 113 Working within the Utility Area 115 Inspector and Quick Help pane 115 Library pane 116 Understanding iPad Navigation 117 Adding a New View Controller 121 Danger Will Robinson 128 Adding an identifier to the view controller 129 View Layout 130 Adding the User Interface Objects 131 Autosizing with Auto Layout 136 Adding the Test Drive button 141 Massaging the Template Code 144 Getting Rid of Warnings 148 Creating the iPhone User Interface 148 Chapter 6: The Runtime, Managing Memory, and Using Properties 151 Stepping Through the App Life Cycle 152 UIApplicationMain 153 Handling events while your application is executing 158 Knowing what to do when the normal processing of your application is interrupted 160 An overview of the view controller life cycle 163 Working within the Managed Memory Model Design Pattern 164 Understanding memory management 165 Using reference counting 165 Automatic Reference Counting (ARC) 167 Working with variable types according to ARC 169 Understanding the deadly retain cycle 170 Observing Low-Memory Warnings 172 The didReceiveMemoryWarning method 172 The applicationDidReceiveMemoryWarning: method 172 The UIApplicationDidReceiveMemoryWarningNotification: notification 173 Picking the right memory-management strategy for your application 173 Customizing the Behavior of Framework Classes 174 Subclassing 174 The Delegation pattern 175 Understanding Declared Properties 176 What comprises a declared property 176 Using dot syntax 177 Setting attributes for a declared property 178 Writing your own accessors 180 Accessing instance variables with accessors 181 Hiding Instance Variables 181 Chapter 7: Working with the Source Editor 183 Navigating in the Xcode Source Editors 183 Using the Jump bar 186 Organizing your code using the #pragma mark statement 190 Using the Xcode Source Editor 190 Using Live Issues and Fix-it 192 Compiler warnings 193 The Issue navigator 193 Accessing Documentation 195 Getting Xcode help 195 The Organizer window 198 The Help menu 199 Finding and Searching in Your Project 199 Using the Find command to locate an item in a file 199 Using the Search navigator to search your project or framework 200 Using the Symbol navigator 201 You’re Finally Ready to Write Code! 202 Part III: Getting Your Feet Wet: Basic Functionality 203 Chapter 8: It’s (Finally) T ime to Code 205 Checking for Network Availability 205 Downloading the Reachability sample 205 Adding the code to check for reachability 208 Exploring the Changes in iOS 7 211 The dated interface 211 Losing the content 212 Setting the Master View Controller Title 213 Understanding Autorotation 214 Writing Bug-Free Code 215 Working in the Debug area and Debug navigator 216 Managing breakpoints 218 What you’ll find in the Debug area 222 What you’ll find in the Debug navigator 223 Displaying variables in the Source editor 224 Tiptoeing through your program 225 Chapter 9: Adding Outlets and Actions to Your RoadTrip Code 227 Using Custom View Controllers 228 Adding the custom view controller 228 Setting up the TestDriveController in the MainStoryboard for iPad 229 Understanding Outlets 231 Adding Outlets 232 Opening the Assistant editor 232 Creating the outlet 234 The Connections inspector 237 Working with the Target-Action Design Pattern 239 Using the Target-Action pattern: It’s about controls 239 Adding an action 241 How Outlets and Actions Work 244 Update the iPhone storyboard file 244 Chapter 10: Adding Animation and Sound to Your App 247 Understanding iOS Animation 248 View geometry and coordinate systems 248 Points versus pixels 248 A view’s size and position 249 Working with data structures 250 Coordinating Auto Layout, Frames, and Constraints 250 Animating a View 251 Finally, More Code 252 Implementing the testDrive Method 252 Understanding Block Objects 256 Rotating the Object 259 Working with Audio 261 Tracking Touches 269 Animating a Series of Images “In Place” 272 iPhone versus iPad 273 Part IV: The Model and the App Structure 275 Chapter 11: The Trip Model 277 What the Model Contains 277 Adding the Model Data 278 Using property lists 278 Adding a property list to your project 280 Adding the First Two Model Classes 290 Understanding the Trip Interface 292 Implementing the Trip Class 294 Initializing objects 296 Invoking the superclass’s init method 297 Initializing instance variables 298 Returning self 299 Initializing the Destination Class 300 Creating the Trip Object 303 More Debugger Stuff 305 Chapter 12: Implementing the Master View Controller 309 Setting Up a Custom View Controller for the iPad 309 Adding a Background Image and Title 319 Updating the iPhone Storyboard File 321 Chapter 13: Working with Split View Controllers and the Master View 323 The Problem with Using a Navigation Controller in Detail View 323 Using a Navigation Controller in the Master View 326 Adding a Gesture Recognizer 330 The Split View Controller 333 The UISplitViewController delegate 335 Localization 340 Back to the main feature 340 Adding the Toolbar 346 Adding the button when the view controller is replaced 350 A Few More Tweaks to the MasterViewController 354 And (a Little Extra) One More Thing 355 Don’t Forget the iPhone 356 Chapter 14: Finishing the Basic App Structure 357 Extending the iPad Storyboard to Add More Functionality to Your App 358 Adding the Weather view controller 358 Adding the Events controller 364 Adding the remaining controllers 367 Changing the Split View Controller to a Detail View Controller Relationship 368 Repeat for iPhone 372 Part V: Adding the App Content 373 Chapter 15: How’s the Weather? Working with Web Views 375 The Plan 375 The iPad storyboard 376 The iPhone storyboard 377 Setting Up the Weather Controller 379 Adding the custom view controller 379 Setting Up WeatherController in the Main_iPad.storyboard file 380 The Weather Controller 385 Managing links in a Web view 388 More Opportunities to Use the Debugger 392 Unrecognized selector sent to instance 392 Repeat for the iPhone Storyboard 393 Adding the WeatherController to the iPhone storyboard file 393 Test in the iPhone Simulator 394 Chapter 16: Displaying Events Using a Page View Controller 395 The Plan 396 Setting Up the EventsController 397 Adding the custom view controller 397 Setting up the EventsController in the MainStoryboard 398 Adding and setting up the EventPageController in the MainStoryboard 399 Extending the Trip Model 401 Adding the Events Class 403 The EventsController and Its PageViewController 406 Data sources and delegates 406 Data source 407 Delegate 407 The EventsController 407 The EventPageController 412 Adding Events Support to the iPhone Storyboard 415 Chapter 17: Finding Your Way 417 The Plan 418 Setting Up the Map Controller 419 Adding the custom view controller 420 Setting up the MapController in the Main_iPad.Storyboard 420 Test 426 Putting MapKit through Its Paces 428 MKMapView 428 Enhancing the map 429 Changing the Map Type 435 Adding Annotations 437 Creating the annotation 437 Displaying the map title and annotations 441 Going to the Current Location 446 Fixing the Status Bar 451 Update the iPhone Storyboard 454 Chapter 18: Geocoding 455 Understanding Geocoding on the iPad 455 Reverse Geocoding 458 Chapter 19: Finding a Location 465 Setting Up the Find Controller 465 Adding the custom view controller 466 Setting up FindControllerin the Main_iPad File 466 Implementing the Find Controller 469 Adding the Map View 469 Getting the text 470 Disabling cell highlighting 477 Finding the Location 477 Making the Map Title the Found Location 484 Adding the FindController to the iPhone Storyboard 485 Chapter 20: Selecting a Destination 487 The Plan 487 Setting Up the DestinationController for the iPad Storyboard 488 Adding the custom view controller 488 Setting up the DestinationController in the Main_iPad.storyboard 489 Adding a Modal View 494 Implementing a Table View 497 Creating the Table View 498 Adding sections 499 Displaying the cell 501 Working with user selections 503 Saving the Destination Choice and Selecting a Destination 511 Displaying the Destination table 516 Testing 517 Adding Destination Support to the iPhone Storyboard 518 A Word about Adding Settings 519 What’s Next? 519 Part VI: The Part of Tens 521 Chapter 21: Ten Ways to Be Successful with Apps 523 Make a Million Dollars in a Week 523 Build a Portfolio 524 Build App Icons 524 Design User Interfaces 524 Build Back Ends 525 Socialize with Apps 525 Talk About Apps with People Who Want Them 525 Promote Apps 525 Provide Support to Users 526 Fix Bugs 526 Chapter 22: Ten Ways to Be a Happy Developer 527 Keep Things Loosely Coupled 527 Remember Memory 528 Don’t Reinvent the Wheel 528 Understand State Transitions 529 Do the Right Thing at the Right Time 530 Avoid Mistakes in Error Handling 530 Use Storyboards 531 Remember the User 531 Keep in Mind That the Software Isn’t Finished Until the Last User Is Dead 531 Keep It Fun 531 Index 533
£23.99
John Wiley & Sons Inc Windows Home Server For Dummies
Book SynopsisIf you work in an office, you probably don't lose much sleep worrying about whether your files are safe if your PC melts down. Company IT departments handle those things for business networks.Table of ContentsIntroduction 1 About This Book 1 Foolish Assumptions 2 How This Book Is Organized 2 Part I: Getting Windows Home Server to Serve 3 Part II: Setting Up the Network 3 Part III: Making the Most of Multimedia 3 Part IV: Sharing in the Wild 3 Part V: Backing Up 3 Part VI: Staying Alive and Well 4 Part VII: The Part of Tens 4 Icons Used in This Book 5 Where to Go from Here 5 Part I: Getting Windows Home Server to Serve 7 Chapter 1: Bringing Windows Home Server to Life 9 What Can You Do with Windows Home Server? 10 Backing up and restoring 10 Sharing folders 11 Managing disks 12 Accessing your network from far afield 14 Keeping the home fires burning 15 Streaming media 16 How Do You Control Windows Home Server? 16 Welcome to the Console 16 What happens behind the scenes 18 Knowing Windows Home Server’s Limitations 19 What Windows Home Server won’t do 20 Tapping into previous versions of a file 21 What Hardware Do You Need? 22 Choosing a Great Windows Home Server 24 Positioning the Server in Your Home or Office 26 Chapter 2: Installing the WHS Software 27 Do You Need to Install Windows Home Server? 28 Preparing to Install 29 Installing Windows Home Server 31 Part II: Setting Up the Network 37 Chapter 3: Bringing Computers into the Home Server Fold 39 Kick-Starting the Network 39 Installing Windows Home Server Connector on a Windows XP Machine 42 Installing Windows Home Server Connector on a Windows Vista Machine 46 Configuring Windows Home Server 49 Chapter 4: Adding Users and Controlling Passwords 55 Understanding User Control 56 Raising the Bar for Passwords 57 Adding New Users the Smart Way 60 Using the Guest Account 65 Synchronizing Passwords 68 Changing Passwords the Old-Fashioned Way 71 On the server 71 In Windows XP 72 In Windows Vista 73 Chapter 5: Using Built-In Shared Folders 75 Organizing Files with Shared Folders 76 Finding the Shared Folders 77 Opening shared files on the server 78 Pinpointing each user’s shared folder 79 Controlling Access to Shared Folders 80 Experiencing folder permissions firsthand 80 Changing shared folder permissions 82 Controlling Shared Folders from the Console 84 Creating new shared folders 86 Usin’ your noggin with sharin’ 89 Duplicating Shared Folders 90 Part III: Making the Most of Multimedia 95 Chapter 6: Sharing Music and Videos 97 Sharing from A to Z to PC to PC 98 Playing From (and With) the Server 102 Ripping to the Server 107 Sharing C.R.A.P Music on the Network 110 Chapter 7: Recording and Playing TV 113 Understanding Windows Home Server and Recorded TV 114 Storing Shows on Your Server 115 Creating a shared home for recorded TV 115 Moving recorded TV to the server 118 Recording TV directly to the server 124 Viewing TV Shows Stored on the Server 125 Why WHS Doesn’t Back Up Recorded TV 126 Chapter 8: Streaming with the Xbox 129 Using an Xbox in Server Land 130 Getting Your Xbox to Play with the Server 131 Using a Media Center PC to Stream to an Xbox 137 Connecting an Xbox to a Media Center computer 137 Playing media files with a connected Xbox 139 Chapter 9: Nailing Down Your Photos 141 Using the Windows Tools 142 Modifying XP for Shared Photos 144 Viewing photos in the shared Photos folder 144 Moving photos from your camera to the shared Photos folder 148 Modifying the screen saver to use the shared Photos folder 153 Modifying Vista for Shared Photos 155 Viewing photos in the shared Photos folder 155 Moving photos directly from your camera to the shared Photos folder 156 Creating a screen saver from the shared Photos folder 159 Part IV: Sharing in the Wild 163 Chapter 10: Starting Remote Access 165 Remote Access — the Good, the Bad, and the Really Frustrating 166 An Overview of Remote Access Setup 167 Setting up the Server 169 Configuring Your Router 171 Establishing a Permanent Domain Name 176 Spreading Out the Welcome Mat 179 Getting Connected for the First Time — or Maybe Not 182 My Encounter with the Seventh Ring 185 Chapter 11: Using Remote Access 189 Logging on to Your Windows Home Server Remotely 190 Accessing Shared Folders 192 Uploading files 194 Downloading files 196 Getting into the Windows Home Server Console 197 Pulling Puppet Strings on Your Home Network’s Computers 199 Reviewing the ground rules 200 Getting logged on 201 Part V: Backing Up 205 Chapter 12: Running Backups 207 Mired in Myriad Backups 208 Backing up files on network computers 208 Backing up shared folders with Folder Duplication 212 Shadow copies in Windows Home Server 214 Understanding what Vista is backing up 214 Checking Windows XP for backup routines 215 Unraveling the Mess 216 Setting Up Server Backups That Serve You 217 Backing up on your time 218 Choosing what gets backed up 220 Keeping backups 222 Checking That Backups Run Smoothly 224 Chapter 13: Restoring a Dead Computer from Backup 229 Dealing with Home Computer Restore Restrictions 230 Restoring a Hard Drive 231 Rolling Your Own Home Computer Restore CD 238 Chapter 14: Restoring Files from Backup 241 Restoring a Backed-Up File 242 Restoring a Shared Folder File with Windows XP, Media Center, or Tablet PC 246 Restoring a Shared Folder File with Vista Business, Enterprise, or Ultimate 250 Chapter 15: Backing Up the Server 255 Mapping Out Windows Home Server Storage 256 Using Folder Duplication 257 Making Offsite Backups of Shared Files 258 Copying files to an external drive 259 Choosing an online backup provider 263 Part VI: Staying Alive and Well 265 Chapter 16: Monitoring System Health 267 Understanding the Network Health Indicator 268 What Can Go Wrong? 271 How to Fix Health Problems 272 Chapter 17: Breaking into the Server 277 Deciding to Break In 278 Logging On to the Server with RDP 280 Attaching a Printer with RDP 283 Restoring a Previous Version of a Shared File with RDP 286 Giving Your Server a Permanent IP Address 290 Chapter 18: Adding and Retiring Drives 293 Knowing When and What to Feed the Maw 294 Adding a New Internal Hard Drive 297 Adding a New External Hard Drive 300 Retiring an Old Drive Safely 302 Chapter 19: Repairing and Recovering the Server 305 Dealing with Lost Passwords 306 Fixing a Broken Server Hard Drive 308 Primary versus secondary drives 309 Replacing a broken secondary drive 310 Repairing the primary drive 313 Part VII: The Part of Tens 319 Chapter 20: Top Ten Health Traps Triaged 321 No Spyware Protection 322 Backup Warning 323 Backup Warning, New Hard Drive 325 Backup Error 325 Backup Server Error 326 Storage Status, Not Enough Room 327 Storage Status, Failing Hard Drive 328 Passwords Do Not Match 329 Updates Are Ready 329 Antivirus Out of Date 330 Chapter 21: Ten More Tricks with Windows Home Server 331 Installing (and Uninstalling) Add-Ins 332 Launching Programs from Windows Home Server Console 334 Changing Your Remote Access Page with Whiist 335 Running uTorrent on the Server 336 Wake on LAN for Home Server 336 Uploading Photos to Flickr with PhotoSync 337 Streaming Away from Home with WebGuide 337 Streaming to Your TiVo 338 Streaming to Your Phone with LobsterTunes 338 Finding More Add-Ins 339 Index 341
£16.99
John Wiley & Sons Inc Raspberry Pi For Dummies
Book SynopsisA recipe for having fun and getting things done with the Raspberry Pi The Raspberry Pi makes it easy to learn about computers and computer programming, andRaspberry PiForDummiesmakes it even easier!Usingthis extremelyaffordableand compactcomputer, you can learn to code in languages like Scratch and Python, explore how electronics work,create computer-generated buildings in Minecraft and music in Sonic Pic,become Linux-savvy,make Internet-of-Thingsdevices,or just play around! This bookgetsyou up and running on your Raspberry Pi,starting withsetting it up, downloading the operating system, and using the desktop environment.Then, the only limit is your imagination!It doesn't matter whether you have a Raspberry Pi 4, Raspberry Pi 400, Raspberry Pi Zero W or an older model: we've got you covered. Raspberry PiForDummiesexplores the latesttechnologytheRaspberryPi 4and 400, Scratch 3 programming language, new games bundled with the Raspberry Pi, and the hottest Add-Ons out there. Thisintroductoryguide is the perfect place to start if you want to get a taste of everything the Raspberry Pi can do! Set up your Raspberry Pi, install the operating system, and connect to theInternetLearn the basics of the Linux desktop and Linux shell so you canprogram,work,and playUse Python, Scratch, and SonicPi to write your first programs and makegames anddigital musicDiscover how circuits work hand-in-hand with your Pi If youwant to make the most of the Raspberry Pi for school, work, or play, you'lllove this easy-to-read reference.Table of ContentsIntroduction 1 Part 1: Setting Up Your Raspberry Pi 5 Chapter 1: Introducing the Raspberry Pi 7 Chapter 2: Downloading the Operating System 25 Chapter 3: Connecting Your Raspberry Pi 33 Part 2: Getting Started with Linux 49 Chapter 4: Using the Desktop Environment 51 Chapter 5: Using the Linux Shell 79 Part 3: Using the Raspberry Pi for Both Work and Play 119 Chapter 6: Being Productive with the Raspberry Pi 121 Chapter 7: Editing Photos on the Raspberry Pi with GIMP 133 Chapter 8: Playing Audio and Video on the Raspberry Pi 143 Part 4: Programming the Raspberry Pi 155 Chapter 9: Introducing Programming with Scratch 157 Chapter 10: Programming an Arcade Game Using Scratch 177 Chapter 11: Writing Programs in Python 201 Chapter 12: Creating a Game with Python and Pygame Zero 233 Chapter 13: Programming Minecraft with Python 251 Chapter 14: Making Music with Sonic Pi 275 Part 5: Exploring Electronics with the Raspberry Pi 291 Chapter 15: Understanding Circuits 293 Chapter 16: Taking Control of Your Pi’s Circuitry 319 Chapter 17: Lots of Multicolored LEDs 357 Chapter 18: Old McDonald’s Farm and Other RFID Adventures. 391 Part 6: The Part of Tens 425 Chapter 19: Ten Great Software Packages for the Raspberry Pi 427 Chapter 20: Ten Inspiring Projects for the Raspberry Pi 439 Chapter 21: Ten Great Add-Ons for the Raspberry Pi 447 Appendix: Troubleshooting and Configuring the Raspberry Pi 455 Index 467
£17.59
Pearson Education Limited Operating Systems Internals and Design Principles
Book SynopsisTable of ContentsOnline Chapters and Appendices VideoNotes Preface About the Author I. Background 1. Computer System Overview 1.1. Basic Elements 1.2. Evolution of the Microprocessor 1.3. Instruction Execution 1.4. Interrupts 1.5. The Memory Hierarchy 1.6. Cache Memory 1.7. Direct Memory Access 1.8. Multiprocessor and Multicore Organization 1.9. Key Terms, Review Questions, and Problems 1A. Performance Characteristics of Two-Level Memories 2. Operating System Overview 2.1. Operating System Objectives and Functions 2.2. The Evolution of Operating Systems 2.3. Major Achievements 2.4. Developments Leading to Modern Operating Systems 2.5. Fault Tolerance 2.6. Os Design Considerations for Multiprocessor and Multicore 2.7. Microsoft Windows Overview 2.8. Traditional Unix Systems 2.9. Modern Unix Systems 2.10. Linux 2.11. Android 2.12. Key Terms, Review Questions, and Problems II. Processes 3. Process Description and Control 3.1. What is a Process? 3.2. Process States 3.3. Process Description 3.4. Process Control 3.5. Execution of the Operating System 3.6. Unix Svr4 Process Management 3.7. Summary 3.8. Key Terms, Review Questions, and Problems 4. Threads 4.1. Processes and Threads 4.2. Types of Threads 4.3. Multicore and Multithreading 4.4. Windows Process and Thread Management 4.5. Solaris Thread and Smp Management 4.6. Linux Process and Thread Management 4.7. Android Process and Thread Management 4.8. Mac OS X Grand Central Dispatch 4.9. Summary 4.10. Key Terms, Review Questions, and Problems 5. Concurrency: Mutual Exclusion and Synchronization 5.1. Mutual Exclusion: Software Approaches 5.2. Principles of Concurrency 5.3. Mutual Exclusion: Hardware Support 5.4. Semaphores 5.5. Monitors 5.6. Message Passing 5.7. Readers/Writers Problem 5.8. Summary 5.9. Key Terms, Review Questions, and Problems 6. Concurrency: Deadlock and Starvation 6.1. Principles of Deadlock 6.2. Deadlock Prevention 6.3. Deadlock Avoidance 6.4. Deadlock Detection 6.5. An Integrated Deadlock Strategy 6.6. Dining Philosophers Problem 6.7. Unix Concurrency Mechanisms 6.8. Linux Kernel Concurrency Mechanisms 6.9. Solaris Thread Synchronization Primitives 6.10. Windows Concurrency Mechanisms 6.11. Android Interprocess Communication 6.12. Summary 6.13. Key Terms, Review Questions, and Problems III. Memory 7. Memory Management 7.1. Memory Management Requirements 7.2. Memory Partitioning 7.3. Paging 7.4. Segmentation 7.5. Summary 7.6. Key Terms, Review Questions, and Problems 7A. Loading and Linking 8. Virtual Memory 8.1. Hardware and Control Structures 8.2. Operating System Software 8.3. Unix and Solaris Memory Management 8.4. Linux Memory Management 8.5. Windows Memory Management 8.6. Android Memory Management 8.7. Summary 8.8. Key Terms, Review Questions, and Problems IV. Scheduling 9. Uniprocessor Scheduling 9.1. Types of Processor Scheduling 9.2. Scheduling Algorithms 9.3. Traditional Unix Scheduling 9.4. Summary 9.5. Key Terms, Review Questions, and Problems <
£72.09
John Wiley & Sons Inc Windows Server 2022 PowerShell AllinOne For
Book SynopsisAll the essentials for administering Windows Server 2022 in one book Looking for a little help installing, configuring, securing, or running a network running Windows Server 2022? Windows Server 2022 & PowerShell All-in-One For Dummies delivers a thorough guide to network administration in a single, convenient book. Whether you need to start from scratch and install a new server or want to jump right into a more advanced topiclike managing security or working in Windows PowerShellyou'll find what you need right here. In this 8-books-in-1 compilation, you'll: Learn what you need to install and set up a brand-new Windows server installationConfigure your Windows Server and customize its settings based on your needs and preferencesDiscover how to install, configure, and work with Containers The perfect book for server and system admins looking for a quick reference on Windows Server operation, this book is also a great resource for networking newcomers learning their way around the server software they'll encounter daily.Table of ContentsIntroduction 1 About This Book 1 Foolish Assumptions 2 Icons Used in This Book 2 Beyond the Book 3 Where to Go from Here 3 Book 1: Installing and Setting Up Windows Server 2022 5 Chapter 1: An Overview of Windows Server 2022 7 Extra! Extra! Read All About It! Seeing What’s New in Windows Server 2022 8 Deciding Which Windows Server 2022 Edition Is Right for You 9 Walking the Walk: Windows Server 2022 User Experiences 10 Seeing What Server Manager Has to Offer 13 Windows Admin Center: Your New Best Friend 15 Extending and Improving Your Datacenter 18 Chapter 2: Using Boot Diagnostics 19 Accessing Boot Diagnostics 19 Using Advanced Boot Options 22 Performing a Memory Test 28 Using the Command Prompt 30 Working with Third-Party Boot Utilities 31 Chapter 3: Performing the Basic Installation 33 Making Sure You Have What It Takes 34 Performing a Clean Install 38 Upgrading Windows 41 Performing a Network Install with Windows Deployment Services 43 Chapter 4: Performing Initial Configuration Tasks 45 Understanding Default Settings 46 Getting an Overview of the Configuration Process 47 Providing Computer Information 48 Updating Windows Server 2022 58 Customizing Windows Server 2022 62 Configuring Startup Options with BCDEdit 69 Book 2: Configuring Windows Server 2022 73 Chapter 1: Configuring Server Roles and Features 75 Using Server Manager 75 Understanding Server Roles 80 Understanding Server Features 87 Chapter 2: Configuring Server Hardware 103 Working with Device Manager 104 Using the Add Hardware Wizard 113 Performing Hard-Drive-Related Tasks 114 Performing Printer-Related Tasks 133 Performing Other Configuration Tasks 140 Chapter 3: Using the Settings Menu 145 Accessing the Settings Menu 145 Understanding Settings Menu Items 146 Chapter 4: Working with Workgroups 155 Knowing What a Workgroup Is 156 Knowing If a Workgroup Is Right for You 156 Comparing Centralized and Group Sharing 157 Configuring a Server for a Workgroup 157 Managing Workgroups 166 Examining the Peer Name Resolution Protocol 169 Chapter 5: Promoting Your Server to Domain Controller 171 Understanding Domains 172 Preparing to Create a Domain 175 Performing Domain Configuration Prerequisites 178 Configuring the Server as a Domain Controller 186 Wrapping Things Up 200 Chapter 6: Managing DNS and DHCP with IP Address Management 203 Installing IP Address Management 204 Configuring IP Address Management 205 Using IP Address Management 209 Book 3: Administering Windows Server 2022 217 Chapter 1: An Overview of the Tools Menu in Server Manager 219 Accessing the Server Manager Tools Menu 219 Working with Common Administrative Tools 222 Installing and Using Remote Server Administration Tools 229 Chapter 2: Setting Group Policy 233 Understanding How Group Policy Works 234 Starting the Group Policy Editor 235 Performing Computer Management 237 Performing User Configuration 241 Viewing Resultant Set of Policy 244 Chapter 3: Configuring the Registry 247 Starting Registry Editor 248 Importing and Exporting Registry Elements 248 Finding Registry Elements 250 Understanding Registry Data Types 251 Understanding the Hives 252 Loading and Unloading Hives 256 Connecting to Network Registries 257 Setting Registry Security 259 Chapter 4: Working with Active Directory 263 Active Directory 101 263 Configuring Objects in Active Directory 264 Chapter 5: Performing Standard Maintenance 279 Activating Windows 279 Configuring the User Interface 282 Understanding How User Access Control Affects Maintenance Tasks 290 Adding and Removing Standard Applications 291 Measuring Reliability and Performance 292 Protecting the Data on Your Server 296 Performing Disk Management Tasks 300 Automating Diagnostic Tasks with Task Scheduler 302 Working with Remote Desktop 306 Working with Remote Server Administration Tools 308 Working with Admin Center 310 Creating a Windows Recovery Drive 312 Chapter 6: Working at the Command Line 313 Opening an Administrative Command Prompt 313 Configuring the Command Line 314 Setting Environmental Variables 320 Getting Help at the Command Line 321 Understanding Command Line Symbols 323 Chapter 7: Working with PowerShell 325 Opening an Administrative PowerShell Window 326 Configuring PowerShell 327 Customizing PowerShell a Little Further 332 Using a Profile Script 333 Setting Environmental Variables 334 Getting Help in PowerShell 336 Understanding PowerShell Punctuation 337 Book 4: Configuring Networking in Windows Server 2022 339 Chapter 1: Overview of Windows Server 2022 Networking 341 Getting Acquainted with the Network and Sharing Center 342 Using the Network Connections Tools 344 Configuring TCP/IP 348 Understanding DHCP 351 Defining DNS 352 Chapter 2: Performing Basic Network Tasks 359 Viewing Network Properties 359 Connecting to Another Network 361 Managing Network Connections 365 Chapter 3: Accomplishing Advanced Network Tasks 371 Working with Remote Desktop Services 371 Working with Network Policy and Access Services 382 Troubleshooting at the Command Line 386 Chapter 4: Diagnosing and Repairing Network Connection Problems 389 Using Windows Network Diagnostics 390 Repairing Individual Connections 392 Network Troubleshooting at the Command Line 393 Working with Windows Firewall 395 Making Sense of Common Configuration Errors 397 Working with Other Troubleshooting Tools 398 Book 5: Managing Security with Windows Server 2022 401 Chapter 1: Understanding Windows Server 2022 Security 403 Understanding Basic Windows Server Security 403 Working with Files and Folders 409 Creating a Local Security Policy 413 Paying Attention to Windows Security 414 Chapter 2: Configuring Shared Resources 419 Comparing Share Security with File System Security 420 Sharing Resources 424 Configuring Access with Federated Rights Management 426 Working with Active Directory Rights Management Services 431 Chapter 3: Configuring Operating System Security 439 Understanding and Using User Account Control 439 Managing User Passwords 445 Understanding Credential Guard 446 Configuring Startup and Recovery Options 450 Hardening Your Server 452 Chapter 4: Working with the Internet 457 Firewall Basics 457 Configuring Windows Defender Firewall with Advanced Security 461 Chapter 5: Understanding Digital Certificates 471 Certificates in Windows Server 2022 472 Types of Certificates in Active Directory Certificate Services 475 Chapter 6: Installing and Configuring AD CS 479 Introducing Certificate Authority Architecture 480 Installing a Certificate Authority 481 Configuring Certificate Auto-Enrollment 496 Chapter 7: Securing Your DNS Infrastructure 499 Understanding DNSSEC 499 Understanding DANE 505 Protecting DNS Traffic with DNS-over-HTTPS 509 Book 6: Working with Windows Powershell 513 Chapter 1: Introducing PowerShell 515 Understanding the Basics of PowerShell 515 Using PowerShell 521 Running PowerShell Remotely 538 Getting Help in PowerShell 540 Identifying Security Issues with PowerShell 541 Chapter 2: Understanding the .NET Framework 547 Introducing the Various Versions of .NET Framework 547 Focusing on New Features in .NET 4.8 550 Viewing the Global Assembly Cache 551 Understanding .NET Standard and .NET Core 553 Chapter 3: Working with Scripts and Cmdlets 555 Introducing Common Scripts and Cmdlets 555 Executing Scripts or Cmdlets 557 Working from Another Location 559 Performing Simple Administrative Tasks with PowerShell Scripts 560 Chapter 4: Creating Your Own Scripts and Advanced Functions 565 Creating a PowerShell Script 566 Defining a Script Policy 572 Signing a PowerShell Script 573 Creating a PowerShell Advanced Function 573 Chapter 5: PowerShell Desired State Configuration 581 Getting an Overview of PowerShell Desired State Configuration 582 Creating a PowerShell Desired State Configuration Script 586 Applying the PowerShell Desired State Configuration Script 588 Push and Pull: Using PowerShell Desired State Configuration at Scale 590 Book 7: Installing and Administering Hyper-V 593 Chapter 1: What Is Hyper-V? 595 Introduction to Virtualization 595 Type 1 and Type 2 Hypervisors 596 Installing and Configuring Hyper-V 597 Chapter 2: Virtual Machines 607 Creating a Virtual Machine 607 Configuring a Virtual Machine 611 Shielded Virtual Machines 618 Chapter 3: Virtual Networking 619 Identifying the Types of Virtual Switches 620 Creating a Virtual Switch 621 Getting into Advanced Hyper-V Networking 625 Chapter 4: Virtual Storage 637 Understanding Virtual Disk Formats 637 Considering Types of Disks 638 Adding Storage to the Host 639 Adding Storage to the Virtual Machine 643 Chapter 5: High Availability in Hyper-V 651 Hyper-V Replica 651 Live Migration 656 Storage Migration 660 Failover Clustering 661 Book 8: Installing, Configuring, and Using Containers 667 Chapter 1: Introduction to Containers in Windows Server 2022 669 Understanding Containers 670 Considering Use Cases for Containers 672 Deciding What Type of Containers You Want to Use 673 Managing Containers at Scale 674 Chapter 2: Docker and Docker Hub 675 Introduction to Docker 675 Introduction to Docker Hub 677 Chapter 3: Installing Containers on Windows Server 2022 685 Installing Windows Containers 686 Installing Hyper-V Containers 687 Installing Docker 688 Testing Your Container Installation 689 Chapter 4: Configuring Docker and Containers on Windows Server 2022 695 Working with Dockerfile 695 Applying Custom Metadata to Containers and Other Objects 698 Configuring Containers 700 Configuring the Docker Daemon with daemon.json 702 Chapter 5: Managing Container Images 705 Making Changes to Images and Saving the Changes You Make 705 Pushing Images to Docker Hub 709 Pulling Images from Docker Hub 711 Handling Image Versioning 713 Chapter 6: Container Networking 715 Considering the Different Types of Network Connections 716 Viewing Your Network Adapters and Virtual Switches 717 Configuring a Network Address Translation Network Connection 718 Configuring a Transparent Network Connection 719 Configuring an Overlay Network Connection 720 Configuring an l2bridge Network Connection 721 Configuring an l2tunnel Network Connection 722 Removing a Network Connection 723 Connecting to a Network 723 Chapter 7: Container Storage 725 Getting Acquainted with Container Storage 725 Creating a Volume Inside of a Container 726 Working with Persistent Volumes 729 Index 733
£31.99
McGraw-Hill Education - Europe How to Do Everything Pages Keynote Numbers for
Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Maximize your productivity--the Apple way!Get the most out of the iWork suite of apps on a Mac, an iOS device, and in iCloud. How to Do Everything: Pages, Keynote & Numbers for OS X and iOS shows you how to create great-looking documents, persuasive presentations, and number-crunching spreadsheets. Filled with clear explanations and detailed examples, this practical guide covers everything you need to know to use these powerful productivity apps on your Mac, iPad, iPhone, iPod touch, and web browser. Set up an iCloud account and download Pages, Keynote, and Numbers Create, edit, and format documents with Pages Add graphics, audio, video, tables, and charts to your documents Design and delivTable of ContentsIntroduction Ch 1. A Brief Overview of Apple's Productivity SoftwareCh 2. What is iCloudCh 3. Pages BasicsCh 4. Dazzling DocumentsCh 5. Tidying UpCh 6. Getting to Know KeynoteCh 7. Pleasantly Pleasing PresentationsCh 8. Getting Your Presentation to the MassesCh 9. Juggling NumbersCh 10. Filling In All of Those CellsCh 11. Looks Aren't Everything… but They Don't HurtAppendix A: Keyboard ShortcutsAppendix B: GlossaryIndex
£23.79
McGraw-Hill Education Build Your Own Combat Robot
Book SynopsisCreate your own powerful battling robot from start to finish using this easy-to-follow manual. Robotics experts Pete Miles and Tom Carroll explain the science and technology behind robots, and show you what materials you need to build and program a robot for home, school, and competition.
£18.04
McGraw-Hill Education How to Do Everything with Your Scanner
Book SynopsisScan this book! Or, read it cover-to-cover. Either way, youâll learn which scanner to purchase to suite your needs, important technical information about pixels and digital images, installation and calibration tips, and plenty of tricks to make scanning easier and more effective. Written for both PC and Mac users.
£19.22
McGraw-Hill Education Everquest Companion
Book SynopsisTake a fascinating look at the EverQuest game itself, the worldwide following that has grown around it, and the phenomenon of Massively Multiplayer Online Role-Playing Games (MMORPGs). Beyond merely dealing with strategies for winning the game, this book offers a glimpse inside the game, offering a chance to understand the history and some of the underlying issues of the game.
£19.22
McGraw-Hill Education How to Do Everything with Your GPS
Book SynopsisLocate this perfect teaching guide to GPS, and master GPS receivers and software. Technology guru Rick Broida, who has written many best-selling books in the How to Do Everything series, maps out the guts of GPS in a friendly, helpful way that shows you how to get the most from this new technology. Master GPS receivers and software, use GPS in cars, PDAs, and laptops, and even go GPS golfing or try geocaching, the new game featuring GPS.
£19.22
Oxford University Press Principles of Computer Hardware
Book SynopsisThe understanding of fundamental computer components and systems lies at the heart of those enabling computer technologies that pervade our lives. Principles of Computer Hardware explores the fundamentals of computer structure, architecture, and programming that underpin the array of computerized technologies around which our lives are built.Trade ReviewThe fourth edition of this classic textbook continues to encompass the range of topics that comprise a typical introductory university level course in computer hardware. As with the previous edition the author writes with great clarity, and conveys both his expertise and enthusiasm for the subject. This is a great choice for adoption in an introductory hardware course in computer science and related disciplines. * ITNow, 2006 *Table of Contents1. Introduction to computer hardware ; 2. Gates, Circuits, and Combinational Logic ; 3. Sequential logic ; 4. Computer arithmetic ; 5. The Instruction Set Architecture ; 6. Assembly language programming ; 7. Structure of the CPU ; 8. Accelerating Performance ; 9. Processor Architectures ; 10. Buses and Input/Output Mechanisms ; 11. Peripherals for Computers ; 12. Computer memory ; 13. The CPU, memory and the operating system ; 14. Computer communications ; Appendices ; Bibliography ; Index
£78.84
MIT Press Ltd Makers of the Microchip A Documentary History of
Book SynopsisThe first years of the company that developed the microchip and created the model for a successful Silicon Valley start-up.In the first three and a half years of its existence, Fairchild Semiconductor developed, produced, and marketed the device that would become the fundamental building block of the digital world: the microchip. Founded in 1957 by eight former employees of the Schockley Semiconductor Laboratory, Fairchild created the model for a successful Silicon Valley start-up: intense activity with a common goal, close collaboration, and a quick path to the market (Fairchild's first device hit the market just ten months after the company's founding). Fairchild Semiconductor was one of the first companies financed by venture capital, and its success inspired the establishment of venture capital firms in the San Francisco Bay area. These firms would finance the explosive growth of Silicon Valley over the next several decades. This history of the early years of Fairchi
£34.20
Springer Handbook of PeertoPeer Networking
Book SynopsisPeer-to-peer networking is a disruptive technology for large scale distributed app- cations that has recently gained wide interest due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications.Trade ReviewFrom the reviews:“This handbook serves as a foundation work on P2P networks covering a broad spectrum of topics … . Within each subject area, many notable researchers contribute their seminal work to make up the contents. Hence this volume is invaluable not only to those primarily doing research in P2P network technologies, but also to those interested in network-related issues and their impact on society. Summing Up: Recommended. Graduate students and above.” (J. Y. Cheung, Choice, Vol. 48 (1), September, 2010)Table of ContentsPart 1: Introduction to Peer-to-Peer Networking: Peer-to-Peer Networking and Applications: Synopsis and Research Directions John Buford, Heather Yu.- The social impact of P2P systems Andrea Glorioso, Ugo Pagallo, Giancarlo Ruffo.- From Client- Server to P2P Networking Lu Liu, Nick Antonopoulos.- Examining the Use of Peer-to-Peer Networks from an Activity Perspective Jorn De Boever, Dirk De Groof.- Part 2: Unstructured P2P Overlay Architectures: Unstructured Peer-to-Peer Network Architectures Xing Jin, S.-H. Gary Chan.- Exchanging Peers to Establish P2P Networks Mursalin Akon, Mohammad Towhidul Islam, Xuemin Shen, Ajit Singh.- Peer-to-Peer Topology Formation Using Random Walk Kin-Wah Kwong, Danny H.K. Tsang.- Semantic Social Overlay Networks Alexander Lser, Steffen Staab, Christoph Tempich.- Part 3: Structured P2P Overlay Architectures: Overview of Structured Overlay Algorithms Krishna Dhara, Yang Guo, Mario Kolberg, Xiaotao Wu.- Distributed Hash Tables: Design and Applications C.-F. Michael Chan, S.-H. Gary Chan, - The Gamut of Bootstrapping Mechanisms for Structured Overlay Networks Anwitaman Datta.- Network Aware DHT-based P2P Systems Marguerite Fayçal, Ahmed Serhrouchni.- On Adding Structure to Unstructured Overlay Networks João Leitão, Nuno A.Carvalho, José Orlando Pereira, Rui Oliveira, Luis Rodrigues.- Mathematical Modeling of Routing in DHTs Peter Kersch, Robert Szabo.- Part 4: Search and Query Processing: Keyword Search in Unstructured P2P Networks Dingyi Han, Yong Yu.- Distributed Search and Pattern Matching Reaz Ahmad, Raouf Boutaba.- Distributed Semantic Overlay Networks Christos Doulkeridis, Akrivi Vlachou, Kjetil Nørvåg, Michalis Vazirgiannis.- Self-adaptation and Self-organization for Search in Social-like Peer-to-Peer Networks LuLiu, Jie Xu, Duncan Russell, Zongyang Luo.- Data Sharing in P2P Systems Rabab Hayek, Guillaume Raschia, Patrick Valduriez, Noureddine Mouaddib.- Managing Linguistic Data Summaries in Advanced P2P Applications R.Hayek, G. Raschia, P. Valduriez, N. Mouaddib.- Case Study: Scoop for Partial Read from P2P Database Farnoush Banaei-Kashani, Cyrus Shahabi.- Part 5: Incentive Mechanisms: Incentive Mechanisms for Cooperation in Peer-to-Peer Networks Daniel A. G. Manzato, Nelson L. S. da Fonseca.- Bandwidth Trading as Incentive Kolja Eger, Ulrich Killat.- Part 6: Trust, Anonymity, and Privacy: Reputation-based Trust Management in Peer-to-Peer Systems: Taxonomy and Anatomy Loubna Mekouar, Youssef Iraqi, Raouf Boutaba.- P2P Reputation Management Through Social Networking Zoran Despotovic .- State of the Art in Trust and Reputation Models in P2P Networks Felix Gómez Mármol, Gregorio Martinez Pérez.- Anonymity in P2P Systems Pilar Manzanares-Lopez, Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Juan Carlos Sanchez-Aarnoutse.- Private Peer-to-Peer Network Michael Rogers, Saleem Bhatti.- Part 7: Broadcast and Multicast Services: Gossip-based Broadcast João Leitão, José Pereira, Luís Rodrigues.- Employing Multicast in P2P Overlay Networks Mario Kolberg.- Multicast Services Over Structured P2P Networks P. Manzanares-Lopez, J. Malgosa-Sanahuja, J.P. Muñoz-Gea, J. Sanchez-Aarnoutse.- Multicast Routing in Structured Overlays and Hybrid Networks Matthias Wählisch, Thomas C. Schmidt.- Multicast and Bulk Lookup in Structured Overlay Networks Ali Ghodsi.-Part 8: Multimedia Content Delivery: Peer-to-Peer Content Distribution and Over-The-Top TV: An Analysis of Value Networks J. De Boever, D. De Grooff.- Live video and IP-TV Maria Luisa Merani, Daniela Saladino.- Providing VoD streaming using P2P networks J. P. Muñoz-Gea, J. Malgosa-Sanahuja, P. Manzanares-Lopez, J. C. Sanchez-Aarnoutse.- Part 9: Mobile P2P: Peer-to-Peer Overlay in Mobile Ad-hoc Networks Marcel C. Castro, Andreas J. Kassler, Carla-Fabiana Chiasserini, Claudio Casetti, Ibrahim Korpeoglu.- Opportunistic Information Retrieval in Sparsely Connected Ad Hoc Networks Mooi-Choo Chuah, Jian-bin Han.- The MOBI-DIK Approach to
£314.99
John Wiley & Sons Inc Wiley Pathways Personal Computer Hardware
Book SynopsisFrom multicore CPUs and SATA hard drives to PCIe expansion buses and peripherals, this text offers practical and concise explanations of contemporary and popular PC hardware. Along with detailed coverage of essential A+ hardware topics, students will find an indispensable guide to building, maintaining, upgrading, and troubleshooting desktop computers and laptops. Packaged Set (Text + PC Hardware Essentials Project Manual): 0470-221089Table of Contents1. Understanding and Working with Personal Computers 2. Electricity and Power 3. Motherboards 4. Central Processing Units 5. Memory 6. Bus Structures 7. Hard Drives 8. Removable Storage 9. Input and Output Devices 10. Printers 11. Portable Systems 12. Network Fundamentals
£83.66
John Wiley & Sons Inc Collaborative Process Improvement
Book SynopsisThis practical, user-friendly handbook specifically addresses software companies that are interested in implementing effective improvement processes into the daily work life of every employee. A wealth of checklists, templates, exercises, tips, and pitfalls to avoid make it easy for readers to integrate quality awareness into their organization's day-to-day processes at every level.Trade Review"..perfectly suitable for an audience with no or little previous knowledge…experienced readers can also find…reading it worthwhile." (Computing Reviews.com, June 22, 2007)Table of ContentsList of Figures. Preface. How to Read This Book. Introduction. Special Thanks and Acknowledgments. Chapter 1. Your World-Understanding Your Situation and Preparing First Steps. Chapter 2. Welcome to the World-Establishing Advocates and Champions. Chapter 3. Drawing Your Map-Initiating your CPI Program. Chapter 4. World Vision-Training the Organization. Chapter 5. World Views-Addressing the Capital Q. Chapter 6. Around the World-Acknowledging Cultural Diversity. Chapter 7. Move Your World-Managing Change. Chapter 8. Rock Your World-Encouraging Process Perpetual Motion. Chapter 9. Your World of Influence-Sneezing and Spreading the Improvement Virus. Chapter 10. World Climate-Checking for Vital Signs. Chapter 11. World Health-Evaluating Progress. Chapter 12. World News-Rewarding and Recognizing Work. Chapter 13. Modern World-Building Meaningful Quality Pictures. Chapter 14. One World-Uniting Your Change Maps with the New World View. Definitions. Acronyms. References and Resources. Index.
£72.86
John Wiley & Sons Inc The Grid Core Technologies
Book SynopsisThis book gives readers a complete, clear and practical understanding of the technologies that enable the hot topic of Grid computing. It systematically explains OGSA (Open Grid Service Architecture), Web Service technologies (SOAP, WSDL, UDDI), GMA (Grid Monitoring Architecture), Grid Portals, Grid Workflow.Trade Review"It could serve as a good textbook and would certainly be a good addition to the reference libraries of technologists, academics, and students." (IEEE Distributed Systems Online, December 2006) "…lots of valuable information." (Computing Reviews.com, May 11, 2006) "…a complete, clear, systematic, and practical understanding of the technologies that enable the Grid." (IEEE Computer Magazine, August 2005) "…a good addition to the reference library…" (IEEE DS Online, January 2007)Table of ContentsAbout the Authors xiii Preface xv Acknowledgements xix List of Abbreviations xxi 1 An Introduction to the Grid 1 1.1 Introduction 1 1.2 Characterization of the Grid 1 1.3 Grid-Related Standards Bodies 4 1.4 The Architecture of the Grid 5 1.5 References 6 Part One System Infrastructure 9 2 OGSA and WSRF 11 Learning Objectives 11 Chapter Outline 11 2.1 Introduction 12 2.2 Traditional Paradigms for Distributed Computing 13 2.2.1 Socket programming 14 2.2.2 RPC 15 2.2.3 Java RMI 16 2.2.4 DCOM 18 2.2.5 CORBA 19 2.2.6 A summary on Java RMI, DCOM and CORBA 20 2.3 Web Services 21 2.3.1 SOAP 23 2.3.2 WSDL 24 2.3.3 UDDI 26 2.3.4 WS-Inspection 27 2.3.5 WS-Inspection and UDDI 28 2.3.6 Web services implementations 29 2.3.7 How Web services benefit the Grid 33 2.4 OGSA 34 2.4.1 Service instance semantics 35 2.4.2 Service data semantics 37 2.4.3 OGSA portTypes 38 2.4.4 A further discussion on OGSA 40 2.5 The Globus Toolkit 3 (GT3) 40 2.5.1 Host environment 41 2.5.2 Web services engine 42 2.5.3 Grid services container 42 2.5.4 GT3 core services 43 2.5.5 GT3 base services 44 2.5.6 The GT3 programming model 50 2.6 OGSA-DAI 53 2.6.1 OGSA-DAI portTypes 54 2.6.2 OGSA-DAI functionality 56 2.6.3 Services interaction in the OGSA-DAI 58 2.6.4 OGSA-DAI and DAIS 59 2.7 WSRF 60 2.7.1 An introduction to WSRF 60 2.7.2 WSRF and OGSI/GT3 66 2.7.3 WSRF and OGSA 69 2.7.4 A summary of WSRF 70 2.8 Chapter Summary 70 2.9 Further Reading and Testing 72 2.10 Key Points 72 2.11 References 73 3 The Semantic Grid and Autonomic Computing 77 Learning Outcomes 77 Chapter Outline 77 3.1 Introduction 78 3.2 Metadata and Ontology in the Semantic Web 79 3.2.1 RDF 81 3.2.2 Ontology languages 83 3.2.3 Ontology editors 87 3.2.4 A summary of Web ontology languages 88 3.3 Semantic Web Services 88 3.3.1 DAML-S 89 3.3.2 OWL-S 90 3.4 A Layered Structure of the Semantic Grid 91 3.5 Semantic Grid Activities 92 3.5.1 Ontology-based Grid resource matching 93 3.5.2 Semantic workflow registration and discovery in myGrid 94 3.5.3 Semantic workflow enactment in Geodise 95 3.5.4 Semantic service annotation and adaptation in ICENI 98 3.5.5 PortalLab – A Semantic Grid portal toolkit 99 3.5.6 Data provenance on the Grid 106 3.5.7 A summary on the Semantic Grid 107 3.6 Autonomic Computing 108 3.6.1 What is autonomic computing? 108 3.6.2 Features of autonomic computing systems 109 3.6.3 Autonomic computing projects 110 3.6.4 A vision of autonomic Grid services 113 3.7 Chapter Summary 114 3.8 Further Reading and Testing 115 3.9 Key Points 116 3.10 References 116 Part Two Basic Services 121 4 Grid Security 123 4.1 Introduction 123 4.2 A Brief Security Primer 124 4.3 Cryptography 127 4.3.1 Introduction 127 4.3.2 Symmetric cryptosystems 128 4.3.3 Asymmetric cryptosystems 129 4.3.4 Digital signatures 130 4.3.5 Public-key certificate 130 4.3.6 Certification Authority (CA) 132 4.3.7 Firewalls 133 4.4 Grid Security 134 4.4.1 The Grid Security Infrastructure (GSI) 134 4.4.2 Authorization modes in GSI 136 4.5 Putting it all Together 140 4.5.1 Getting an e-Science certificate 140 4.5.2 Managing credentials in Globus 146 4.5.3 Generate a client proxy 148 4.5.4 Firewall traversal 148 4.6 Possible Vulnerabilities 149 4.6.1 Authentication 149 4.6.2 Proxies 149 4.6.3 Authorization 150 4.7 Summary 151 4.8 Acknowledgements 151 4.9 Further Reading 151 4.10 References 152 5 Grid Monitoring 153 5.1 Introduction 153 5.2 Grid Monitoring Architecture (GMA) 154 5.2.1 Consumer 155 5.2.2 The Directory Service 156 5.2.3 Producers 157 5.2.4 Monitoring data 159 5.3 Review Criteria 161 5.3.1 Scalable wide-area monitoring 161 5.3.2 Resource monitoring 161 5.3.3 Cross-API monitoring 161 5.3.4 Homogeneous data presentation 162 5.3.5 Information searching 162 5.3.6 Run-time extensibility 162 5.3.7 Filtering/fusing of data 163 5.3.8 Open and standard protocols 163 5.3.9 Security 163 5.3.10 Software availability and dependencies 163 5.3.11 Projects that are active and supported; plus licensing 163 5.4 An Overview of Grid Monitoring Systems 164 5.4.1 Autopilot 164 5.4.2 Control and Observation in Distributed Environments (CODE) 168 5.4.3 GridICE 172 5.4.4 Grid Portals Information Repository (GPIR) 176 5.4.5 GridRM 180 5.4.6 Hawkeye 185 5.4.7 Java Agents for Monitoring and Management (JAMM) 189 5.4.8 MapCenter 192 5.4.9 Monitoring and Discovery Service (MDS3) 196 5.4.10 Mercury 201 5.4.11 Network Weather Service 205 5.4.12 The Relational Grid Monitoring Architecture (R-GMA) 209 5.4.13 visPerf 214 5.5 Other Monitoring Systems 217 5.5.1 Ganglia 217 5.5.2 GridMon 219 5.5.3 GRM/PROVE 220 5.5.4 Nagios 221 5.5.5 NetLogger 222 5.5.6 SCALEA-G 223 5.6 Summary 225 5.6.1 Resource categories 225 5.6.2 Native agents 225 5.6.3 Architecture 226 5.6.4 Interoperability 226 5.6.5 Homogeneous data presentation 226 5.6.6 Intrusiveness of monitoring 227 5.6.7 Information searching and retrieval 231 5.7 Chapter Summary 233 5.8 Further Reading and Testing 236 5.9 Key Points 236 5.10 References 236 Part Three Job Management and User Interaction 241 6 Grid Scheduling and Resource Management 243 Learning Objectives 243 Chapter Outline 243 6.1 Introduction 244 6.2 Scheduling Paradigms 245 6.2.1 Centralized scheduling 245 6.2.2 Distributed scheduling 246 6.2.3 Hierarchical scheduling 248 6.3 How Scheduling Works 248 6.3.1 Resource discovery 248 6.3.2 Resource selection 251 6.3.3 Schedule generation 251 6.3.4 Job execution 254 6.4 A Review of Condor, SGE, PBS and LSF 254 6.4.1 Condor 254 6.4.2 Sun Grid Engine 269 6.4.3 The Portable Batch System (PBS) 274 6.4.4 LSF 279 6.4.5 A comparison of Condor, SGE, PBS and LSF 288 6.5 Grid Scheduling with QoS 290 6.5.1 AppLeS 291 6.5.2 Scheduling in GrADS 293 6.5.3 Nimrod/G 293 6.5.4 Rescheduling 295 6.5.5 Scheduling with heuristics 296 6.6 Chapter Summary 297 6.7 Further Reading and Testing 298 6.8 Key Points 298 6.9 References 299 7 Workflow Management for the Grid 301 Learning Outcomes 301 Chapter Outline 301 7.1 Introduction 302 7.2 The Workflow Management Coalition 303 7.2.1 The workflow enactment service 305 7.2.2 The workflow engine 306 7.2.3 WfMC interfaces 308 7.2.4 Other components in the WfMC reference model 309 7.2.5 A summary of WfMC reference model 310 7.3 Web Services-Oriented Flow Languages 310 7.3.1 XLANG 311 7.3.2 Web services flow language 311 7.3.3 WSCI 313 7.3.4 BPEL4WS 315 7.3.5 BPML 317 7.3.6 A summary of Web services flow languages 318 7.4 Grid Services-Oriented Flow Languages 318 7.4.1 GSFL 318 7.4.2 SWFL 321 7.4.3 GWEL 321 7.4.4 GALE 322 7.4.5 A summary of Grid services flow languages 323 7.5 Workflow Management for the Grid 323 7.5.1 Grid workflow management projects 323 7.5.2 A summary of Grid workflow management 329 7.6 Chapter Summary 330 7.7 Further Reading and Testing 331 7.8 Key Points 332 7.9 References 332 8 Grid Portals 335 Learning Outcomes 335 Chapter Outline 335 8.1 Introduction 336 8.2 First-Generation Grid Portals 337 8.2.1 A three-tiered architecture 337 8.2.2 Grid portal services 338 8.2.3 First-generation Grid portal implementations 339 8.2.4 First-generation Grid portal toolkits 341 8.2.5 A summary of the four portal tools 348 8.2.6 A summary of first-generation Grid portals 349 8.3 Second-Generation Grid Portals 350 8.3.1 An introduction to portlets 350 8.3.2 Portlet specifications 355 8.3.3 Portal frameworks supporting portlets 357 8.3.4 A Comparison of Jetspeed, WebSphere Portal and GridSphere 368 8.3.5 The development of Grid portals with portlets 369 8.3.6 A summary on second-generation Grid portals 371 8.4 Chapter Summary 372 8.5 Further Reading and Testing 373 8.6 Key Points 373 8.7 References 374 Part Four Applications 377 9 Grid Applications – Case Studies 379 Learning Objectives 379 Chapter Outline 379 9.1 Introduction 380 9.2 GT3 Use Cases 380 9.2.1 GT3 in broadcasting 381 9.2.2 GT3 in software reuse 382 9.2.3 A GT3 bioinformatics application 387 9.3 OGSA-DAI Use Cases 387 9.3.1 eDiaMoND 387 9.3.2 ODD-Genes 388 9.4 Resource Management Case Studies 388 9.4.1 The UCL Condor pool 388 9.4.2 SGE use cases 389 9.5 Grid Portal Use Cases 390 9.5.1 Chiron 390 9.5.2 GENIUS 390 9.6 Workflow Management – Discovery Net Use Cases 391 9.6.1 Genome annotation 391 9.6.2 SARS virus evolution analysis 391 9.6.3 Urban air pollution monitoring 392 9.6.4 Geo-hazard modelling 394 9.7 Semantic Grid – myGrid Use Case 394 9.8 Autonomic Computing – AutoMate Use Case 395 9.9 Conclusions 397 9.10 References 398 Glossary 401 Index 419
£84.56
John Wiley & Sons Inc Mac OS X Snow Leopard For Dummies
Book SynopsisMac OS X Snow Leopard is the newest version of the Macintosh operating system, and "Dr. Mac" Bob LeVitus is the ideal expert to introduce you to Snow Leopard.Table of ContentsIntroduction. Part I: Introducing Mac OS X Snow Leopard: The Basics. Chapter 1: Mac OS X Snow Leopard 101 (Prerequisites: None). Chapter 2: The Desktop and Windows and Menus (Oh My)! Chapter 3: Have It Your Way. Chapter 4: What’s Up, Dock? Chapter 5: The Finder and Its Icons. Part II: Snow Leopard Taming (Or “Organization for Smart People”). Chapter 6: Organizing and Managing Files and Folders. Chapter 7: Dealing with Disks. Chapter 8: Organizing Your Life. Part III: Do Unto Snow Leopard: Getting Things Done. Chapter 9: Internet-Working. Chapter 10: E-Mail Made Easy. Chapter 11: The Musical Mac. Chapter 12: The Multimedia Mac. Chapter 13: Words and Letters. Part IV: Making This Snow Leopard Your Very Own. Chapter 14: Publish or Perish: The Fail-Safe Guide to Printing. Chapter 15: Sharing Your Mac and Liking It. Chapter 16: Features for the Way You Work. Part V: The Care and Feeding of Your Snow Leopard. Chapter 17: Safety First: Backups and Other Security Issues. Chapter 18: Utility Chest. Chapter 19: Troubleshooting Mac OS X. Part VI: The Part of Tens. Chapter 20: Almost Ten Ways to Speed Up Your Mac Experience. Chapter 21: Ten Ways to Make Your Mac Better by Throwing Money at It. Chapter 22: Ten (Or So) Great Web Sites for Mac Freaks. Appendix: Installing or Reinstalling Mac OS X Snow Leopard (Only If You Have To). Index.
£15.29
John Wiley and Sons Ltd Software Performance and Scalability A
Book SynopsisGives the reader the ability to set up a proper test environment and conduct software performance and scalability tests. Uses many examples showing software performance problems and applicable solutions. Contains a number of case studies to assist the reader with comprehending all aspects of software performance and scalability.Table of ContentsPREFACE xv ACKNOWLEDGMENTS xxi Introduction 1 Performance versus Scalability 1 PART 1 THE BASICS 3 1. Hardware Platform 5 1.1 Turing Machine 6 1.2 von Neumann Machine 7 1.3 Zuse Machine 8 1.4 Intel Machine 9 1.5 Sun Machine 17 1.6 System Under Test 18 1.7 Odds Against Turing 30 1.8 Sizing Hardware 35 1.9 Summary 37 2. Software Platform 41 2.1 Software Stack 42 2.2 APIs 44 2.3 Multithreading 47 2.4 Categorizing Software 535 2.5 Enterprise Computing 55 2.6 Summary 63 3. Testing Software Performance and Scalability 65 3.1 Scope of Software Performance and Scalability Testing 67 3.2 Software Development Process 83 3.3 Defining Software Performance 86 3.4 Stochastic Nature of Software Performance Measurements 95 3.5 Amdahl’s Law 97 3.6 Software Performance and Scalability Factors 99 3.7 System Performance Counters 111 3.8 Software Performance Data Principles 129 3.9 Summary 131 PART 2 APPLYING QUEUING THEORY 135 4. Introduction to Queuing Theory 137 4.1 Queuing Concepts and Metrics 139 4.2 Introduction to Probability Theory 143 4.3 Applying Probability Theory to Queuing Systems 145 4.4 Queuing Models for Networked Queuing Systems 153 4.5 Summary 172 5. Case Study I: Queuing Theory Applied to SOA 177 5.1 Introduction to SOA 178 5.2 XML Web Services 179 5.3 The Analytical Model 181 5.4 Service Demand 183 5.5 MedRec Application 188 5.6 MedRec Deployment and Test Scenario 189 5.7 Test Results 191 5.8 Comparing the Model with the Measurements 198 5.9 Validity of the SOA Performance Model 200 5.10 Summary 200 6. Case Study II: Queuing Theory Applied to Optimizing and Tuning Software Performance and Scalability 205 6.1 Analyzing Software Performance and Scalability 207 6.2 Effective Optimization and Tuning Techniques 220 6.3 Balanced Queuing System 240 6.4 Summary 244 PART 3 APPLYING API PROFILING 249 7. Defining API Profiling Framework 251 7.1 Defense Lines Against Software Performance and Scalability Defects 252 7.2 Software Program Execution Stack 253 7.3 The PerfBasic API Profiling Framework 254 7.4 Summary 260 8. Enabling API Profiling Framework 263 8.1 Overall Structure 264 8.2 Global Parameters 265 8.3 Main Logic 266 8.4 Processing Files 266 8.5 Enabling Profiling 267 8.6 Processing Inner Classes 270 8.7 Processing Comments 271 8.8 Processing Method Begin 272 8.9 Processing Return Statements 274 8.10 Processing Method End 275 8.11 Processing Main Method 276 8.12 Test Program 277 8.13 Summary 279 9. Implementing API Profiling Framework 281 9.1 Graphics Tool—dot 281 9.2 Graphics Tool—ILOG 284 9.3 Graphics Resolution 286 9.4 Implementation 287 9.5 Summary 300 10. Case Study: Applying API Profiling to Solving Software Performance and Scalability Challenges 303 10.1 Enabling API Profiling 304 10.2 API Profiling with Standard Logs 313 10.3 API Profiling with Custom Logs 320 10.4 API Profiling with Combo Logs 325 10.5 Applying API Profiling to Solving Performance and Scalability Problems 333 10.6 Summary 337 APPENDIX A STOCHASTIC EQUILIBRIUM AND ERGODICITY 339 A.1 Basic Concepts 339 A.2 Classification of Random Processes 343 A.3 Discrete-Time Markov Chains 345 A.4 Continuous-Time Markov Chains 349 A.5 Stochastic Equilibrium and Ergodicity 351 A.6 Birth–Death Chains 357 APPENDIX B MEMORYLESS PROPERTY OF THE EXPONENTIAL DISTRIBUTION 361 APPENDIX C M/M/1 QUEUES AT STEADY STATE 363 C.1 Review of Birth–Death Chains 363 C.2 Utilization and Throughput 364 C.3 Average Queue Length in the System 365 C.4 Average System Time 365 C.5 Average Wait Time 366 INDEX 367
£87.26
John Wiley & Sons Inc Green Gadgets For Dummies
Book SynopsisGreen gadgets encompass everything from iPods to energy-efficient home entertainment devices to solar laptop chargers and crank-powered gizmos. This book explains how to research green gadgets, make a smart purchasing decision, use products you already own in a more environmentally friendly way, and say goodbye to electronics that zap both energy.Table of ContentsForeword xix Introduction 1 About Green Gadgets For Dummies 1 Foolish Assumptions 2 Conventions Used in This Book 3 What You Don’t Have to Read 3 How This Book Is Organized 4 Part I: Settling into a Green Gadget Mindset 4 Part II: Getting Green with Gadgets You Own 4 Part III: Minimizing Your Computer’s Carbon Footprint 4 Part IV: Acquiring Green Gadgets and Gear 5 Part V: Ridding Yourself of Gadgets the Green Way 5 Part VI: The Part of Tens 5 The companion Web site 5 Icons Used in This Book 6 Where to Go from Here 6 Part I: Settling into a Green Gadget Mindset 7 Chapter 1: Mother Nature’s Green-Eyed View of Gadgets 9 Hey, Joe, Where You Goin’ with That Green Gadget in Your Hand? 10 Assessing “green” companies 12 Defining gadgets 14 Defining green gadgets 15 Relating the Four Rs to Green Gadgets 16 Following a Green Gadget’s Carbon Footprint 17 Thoughtful manufacturing 18 Ecofriendly features 19 Other green electronics 20 Understanding Energy Star and EPEAT Green Gadget Labels 22 Implementing Green Living Habits with Gadgets You Already Own 24 Taking a bite out of “energy vampires” 24 Calculating your gadgets’ carbon footprints 25 Taking other simple green gadget steps 26 Staying Informed about Green Gadget Developments 27 Chapter 2: Practicing Green Gadget Living 29 Evaluating Your Energy Waste, er, Usage 30 Reducing Your Gadgets’ Carbon Footprints and E-Waste 33 Reusing Your Gadgets and Electronics Gear 34 Recycling Gadgets the Green Way 35 Rethinking Your Gadget Purchases 36 Sharing Your Gadget Greenness with Others 38 Part II: Getting Green with Gadgets You Own 41 Chapter 3: Saving Money (and the Planet) with Rechargeable Batteries 43 Understanding Basic Battery Pluses and Minuses 44 Hunting and Gathering Battery-Powered Gadgets in Your House 44 Sorting Out and Choosing Rechargeable Batteries and Chargers 46 Gauging matters of size, type, power, and price 47 Picturing how long battery types last 50 Getting a charge out of chargers 50 Choosing rechargeable batteries and chargers 53 Finding Rechargeable Battery Packs 55 Buying rechargeable batteries for less 56 Replacing rechargeable batteries in iPods, iPhones, and other sealed gadgets 56 Properly Disposing of Dead Batteries 57 Disposable batteries 57 Rechargeable batteries 59 Chapter 4: Maximizing Energy Savings for Your Portable Gadgets 61 Getting a Grip on a Gadget’s Energy-Saving Settings 61 Battery-draining items 63 Cellphones and smartphones 65 MP3 and media players 69 Digital cameras and camcorders 71 Running Mobile Applications to Monitor and Adjust Power 72 Chapter 5: Energy Savings All Around the House 75 Practicing Green Living in Your House 75 Reviewing Energy-Saving Opportunities in Your House 77 Televisions 78 Computers and peripheral devices 79 Mobile phones, MP3 players, GPS trackers, and other personal gadgets 79 Adjusting Power-Saving Options on TVs and Entertainment Gear 80 Taming TV power 80 Reducing power consumption in DVD, video game, and other types of players 82 Part III: Minimizing Your Computer’s Carbon Footprint 87 Chapter 6: Your Computer’s Energy Use 89 Quashing Computer Power Myths 89 Evaluating Your Everyday Computer Needs 93 Understanding Computer Energy-Saving Settings 94 Changing your computer’s energy settings the easy way 97 Taking greater control of your computer’s energy settings 98 iPods, Printers, Hard Drives, and Other Connected Devices 101 Chapter 7: Reducing Energy Consumption in Windows 103 Minimizing Windows Energy Use On-the-Fly 106 Adjusting the Windows Automatic Power Options Settings 107 Choosing and customizing Windows Vista’s power plans 109 Customizing Windows Vista’s advanced power settings 112 Choosing and Customizing Windows XP Power Schemes 113 Power Schemes 114 Alarms 115 Power Meter 116 Advanced 116 Hibernate 117 UPS 117 Making Additional Windows Vista and XP Power Options Adjustments 117 Windows Mobility Center (Vista only) 118 Brightness 118 Screen saver 120 Keyboard brightness 121 Wireless networking 121 Bluetooth 122 Sound 123 Indexing options (Vista only) 124 Chapter 8: Conserving Power with Your Mac’s Energy-Saver Settings 127 Minimizing Your Mac’s Energy Use On-the-Fly 128 Adjusting Your Mac’s Automatic Energy- Saver Settings 129 Making Additional Mac Energy-Saving Adjustments 132 Brightness 133 Screen saver 134 Keyboard brightness 135 AirPort 136 Bluetooth 136 Sound 138 Spotlight 138 Part IV: Acquiring Green Gadgets and Gear 141 Chapter 9: Knowing the Difference Between Truly Green and Greenwash Hype 143 Paying to Be (Seen As) Green Is Big Business 143 Reviewing the Greenpeace Guide to Greener Electronics 145 Tapping In to the Greenpeace Electronics Survey 147 Considering Another Take on Green Gadgets: The Consumer Electronics Association 149 Taking Companies at Their Own Green Word, Sort Of 151 Browsing gadget-makers’ ecocentric Web sites 151 Seeking a second, third, or tenth opinion 154 Chapter 10: Choosing Green Mac and Windows Computers 155 Considering Upgrades to Make Your Computer Feel New Again 156 Upgrading hardware 156 Upgrading operating systems and applications 158 Choosing and installing upgrades 158 Getting Up-to-Speed on Computer Energy Standards and Ratings 159 Evaluating Computer Manufacturers’ Levels of Greenness 160 Getting a Handle on Green Computers 161 Picking Green Macs 163 Breaking down the MacBook, piece by piece 164 Considering other Macs and products 165 Looking at Green Windows Computers 166 Two green Windows desktops 167 A pair of green Windows notebooks 169 Chapter 11: Buying Green Mobile Phones and Handheld Gadgets 173 Getting Up to Speed on Green Gadget Matters 173 Dialing in to Green Mobile Phones 175 Motorola MOTO W233 Renew 177 Samsung SGH-W510, SGH-F268, and E200 Eco 178 Nokia 3110 Evolve and N79 eco 179 Looking at Green MP3 and Video Players, and Other Entertaining Gadgets 181 iPod nano 181 Shiro SQ-S solar-powered media player 182 Baylis Eco Media Player 182 eMotion Solar Portable media player 183 Saving Trees by Reading E-Books 184 Mobile phone and computer e-book readers 184 Dedicated e-book readers 187 Electronic bookstores 190 Getting Wound Up Over Green Windup Gadgets 191 Chapter 12: Getting Green Gadgets for on the Go 195 Driving Your Car More Efficiently 195 Tricking Out Your Car with Efficiency Gizmos 197 Tapping into GPS and Mobile Phone Applications for Green Getting-around 199 Talking mobile phone GPS navigator apps 201 Portable GPS navigators 202 GPS and green mobile phone apps 203 Tracking Green Gadgets for Fitness and Outdoor Activities 206 Staying in Charge with Portable Power Chargers and Extenders 208 Leafing Through Green Garments, Bags, and Cases 211 Chapter 13: Adding Green Gadgets around the House 215 Considering Green Gadgets for Every Room in the House 215 Monitoring and Controlling Household Energy Usage 217 Turning Things On and Off Automatically 219 Controlling Your Entire House with Home Automation Systems 221 Looking at Green HDTV, Music, Movie-Watching, and Audio Products 225 Fiddling with Other Ecofriendly Home Gadgets 229 Part V: Ridding Yourself of Gadgets the Green Way 233 Chapter 14: Donating, Gifting, and Selling Unwanted Gadgets 235 Determining whether an Unwanted Gadget Is of Use to Anyone 236 Weighing the Risks and Rewards of Donating, Gifting, and Selling Unwanted Gadgets 238 Giving the Gift of Unwanted Gadgets 240 Doing Good by Donating Computers and Other Gadgets 240 Trading In or Selling Gadgets for Greenbacks 243 The basics of the trade-in process 244 Finding a trade-in site for you 246 Selling Your Old Electronics on Craigslist 249 Auctioning Unwanted Gadgets on eBay and Other Auction Web Sites 251 Chapter 15: Erasing Your Personal Information before Getting Rid of Gadgets 255 Deleting Your Personal Stuff — The Short Way and the Long Way 256 Considering Trust to Decide How to Erase Personal Information 258 To know you is to trust you 258 I want to trust you, but I’m just not sure 259 Deauthorizing Computer Programs before Giving Away Your PC 260 Deleting Your User Account Files before Getting Rid of a Computer 264 Deleting your Windows XP user account and creating a new one 265 Deleting your Windows Vista user account and creating a new one 267 Deleting your Mac user account and creating a new one 270 Restoring Computers to Factory-Fresh Condition 273 Formatting and restoring a Windows hard drive 273 Formatting and restoring a Mac hard drive 277 Completely Erasing Deleted Files and Hard Drives 279 Wiping Windows hard drives 279 Wiping Mac hard drives 280 Chapter 16: Recycling and Properly Disposing of Hopelessly Useless Gadgets 283 Understanding E-Waste and E-Cycling 284 Finding E-Cyclers 286 Reputable or not? 286 Local or from a distance? 286 Finding a local e-cycler 288 National and corporate e-cycling programs 290 Erasing Personal Information 296 Deciding Whether to Break Down E-Waste or Leave It Whole 297 Keeping useful parts 297 Peripherals and other parts and pieces 298 Part VI: The Part of Tens 301 Chapter 17: Ten Cool Green PC Peripherals and Accessories 303 PC TrickleSaver 303 Ecobutton 303 Bamboo Laptop Stand Workstation 304 SimpleTech [re]drive R500U 500 GB Turbo 304 Lenovo ThinkVision L197 Wide 19-inch LCD Display 304 Apple 24-inch LED Cinema Display 305 Ink2image Bulk Ink System 305 Canon Generation Green Printers 305 D-Link DGL-4500 Xtreme N Gaming Router 306 Netgear 3G Broadband Wireless Router 306 Chapter 18: Ten Green Gadget Designs 307 Bware Water Meter 307 Laundry Pod 307 Social-Environmental Station: The Environmental Traffic Light 308 Indoor Drying Rack 308 Thermal Touch 308 Fastronauts 308 Tweet-a-Watt 309 Standby Monsters 309 Power-Hog 309 WattBlocks 309 And the Winners Are 310 Chapter 19: Ten Green Gadget Buying Tips 313 Don’t Buy! 313 Do Your Homework 313 Buy Recycled and Highly Recyclable 314 Buy Reconditioned or Preowned 315 Buy Small, Think Big Picture 315 Take a Bite Out of Energy Vampires 316 Make the Most of Multifunction Gadgets 316 Charge Your Gadgets the Green Way 317 Get Rid of Gadgets the Green Way 317 Buy Carbon Offsets to Minimize Your Carbon Footprint 318 Chapter 20: Ten Frequently Asked Questions about Green Gadgets 319 What Is a Green Gadget? 319 Why Should I Care about Buying Green Gadgets? 320 What Is EPEAT? 321 Which Electronic Products Does EPEAT Cover? 321 What Is Energy Star? 321 How Does a Product Earn the Energy Star Seal of Approval? 322 What Is the “Change the World, Start with Energy Star” Campaign? 322 Should I Donate or Recycle My Old Computer? 323 Should I Donate or Recycle My Old Cellphone? 323 Should I Recycle My Old Rechargeable Batteries? 324 Index 325
£15.29
John Wiley & Sons Inc Trustworthy Compilers
Book SynopsisThis unique guide book explains and teaches the concept oftrustworthy compilers based on 50+ years of worldwide experience inthe area of compilers, and on the author s own 30+ years ofexpertise in development and teaching compilers.Trade Review"Overall, however, it is an excellent addition to a computer scientist's bookshelf, and complements the classics in compiler design." (Computing Reviews, 22 November 2011)Table of ContentsPreface. Acknowledgments. 1. Introduction. 1.1. The Concept of a Trustworthy Compiler. 1.2. Kinds of Compilers. 1.3. Evolution of Java Compilers. 1.4. Compilation for .NET. 1.5. Phases of Compilation. 1.6. Overview of Compiler Development Principles and Technologies. 1.7. History of Compiler Development in the U.S.S.R. and in Russia. Exercises to Chapter 1. 2. Theoretical Foundations and Principles of Trustworthy Compilers. 2.1. The Trustworthy Computing (TWC) Initiative. 2.2. TWC and Trustworthy Compilers. 2.3. Verified Compilers. 2.4. Spec#: Microsoft’s Approach to Verifying Compilers. 2.5. Perspectives of Verified and Verifying Compilation. Exercises to Chapter 2. 3. Lexical Analysis and Its Trustworthiness Principles. 3.1. Token Classes. 3.2. The Output of the Lexical Analyzer. 3.3. Processing White Spaces, Comments, and New Lines. 3.4. Theoretical Models of Lexical Analysis. 3.5. Lexical Errors, Error Diagnostics, and Recovery. 3.6. Processing Identifiers and Keywords. 3.7. The Architecture of a Lexical Analyzer and the Principles of Its Implementation. 3.8. The Lexical Analyzer Generator Lex. 3.9. Lexical Analyzer Generation in ANTLR. Exercises to Chapter 3. 4. Parsing and Trustworthy Methods of Syntax Error Recovery. 4.1. Basic Concepts and Principles of Parsing. 4.2. Recursive Descent and Simple Lookahead Mechanism. 4.3. Overview of Error Recovery in Parsing: Error Recovery for Recursive Descent. 4.4. LR(1) and LALR(1) Parsing. 4.5. Error Recovery in LR Parsing. 4.6. The Yacc Parser Generator. 4.7. The Bison Parser Generator: Generalized LR Parsing. 4.8. The Yacc++, JavaCC, SableCC, ANTLR, and CoCo/R Object-Oriented Parser Generators. Exercises to Chapter 4. 5. Semantic Analysis and Typing: Efficient and Trustworthy Techniques. 5.1. Basic Concepts and Principles of Semantic Analysis. 5.2. Formal Model of Semantic Analysis: Attributed Grammars. 5.3. Definition Systems with Forward References and the Algorithm of Their One-Pass Analysis. 5.4. Commonly Used Semantic Attributes for Program Constructs. 5.5. Design Flaws of the Semantic Attribute Evaluation and Our Efficient Methods to Speed It Up. 5.6. Lookup—Traditional and Novel Techniques. 5.7. Typing and Type-Checking: Basic Concepts. 5.8. Representing Types at Compile Time. 5.9. Efficient Method and Algorithm to Represent and Handle Types with Structural Identity. 5.10. Type Identity and Type Compatibility. 5.11. Type-Checking, Typing Error Diagnostics, and Recovery. 5.12. Code Trustworthiness Checks During Semantic Analysis. 5.13. Checks for Context Restrictions in Semantic Analysis. 5.14. Intermediate Code Generation—Principles and Architectural Models. 5.15. Postfix (Reverse Polish) Notation. 5.16. PCC Trees. 5.17. Triples. 5.18. Summary of the Chapter. Exercises to Chapter 5. 6. Trustworthy Optimizations. 6.1. Basic Concepts and Trustworthiness of Optimizations. 6.2. Optimizations as Mixed Computations. 6.3. Overview of the Most Common Kinds of Optimizations. 6.4. Control Flow and Data Flow Dependencies. 6.5. Static Single Assignment (SSA). 6.6. Data Structures Constructed and Used by the Optimizer. 6.7. Optimization in Sun Studio Compilers. 6.8. Optimizations of the Java Bytecode. 6.9. Optimizations of the .NET Common Intermediate Language (CIL) Code. 6.10. Optimizations during JIT Compilation. Exercises to Chapter 6. 7. Code Generation and Runtime Data Representation. 7.1. Target Platforms for Code Generation. 7.2. Overview of Code Generation Tasks and Goals. 7.3. Specifics of Code Generation for .NET. 7.4. Specifics of Code Generation for SPARC Architecture. 7.5. Representing Types and Addressing Variables. 7.6. Representing Procedures, Functions, and Methods. 7.7. Principles of SPARC Architecture. 7.8. Example of Code Generation for SPARC Architecture. 7.9. Generation of Debugging Information. 7.10. Code Generation for Declarations (Definitions), Expressions, and Statements. Exercises to Chapter 7. 8. Runtime, JIT, and AOT Compilation. 8.1. The Tasks of the Runtime. 8.2. The Relationship of the Runtime and the Operating System (OS). 8.3. JIT Compilation. 8.4. The Architecture of FJIT––JIT Compiler for SSCLI/Rotor. 8.5. The Architecture of Optimizing JIT Compiler for SSCLI/Rotor. 8.6. AOT Compilation. Exercises to Chapter 8. 9. Graph Grammars and Graph Compilers. 9.1. Basic Concepts of Graph Grammars and Graph Compilers. 9.2. Categorical Approach to Graph Transformations. 9.3. Reserved Graph Grammars (RGGs). 9.4. Layered Graph Grammars. 9.5. Meta-Modeling Approach to Graph Grammars and Diameta Editor. 9.6. Hypergraph Approach to Graph Grammars in Diagen. 9.7. Graph Compiler Generation Tools. Exercises to Chapter 9. 10. Microsoft Phoenix, Phoenix-Targeted Tools, and Our Phoenix Projects. 10.1. History of Phoenix and of Our Phoenix Projects. 10.2. Overview of Phoenix Architecture. 10.3. Phoenix-Based Tools, Passes, Phases, and Plug-Ins. 10.4. Phoenix Primitives: Strings and Names. 10.5. Phoenix Intermediate Representation (IR). 10.6. Phoenix Symbol System. 10.7. Phoenix Type System. 10.8. Data Flow Analysis, Control Flow Analysis, Graphs, and Static Single Assignment (SSA) in Phoenix. 10.9. Overview of Other Phoenix Features. 10.10. Example of a Phoenix-Based Plug-In. 10.11. Phoenix-Fete—A Compiler Front-End Development Toolkit and Environment Targeted to Phoenix. Exercises to Chapter 10. Conclusions. References. Index.
£121.46
John Wiley & Sons Inc Windows 7 for Seniors for Dummies
Book SynopsisThis easy-to-understand guide helps seniors get started with Windows 7! Many seniors use a home computer to stay connected to family and friends.Table of ContentsIntroduction 1 Part I: Getting to Know Windows 7 7 1: Getting Comfortable with the Windows 7 Desktop 9 2: Examining the Anatomy of a Window 29 3: Creating Your First Documents 45 4: Organizing Your Documents 69 Part II: Getting Things Done in Windows 7 93 5: Taking Advantage of the Windows Accessories 95 6: Installing and Removing Programs 115 7: Working with Printers and Other Add-On Devices 127 Part III: Discovering the Internet 141 8: Connecting to the Internet 143 9: Finding What You Need on the Web 153 10: Sending and Receiving E-Mail 179 Part IV: Having Fun with Windows 7 201 11: Playing Games 203 12: Enjoying Photos in Windows 7 213 13: Listening to Music and Watching DVDs 235 Part V: Having It Your Way with Windows 7 259 14: Making Windows 7 More Fun to Use 261 15: Using the Taskbar and Start Menu Smartly 285 16: Making Windows 7 Easier to Use 303 Part VI: Staying Safe and Keeping Windows 7 Healthy 323 17: Updating Windows 7 325 18: Protecting Your Computer 341 19: Keeping Your Data Safe 359 Index 377
£15.29
John Wiley & Sons Inc Microsoft Exchange Server 2010 Administration
Book SynopsisQuestions about Exchange Server 2010? Flip open this easy-access guide! Have all your questions about Microsoft's new Exchange Server 2010 answered on the spot with this handy reference guide.Table of ContentsPart I Getting Started. 1 Deploying Exchange Servers. 2 Using the Exchange Management Console and the Exchange Management Shell. 3 Managing the Organization. 4 Administering Recipients. 5 Managing Client Access. 6 Managing Message Routing. Part II Managing Exchange Server Roles. 7 Managing Mailbox Databases. 8 Managing Public Folders. 9 Administering Mailbox Content. 10 Maintaining Reliability and Availability. Part III Mitigating Risk. 11 Monitoring Health and Performance. 12 Securing Exchange Server.
£21.84
John Wiley & Sons Inc Nonlinear Optical Communication Networks
Book SynopsisThis book presents coverage of the performance, design principles and analysis of optical communication systems operating under nonlinear propagation regimes. It includes an application based comparison of different systems, so that the reader can determine the right system for his application.Table of ContentsOptical Fiber Propagation. Optical Amplifiers. Optical Transmission Systems. Soliton Optical Communications. Repeaterless Systems. Long Distance TDM Transmission. WDM Optically Amplified Systems. Transmission in All-Optical Networks. Appendices. Index.
£159.26
John Wiley & Sons Inc Digital Logic Design
Book SynopsisThe perfect complement to computer architecture and logic texts. This widely praised tutorial and lab book gives practice in the fundamentals of digital logic and circuitry, with special emphasis on how the machine operates at the gate and register level.Table of ContentsReview of Fundamental Concepts and Introduction to the TTLFamily. Basic Two-level Circuits. Implementation with One Gate Type. Expression Reduction Techniques. Important Combinatorial Networks--1. Important Combinatorial Networks--2. Latches and Flip-flops. Counters. State Sequencers and Controllers. Registers. Appendix A: Boolean Algebra. Appendix B: TTL Parts, Layout. Appendix C: References. Appendix D: Recommended Parts List and Lab Equipment.
£129.56
John Wiley & Sons Inc Windows Vista For Dummies
Book SynopsisCreate music CDs and photo DVDs or even watch TV Move your files to a new computer, or get your old PC ready for Vista The thing that's made Windows For Dummies so successful is that it's packed with the basics you need to make Windows work.Table of ContentsIntroduction 1 Part I: Windows Vista Stuff Everybody Thinks You Already Know 7 Chapter 1: What Is Windows Vista? 9 Chapter 2: The Desktop, Start Menu, and Other Windows Vista Mysteries 21 Chapter 3: Basic Windows Mechanics 47 Chapter 4: Flipping Through Files, Folders, Floppies, and CDs 69 Part II: Working with Programs and Files 95 Chapter 5: Playing with Programs and Documents 97 Chapter 6: Briefly Lost, but Quickly Found 119 Chapter 7: Printing Your Work 133 Part III: Getting Things Done on the Internet 145 Chapter 8: Cruising the Web 147 Chapter 9: Sending and Receiving E-mail 171 Chapter 10: Safe Computing 189 Part IV: Customizing and Upgrading Windows Vista 207 Chapter 11: Customizing Windows Vista with the Control Panel 209 Chapter 12: Keeping Windows from Breaking 235 Chapter 13: Sharing One Computer with Several People 249 Chapter 14: Connecting Two or More Computers with a Network 259 Part V: Music, Movies, Memories (and Photos, Too) 277 Chapter 15: Playing and Copying Music in Media Player 279 Chapter 16: Fiddling with Photos and Movies 303 Part VI: Help! 331 Chapter 17: The Case of the Broken Window 333 Chapter 18: Strange Messages: What You Did Does Not Compute 345 Chapter 19: Moving from an Old Computer to a New One 353 Chapter 20: Help on the Windows Vista Help System 365 Part VII: The Part of Tens 371 Chapter 21: Ten or So Things You’ll Hate about Windows Vista (and How to Fix Them) 373 Chapter 22: Ten or So Tips for Laptop Owners 381 Appendix: Upgrading to Windows Vista 387 Index 391
£13.49
John Wiley & Sons Inc DOS For Dummies 3e
Book SynopsisDOS made easy!Windows may rule the world of popular computing on PCs around theglobe, but DOS still has a place in the hearts and minds ofcomputer users who vaguely remember what a C prompt looks like.Even if DOS (with all its arcane commands and its drab, boringlook) isn''t your idea of the best way to get things done on a PC,you''ll find plenty of fast and friendly help on hand with the thirdedition of DOS For Dummies. Here''s a plain-speaking reference guide to all the command-linestuff and nonsense that makes DOS work, whether you''re a native DOSuser or are an occasional dabbler who needs the operating system torun all those cool games under Windows. DOS For Dummies, 3rd Edition, avoids all the technicaljargon to cut to the heart of things with clear, easy-to-understandexplanations and step-by-step help for * Changing disks and drives * Dealing with the DOS prompt * Managing files * Running DOS inside WindowsTrade Review“…excellent and fun to read…” (Mourne Observer & County Down News, 23 July 2003)Table of ContentsIntroduction. PART I: The Absolute Basics. Chapter 1: Getting On with It. Chapter 2: The PC Hokey-Pokey (Or That's What It's AllAbout). Chapter 3: Life at the DOS Prompt. Chapter 4: Easier DOS: The DOS Shell. Chapter 5: The Way Windows Was. Chapter 6: DOS in Windows 95/98. PART II: The Non-Nerd's Guide to PC Hardware. Chapter 7: Your Basic Hardware: What It Is and Why. Chapter 8: RAM (Or Memory, the Way We Were). Chapter 9: The Video Display (That's the Computer Screen). Chapter 10: Keyboard and Mouse (Or Where Is the "Any" Key?). Chapter 11: The Printer (Making the Right Impression). Chapter 12: More on Modems. Chapter 13: All You (Don't) Want to Know about Disks. PART III: The Non-Nerd's Guide to PC Software. Chapter 14: Basic Software Setup. Chapter 15: Software Mystery Grab Bag. Chapter 16: Playing with the Editor. Chapter 17: The Hard Drive: Where You Store Stuff. Chapter 18: File Fitness (Stuff You Do with Files). Chapter 19: Files -- Lost and Found. PART IV: Yikes! (Or Help Me Out of This One!). Chapter 20: When It's Time to Toss In the Towel (And Call a DOSGuru). Chapter 21: After You Panic, Do This. Chapter 22: Diagnosing, Disinfecting, and Getting Help. Chapter 23: DOS Error Messages (What They Mean, What to Do). PART V: The Part of Tens. Chapter 24: Ten Things You Should Do All the Time. Chapter 25: Ten Common Beginner Mistakes. Chapter 26: Ten Things You Should Never Do. Chapter 27: Ten Favorite DOS Commands. DOS Command Reference. Glossary. Index. Book Registration Information.
£16.14
John Wiley & Sons Inc TI83 Plus Graphing Calculator for Dummies
Book SynopsisIf you have a TI-83 Plus graphing calculator, you have a veritable feast of features and functions at your fingertips, but chances are you don't take full advantage of them. This book helps you explore your TI-83 Plus Graphing Calculator. It also helps you to discover how your TI-83 Plus Graphing Calculator can solve various kinds of problems.Table of ContentsIntroduction 1 Part I: Making Friends with the Calculator 7 Chapter 1: Coping with the Basics 9 Chapter 2: Doing Basic Arithmetic 21 Part II: Advanced Functions, Complex Numbers, and Solving Equations 29 Chapter 3: The Math and Angle Menus 31 Chapter 4: Dealing with Complex Numbers 41 Chapter 5: Solving Equations 45 Part III: Dealing with Finances 51 Chapter 6: Finding the Best Deal 53 Chapter 7: Loans and Mortgages 57 Chapter 8: Savings and Investments 63 Part IV: Graphing and Analyzing Functions 67 Chapter 9: Graphing Functions 69 Chapter 10: Exploring Functions 83 Chapter 11: Evaluating Functions 95 Chapter 12: Drawing on a Graph 105 Part V: Sequences, Parametric Equations, and Polar Equations 115 Chapter 13: Graphing Sequences 117 Chapter 14: Exploring Sequences 127 Chapter 15: Parametric Equations 139 Chapter 16: Polar Equations 157 Part VI: Probability and Statistics 177 Chapter 17: Probability 179 Chapter 18: Dealing with Statistical Data 183 Chapter 19: Analyzing Statistical Data 191 Part VII: Dealing with Matrices 203 Chapter 20: Creating and Editing Matrices 205 Chapter 21: Using Matrices 211 Part VIII: Communicating with PCs and Other Calculators 217 Chapter 22: Communicating with a PC with TI Connect TM 219 Chapter 23: Communicating Between Calculators 223 Part IX: The Part of Tens 229 Chapter 24: Ten Great Applications 231 Chapter 25: Eight Common Errors 235 Chapter 26: Eleven Common Error Messages 239 Index 243
£13.59
Wiley TI89 Graphing Calculator For Dummies For Dummies S
Book SynopsisHelps you with: equations and systems of equations; factor polynomials; derivatives and integrals; graph functions, parametric equations, polar equations, and sequences; differential equations and systems of differential equations. This book also helps transfer files between two or more calculators; and save calculator files on your computer.Table of ContentsIntroduction. Part I: Making Friends with the Calculator. Chapter 1: Coping with the Basics. Chapter 2: Doing Basic Arithmetic. Part II: Doing Algebra and Trigonometry. Chapter 3: Solving Equations, Factoring, and Other Great Stuff. Chapter 4: Dealing with Complex Numbers. Part III: Graphing and Analyzing Functions. Chapter 5: Graphing Functions of One Variable. Chapter 6: Exploring Functions. Chapter 7: Analyzing Functions. Part IV: Working with Sequences, Parametric Equations, and Polar Equations. Chapter 8: Graphing Sequences. Chapter 9: Exploring Sequences. Chapter 10: Parametric Equations. Chapter 11: Polar Equations. Part V: Doing Calculus. Chapter 12: Dealing with Differential and Integral Calculus. Chapter 13: Dealing with Vector Calculus. Chapter 14: Graphing Surfaces and Contour Maps. Chapter 15: Dealing with Differential Equations. Part VI: Dealing with Matrices. Chapter 16: Creating and Editing Matrices. Chapter 17: Using Matrices. Part VII: Dealing with Probability and Statistics. Chapter 18: Probability. Chapter 19: Dealing with Statistical Data. Chapter 20: Analyzing Statistical Data. Part VIII: Communicating with PCs and Other Calculators. Chapter 21: Communicating with a PC Using TI Connect. Chapter 22: Communicating between Calculators. Part IX: The Part of Tens. Chapter 23: Ten Great Applications. Chapter 24: Ten Common Errors and Messages. Appendix: Creating Custom Menus. Index.
£13.29
Birkhauser Boston The Mathematics of Internet Congestion Control Systems Control Foundations Applications
Book Synopsis* Recommended by T.Basar, SC series ed.* This text addresses a new, active area of research and fills a gap in the literature. * Bridges mathematics, engineering, and computer science; * Useful as a supplementary text & reference for grad students with some background in control theory;Trade Review"This first book on the mathematics of congestion control [is] very useful for both students and researchers, but also for system engineers developing new Internet protocols. This is an elementary book for graduate students that uses a rich pallet of mathematical tools: convex optimization and control theory (Lyapunov stability and Nyquist criteria and stochastic processes). The tools are summarized well in appendices which makes the book self-contained and easy to read. The book is very well written and will undoubtedly remain a major reference on the topic for years to come." —Mathematical Reviews "This well-written book presents an overview of the mathematics behind internet congestion control. Focusing on the well-established TCP protocol, it starts with a gentle introduction on TCP and the packet/acknowledgement structure of the internet, before proceeding to congestion and the principles of congestion control…. Overall, this book presents in an easy-to-understand way the principles of internet congestion control with a focus on the mathematical concepts behind them. The book concludes with a useful index and a rich source of bibliographical references." —Zentralblatt Math "The investigation of fairness, efficiency, and dynamics of TCP led to the development of a new fast-growing research domain of mathematical models for congestion control. The Mathematics of Internet Congestion Control by R. Srikant provides a valuable comprehensive introduction to this new exciting research area. …Using mathematical models, Srikant successfully explains the principal ideas behind Internet congestion control. The publication of the book is very timely. Currently, there are no other books on mathematical models for congestion control. …All material in the book is accessible to graduate or even undergraduate students of mathematical and electrical engineering disciplines. Many chapters are supplied with appendices which review the necessary background material and make the book self-contained. In conclusion, this book can be equally recommended for beginners as well as for expert researchers working in the domain of congestion control. For beginners, the book will be a good starting point from which to explore a vast and rapidly growing body of literature on the subject of Internet congestion control. For expert researchers, the book will definitely help to place congestion control in perspective and will point to new avenues in this exciting research domain." —SIAM Book Reviews Table of ContentsPreface Introduction Resource Allocation Congestion Control: A Decentralized Solution Relationship to Current Internet Protocols Linear Analysis with Delay: The Single Link Case Linear Analysis with Delay: The Network Case Global Stability for a Single Link and Single Flow Stochastic Models and Their Deterministic Limits Connection-level Models Real-Time Sources and Distributed Admission Control Conclusions References Index
£42.74
O'Reilly Media AI at the Edge
Book SynopsisThis practical guide gives engineering professionals, including product managers and technology leaders, an end-to-end framework for solving real-world industrial, commercial, and scientific problems with edge AI.
£51.19
Cambridge University Press Digital Design Using VHDL
Book SynopsisProvides students with a system-level perspective and the tools they need to understand, analyze and design complete digital systems using VHDL. It goes beyond the design of simple combinational and sequential modules to show how such modules are used to build complete systems, reflecting digital design in the real world.Table of ContentsPart I. Introduction: 1. The digital abstraction; 2. The practice of digital system design; Part II. Combinational Logic: 3. Boolean algebra; 4. CMOS logic circuits; 5. Delay and power of CMOS circuits; 6. Combinational logic design; 7. VHDL descriptions of combinational logic; 8. Combinational building blocks; 9. Combinational examples; Part III. Arithmetic Circuits: 10. Arithmetic circuits; 11. Fixed- and floating-point numbers; 12. Fast arithmetic circuits; 13. Arithmetic examples; Part IV. Synchronous Sequential Logic: 14. Sequential logic; 15. Timing constraints; 16. Datapath sequential logic; 17. Factoring finite-state machines; 18. Microcode; 19. Sequential examples; Part V. Practical Design: 20. Verification and test; Part VI. System Design: 21. System-level design; 22. Interface and system-level timing; 23. Pipelines; 24. Interconnect; 25. Memory systems; Part VII. Asynchronous Logic: 26. Asynchronous sequential circuits; 27. Flip-flops; 28. Metastability and synchronization failure; 29. Synchronizer design; Appendix A. VHDL coding style; Appendix B. VHDL syntax guide; References; Index.
£62.99
John Wiley & Sons Inc Switching to a Mac For Dummies
Book SynopsisLearn how to make the switch from PC to Mac a completely smooth transition The number of Mac users continues to increase significantly each year.Table of ContentsIntroduction 1 Part I: Informed Switching Starts Here 7 Chapter 1: Why Switch? Demystifying the Mac Mantra 9 Chapter 2: Meet the Mac Family 23 Chapter 3: Deciding What to Buy 49 Part II: Making the Switch 83 Chapter 4: The Big Day: Setting Up Your Mac 85 Chapter 5: Mac OS X for Windows Users 99 Chapter 6: Moving Files from Your PC to the Mac 131 Chapter 7: Switching Applications 149 Part III: Connecting Hither and Yon 169 Chapter 8: Getting Your Mac Online 171 Chapter 9: Networking the Mac Way 195 Chapter 10: Staying Secure in a Connected World 215 Chapter 11: Connecting with iDevices, iTunes, and iCloud 235 Part IV: More Software, More Choices 247 Chapter 12: Picturing iPhoto 249 Chapter 13: Producing Movies and Music on Your Mac 261 Chapter 14: Building Your Space on the Web 273 Chapter 15: Enjoying Other OS X Goodies 283 Chapter 16: Oops, It’s a PC: Running Windows on Your Mac 297 Part V: Specialty Switching Scenarios 307 Chapter 17: Switching with the Whole Family in Mind 309 Chapter 18: Switching Your Business to Macs 329 Chapter 19: Desktop to Dashcode: OS X Advanced 335 Part VI: The Part of Tens 347 Chapter 20: Ten Terrific Troubleshooting Tips 349 Chapter 21: Ten Ways Your Mac Can Help the Planet 361 Chapter 22: Ten Creative Uses for Your Old PC 369 Appendix: Mac Speak versus Windows Speak: A Translation Glossary 373 Index 401 Bonus Chapter 1: Converting from OS 9 and Other Operating Systems BC 1
£16.99
John Wiley & Sons Inc VMware vSphere Design
Book SynopsisAchieve the performance, scalability, and ROI your business needs What can you do at the start of a virtualization deployment to make things run more smoothly? If you plan, deploy, maintain, and optimize vSphere solutions in your company, this unique book provides keen insight and solutions. From hardware selection, network layout, and security considerations to storage and hypervisors, this book explains the design decisions you''ll face and how to make the right choices. Written by two virtualization experts and packed with real-world strategies and examples, VMware vSphere Design, Second Edition will help you design smart design decisions. Shows IT administrators how plan, deploy, maintain, and optimize vSphere virtualization solutions Explains the design decisions typically encountered at every step in the process and how to make the right choices Covers server hardware selection, network topology, security, storage, vTable of ContentsIntroduction xxi Chapter 1 • An Introduction to Designing VMware Environments 1 What is Design? 1 The Facets of vSphere Design 5 The Technical Facet 6 The Organizational Facet 7 The Operational Facet 8 The Principles of Design 9 Availability 9 Manageability 10 Performance 10 Recoverability 10 Security 11 The Process of Design 11 Gathering and Defining Functional Requirements 11 Assessing the Environment 13 Performing a Gap Analysis 14 Assembling the Design 15 Documenting the Design 16 Performing the Implementation 17 Summary 17 Chapter 2 • The ESXi Hypervisor 19 Evolution of the vSphere Hypervisor 19 The ESXi Concept 21 ESXi Design 22 ESXi Components 22 ESXi Agents 23 ESXi System Image 24 ESXi Customized Images 25 ESXi Disk Layout 27 Tardisks and Ramdisks 29 ESXi Deployment 29 Hardware Requirements 29 ESXi Flavors: Installable, Embedded, and Stateless 29 Auto Deploy Infrastructure 36 Comparing Deployments Options 38 Upgrading ESXi 41 Migrating from ESX 42 Testing 42 Deployment 43 Management 44 Postinstallation Design Options 45 Management Tools Overview 51 Host-Management Tools 51 Centralized Management Tools 54 Hardware Monitoring 56 Logging 57 Summary 58 Chapter 3 • The Management Layer 59 Reviewing the Components of the Management Layer 59 VMware vCenter Server 59 vSphere Client and vSphere Web Client 62 vSphere Update Manager 63 Management Applications 64 Examining Key Management Layer Design Decisions 69 Virtual or Physical vCenter Server? 70 vCenter Server on Windows or vCenter Server Appliance? 72 Local or Remote Database Server? 73 Which Operating System for vCenter Server? 75 Creating the Management Layer Design 76 Availability 76 Manageability 82 Performance 86 Recoverability 92 Security 92 Summary 94 Chapter 4 • Server Hardware 95 Hardware Considerations 95 Factors in Selecting Hardware 96 Computing Needs 99 Server Constraints 101 Differentiating among Vendors 104 Server Components 106 CPU 107 RAM 110 NUMA 117 Motherboard 118 Storage 118 Network 119 PCI 119 Preparing the Server 121 Configuring the BIOS 122 Other Hardware Settings 122 Burn-in 123 Preproduction Checks 123 Scale-Up vs Scale-Out 123 Advantages of Scaling Up 125 Advantages of Scaling Out 126 Scaling is a Matter of Perspective 127 Risk Assessment 127 Choosing the Right Size 128 CPU to Memory Design Ratio 129 Sizing the Hosts 130 Blade Servers vs Rack Servers 131 Blade Servers 132 Rack Servers 135 Form-Factor Conclusions 136 Alternative Hardware Approaches 136 Cloud Computing 136 Converged Hardware 138 Summary 139 Chapter 5 • Designing Your Network 141 Examining Key Network Components 141 Physical Connectivity 142 Network Traffic Types 142 Software Components 144 Exploring Factors Influencing the Network Design 144 Physical Switch Support 145 vSwitches and Distributed vSwitches 152 IP-Based Storage 154 10Gb Ethernet 156 I/O Virtualization 158 SR-IOV and DirectPath I/O 159 Server Architecture 160 Crafting the Network Design161 Availability 161 Manageability 168 Performance 171 Recoverability 173 Security 174 Design Scenarios 177 Two NICs 177 Four NICs 178 Six NICs 178 Eight NICs 179 Looking to the Future 180 Summary 180 Chapter 6 • Storage 181 Dimensions of Storage Design 181 Storage Design Factors 182 Storage Efficiency 183 vSphere Storage Features 186 Designing for Capacity 186 RAID Options 187 Estimating Capacity Requirements 189 VMFS Capacity Limits 190 Large or Small Datastores? 191 Thin Provisioning 193 Data Deduplication 195 Array Compression 196 Downside of Saving Space 197 Designing for Performance197 Measuring Storage Performance 197 How to Calculate a Disk’s IOPS 197 What Can Affect a Storage Array’s IOPS? 198 Measuring Your Existing IOPS Usage 206 Local Storage vs Shared Storage 207 Local Storage 207 What about Local Shared Storage? 209 Shared Storage 212 Choosing a Protocol 212 Fibre Channel 215 iSCSI 218 NFS 221 Protocol Choice 224 Multipathing 225 SAN Multipathing 225 NAS Multipathing 229 vSphere Storage Features 229 vSphere Storage APIs 230 Performance and Capacity 233 Storage Management 242 Summary 247 Chapter 7 • Virtual Machines 249 Components of a Virtual Machine 249 Base Virtual Machine Hardware 251 Hardware Versions 251 Virtual Machine Maximums 253 Hardware Choices 253 Removing or Disabling Unused Hardware 259 Virtual Machine Options 259 SDRS Rules 263 vApp Options 263 vServices 263 Naming Virtual Machines 263 VMware Tools 264 Notes, Custom Attributes, and Tagging 264 Sizing Virtual Machines 265 Virtual Machine CPU Design 265 Cores per Socket 267 CPU Hot Plug 267 Resources 268 Additional CPU Settings 269 Virtual Machine Memory Design 270 Resources 271 Additional Memory Settings 272 Virtual Machine Storage Design 272 Disks 273 Disk Types 274 Disk Shares and IOPS Limits 275 Disk Modes 275 SCSI Controllers 276 RDMs 277 Storage vMotion 279 Cross-Host vMotion 279 VM Storage Profile 280 Virtual Machine Network Design 280 vNIC Drivers 281 MAC Addresses 284 VLAN Tagging 284 Guest Software 285 Selecting an OS 285 Guest OS and Application Licensing 286 Disk Alignment 287 Defragmentation 288 Optimizing the Guest for the Hypervisor 289 Clones, Templates, and vApps 291 Clones 291 Templates 292 Preparing a Template 293 Virtual Appliances 294 OVF Standard 295 vApps 295 Virtual Machine Availability 295 vSphere VM Availability 296 Third-Party VM Clustering 298 vCenter Infrastructure Navigator 302 Summary 303 Chapter 8 • Datacenter Design 305 vSphere Inventory Structure 305 Inventory Root 306 Folders 307 Datacenters 307 Clusters 309 Resource Pools 309 Hosts 309 Virtual Machines 309 Templates 309 Storage 309 Networks 310 Why and How to Structure 310 Clusters 311 EVC 313 Swapfile Policy 313 Cluster Sizing 314 Resource Pools 315 Resource Pool Settings 317 Admission Control 319 Distributed Resource Scheduling 319 Load Balancing 319 Affinity Rules 324 Distributed Power Management 327 High Availability and Clustering 331 High Availability 331 Fault Tolerance 347 Summary 355 Chapter 9 • Designing with Security in Mind 357 Why is Security Important? 357 Separation of Duties 358 Risk Scenario 358 Risk Mitigation 359 vCenter Server Permissions 360 Risk Scenario 360 Risk Mitigation 360 Security in vCenter Linked Mode 363 Risk Scenario 363 Risk Mitigation 363 Command-Line Access to ESXi Hosts 365 Risk Scenario 365 Risk Mitigation 366 Managing Network Access 368 Risk Scenario 368 Risk Mitigation 369 The DMZ 371 Risk Scenario 371 Risk Mitigation 372 Firewalls in the Virtual Infrastructure 375 The Problem 375 The Solution 376 Change Management 378 Risk Scenario 378 Risk Mitigation 378 Protecting the VMs 379 Risk Scenario 379 Risk Mitigation 380 Protecting the Data 381 Risk Scenario 382 Risk Mitigation 382 Cloud Computing 383 Risk Scenario 383 Risk Mitigation 384 Auditing and Compliance 385 The Problem 385 The Solution 385 Summary 387 Chapter 10 • Monitoring and Capacity Planning 389 Nothing is Static 389 Building Monitoring into the Design 390 Determining the Tools to Use 390 Selecting the Items to Monitor 396 Selecting Thresholds 398 Taking Action on Thresholds 399 Alerting the Operators 400 Incorporating Capacity Planning in the Design 400 Planning before Virtualization 401 Planning during Virtualization 405 Summary 408 Chapter 11 • Bringing a vSphere Design Together 411 Sample Design 411 Business Overview for XYZ Widgets 411 Hypervisor Design 413 vSphere Management Layer 413 Server Hardware 413 Networking Configuration 414 Shared Storage Configuration 414 VM Design 415 VMware Datacenter Design 415 Security Architecture 415 Monitoring and Capacity Planning 416 Examining the Design 416 Hypervisor Design 416 vSphere Management Layer 417 Server Hardware 418 Networking Configuration 419 Shared Storage Configuration 421 VM Design 423 VMware Datacenter Design 423 Security Architecture 424 Monitoring and Capacity Planning 424 Summary 425 Chapter 12 • vCloud Design 427 Differences between Cloud and Server Virtualization 428 Role of vCloud Director in Cloud Architecture 429 vCloud Director Use Cases 430 Use Case #1 432 Use Case #2 432 Use Case #3 432 Use Case #4 433 Components of the vCloud Management Stack 433 vCloud Cell and NFS Design Considerations 435 Management vs Consumable Resources 437 Database Concepts 438 vCenter Design 439 vCloud Management: Physical Design 442 The Physical Side of Provider Virtual Datacenters 444 The Logical Side of Provider Virtual Datacenters 449 Network Pool Decisions 455 External Networks 456 Designing Organizations, Catalogs, and Policies 461 Correlating Organizational Networks to Design 464 End Users and vApp Networking 466 Designing Organization Virtual Datacenters 470 Multiple Sites 476 Backup and Disaster Recovery 477 Summary 478 Index 479
£28.49
John Wiley & Sons Inc Windows Server 2012 HyperV Installation and
Book SynopsisGo-to guide for using Microsoft''s updated Hyper-V as a virtualization solution Windows Server 2012 Hyper-Voffers greater scalability, new components, and more options than ever before for large enterprise systems and small/medium businesses. Windows Server 2012 Hyper-V Installation and Configuration Guide is the place to start learning about this new cloud operating system. You''ll get up to speed on the architecture, basic deployment and upgrading, creating virtual workloads, designing and implementing advanced network architectures, creating multitenant clouds, backup, disaster recovery, and more. The international team of expert authors offers deep technical detail, as well as hands-on exercises and plenty of real-world scenarios, so you thoroughly understand all features and how best to use them. Explains how to deploy, use, manage, and maintain the Windows Server 2012 Hyper-V virtualization solutions in large enterprises and small- to mTable of ContentsIntroduction xxv Part 1 • The Basics 1 Chapter 1 • Introducing Windows Server 2012 Hyper-V 3 Virtualization and Cloud Computing 4 Computing of the Past: Client/Server 4 Computing of the Recent Past: Virtualization 5 Computing of the Present: Cloud Computing 8 Windows Server 2012: Beyond Virtualization 9 Windows Server 2012 Hyper-V 11 The Technical Requirements of Hyper-V 11 The Architecture of Hyper-V 12 Maximum Scalability 15 Supported Guest Operating Systems 18 Licensing Windows Server 2012 in Virtualization 18 Common Misunderstandings in Licensing 19 Windows Server 2012 Licensing 20 Hyper-V Server 2012 23 Virtualization Scenarios 24 VMware 26 Migrating from VMware 27 Transferring Skills to Hyper-V 27 Other Essential Knowledge 28 Microsoft Assessment and Planning Toolkit 28 PowerShell 29 Chapter 2 • Deploying Hyper-V 33 Preparing a Hyper-V Deployment 33 Design and Architecture 33 Hardware 36 Operating System 39 Don’t Forget the Documentation 41 Windows PowerShell 42 Building the First Hyper-V Host 43 Preparing Windows Server 43 Installing the Hyper-V Role 47 Configuring the Hyper-V Host 48 Providing Security 54 Managing Hyper-V 56 Hyper-V Management Console 57 Hyper-V PowerShell 57 Server Core 59 Upgrading Hyper-V 61 Performing In-Place Migration 62 Using the Windows Server Migration Tools 62 Exporting and Importing Virtual Machines 62 Upgrading Integration Services 64 Real World Solutions 65 Chapter 3 • Managing Virtual Machines 71 Creating Virtual Machines 71 Create a Virtual Machine by Using the New Virtual Machine Wizard 72 Create a Virtual Machine by Using PowerShell 77 Designing Virtual Machines 78 Virtual Machine Maximums 78 Auto-Start and Auto-Stop Actions 81 Dynamic Memory 83 Processors 95 Virtual Storage 100 Network Adapters 111 Performing Virtual Machine Operations 117 Adding and Removing Virtual Hardware 117 Working with Snapshots 118 Using Live Migration 124 Importing and Exporting Virtual Machines 138 Installing Operating Systems and Applications 140 Installing Operating Systems 140 Using Virtual Machine Templates 142 Designing Virtual Machines for Applications 143 Performance Monitoring of Guest Operating Systems 143 Real World Solutions 144 Replacing Virtual Switches 144 Performing Simultaneous Live Migration 144 Rapid Virtual Machine Creation 146 Part 2 • Advanced Networking and Cloud Computing 153 Chapter 4 • Networking 155 Basic Hyper-V Networking 155 Using the Hyper-V Extensible Virtual Switch 156 Supporting VLANs 166 Supporting NIC Teaming 171 Networking Hardware Enhancements 183 Single-Root I/O Virtualization 183 Receive-Side Scaling 187 Dynamic Virtual Machine Queuing 190 IPsec Task Offload 191 Advanced Networking 191 Quality of Service 191 Converged Fabrics 201 Real World Solutions 210 Implementing RSS and DVMQ 210 Creating Converged Fabrics with Isolated SMB Storage 213 Creating Converged Fabrics with DCB and SR-IOV 216 Chapter 5 • Cloud Computing 219 Clouds, Tenants, and Segregation 220 The Multi-Tenancy Era 220 Segregation by Isolation 221 Microsoft Network Virtualization 223 Encapsulated Network Virtualization 224 Network Virtualization Abstraction 225 Network Virtualization at Work 232 Network Virtualization Gateways 251 PVLANs 252 Understanding PVLAN Structure 254 Understanding How PVLANs Work 255 Configuring Private VLANs 259 Summary 263 Port Access Control Lists 263 How ACLs Work 263 Extensible Switch Packet Filter 264 DHCP Guard 266 Router Advertisement Guard 267 Hyper-V Virtual Machine Metrics 268 Real World Solutions 270 Part 3 • Storage and High Availibility 273 Chapter 6 • Microsoft iSCSI Software Target 275 Introducing the Microsoft iSCSI Software Target 275 The Microsoft iSCSI Solution 276 Changes in Windows Server 2012 278 Design and Architecture 280 Building the iSCSI Target 283 Installing a Stand-Alone iSCSI Target 283 Installing a Clustered iSCSI Target 284 Transforming a Stand-Alone to a Clustered iSCSI Target 285 Configuring the iSCSI Target 286 Connecting the Initiator 288 Managing the iSCSI Target Server 289 Storage Providers 289 iSCSI Target SMI-S Provider 289 Best Practice Analyzer 292 PowerShell 293 Migrating 295 Migration to Windows Server 2012 295 VHD Conversion 295 Chapter 7 • Using File Servers 297 Introducing Scale-Out File Servers 298 Limitations in Availability and Performance with Windows Server 2008 R2 299 Technical Overview of the Key Changes 300 Installing and Configuring Scale-Out File Servers 309 Complying with Installation Prerequisites 310 Configuring Failover Clustering 311 Configuring Scale-Out File Services 315 Configuring a Continuously Available File Share 316 Windows Server 2012 SMB PowerShell 318 Windows Server 2012 Hyper-V over SMB 30 319 Some Real-World Examples 320 Configuring Windows Server 2012 Hyper-V to Use Scale-Out File Server Cluster 322 Configuring SQL Server to Use Scale-Out File Server Cluster 325 Troubleshooting Scale-Out File Servers 329 Using Troubleshooting Tools 329 Troubleshooting Client Network Connectivity Issues 332 Troubleshooting Access Denied Issues 333 Troubleshooting Cluster Resource Issues 333 Real World Solutions 333 Chapter 8 • Building Hyper-V Clusters 335 Introduction to Building Hyper-V Clusters 335 Active Directory Integration 337 Failover Clustering Installation 337 Performing Validation 338 Running Cluster Validation 338 Creating a Failover Cluster 342 Adding Disks 344 Configuring Network Prioritization 345 Cluster Shared Volumes 346 Cluster Shared Volumes Compatibility 346 Prerequisites 347 Enabling Cluster Shared Volumes 348 CSV Namespace 348 CSV Resiliency 348 CSV Optimizations 349 CSV Best Practices 350 BitLocker 351 Prerequisites 351 Installing BitLocker 351 Configuring BitLocker on Cluster Shared Volumes 352 Cluster-Aware Updating 357 Prerequisites 359 Installing and Configuring CAU 360 Highly Available Virtual Machine 370 Implementing a Highly Available Virtual Machine 370 Examining the Virtual Machine Role 371 Virtual Machine Mobility 375 Live-Migrating Virtual Machines 376 Using Live Storage Migration 376 Real World Solutions 378 Chapter 9 • Virtual SAN Storage and Guest Clustering 379 Introduction to Virtual SAN Storage 379 Overview of Virtual Fibre Channel 380 Guest Clustering 388 Guest Clustering on a Single Host 388 Guest Clustering across Physical Hosts 389 Guest Clustering across Physical Hosts and Virtual Machines 390 Creating a Guest-Based Cluster 391 Virtual Machine Preparation 391 Virtual Machine Monitoring 393 Configuring Virtual Machine Monitoring 395 Real World Solutions 399 Part 4 • Advanced Hyper-V 401 Chapter 10 • Backup and Recovery 403 How Backup Works with Hyper-V 403 Volume Shadow Copy Service Framework 403 Virtual Machine Backup Strategies 406 Choosing a Backup Strategy 409 Improvements in Windows Server 2012 Hyper-V Backup 410 Incremental Backup 410 Windows Server Backup 411 Distributed CSV Snapshots 412 VSS for SMB File Shares 414 Using Windows Server Backup 418 Installing Windows Server Backup 419 Protecting Nonclustered Hyper-V Hosts 419 Protecting Hyper-V Clusters 425 The Impact of Backup on the Network 426 Real World Solutions 427 Using WSB to Back up a Hyper-V Host and Retain Backup Data 427 Performing Automated WSB Backup of a Hyper-V Cluster 429 Chapter 11 • Disaster Recovery 431 Introducing Disaster Recovery 431 The Evolution of Disaster Recovery 432 Virtualization Simplifies DR 433 DR Architecture for Windows Server 2012 Hyper-V 434 DR Requirements 435 Synchronous and Asynchronous Replication 436 DR Architectures 438 DR Replication Solutions 440 Virtual Machine Connectivity 446 Implementation of a Hyper-V Multi-site Cluster 456 Replication Link Networking 456 Multi-site Cluster Quorum 457 Tuning Cluster Heartbeat 462 Preferred Owners (Hosts) 463 Summarizing Multi-site Clusters 465 Real World Solutions 465 Designing Hybrid DR 465 Designing Hosted Disaster Recovery 466 Chapter 12 • Hyper-V Replica 469 Introducing Hyper-V Replica 469 How Hyper-V Replica Works 470 Target Markets for Hyper-V Replica 471 Hyper-V Replica Requirements 472 Bandwidth Requirements 472 What Can You Replicate Between? 473 Enabling Hyper-V Replica between Nonclustered Hosts 475 Enabling Virtual Machine Replication 478 Understanding Copy Methods 479 Replicating a Virtual Machine with Network Copy 480 Replicating a Virtual Machine with Removable Media 486 Replicating a Virtual Machine with Offsite Recovery 488 Using Authentication with Certificates 489 Understanding Certificate Requirements 489 Enabling Hyper-V Replica with HTTPS 490 Replicating Virtual Machines via HTTPS 491 Using Advanced Authorization and Storage 491 Using Hyper-V Replica with Clusters 493 Understanding the Hyper-V Replica Broker 493 Creating the Hyper-V Replica Broker 495 Allowing Replication from a Cluster 497 Allowing Replication to a Cluster 498 Exploring Hyper-V Replica in Greater Detail 498 Hyper-V Replica Logging and Swapping 499 Resynchronization 499 The Performance Impact of Hyper-V Replica 500 Managing Hyper-V Replica 501 Monitoring Replication 501 Managing Replication 504 Setting Up Failover Networking 505 Failover TCP/IP 505 Test Failover Virtual Switch 506 Failing Over Virtual Machines 508 Performing a Test Failover 508 Returning to the Production Site 510 Performing a Planned Failover 510 Performing an Unplanned Failover 512 Summarizing Hyper-V Replica 513 Real World Solutions 514 Enabling Replication for Lots of Virtual Machines 514 Running a Planned Failover 515 Scripting an Ordered Unplanned Failover 517 Chapter 13 • Using Hyper-V for Virtual Desktop Infrastructure 521 Using Virtual Desktops, the Modern Work Style 521 What Is VDI? 521 The Benefits of Using Hyper-V for VDI 522 Changes in Windows Server 2012 523 Design and Architecture 524 Building a Microsoft VDI Environment 529 Installing Remote Desktop Services 529 Installing RD Virtualization Hosts 534 Deploying Virtual Guests 536 Connecting to the VDI Environment 539 Real World Solutions 541 Index 543
£42.75
John Wiley & Sons Inc Cabling
Book SynopsisDevelop the skills you need to design and build a reliable, cost-effective cabling infrastructure Fully updated for the growing demand of fiber optics for large-scale communications networks and telecommunication standards, this new edition is organized into two parts.Table of ContentsIntroduction xxxiii Part I LAN Networks and Cabling Systems 1 Chapter 1 Introduction to Data Cabling 3 Chapter 2 Cabling Specifications and Standards 57 Chapter 3 Choosing the Correct Cabling 103 Chapter 4 Cable System and Infrastructure Constraints 133 Chapter 5 Cabling System Components 157 Chapter 6 Tools of the Trade 183 Chapter 7 Copper Cable Media 215 Chapter 8 Fiber-Optic Media 255 Chapter 9 Wall Plates 281 Chapter 10 Connectors 299 Chapter 11 Network Equipment 325 Chapter 12 Wireless Networks 343 Chapter 13 Cabling System Design and Installation 367 Chapter 14 Cable Connector Installation 401 Chapter 15 Cable System Testing and Troubleshooting 433 Chapter 16 Creating a Request for Proposal 467 Chapter 17 Cabling @ Work: Experience from the Field 493 Part II Fiber-Optic Cabling and Components 507 Chapter 18 History of Fiber Optics and Broadband Access 509 Chapter 19 Principles of Fiber-Optic Transmission 519 Chapter 20 Basic Principles of Light 539 Chapter 21 Optical Fiber Construction and Theory 555 Chapter 23 Safety 605 Chapter 24 Fiber-Optic Cables 621 Chapter 25 Splicing 653 Chapter 26 Connectors 693 Chapter 27 Fiber-Optic Light Sources and Transmitters 763 Chapter 28 Fiber-Optic Detectors and Receivers 793 Chapter 29 Passive Components and Multiplexers 819 Chapter 30 Passive Optical Networks 849 Chapter 31 Cable Installation and Hardware 869 Chapter 32 Fiber-Optic System Design Considerations 903 Chapter 33 Test Equipment and Link/Cable Testing 941 Chapter 34 Troubleshooting and Restoration 995 Appendices 1037 Appendix A The Bottom Line 1039 Appendix B Cabling Resources 1097 Appendix C Registered Communications Distribution Designer (RCDD) Certification 1103 Appendix D Home Cabling: Wiring Your Home for Now and the Future 1109 Appendix E Overview of IEEE 1394 and USB Networking 1115 Appendix F The Electronics Technicians Association, International (ETA) Certifications 1121 Glossary Index 1241
£66.60
John Wiley & Sons Inc Adventures in Python
Book SynopsisThe complete beginner's guide to Python, for young people who want to start today Adventures in Python is designed for 11-to 15-year olds who want to teach themselves Python programming, but don't know where to start.Table of ContentsIntroduction 1 Adventure 1 Diving into Python 23 What Is Programming? 24 Opening IDLE 25 Returning to Your First Python Program 26 It Isn’t Working—Grrr! 28 Using a File Editor 30 Asking Questions with Variables 33 A Bit About Variables 35 Using Variables for a Fill-in-the-Blanks Story 37 Making the Program Make Decisions: Conditionals 39 Using if Statements 39 Nested if Statements 41 Creating an Imaginary Vending Machine 43 Repeating Code with Loops 45 Using while Loops 45 Infinite while Loops 47 Praise Generator 48 A Bigger Adventure: Spaceship Control Console 50 Set-Up and Password 50 Using the Console to Do Things 52 Adventure 2 Drawing with Turtle Graphics 57 Getting Started with Turtle 57 Using Variables to Change Angles and Lengths 61 Using Addition to Draw a Spiral 64 Saving Some Space with Loops 65 A Shape with 360 Sides: Drawing a Circle 67 Controlling the Number of Sides Using for Loops 68 Changing the Fill Colour in a Shape 71 Creating Functions to Reuse Your Code 72 Shape Presets 75 Adding Randomly Generated Pictures 76 Adventure 3 Windows, Buttons, and Other GUI Stuff 83 Creating Buttons 84 Changing the Button Text on Click 87 Counting Clicks 88 Creating Text Boxes 90 Writing It Backwards 92 Adding Passwords 93 Building a Random Sentence Generator 96 Programming a Guessing Game 99 Adventure 4 More GUI Elements with Tkinter 105 Creating Sliders 105 How Colours Work on Computers and as Hexadecimal Values 109 Changing the Canvas Colour 111 Making the Colour Picker 113 Adding a Text Box 116 Creating a Click Speed Game 117 Adventure 5 Drawing Shapes with PyGame 123 Installing PyGame 123 My First PyGame 124 Creating Rectangles 127 Creating a Rectangle 127 A Rainbow of Rectangles 128 Colour Grid 131 Creating Ellipses 133 Wobbling Circle 133 Saving Your Images 135 Saving a Single Image 135 Saving a Series of Images 136 Adventure 6 Adding Keyboard Input with PyGame 139 Using Keyboard Input 140 Other Keys You Can Use 142 Creating the Game 142 Introducing Full Movement 146 Moving the Player Offscreen 148 Adding the Ball 150 Creating Collisions 152 Goal! 154 Adding a Time Limit 157 Adventure 7 Creative Ways to Use a Mouse with PyGame 161 Getting the Mouse Position 161 Making a Button 163 Moving Target 166 Exploding Clicks 169 Making a Mesh 172 Creating Mouse Trails 175 Adventure 8 Using Images with PyGame 181 Loading an Image 181 Layering Images 184 Randomly Layering Images 186 Adding a Moustache to a Photograph 188 Making Sprites 191 Creating a Walking Animation 191 Walking in All Directions 195 Teleportation 197 Adventure 9 Using Sounds and Music with PyGame 203 Playing Sounds 203 Creating a Noise Loop 205 Making Keyboard Sound Effects 207 Using Music with Python 210 Playing Music 210 Adding Volume Tremolo 212 Making a Music Player 215 Adding Sounds and Music to a Game 218 Adventure 10 Your Really Big Adventure 223 Writing the Program for the Game 224 Setting Up the Files 224 Making the Game 225 Walls 226 Doors, Collisions and Coins 229 Setting Up the Window and Variables 231 Adding the Game Loop 234 Character Controls and Animations 234 Player Collisions and Collecting Coins 237 Displaying Points and Updating the Window 237 Playing the Game 238 Debugging the Game 239 Summary 240 Appendix A Installing and Downloading the Proper Files 243 Installing PyGame 243 Windows 8 243 Windows 7 245 Mac 245 Linux (Ubuntu) 247 Raspberry Pi 248 Downloading the Files for Adventures 8, 9 and 10 248 Windows 8 248 Windows 7 249 Mac 249 Linux (Ubuntu) 250 Raspberry Pi 250 Glossary 251 Index 257
£12.75
John Wiley & Sons Inc Operating System Concepts Essentials Binder Ready
Book Synopsis
£84.50
John Wiley & Sons Inc Learning Computer Architecture with Raspberry Pi
Book SynopsisUse your Raspberry Pi to get smart about computing fundamentals In the 1980s, the tech revolution was kickstarted by a flood of relatively inexpensive, highly programmable computers like the Commodore. Now, a second revolution in computing is beginning with the Raspberry Pi. Learning Computer Architecture with the Raspberry Pi is the premier guide to understanding the components of the most exciting tech product available. Thanks to this book, every Raspberry Pi owner can understand how the computer works and how to access all of its hardware and software capabilities. Now, students, hackers, and casual users alike can discover how computers work with Learning Computer Architecture with the Raspberry Pi. This book explains what each and every hardware component does, how they relate to one another, and how they correspond to the components of other computing systems. You''ll also learn how programming works and how the operating system relates to tTable of ContentsIntroduction 1 Cambridge 1 Cut to the Chase 3 The Knee in the Curve 4 Forward the Foundation 5 Chapter 1 The Shape of a Computer Phenomenon 7 Growing Delicious, Juicy Raspberries 7 System-on-a-Chip 10 An Exciting Credit Card-Sized Computer 12 What Does the Raspberry Pi Do? 14 Meeting and Greeting the Raspberry Pi Board 14 GPIO Pins 15 Status LEDs 16 USB Receptacles 18 Ethernet Connection 18 Audio Out 19 Composite Video 21 CSI Camera Module Connector 21 HDMI 22 Micro USB Power 22 Storage Card 23 DSI Display Connection 24 Mounting Holes 25 The Chips 25 The Future 25 Chapter 2 Recapping Computing 27 The Cook as Computer 28 Ingredients as Data 28 Basic Actions 30 The Box That Follows a Plan 31 Doing and Knowing 31 Programs are Data 32 Memory 33 Registers 34 The System Bus 36 Instruction Sets 36 Voltages, Numbers and Meaning 37 Binary: Counting in 1s and 0s 37 The Digit Shortage 40 Counting and Numbering and 0 40 Hexadecimal as a Shorthand for Binary 41 Doing Binary and Hexadecimal Arithmetic 43 Operating Systems: The Boss of the Box 44 What an Operating System Does 44 Saluting the Kernel 46 Multiple Cores 46 Chapter 3 Electronic Memory 47 There Was Memory Before There Were Computers 47 Rotating Magnetic Memory 48 Magnetic Core Memory 50 How Core Memory Works 50 Memory Access Time 52 Static Random Access Memory (SRAM) 53 Address Lines and Data Lines 54 Combining Memory Chips into Memory Systems 56 Dynamic Random Access Memory (DRAM) 59 How DRAM Works 60 Synchronous vs. Asynchronous DRAM 62 SDRAM Columns, Rows, Banks, Ranks and DIMMs 64 DDR, DDR2 DDR3 and DDR4 SDRAM 66 Error-Correcting Code (ECC) Memory 69 The Raspberry Pi Memory System 70 Power Reduction Features 70 Ball-Grid Array Packaging 71 Cache 72 Locality of Reference 72 Cache Hierarchy 72 Cache Lines and Cache Mapping 74 Direct Mapping 76 Associative Mapping 78 Set-Associative Cache 79 Writing Cache Back to Memory 81 Virtual Memory 81 The Virtual Memory Big Picture 82 Mapping Virtual to Physical 83 Memory Management Units: Going Deeper 84 Multi-Level Page Tables and the TLB 88 The Raspberry Pi Swap Problem 88 Watching Raspberry Pi Virtual Memory 90 Chapter 4 ARM Processors and Systems-on-a-Chip 93 The Incredible Shrinking CPU 93 Microprocessors 94 Transistor Budgets 95 Digital Logic Primer 95 Logic Gates 96 Flip-Flops and Sequential Logic 97 Inside the CPU 99 Branching and Flags 101 The System Stack 102 System Clocks and Execution Time 105 Pipelining 106 Pipelining in Detail 108 Deeper Pipelines and Pipeline Hazards 109 The ARM11 Pipeline 112 Superscalar Execution 113 More Parallelism with SIMD 115 Endianness 118 Rethinking the CPU: CISC vs. RISC 119 RISC's Legacy 121 Expanded Register Files 122 Load/Store Architecture 122 Orthogonal Machine Instructions 123 Separate Caches for Instructions and Data 123 ARMs from Little Acorns Grow 124 Microarchitectures, Cores and Families 125 Selling Licenses Rather Than Chips 125 ARM11 126 The ARM Instruction Set 126 Processor Modes 129 Modes and Registers 131 Fast Interrupts 137 Software Interrupts 137 Interrupt Priority 138 Conditional Instruction Execution 139 Coprocessors 142 The ARM Coprocessor Interface 143 The System Control Coprocessor 143 The Vector Floating Point (VFP) Coprocessor 144 Emulating Coprocessors 145 ARM Cortex 145 Multiple-Issue and Out-Of-Order Execution 146 Thumb 2 147 Thumb EE 147 big.LITTLE 147 The NEON Coprocessor for SIMD 148 ARMv8 and 64-Bit Computing 148 Systems on a Single Chip 150 The Broadcom BCM2835 SoC 150 Broadcom's Second- and Third-Generation SoC Devices 151 How VLSI Chips Happen 151 Processes, Geometries and Masks 152 IP: Cells, Macrocells and Cores 153 Hard and Soft IP 154 Floorplanning, Layout and Routing 154 Standards for On-Chip Communication: AMBA 155 Chapter 5 Programming 159 Programming from a Height 159 The Software Development Process 160 Waterfall vs. Spiral vs. Agile 162 Programming in Binary 165 Assembly Language and Mnemonics 166 High-Level Languages 167 Après BASIC, Le Deluge 170 Programming Terminology 171 How Native-Code Compilers Work 173 Preprocessing 174 Lexical Analysis 175 Semantic Analysis 175 Intermediate Code Generation 176 Optimisation 176 Target Code Generation 176 Compiling C: A Concrete Example 177 Linking Object Code Files to Executable Files 183 Pure Text Interpreters 184 Bytecode Interpreted Languages 186 P-Code 186 Java 187 Just-In-Time (JIT) Compilation 189 Bytecode and JIT Compilation Beyond Java 191 Android, Java and Dalvik 191 Data Building Blocks 192 Identifiers, Reserved Words, Symbols and Operators 192 Values, Literals and Named Constants 193 Variables, Expressions and Assignment 193 Types and Type Definitions 194 Static and Dynamic Typing 196 Two's Complement and IEEE 754 198 Code Building Blocks 200 Control Statements and Compound Statements 200 If/Then/Else 200 Switch and Case 202 Repeat Loops 205 While Loops 205 For Loops 207 The Break and Continue Statements 208 Functions 210 Locality and Scope 211 Object-Oriented Programming 214 Encapsulation 217 Inheritance 219 Polymorphism 221 OOP Wrapup 224 A Tour of the GNU Compiler Collection Toolset 224 gcc as Both Compiler and Builder 225 Using Linux Make 228 Chapter 6 Non-Volatile Storage 231 Punched Cards and Tape 232 Punched Cards 232 Tape Data Storage 232 The Dawn of Magnetic Storage 235 Magnetic Recording and Encoding Schemes 236 Flux Transitions 237 Perpendicular Recording 238 Magnetic Disk Storage 240 Cylinders, Tracks and Sectors 240 Low-Level Formatting 242 Interfaces and Controllers 244 Floppy Disk Drives 246 Partitions and File Systems 247 Primary Partitions and Extended Partitions 247 File Systems and High-Level Formatting 249 The Future: GUID Partition Tables (GPTs) 249 Partitions on the Raspberry Pi SD Card 250 Optical Discs 252 CD-Derived Formats 254 DVD-Derived Formats 254 Ramdisks 255 Flash Storage 257 ROMs, PROMs and EPROMs 257 Flash as EEPROM 258 Single-Level vs. Multi-Level Storage 260 NOR vs. NAND Flash 261 Wear Levelling and the Flash Translation Layer 265 Garbage Collection and TRIM 267 SD Cards 268 eMMC 270 The Future of Non-Volatile Storage 271 Chapter 7 Wired and Wireless Ethernet 273 The OSI Reference Model for Networking 274 The Application Layer 276 The Presentation Layer 276 The Session Layer 278 The Transport Layer 278 The Network Layer 279 The Data Link Layer 281 The Physical Layer 282 Ethernet 282 Thicknet and Thinnet 283 The Basic Ethernet Idea 283 Collision Detection and Avoidance 285 Ethernet Encoding Systems 286 PAM-5 Encoding 290 10BASE-T and Twisted-Pair Cabling 291 From Bus Topology to Star Topology 292 Switched Ethernet 293 Routers and the Internet 296 Names vs. Addresses 296 IP Addresses and TCP Ports 297 Local IP Addresses and DHCP 300 Network Address Translation 302 Wi-Fi 304 Standards within Standards 305 Facing the Real World 305 Wi-Fi Equipment in Use 309 Infrastructure Networks vs. Ad Hoc Networks 311 Wi-Fi Distributed Media Access 312 Carrier Sense and the Hidden Node Problem 314 Fragmentation 315 Amplitude Modulation, Phase Modulation and QAM 316 Spread-Spectrum Techniques 319 Wi-Fi Modulation and Coding in Detail 320 How Wi-Fi Connections Happen 323 Wi-Fi Security 325 Wi-Fi on the Raspberry Pi 326 Even More Networking 329 Chapter 8 Operating Systems 331 Introduction to Operating Systems 333 History of Operating Systems 333 The Basics of Operating Systems 336 The Kernel: The Basic Facilitator of Operating Systems 343 Operating System Control 344 Modes 345 Memory Management 346 Virtual Memory 347 Multitasking 347 Disk Access and File Systems 348 Device Drivers 349 Enablers and Assistants to the Operating System 349 Waking Up the OS 349 Firmware 353 Operating Systems for Raspberry Pi 354 NOOBS 354 Third-Party Operating Systems 356 Other Available Operating Systems 356 Chapter 9 Video Codecs and Video Compression 359 The First Video Codecs 360 Exploiting the Eye 361 Exploiting the Data 363 Understanding Frequency Transform 367 Using Lossless Encoding Techniques 371 Changing with the Times 373 The Latest Standards from MPEG 374 H.265 378 Motion Search 378 Video Quality 381 Processing Power 382 Chapter 10 3D Graphics 383 A Brief History of 3D Graphics 383 The Graphical User Interface (GUI) 384 3D Graphics in Video Games 386 Personal Computing and the Graphics Card 387 Two Competing Standards 390 The OpenGL Graphics Pipeline 391 Geometry Specification and Attributes 393 Geometry Transformation 396 Lighting and Materials 400 Primitive Assembly and Rasterisation 403 Pixel Processing (Fragment Shading) 405 Texturing 407 Modern Graphics Hardware 411 Tiled Rendering 411 Geometry Rejection 413 Shading 415 Caching 416 Raspberry Pi GPU 417 Open VG 421 General Purpose GPUs 423 Heterogeneous Architectures 423 OpenCL 425 Chapter 11 Audio 427 Can You Hear Me Now? 427 MIDI 428 Sound Cards 428 Analog vs. Digital 429 Sound and Signal Processing 430 Editing 431 Compression 431 Recording with Effects 432 Encoding and Decoding Information for Communication 433 1-Bit DAC 434 I2S 436 Raspberry Pi Sound Input/Output 437 Audio Output Jack 437 HDMI 438 Sound on the Raspberry Pi 438 Raspberry Pi Sound on Board 439 Manipulating Sound on the Raspberry Pi 439 Chapter 12 Input/Output 447 Introducing Input/Output 448 I/O Enablers 451 Universal Serial Bus 452 USB Powered Hubs 455 Ethernet 457 Universal Asynchronous Receiver/Transmitters 458 Small Computer Systems Interface 459 Parallel ATA 459 Serial Advanced Technology Attachment 460 RS-232 Serial 460 High Definition Media Interface 461 I2S 462 I2C 463 Raspberry Pi Display, Camera Interface and JTAG 464 Raspberry Pi GPIO 464 GPIO Overview and the Broadcom SoC 465 Meeting the GPIO 466 Programming GPIO 473 Alternative Modes 479 GPIO Experimentation the Easy Way 480 Index 481
£19.20
John Wiley & Sons Inc The Official BBC microbit User Guide
Book SynopsisThe go-to guide to getting started with micro:bit and exploring all of the mini-computer's amazing capabilities The micro:bit is a pocket-sized electronic development platform built with education in mind.Table of ContentsForeword xi Introduction xiii Part I Chapter 1 Meet the BBC micro:bit 3 A Tour of the Board 3 Breaking It Down 5 Display 6 Buttons 7 Processor 8 Radio 9 Accelerometer 10 Compass 11 Input-Output Pins 12 Micro-USB Port 13 Battery Connector 14 Chapter 2 Getting Started with the BBC micro:bit 17 Handling the BBC micro:bit 17 Powering the BBC micro:bit 18 USB Power 18 Battery Power 20 Greetings from the BBC micro:bit 23 Signs of Life 24 Testing the Buttons 24 Motion Gaming 24 Get Coding 25 Resetting the BBC micro:bit 25 Chapter 3 Programming the BBC micro:bit 27 USB Connectivity 27 Drag-and-Drop 29 Automatic Flashing 31 The Code Editor 32 Downloading Your Program 33 About Flash Memory 38 Part II Chapter 4 Programming Languages 41 About Programming Languages 41 The Three Main BBC micro:bit Languages 42 JavaScript Blocks 43 JavaScript 44 Python 45 Comparing Programming Languages 46 Choosing a Programming Language 48 Other Programming Languages 49 Chapter 5 JavaScript Blocks 51 Introducing the JavaScript Blocks Editor 51 Program 1: ‘Hello, World!’ 54 Loops 57 Program 2: Button Inputs 58 Multiple Buttons 60 Program 3: Touch Inputs 61 Variables 62 Program 4: The Temperature Sensor 65 Formatting the Output 67 Program 5: The Compass Sensor 67 Program 6: The Accelerometer Sensor 70 Delays 73 Reading Raw Accelerometer Data 74 Program 7: The Fruit Catcher Game 76 The Setup 77 The Main Program Loop 78 Conditional Loops 80 Conditional Statements 82 The Control Events 84 Further Steps 86 Chapter 6 JavaScript 87 Introducing the JavaScript Editor 88 Program 1: ‘Hello, World!’ 90 Loops 93 Program 2: Button Inputs 94 Multiple Buttons 97 Program 3: Touch Inputs 98 Variables 99 Program 4: The Temperature Sensor 102 Formatting the Output 104 Program 5: The Compass Sensor 104 Program 6: The Accelerometer Sensor 107 Delays 109 Reading Raw Accelerometer Data 110 Program 7: The Fruit Catcher Game 112 The Setup 113 The Main Program Loop 115 The Conditional Loops 116 The Conditional Statements 117 The Control Events 120 Further Steps 123 Chapter 7 Python 125 Introducing the Python Editor 126 Program 1: ‘Hello, World!’ 128 Loops 132 Program 2: Button Inputs 133 Multiple Buttons 136 Program 3: Touch Inputs 137 Variables 138 Program 4: The Temperature Sensor 141 Formatting the Output 142 Program 5: The Compass Sensor 143 Program 6: The Accelerometer Sensor 145 Delays 147 Reading Raw Accelerometer Data 148 Program 7: The Fruit Catcher Game 150 The Setup 150 The Main Program Loop 153 Conditional Loops 154 Conditional Statements 155 Drawing the Sprites 156 Finishing the Program 157 Further Steps 160 Part III Chapter 8 The Wireless BBC micro:bit 163 The BBC micro:bit Radio 163 Program 1: One-to-One Communication 164 Program 2: One-to-Many Communication 167 Program 3: Radio Groups 169 Testing the Group Feature 171 Using the BBC micro:bit with a Smartphone or Tablet 173 Chapter 9 The BBC micro:bit and the Raspberry Pi 175 About the Raspberry Pi 176 Connecting the Raspberry Pi to the BBC micro:bit 177 Reading from the BBC micro:bit 180 Using the BBC micro:bit Display 186 Practical Example: A CPU Monitor 189 Chapter 10 Building Circuits 193 Electronic Equipment 194 The Input-Output Pins 196 The Large Pins 197 The Small Pins 199 Serial Peripheral Interface (SPI) 201 Inter-Integrated Circuit (I2C) 201 Universal Asynchronous Receiver/Transmitter (UART) 201 Your First Circuits 202 Reading from a Button Input 202 Reading Resistor Colour Codes 205 Writing to an LED Output 207 Fading an LED via PWM 211 Reading an Analogue Input 213 Chapter 11 Extending the BBC micro:bit 217 Extending via Breakout Boards 217 Kitronik Edge Connector Breakout Board 218 ScienceScope Micro:bit Breakout Board 219 Proto-Pic Bread:Bit 220 Proto-Pic Exhi:Bit 220 Robotics and the BBC micro:bit 222 Kitronik Line-Following Buggy 222 Kitronik Motor Driver Board 223 Technology Will Save Us Micro:Bot 224 4tronix Bit:Bot 225 BinaryBots 226 Other BBC micro:bit Add-Ons 227 Kitronik Mi:Power 227 Proto-Pic Micro:Pixel Board 228 Proto-Pic Simon:Says Board 229 4tronix Bit:2:Pi Board 230 Kitronik Mi:Pro Protector and Mi:Power Cases 231 Chapter 12 The Wearable BBC micro:bit 233 Advantages of the Wearable BBC micro:bit 234 Conductive Thread 235 Using Conductive Thread 237 The Rain-Sensing Hat 241 Building the Hat 242 Mounting the BBC micro:bit 244 The Rain-Sensing Program 245 Battery Power 246 Chapter 13 Additional Resources 249 The Micro:bit Educational Foundation 249 Official Teaching Resources 251 Third-Party Teaching Resources 252 The Institution of Engineering and Technology 252 Computing At School 253 Micro:bit for Primary Schools 253 TES Magazine 255 Code Clubs 256 Part IV Appendix A JavaScript Blocks Recipes 259 Appendix B JavaScript Recipes 267 Appendix C Python Recipes 275 Appendix D Pin-Out Listing 285 Index 289
£16.14
John Wiley & Sons Inc Cyber Security in Parallel and Distributed
Book SynopsisThe book contains several new concepts, techniques, applications and case studies for cyber securities in parallel and distributed computing The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. Also included are various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information concerning various topics relating to cybersecurity technologies is organized within the sixteen chapters of this book. Some of the important topics covered include: Research and solutions for the problem of hidden image detection Security aspects of data mining and possible solution techniques A comparative analysis of various methods used in e-commerce security and how to perform secure payment transactions in an efficient manner Blockchain tTable of ContentsList of Figures xv List of Tables xvii Foreword xix Preface xxi Acknowledgments xxv Acronyms xxvii Part 1 Cybersecurity Concept 1 Introduction on Cybersecurity 3Ishaani Priyadarshini 1.1 Introduction to Cybersecurity 5 1.2 Cybersecurity Objectives 6 1.3 Cybersecurity Infrastructure and Internet Architecture (NIST) 8 1.4 Cybersecurity Roles 10 1.5 Cybercrimes 17 1.5.1 Overview 17 1.5.2 Traditional Computer Crime and Contemporary Computer Crime 18 1.5.3 Combating Crimes 21 1.6 Security Models 23 1.7 Computer Forensics 25 1.8 Cyber Insurance 27 1.8.1 Digital Citizenship 29 1.8.2 Information Warfare and its Countermeasures 31 1.8.3 Network Neutrality 33 1.8.4 Good Practices and Policies 34 1.8.5 Cybersecurity and Human Rights 35 1.9 Future of Cybersecurity 36 1.10 Conclusion 36 References 37 2 Steganography and Steganalysis 39Ho Thi Huong Thom, Nguyen Kim Anh 2.1 Introduction 40 2.2 Steganography 41 2.2.1 Method for Evaluating Hidden Information Schema Security 41 2.2.2 Peak Signal-to-Noise Ratio 42 2.3 Steganalysis 42 2.3.1 Blind Detection Based on LSB 43 2.3.2 Constraint Steganalysis 45 2.4 Conclusion 46 References 46 3 Security Threats and Vulnerabilities in E-business 51Satya Narayan Tripathy, Sisira Kumar Kapat, Susanta Kumar Das 3.1 Introduction to e-Business 52 3.1.1 Benefits of e-Business 52 3.1.2 Business Revolution 53 3.2 Security Issues in e-Business 54 3.2.1 Vulnerabilities 54 3.2.2 Security Attacks 55 3.2.3 Malware as a Threat 55 3.3 Common Vulnerabilities in e-Business 55 3.3.1 Phishing 55 3.3.2 Cross-Site Scripting (XSS) 56 3.4 Threats in e-Business 56 3.4.1 Ransomware 56 3.4.2 Spyware 56 3.4.3 Worms 57 3.4.4 Trojan Horse 57 3.5 Prevention Mechanism 57 3.6 Conclusion 58 References 58 4 e-Commerce Security: Threats, Issues, and Methods 61Prerna Sharma, Deepak Gupta, Ashish Khanna 4.1 Introduction 62 4.2 Literature Review 63 4.3 e-Commerce 63 4.3.1 Characteristics of e-Commerce Technology 63 4.3.2 Architectural Framework of e-Commerce 64 4.3.3 Advantages and Disadvantages of e-Commerce 66 4.4 Security Overview in e-Commerce 67 4.4.1 Purpose of Security in e-Commerce 67 4.4.2 Security Element at Different Levels of e-Commerce System 67 4.5 Security Issues in e-Commerce 68 4.5.1 Client Level 68 4.5.2 Front-End Servers and Software Application Level 68 4.5.3 Network and Server Level 68 4.6 Security Threats in e-Commerce 69 4.7 Security Approaches in e-Commerce 72 4.8 Comparative Analysis of Various Security Threats in e-Commerce 73 4.9 e-Commerce Security Life-Cycle Model 73 4.10 Conclusion 75 References 76 5 Cyberwar is Coming 79T. Manikandan, B. Balamurugan, C. Senthilkumar, R. Rajesh Alias Harinarayan, R. Raja Subramanian 5.1 Introduction 80 5.2 Ransomware Attacks 82 5.2.1 Petya 83 5.2.2 WannaCry 83 5.2.3 Locky 84 5.3 Are Nations Ready? 85 5.4 Conclusion 88 References 88 Part 2 Cybersecurity in Parallel and Distributed Computing Techniques 6 Introduction to Blockchain Technology 93Ishaani Priyadarshini 6.1 Introduction 94 6.2 Need for Blockchain Security 95 6.3 Characteristics of Blockchain Technology 96 6.4 Types of Blockchains 97 6.5 The Architecture of Blockchain Technology 97 6.6 How Blockchain Technology Works 100 6.7 Some Other Case Studies for Blockchain Technology 102 6.8 Challenges Faced by Blockchain Technology 103 6.9 The Future of Blockchain Technology 105 6.10 Conclusion 106 References 106 7 Cyber-Security Techniques in Distributed Systems, SLAs and other Cyber Regulations 109Soumitra Ghosh, Anjana Mishra, Brojo Kishore Mishra 7.1 Introduction 110 7.1.1 Primary Characteristics of a Distributed System 110 7.1.2 Major Challenges for Distributed Systems 111 7.2 Identifying Cyber Requirements 112 7.3 Popular security mechanisms in Distributed Systems 113 7.3.1 Secure Communication 113 7.3.2 Message Integrity and Confidentiality 115 7.3.3 Access Controls 116 7.4 Service Level Agreements 118 7.4.1 Types of SLAs 118 7.4.2 Critical Areas for SLAs 119 7.5 The Cuckoo’s Egg in the Context of IT Security 122 7.6 Searching and Seizing ComputerRelated Evidence 124 7.6.1 Computerized Search Warrants 124 7.6.2 Searching and Seizing 125 7.7 Conclusion 126 References 126 8 Distributed Computing Security: Issues and Challenges 129Munmun Saha, Sanjaya Kumar Panda and Suvasini Panigrahi 8.1 Introduction 130 8.2 Security Issues and Challenges 131 8.2.1 Confidentiality, Integrity and Availability 131 8.2.2 Authentication and Access Control Issue 132 8.2.3 Broken Authentication, Session and Access 132 8.3 Security Issues and Challenges in Advanced Areas 133 8.4 Conclusion 136 References 136 9 Organization Assignment in Federated Cloud Environments based on Multi-Target Optimization of Security 139Abhishek Kumar, Palvadi Srinivas Kumar, T.V.M. Sairam 9.1 Introduction 140 9.2 Background Work Related to Domain 141 9.2.1 Basics on Cloud computing 141 9.2.2 Clouds Which are Federated 141 9.2.3 Cloud Resource Management 141 9.3 Architectural-Based Cloud Security Implementation 142 9.4 Expected Results of the Process 144 9.5 Conclusion 146 References 146 10 An On-Demand and User-friendly Framework for Cloud Data Centre Networks with Performance Guarantee 149P. Srinivas Kumar, Abhishek Kumar, Pramod Singh Rathore, Jyotir Moy Chatterjee 10.1 Introduction 150 10.1.1 Key Research Problems in This Area 150 10.1.2 Problems with Interoperability 151 10.2 Difficulties from a Cloud Adoption Perspective 151 10.3 Security and Privacy 151 10.3.1 Resource Provisioning 152 10.3.2 How Do We Define Cloud? 153 10.3.3 Public vs Private Cloud-Based Services 153 10.3.4 Traffic-Aware VM Migration to Load Balance Cloud Servers 154 10.4 Conclusion and Future Work 157 References 157 Part 3 Cybersecurity Applications and Case Studies 11 Cybersecurity at Organizations: A Delphi Pilot Study of Expert Opinions About Policy and Protection 163Holly Reitmeier, Jolanda Tromp, John Bottoms 11.1 Introduction 164 11.1.1 What is Cybercrime? 164 11.1.2 What is Cybersecurity? 165 11.1.3 Purpose of This Cybersecurity Pilot Study 165 11.1.4 Methods of Cybersecurity Professionals 165 11.2 Shocking Statistics of Cybercrime 166 11.2.1 Role of the Internet Crime Complaint Center 166 11.2.2 2016 Global Economic Crime Survey Report 168 11.2.3 Inadequate Preparation at Organizations 168 11.2.4 Organizations: Be Aware, Be Secure 168 11.3 Cybersecurity Policies for Organizations 169 11.3.1 Classification of Cybersecurity at an Organization 171 11.3.2 Pyramid of Cybersecurity 171 11.4 Blockchain Technology 172 11.5 Research Methodology 173 11.5.1 Quantitative and Qualitative Data Collection 173 11.5.2 Design of the Study 174 11.5.3 Selection of the Delphi Method 174 11.5.4 Procedure of Utilization of the Delphi Method 175 11.5.5 Delphi Activities (Iteration Rounds) of This Pilot Study 175 11.6 Results of the Cybersecurity Delphi Study 176 11.6.1 Results from Round One 176 11.6.2 Results of Round Two 178 11.6.3 Discussion and Limitations Based on the Results 181 11.7 Conclusion 183 11.7.1 The Literature in the Field 183 11.7.2 Next Steps for Future Research 184 References 184 12 Smartphone Triggered Security Challenges - Issues, Case Studies and Prevention 187Saurabh Ranjan Srivastava, Sachin Dube, Gulshan Shrivastava, Kavita Sharma 12.1 Introduction 188 12.2 Classification of Mobile Security Threats 188 12.2.1 Physical Threats 189 12.2.2 Web-Based Threats 189 12.2.3 Application-Based Threats 189 12.2.4 Network-Based Threats 190 12.2.5 Data Transfer-Based Threats 191 12.2.6 Improper Session Management-Based Threats 191 12.2.7 Bluetooth-Based Threats 191 12.2.8 Application Platform-Based Threats 192 12.3 Smartphones as a Tool of Crime 192 12.4 Types of Mobile Phone-Related Crimes 193 12.5 Types of Mobile Fraud 196 12.6 Case Studies 198 12.6.1 Mobile Identity Theft 198 12.6.2 Data Theft by Applications 200 12.6.3 SIM Card Fraud 200 12.7 Preventive Measures and Precautions 201 12.7.1 Against Physical Loss and Theft of the Mobile Device 201 12.7.2 Against SMiShing Attacks 202 12.7.3 Against App-Based Attacks 203 12.7.4 Against Identity Theft and SIM Card Fraud 203 12.8 Conclusion 204 References 205 13 Cybersecurity: A Practical Strategy Against Cyber Threats, Risks with Real World Usages 207Anjana Mishra, Soumitra Ghosh, Brojo Kishore Mishra 13.1 Introduction 208 13.2 Cyberwar 209 13.3 Arms Control in Cyberwar 210 13.4 Internet Security Alliance 211 13.5 Cybersecurity Information Sharing Act 212 13.6 Market for Malware 214 13.7 Mobile Cybersecurity 215 13.8 Healthcare 216 13.9 Human Rights 217 13.10 Cybersecurity Application in Our Life 218 13.11 Conclusion 219 References 219 14 Security in Distributed Operating System: A Comprehensive Study 221Sushree Bibhuprada B. Priyadarshini, Amiya Bhusan Bagjadab, Brojo Kishore Mishra 14.1 Introduction to Security and Distributed Systems 222 14.2 Relevant Terminology 225 14.3 Types of External Attacks 225 14.4 Globus Security Architecture 228 14.5 Distribution of Security Mechanism 229 14.6 Conclusions 230 References 230 15 Security in Healthcare Applications based on Fog and Cloud Computing 231Rojalina Priyadarshini, Mohit Ranjan Panda, Brojo Kishore Mishra 15.1 Introduction 232 15.2 Security Needs of Healthcare Sector 233 15.2.1 Data Integrity 233 15.2.2 Data Confidentiality 233 15.2.3 Authentication and Authorization 233 15.2.4 Availability 234 15.2.5 Access Control 234 15.2.6 Dependability 234 15.2.7 Flexibility 234 15.3 Solutions to Probable Attacks in e-Healthcare 234 15.3.1 Jamming Attack 235 15.3.2 Data Collision Attack 235 15.3.3 Desynchronization Attack 235 15.3.4 Spoofing Attack 236 15.3.5 Man-in-the-Middle Attack 236 15.3.6 Denial-of-Service (DoS) Attack 237 15.3.7 Insider Attack 238 15.3.8 Masquerade Attack 238 15.3.9 Attacks on Virtual Machine and Hypervisor 239 15.4 Emerging Threats in Cloud- and Fog-Based Healthcare System 240 15.4.1 Software Supply Chain Attacks 240 15.4.2 Ransomware Attacks 240 15.4.3 Crypto-Mining and Crypto-Jacking Malware 240 15.5 Conclusion 241 References 241 16 Mapping of e-Wallets with Features 245Alisha Sikri, Surjeet Dalal, N.P Singh, Dac-Nhuong Le 16.1 Introduction 246 16.1.1 e-Wallet 246 16.1.2 Objectives 247 16.2 Review of Literature 250 16.3 Market Share of e-Wallet 251 16.3.1 Technical Features 252 16.3.2 Legal Features 252 16.3.3 Operational Features 253 16.3.4 Security Features 253 16.4 Research Methodology 253 16.5 Result Analysis 255 16.6 Conclusions and future work 256 References 256
£164.66
John Wiley & Sons Inc The Architecture of Computer Hardware Systems
Book SynopsisTable of ContentsPreface xxiii About the Authors xxix Part I An Overview of Computer Systems 1 Computers and Systems 4 1.0 Introduction 5 1.1 The Starting Point 8 1.2 Components of the Computer System 10 The Hardware Component 13 The Software Component 15 The Communication Component 17 The Computer System 17 1.3 The Concept of Virtualization 19 1.4 Protocols and Standards 20 1.5 Overview of This Book 21 1.6 A Brief Architectural History of the Computer 22 Early Work 23 Computer Hardware 24 Operating Systems 27 Communication, Networks, and the Internet 31 Summary and Review 32 For Further Reading 33 Key Concepts and Terms 33 Reading Review Questions 33 Exercises 34 2 An Introduction to System Concepts and Systems Architecture 36 2.0 Introduction 37 2.1 The General Concept of Systems 37 2.2 IT System Architectures 44 The Role of the System Architect 46 Summary and Review 48 For Further Reading 48 Key Concepts and Terms 49 Reading Review Questions 49 Exercises 49 Part II Data in the Computer 3 Number Systems 52 3.0 Introduction 53 3.1 Numbers as a Physical Representation 53 3.2 Counting in Different Bases 54 3.3 Performing Arithmetic in Different Number Bases 59 3.4 Numeric Conversion Between Number Bases 63 Alternative Conversion Methods 65 3.5 A Special Conversion Case—Number Bases That Are Related 67 3.6 Fractions 68 Fractional Conversion Methods 71 3.7 Mixed Number Conversions 73 Summary and Review 73 For Further Reading 74 Key Concepts and Terms 74 Reading Review Questions 74 Exercises 75 4 Data Formats 78 4.0 Introduction 79 4.1 General Considerations 79 4.2 Alphanumeric Character Data 82 4.3 Visual Data 88 Bitmap Images 89 Object Images 93 Representing Characters as Images 96 Video Images 96 4.4 Audio Data 97 4.5 Data Compression 100 4.6 Page Description Languages 102 4.7 Internal Computer Data Format 102 Numerical Character to Integer Conversion 104 Summary and Review 105 For Further Reading 106 Key Concepts and Terms 106 Reading Review Questions 106 Exercises 107 5 Representing Numerical Data 110 5.0 Introduction 111 5.1 Unsigned Binary and Binary-Coded Decimal Representations 111 5.2 Representations for Signed Integers 115 Sign-and-Magnitude Representation 115 Nine’s Decimal and 1’s Binary Complementary Representations 117 Ten’s Complement and 2’s Complement 124 Overflow and Carry Conditions 126 Other Bases 127 Summary of Rules for Complementary Numbers 128 5.3 Real Numbers 128 A Review of Exponential Notation 128 Floating Point Format 130 Normalization and Formatting of Floating Point Numbers 133 A Programming Example 135 Floating Point Calculations 136 Floating Point in the Computer 139 Conversion between Base 10 and Base 2 141 5.4 Programming Considerations 142 Summary and Review 143 For Further Reading 144 Key Concepts and Terms 144 Reading Review Questions 144 Exercises 145 Part III Computer Architecture and Hardware Operation 6 The Little Man Computer 152 6.0 Introduction 153 6.1 Layout of the Little Man Computer 154 6.2 Operation of the LMC 154 6.3 A Simple Program 156 6.4 An Extended Instruction Set 157 6.5 The Instruction Cycle 160 6.6 A Note Regarding Computer Architectures 162 Summary and Review 163 Key Concepts and Terms 163 Reading Review Questions 164 Exercises 164 7 The CPU and Memory 166 7.0 Introduction 167 7.1 The Components of the CPU 168 7.2 The Concept of Registers 169 7.3 The Memory Unit 171 The Operation of Memory 171 Memory Capacity and Addressing Limitations 175 Primary Memory Characteristics and Implementation 176 7.4 The Fetch–Execute Instruction Cycle 178 7.5 Classification of Instructions 181 Data Movement Instructions (load, store, and Other Moves) 183 Arithmetic Instructions 183 Boolean Logic Instructions 184 Single Operand Manipulation Instructions 184 Bit Manipulation Instructions 184 Shift and Rotate Instructions 185 Program Control Instructions 186 Stack Instructions 187 Multiple Data Instructions 189 Other Instructions 190 7.6 Instruction Word Formats 190 7.7 Instruction Word Requirements and Constraints 192 Summary and Review 195 For Further Reading 195 Key Concepts and Terms 195 Reading Review Questions 196 Exercises 197 8 CPU and Memory: Design, Enhancement, and Implementation 200 8.0 Introduction 201 8.1 CPU Architectures 202 Overview 202 Traditional Modern Architectures 202 8.2 CPU Features and Enhancements 203 Introduction 203 Fetch–Execute Cycle Timing Issues 204 A Model for Improved CPU Performance 206 Scalar and Superscalar Processor Organization 210 8.3 Memory Enhancements 213 Wide Path Memory Access 214 Memory Interleaving 214 Cache Memory 215 8.4 The Compleat Modern Superscalar CPU 219 8.5 Multiprocessing 221 8.6 A Few Comments on Implementation 225 Summary and Review 225 For Further Reading 226 Key Concepts and Terms 227 Reading Review Questions 227 Exercises 228 9 Input/Output and Buses 230 9.0 Introduction 231 9.1 Characteristics of Typical I/O Devices 232 9.2 Programmed I/O 237 9.3 Interrupts 239 Servicing Interrupts 239 The Uses of Interrupts 241 Multiple Interrupts and Prioritization 245 9.4 Direct Memory Access 249 9.5 I/O Controllers 252 9.6 Buses 254 Bus Characteristics 254 Summary and Review 258 For Further Reading 259 Key Concepts and Terms 259 Reading Review Questions 259 Exercises 260 10 Computer Peripherals 262 10.0 Introduction 263 10.1 The Hierarchy of Storage 264 10.2 Solid-State Memory 266 10.3 Magnetic Disks 267 Disk Arrays 272 10.4 Optical Disk Storage 274 10.5 Magnetic Tape 276 10.6 Displays 277 Basic Display Design 277 Graphical Processing Units (GPUs) 279 Liquid Crystal Display Technology 282 OLED Display Technology 283 10.7 Printers 284 Laser Printers 285 Inkjet Printers 285 10.8 User Input Devices 286 Keyboards 287 Pointing Devices 287 Alternative Sources of Alphanumeric Input 288 Scanners 291 Multimedia Input 291 Mobile Devices 292 10.9 Network Communication Devices 293 Summary and Review 293 For Further Reading 294 Key Concepts and Terms 294 Reading Review Questions 295 Exercises 295 11 Computer System Organization 298 11.0 Introduction 299 11.1 Putting the Pieces Together 300 11.2 System Architecture 305 Basic System Interconnection Requirements 305 Bus I/O 307 Channel Architecture 311 Blurring the Line 313 Summary and Review 313 For Further Reading 313 Key Concepts and Terms 314 Reading Review Questions 314 Exercises 314 Part IV Networks, Data Communications, and Networked Computer Systems 12 Networks and Data Communications—An Overview 318 12.0 Introduction 319 12.1 The Impact of Networking on Business Processes and User Access to Knowledge and Services 320 12.2 A Simple View of Data Communications 321 12.3 Basic Data Communication Concepts 324 Messages 324 Packets 325 General Channel Characteristics 326 12.4 Networks 330 Network Topology 330 Types of Networks 334 Network Interconnection 347 12.5 Standards 351 Summary and Review 352 For Further Reading 352 Key Concepts and Terms 352 Reading Review Questions 353 Exercises 353 13 Ethernet and T CP/IP Networking 356 13.0 Introduction 357 13.1 TCP/IP, OSI, and Other Communication Protocol Models 357 13.2 Program Applications versus Network Applications 362 13.3 The Physical and Data Link Layers 362 The Physical Layer 363 The Data Link Layer 364 Hub-Based Ethernet 366 Switched Ethernet 366 Wireless Ethernet (Wi-Fi) 367 13.4 The Network Layer 368 13.5 The Transport Layer 372 13.6 IP Addresses 376 IPv4 and DHCP 376 IPv6 379 13.7 Domain Names and DNS Services 380 13.8 Quality of Service 385 13.9 Network Security 386 Physical and Logical Access Restriction 386 Encryption 387 13.10 Alternative Protocols 387 A Comparison of TCP/IP and OSI 388 Other Protocol Suites and Components 388 SCSI Over IP 389 Cellular Technology 389 MPLS 390 Summary and Review 390 For Further Reading 391 Key Concepts and Terms 391 Reading Review Questions 392 Exercises 392 14 Communication Channel T echnology 396 14.0 Introduction 397 14.1 Communication Channel Technology 398 14.2 The Fundamentals of Signaling Technology 400 Analog Signaling 401 Digital Signaling 411 Modems 416 Two Examples of Alternative Advanced Technologies 416 14.3 Transmission Media and Signaling Methods 418 14.4 Wireless Technologies 420 Cellular Technology 421 Wi-Fi 421 Bluetooth 421 Summary and Review 422 For Further Reading 423 Key Concepts and Terms 423 Reading Review Questions 423 Exercises 424 15 Modern Networked Computer Systems 426 15.0 Introduction 427 15.1 Distributed Systems 428 15.2 Client–Server Computing 430 15.3 Web-Based Computing 433 15.4 Peer-to-Peer Computing 435 15.5 Clusters 436 Overview 436 Classification and Configuration 437 Beowulf Clusters 438 15.6 Storage Area Networks 440 15.7 Cloud Computing 441 15.8 Supercomputing 443 Grid Computing 444 15.9 Networked Computer System Architecture Examples 444 Google: A System Architecture Example 445 Another Example: Facebook’s Application Architecture 448 Summary and Review 449 For Further Reading 450 Key Concepts and Terms 450 Reading Review Questions 450 Exercises 451 Part V The Software Component 16 Operating Systems: An Overview 454 16.0 Introduction 455 16.1 The Barebones Computer System 456 16.2 The Operating Systems Concept: An Introduction 457 16.3 Services and Facilities 463 User Interface and Command Execution Services 464 File Management 465 Input/Output Services 466 Process Control Management 467 Memory Management 468 Scheduling and Dispatch 468 Secondary Storage Management 471 Network and Communications Support Services 471 Security and Protection Services 472 System Administration Support 473 16.4 Organization 476 16.5 Types of Computer Systems 479 Summary and Review 483 For Further Reading 483 Key Concepts and Terms 483 Reading Review Questions 484 Exercises 484 17 The User View of Operating Systems 486 17.0 Introduction 487 17.1 Purpose of the User Interface 488 17.2 User Functions and Program Services 490 Program Execution 490 File Commands 491 Disk and Other I/O Device Commands 492 Security and Data Integrity Protection 492 Interuser Communication and Data Sharing Operations 493 System Status Information and User Administration 494 Program Services 495 17.3 Types of User Interface 495 The Command Line Interface 496 Batch System Commands 498 Graphical User Interfaces 499 Touchless Gesture- and Voice-Based Interfaces 504 Trade-Offs in the User Interface 505 Software Considerations 506 17.4 X Window and Other Graphics Display Methodologies 507 17.5 Command and Scripting Languages 510 The Elements of a Command Language 512 The Command Language Start-Up Sequence Files 512 17.6 Services to Programs 513 Summary and Review 515 For Further Reading 515 Key Concepts and Terms 515 Reading Review Questions 516 Exercises 516 18 File Management 518 18.0 Introduction 519 18.1 The Logical and Physical View of Files 519 18.2 The Role of the File Management System 524 18.3 Logical File Access Methods 528 Sequential File Access 529 Random Access 529 Indexed Access 530 18.4 Physical File Storage 531 Contiguous Storage Allocation 531 Noncontiguous Storage Allocation 532 Indexed Allocation 534 Free Space Management 537 Tape Allocation 539 Optical and Flash Drive Allocation 539 18.5 File Systems, Volumes, Disks, Partitions, and Storage Pools 539 18.6 The Directory Structure 542 Tree-Structured Directories 543 Acyclic-Graph Directories 545 18.7 Network File Access 548 18.8 File Protection 550 18.9 Journaling File Systems 551 Summary and Review 552 For Further Reading 552 Key Concepts and Terms 553 Reading Review Questions 553 Exercises 554 19 The Internal Operating System 556 19.0 Introduction 557 19.1 Fundamental OS Requirements 558 Example: A Simple Multitasking Operating System 559 19.2 Starting the Computer System: The Bootstrap 562 19.3 Processes and Threads 564 Process Creation 567 Process States 568 Threads 569 19.4 Basic Loading and Execution Operations 570 19.5 CPU Scheduling and Dispatching 572 Long-Term Scheduler 572 Short-Term Scheduler and Dispatcher 572 Nonpreemptive Scheduling Algorithms 575 Preemptive Short-Term Scheduling Algorithms 576 19.6 Memory Management 577 Memory Partitioning 578 19.7 Virtual Storage 579 Overview 579 Pages and Frames 580 The Concept of Virtual Storage 585 Page Faults 586 Working Sets and the Concept of Locality 588 Page Sharing 588 Page Replacement Algorithms 589 Thrashing 592 Page Table Implementation 592 Segmentation 595 Process Separation 596 19.8 Disk Scheduling 596 First-Come, First-Served Scheduling 597 Shortest Distance First Scheduling 597 Scan Scheduling 597 n-Step c-Scan Scheduling 598 19.9 Network Operating System Services 598 OS Protocol Support and Other Services 598 19.10 Other Operating System Issues 601 Deadlock 601 Other Issues 602 19.11 Virtual Machines 603 Summary and Review 605 For Further Reading 606 Key Concepts and Terms 606 Reading Review Questions 607 Exercises 608 Bibliography B-1 Index I-1
£113.36
John Wiley & Sons Inc Exploring BeagleBone
Book SynopsisTable of ContentsIntroduction xxix Part I Beagle Board Basics 1 Chapter 1 The Beagle Hardware Platform 3 Introduction to the Boards 3 Who Should Use the Beagle Platform 6 When to Use Beagle Boards 7 When Should You Not Use the Beagle Boards 7 BeagleBone Documentation 8 The Beagle Hardware 10 BeagleBone Versions 10 The Beagle Hardware 12 Beagle Accessories 19 Highly Recommended Accessories 19 Headers for the PocketBeagle 20 Micro-SD Card (for Booting or Flashing eMMCs) 20 External 5V Power Supply (for Peripherals) 22 Ethernet Cable (for Wired BBB Network Connection) 22 HDMI Cable (for Connection to Monitors/Televisions) 22 USB to Serial UART TTL 3.3 (for Finding Problems) 23 Optional Accessories 24 USB Hub (to Connect Several USB Devices to a USB Host) 25 Micro-HDMI to VGA Adapters (for VGA Video and Sound) 25 Wi-Fi Adapters (for Wireless Networking) 25 USB Webcam (for Capturing Images and Streaming Video) 25 USB Keyboard and Mouse (for General-Purpose Computing) 26 Capes 26 How to Destroy Your Board! 27 Summary 29 Support 29 Chapter 2 Beagle Software 31 Linux on the Beagle Boards 32 Linux Distributions for Beagle Boards 32 Create a Linux Micro-SD Card Image 33 Communicating with the Boards 34 Installing Drivers 34 Wired Network Connections 35 Internet-over-USB (All Boards) 36 Regular Ethernet (BBB and BeagleBoard Only) 39 Ethernet Crossover Cable (BBB and BeagleBoard Only) 40 Communicating with Your Board 42 Serial Connection over USB 42 Serial Connection with the USB-to-TTL 3.3 V Cable 43 Connecting Through Secure Shell 44 Secure Shell Connections Using Putty 45 Chrome Apps: Secure Shell Client 45 Transferring Files Using Putty/psftp over SSH 46 Controlling the Beagle Board 48 Basic Linux Commands 48 First Steps 49 Basic File System Commands 50 Environment Variables 52 Basic File Editing 53 What Time Is It? 54 Package Management 56 Beagle-Specific Commands 58 Expand the File System on an SD Card 59 Update the Kernel 60 Interacting with the On-Board LEDs 61 Shutdown 63 Node.js, Cloud9, and BoneScript 64 Introduction to Node.js 64 Introduction to the Cloud9 IDE 66 Introduction to BoneScript 67 Summary 69 Further Reading 69 Chapter 3 Exploring Embedded Linux Systems 71 Introducing Embedded Linux 72 Advantages and Disadvantages of Embedded Linux 73 Is Linux Open Source and Free? 74 Booting the Beagle Boards 74 Bootloaders 74 Kernel Space and User Space 83 The systemd System and Service Manager 85 Managing Linux Systems 90 The Superuser 90 System Administration 92 The Linux File System 92 Links to Files and Directories 94 Users and Groups 95 File System Permissions 98 The Linux Root Directory 102 Commands for File Systems 103 The Reliability of SD Card/eMMC File Systems 111 Linux Commands 113 Output and Input Redirection (>, >>, and <) 113 Pipes (| and tee) 114 Filter Commands (from sort to xargs) 115 echo and cat 117 diff 118 tar 119 md5sum 120 Linux Processes 121 How to Control Linux Processes 121 Foreground and Background Processes 122 Other Linux Topics 124 Using Git for Version Control 124 A Practice-Based Introduction 126 Cloning a Repository (git clone) 126 Getting the Status (git status) 128 Adding to the Staging Area (git add) 128 Committing to the Local Repository (git commit) 129 Pushing to the Remote Repository (git push) 129 Git Branching 130 Creating a Branch (git branch) 130 Merging a Branch (git merge) 132 Deleting a Branch (git branch -d) 132 Common Git Commands 133 Desktop Virtualization 134 Code for This Book 135 Summary 136 Further Reading 136 Bibliography 137 Chapter 4 Interfacing Electronics 139 Analyzing Your Circuits 140 Digital Multimeter 140 Oscilloscopes 141 Basic Circuit Principles 143 Voltage, Current, Resistance, and Ohm’s Law 143 Voltage Division 145 Current Division 146 Implementing Circuits on a Breadboard 147 Digital Multimeters and Breadboards 149 Example Circuit: Voltage Regulation 150 Discrete Components 152 Diodes 152 Light-Emitting Diodes 153 Smoothing and Decoupling Capacitors 156 Transistors 158 Transistors as Switches 159 Field Effect Transistors as Switches 162 Optocouplers/Optoisolators 164 Switches and Buttons 166 Hysteresis 168 Logic Gates 169 Floating Inputs 173 Pull-Up and Pull-Down Resistors 173 Open-Collector and Open-Drain Outputs 174 Interconnecting Gates 175 Analog-to-Digital Conversion 177 Sampling Rate 177 Quantization 178 Operational Amplifi ers 178 Ideal Operational Amplifiers 178 Negative Feedback and Voltage Follower 181 Positive Feedback 181 Concluding Advice 182 Summary 182 Further Reading 183 Chapter 5 Practical Beagle Board Programming 185 Introduction 186 Performance of Different Languages 186 Setting the CPU Frequency 190 Scripting Languages 192 Scripting Language Options 192 Bash 193 Lua 196 Perl 197 Python 198 Dynamically Compiled Languages 201 JavaScript and Node.js on the Beagle boards 201 Java on the Beagle Boards 203 C and C++ on the Beagle Boards 207 C and C++ Language Overview 210 Compiling and Linking 211 Writing the Shortest C/C++ Program 213 Static and Dynamic Compilation 215 Variables and Operators in C/C++ 215 Pointers in C/C++ 219 C-Style Strings 221 LED Flashing Application in C 223 The C of C++ 224 First Example and Strings in C++ 225 Passing by Value, Pointer, and Reference 226 Flashing the LEDs Using C++ (non-OO) 227 Writing a Multicall Binary 228 Overview of Object-Oriented Programming 229 Classes and Objects 229 Encapsulation 230 Inheritance 231 Object-Oriented LED Flashing Code 233 Interfacing to the Linux OS 236 Glibc and Syscall 237 Improving the Performance of Python 239 Cython 239 Boost.Python 242 Summary 244 Further Reading 244 Bibliography 244 Part II Interfacing, Controlling, and Communicating 245 Chapter 6 Interfacing to the Beagle Board Input/Outputs 247 General-Purpose Input/Outputs 248 Introduction to GPIO Interfacing 248 GPIO Digital Output 250 GPIO Digital Input 255 GPIO Confi guration 257 Internal Pull-Up and Pull-Down Resistors 258 GPIO Pin Configuration Settings 258 Interfacing to Powered DC Circuits 265 C++ Control of GPIOs 267 The Linux Device Tree 271 Flattened Device Tree on the Beagle Boards 272 Modifying a Board Device Tree 276 Boot Confi guration Files 278 Analog Inputs and Outputs 280 Analog Inputs 280 Enabling the Analog Inputs 280 Analog Input Application—A Simple Light Meter 282 Analog Outputs (PWM) 285 Output Application—Controlling a Servo Motor 289 BoneScript 290 Digital Read and Write 290 Analog Read 292 Analog Write (PWM) 293 GPIO Performance 294 Advanced GPIO Topics 295 More C++ Programming 295 Callback Functions 295 POSIX Threads 297 Linux poll (sys/poll.h) 298 Enhanced GPIO Class 299 Using GPIOs without Using sudo 302 Root Permissions with setuid 304 Summary 306 Further Reading 306 Chapter 7 Cross-Compilation, Eclipse, and Building Linux 307 Setting Up a Cross-Compilation Toolchain 308 Cross-Compiling Under Debian 309 Testing the Toolchain 311 Emulating the armhf Architecture 312 Cross-Compilation with Third-Party Libraries (Multiarch) 314 Cross-Compilation Using Eclipse 315 Installing Eclipse on Desktop Linux 315 Confi guring Eclipse for Cross-Compilation 316 Remote System Explorer 318 Integrating GitHub into Eclipse 322 Remote Debugging 322 Automatic Documentation (Doxygen) 328 Adding Doxygen Editor Support in Eclipse 330 Cross-Building Linux 330 Downloading the Kernel Source 331 Building the Linux Kernel 332 Building a Poky Linux Distribution (Advanced) 335 Summary 340 Chapter 8 Interfacing to the Beagle Board Buses 341 Introduction to Bus Communication 342 I2C 343 I2C Hardware 343 I2C on the Beagle Boards 344 I2C Devices on the Beagle Boards 345 An I2C Test Circuit 346 A Real-Time Clock 346 The ADXL345 Accelerometer 347 Wiring the Test Circuit 348 Using Linux I2C-Tools 348 i2cdetect 348 i2cdump 349 i2cget 353 i2cset 354 I2C Communication in C 356 Wrapping I2C Devices with C++ Classes 358 SPI 360 SPI Hardware 361 SPI on the Beagle Boards 363 Testing an SPI Bus 363 A First SPI Application (74HC595) 365 Wiring the 74HC595 Circuit 366 SPI Communication Using C 367 Bidirectional SPI Communication in C/C++ 370 The ADXL345 SPI Interface 370 Connecting the ADXL345 to the Beagle Boards 372 Wrapping SPI Devices with C++ Classes 373 Three-Wire SPI Communication 375 Multiple SPI Slave Devices 376 UART 377 The Beagle Board UART 378 UART Examples in C 380 Beagle Board Serial Client 381 LED Serial Server 383 UART Applications: GPS 386 CAN Bus 388 Beagle Board CAN Bus 389 SocketCAN 390 A CAN Bus Test Circuit 392 Linux CAN-utils 393 A SocketCAN C Example 394 Logic-Level Translation 396 Summary 398 Further Reading 399 Chapter 9 Interacting with the Physical Environment 401 Interfacing to Actuators 402 DC Motors 403 Driving Small DC Motors (up to 1.5 A) 406 Controlling a DC Motor Using sysfs 407 Driving Larger DC Motors (Greater Than 1.5 A) 409 Controlling a DC Motor Using C++ 411 Stepper Motors 412 The EasyDriver Stepper Motor Driver 413 A Beagle Board Stepper Motor Driver Circuit 414 Controlling a Stepper Motor Using C++ 415 Relays 417 Interfacing to Analog Sensors 418 Protecting the ADC Inputs 420 Diode Clamping 421 Op-Amp Clamping 422 Analog Sensor Signal Conditioning 427 Scaling Using Voltage Division 427 Signal Offsetting and Scaling 428 Analog Interfacing Examples 431 Infrared Distance Sensing 431 ADXL335 Conditioning Example 436 Interfacing to Local Displays 438 MAX7219 Display Modules 438 Character LCD Modules 441 Building C/C++ Libraries 445 Makefi les 446 CMake 447 A Hello World Example 448 Building a C/C++ Library 449 Using a Shared (.so) or Static (.a) Library 452 Summary 453 Further Reading 454 Chapter 10 Real-Time Interfacing Using External Slave Processors 455 Real-Time Beagle Board 456 Real-Time Kernels 456 Real-Time Hardware Solutions 458 Extended GPIO Availability 458 The MCP23017 and the I2C Bus 460 Controlling the GPIO LED Circuit 461 Reading the GPIO Button State 462 An Interrupt Configuration Example (Advanced) 463 The MCP23S17 and the SPI Bus 464 A C++ Class for the MCP23x17 Devices 465 Adding External UARTs 468 The Arduino 471 An Arduino Serial Slave 474 A UART Echo Test Example 475 UART Command Control of an Arduino 478 An Arduino I2C Slave 481 An I2C Test Circuit 481 I2C Register Echo Example 482 I2C Temperature Sensor Example 484 I2C Temperature Sensor with a Warning LED 486 Arduino Slave Communication Using C/C++ 488 An I2C Ultrasonic Sensor Application 490 Summary 493 Further Reading 493 Part III Advanced Beagle Board Systems 495 Chapter 11 The Internet of Things 497 The Internet of Things 498 A Beagle Board IoT Sensor 499 The Beagle Board as a Sensor Web Server 501 Installing and Configuring a Web Server 502 Configuring the Apache Web Server 503 Creating Web Pages and Web Scripts 503 PHP on the Beagle Board 506 GNU Cgicc Applications (Advanced) 508 Replacing Bone101 with Apache 511 A C/C++ Web Client 512 Network Communications Primer 513 A C/C++ Web Client 514 Secure Communication Using Open SSL 516 A Beagle Board as a “Thing” 518 Thing Speak 518 The Linux Cron Scheduler 521 System crontab 521 User crontab 523 Sending E-mail from the Beagle Board 524 If This Then That 526 IoT Frameworks 528 MQ Telemetry Transport 529 MQTT Server/Broker 531 MQTT Publisher/Subscriber on a Beagle Board 533 The mqtt-spy Debug Tool 534 Writing MQTT Code 535 A Paho MQTT Publisher Example 535 A Paho MQTT Subscriber Example 537 Adafuit IO 539 Configuring the Adafruit IO Account 540 Connecting to Adafruit IO with MQTT 542 An MQTT Node.js Publish Example 543 The C++ Client/Server 545 IoT Device Management 548 Remote Monitoring of a Beagle Board 548 Beagle Board Watchdog Timers 549 Static IP Addresses 551 Power over Ethernet 551 PoE Power Extraction Modules (Advanced Topic) 553 Summary 554 Chapter 12 Wireless Communication and Control 555 Introduction to Wireless Communications 556 Bluetooth Communications 557 Installing a Bluetooth Adapter 558 Checking the LKM 559 Configuring a Bluetooth Adapter 560 Making the Beagle Board Discoverable 561 Android App Development with Bluetooth 563 Wi-Fi Communications 564 Installing a Wi-Fi Adapter 564 The NodeMCU Wi-Fi Slave Processor 568 Flashing with the Latest Firmware 569 Connecting the NodeMCU to Wi-Fi 570 Programming the NodeMCU 571 The NodeMCU Web Server Interface 574 JSON 575 The NodeMCU and MQTT 577 ZigBee Communications 579 Introduction to XBee Devices 579 AT versus API Mode 581 XBee Confi guration 582 XCTU 582 Configuring an XBee Network Using XCTU 583 An XBee AT Mode Example 584 Setting Up the Arduino XBee Device (XBeeA) 584 Setting Up the PocketBeagle XBee Device (XBeePB) 586 An XBee API Mode Example 589 Setting Up the PocketBeagle XBee Device (XBee1) 589 Setting Up the Stand-Alone XBee Device (XBee2) 589 XBee API Mode and Node.js 590 XBee and C/C++ 592 Near Field Communication 593 Summary 596 Chapter 13 Beagle Board with a Rich User Interface 599 Rich UI Beagle Board Architectures 600 Beagle Boards as General-Purpose Computers 601 Connecting a Bluetooth Input Peripheral 603 BeagleBone with a LCD Touchscreen Cape 604 Virtual Network Computing 605 VNC Using VNC Viewer 605 VNC with Xming and PuTTY 606 VNC with a Linux Desktop Computer 607 Fat-Client Applications 608 Rich UI Application Development 608 Introduction to GTK+ on the Beagle Boards 609 The “Hello World” GTK+ Application 609 The Event-Driven Programming Model 610 The GTK+ Temperature Application 611 Introduction to Qt for the Beagle Board 612 Installing Qt Development Tools 613 The “Hello World” Qt Application 613 Qt Primer 615 Qt Concepts 615 The QObject Class 617 Signals and Slots 617 Qt Development Tools 618 A First Qt Creator Example 620 A Qt Temperature Sensor GUI Application 621 Remote UI Application Development 625 Fat-Client Qt GUI Application 626 Multithreaded Server Applications 629 A Multithreaded Temperature Service 632 Parsing Stream Data 634 The Fat Client as a Server 635 Parsing Stream Data with XML 638 The Beagle Board Client Application 639 Summary 641 Further Reading 641 Chapter 14 Images, Video, and Audio 643 Capturing Images and Video 644 USB Webcams 644 Video4Linux2 (V4L2) 646 Image Capture Utility 647 Video4Linux2 Utilities 648 Writing Video4Linux2 Programs 650 Streaming Video 652 Image Processing and Computer Vision 654 Image Processing with Open CV 654 Computer Vision with Open CV 656 Boost 659 BeagleBone Audio 660 Core Audio Software Tools 661 Audio Devices for the Beagle Boards 661 HDMI and USB Audio Playback Devices 661 Internet Radio Playback 664 Recording Audio 664 Audio Network Streaming 666 Bluetooth A2DP Audio 666 Text-to-Speech 669 Summary 670 Further Reading 670 Chapter 15 Real-Time Interfacing with the PRU-ICSS 673 The PRU-ICSS 674 The PRU-ICSS Architecture 674 The Remote Processor Framework 675 Important Documents 676 Development Tools for the PRU-ICSS 676 The PRU Code Generation Tools 677 The PRU Debugger 677 Using the AM335x PRU-ICSS 679 Setting Up the Board for Remoteproc 679 Testing Remoteproc under Linux 680 A First PRU Example 683 PRU-ICSS Enhanced GPIOs 683 A First PRU Program 686 A First PRU Program in C 686 A First PRU Program in Assembly 688 The PRU-ICSS in Detail 691 Registers 691 Local and Global Memory 692 PRU Assembly Instruction Set 696 PRU-ICSS Applications 698 PRU-ICSS Performance Tests 698 Utilizing Regular Linux GPIOs 702 A PRU PWM Generator 704 A PRU Sine Wave Generator 708 An Ultrasonic Sensor Application 709 Summary 714 Further Reading 714 Chapter 16 Embedded Kernel Programming 717 Introduction 718 Why Write Kernel Modules? 718 Loadable Kernel Module Basics 719 A First LKM Example 720 The LKM Make file 722 Building the LKM on a Beagle Board 723 Testing the First LKM Example 724 Testing the LKM Parameter 726 An Embedded LKM Example 727 Interrupt Service Routines 729 Performance 733 Enhanced Button GPIO Driver LKM 733 The object Interface 734 Enhanced LED GPIO Driver LKM 741 Kernel Threads 742 Conclusions 744 Summary 744 Index 745
£26.34
John Wiley & Sons Inc Design and Analysis of Security Protocol for
Book SynopsisThe purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.Table of ContentsPreface xiii 1 History and Generations of Security Protocols 1Bright Keswani, Poonam Keswani and Rakhi Purohit 1.1 Introduction 2 1.2 Network Security 2 1.3 Historical Background of Network Security and Network Timeline 4 1.4 Internet Architecture and Security Aspects 5 1.4.1 IPv4 and IPv6 Architecture 6 1.4.1.1 Structure of IPv4 6 1.4.1.2 IPv6 Architecture 7 1.4.2 Attack Through IPv4 8 1.4.2.1 Internet Attacks Common Methods 8 1.4.2.2 Internet Security Technology 10 1.4.3 IPv6 IP Security Issues 11 1.5 Different Aspects of Security of the Network 12 1.6 Evolution of Security Protocols for Network 13 1.6.1 Understanding the Key Components of Network Security 13 1.6.2 A Deep Defense Strategy 14 1.6.3 How Does the Next Generation Network Security System Work Best 15 1.7 Network Security Protocols 17 1.7.1 Application Layer 17 1.7.1.1 Good Privacy (PGP) 17 1.7.1.2 Email/Multipurpose Security (S/MIME) 18 1.7.1.3 HTTP Secure (S-HTTP) 18 1.7.1.4 Hypertext Transfer Protocol (HTTPS) in Secure Sockets Layer 19 1.7.1.5 Secure E-Commerce (SET) 19 1.7.1.6 Kerberos 19 1.7.2 Transport Layer 20 1.7.2.1 Secure Sockets Layer (SSL) 20 1.7.2.2 Transport Layer Security (TLS) 21 1.7.3 Network Layer 21 1.7.3.1 Internet Protocol Security (IPSec) 22 1.7.3.2 Virtual Private Network (VPN) 23 1.7.4 Data Link Layer 24 1.7.4.1 Point-to-Point Protocol (PPP) 24 1.7.4.2 Remote Authentication User Service (RADIO) 24 1.7.4.3 Terminal System Access Control Access Control Equipment (TACACS +) 25 1.8 Current Evolution of Red Security 25 1.8.1 Hardware Development 25 1.8.2 Software Development 27 1.9 Future Security Trends 27 References 27 2 Evolution of Information Security Algorithms 29Anurag Jagetiya and C. Rama Krishna 2.1 Introduction to Conventional Encryption 30 2.2 Classical Encryption Techniques 31 2.2.1 Substitution Based 32 2.2.1.1 Caesar Cipher 32 2.2.1.2 Monoalphabetic Cipher 32 2.2.1.3 Playfair Cipher 33 2.2.1.4 Polyalphabetic Cipher 35 2.2.2 Transposition Based 36 2.2.2.1 Simple Columnar 36 2.2.2.2 Rail Fence Cipher 37 2.3 Evolutions of Modern Security Techniques 38 2.3.1 Stream Cipher Algorithms 38 2.3.1.1 One Time Pad (OTP) 40 2.3.1.2 RC-4 41 2.3.1.3 A5/1 43 2.3.2 Block Cipher Algorithms 44 2.3.2.1 Feistel Cipher Structure 46 2.3.2.2 Data Encryption Standard (DES) 48 2.3.2.3 Triple Data Encryption Standard (TDES) 56 2.3.2.4 International Data Encryption Algorithm (IDEA) 58 2.3.2.5 Blowfish 60 2.3.2.6 CAST-128 62 2.4 Conclusion 66 References 67 Practice Set 67 Review Questions and Exercises 70 3 Philosophy of Security by Cryptostakes Schemes 79Hemant Kumar Saini 3.1 Philosophy of Public Key Cryptosystems (p-k Cryptography) 79 3.2 RSA Algorithm 81 3.3 Security Analysis of RSA 84 3.4 Exponentiation in Modular Arithmetic 85 3.5 Distribution of Public Keys 87 3.6 Distribution of Secret Keys Using Public Key Cryptosystems 89 3.7 Discrete Logarithms 91 3.8 Diffie–Hellman Key Exchange 91 3.9 Review Exercise 93 References 94 4 Zero-Share Key Management for Secure Communication Across a Channel 95P. R. Mahalingam and K. A. Fasila 4.1 Introduction 95 4.2 Background 96 4.3 Zero-Share Key Management System 98 4.4 Simulation 100 4.5 Complexity and Analysis 103 4.6 Conclusion and Future Trends 106 References 107 5 Soft Computing-Based Intrusion Detection System With Reduced False Positive Rate 109Dharmendra G. Bhatti and Paresh V. Virparia 5.1 Introduction 109 5.1.1 Soft Computing for Intrusion Detection 111 5.1.2 False Positive 112 5.1.3 Reasons of False Positive 113 5.2 Existing Technology and Its Review 115 5.3 Research Design 118 5.3.1 Conceptual Framework 118 5.3.2 Preprocessing Module 121 5.3.3 Alert Monitoring Module 123 5.4 Results With Implications 124 5.4.1 Preprocessing Module Benchmark 126 5.4.2 Alert Monitoring Module Benchmark 129 5.4.3 Overall Benchmark 130 5.4.4 Test Bed Network Benchmark 131 5.5 Future Research and Conclusion 133 References 135 6 Recursively Paired Arithmetic Technique (RPAT): An FPGA-Based Block Cipher Simulation and Its Cryptanalysis 141Rajdeep Chakraborty and J.K. Mandal 6.1 Introduction 141 6.2 Recursively Paired Arithmetic Technique (RPAT) 142 6.2.1 An Example of RPAT 144 6.2.2 Options of RPAT 145 6.2.3 Session Key Generation 146 6.3 Implementation and Simulation 147 6.4 Cryptanalysis 150 6.5 Simulation Based Results 152 6.6 Applications 152 6.7 Conclusion 153 Acknowledgment 153 References 153 7 Security Protocol for Multimedia Streaming 155N. Brindha, S. Deepa and S. Balamurugan 7.1 Introduction 156 7.1.1 Significance of Video Streaming 156 7.2 Existing Technology and Its Review 162 7.3 Methodology and Research Design 166 7.4 Findings 167 7.5 Future Research and Conclusion 169 References 169 8 Nature Inspired Approach for Intrusion Detection Systems 171Mohd Shahid Husain 8.1 Introduction 171 8.1.1 Types of Intrusion Detection Systems 172 8.2 Approaches Used for Intrusion Detection Systems 173 8.2.1 Intrusion Detection and Prevention Systems 173 8.2.2 Performance Criteria of Intrusion Detection Systems 174 8.3 Intrusion Detection Tools 175 8.4 Use of Machine Learning to Build Dynamic IDS/IPS 176 8.5 Bio-Inspired Approaches for IDS 178 8.6 Conclusion 179 References 181 9 The Socio-Behavioral Cipher Technique 183Harshit Bhatia, Rahul Johari and Kalpana Gupta 9.1 Introduction 183 9.2 Existing Technology 184 9.3 Methodology 186 9.3.1 Key Arrangement 187 9.3.2 Key Selection 188 9.3.3 Mathematical Operations 189 9.3.4 Algorithm 191 9.3.5 Encryption Operation 192 9.3.6 Decryption Operation 193 9.3.7 Mathematical Modeling 201 9.4 Conclusion: Future Scope and Limitations 205 References 208 10 Intrusion Detection Strategies in Smart Grid 211P. Ponmurugan, C. Venkatesh, M. Divya Priyadharshini and S. Balamurugan 10.1 Introduction 212 10.2 Role of Smart Grid 212 10.3 Technical Challenges Involved in Smart Grid 213 10.4 Intrusion Detection System 216 10.5 General Architecture of Intrusion Detection System 217 10.6 Basic Terms in IDS 218 10.7 Capabilities of IDS 219 10.8 Benefits of Intrusion Detection Systems 219 10.9 Types of IDS 220 10.10 IDS in a Smart Grid Environment 222 10.10.1 Smart Meter 223 10.10.2 Metering Module 223 10.10.3 Central Access Control 224 10.10.4 Smart Data Collector 224 10.10.5 Energy Distribution System 225 10.10.6 SCADA Controller 225 10.11 Security Issues of Cyber-Physical Smart Grid 225 10.12 Protecting Smart Grid From Cyber Vulnerabilities 227 10.13 Security Issues for Future Smart Grid 229 10.14 Conclusion 230 References 230 11 Security Protocol for Cloud-Based Communication 235R. Suganya and S. Sujatha 11.1 Introduction 236 11.2 Existing Technology and Its Review 237 11.3 Methodology (To Overcome the Drawbacks of Existing Protocols) 238 11.4 Findings: Policy Monitoring Techniques 238 11.5 Future Research and Conclusion 240 Reference 241 12 Security Protocols for Mobile Communications 243Divya Priyadharshini M., Divya R., Ponmurugan P. and Balamurugan S. 12.1 Introduction 244 12.2 Evolution of Mobile Communications 246 12.3 Global System for Mobiles (GSM) 248 12.4 Universal Mobile Telecommunications System (UMTS) 250 12.5 Long Term Evolution (LTE) 251 12.6 5G Wireless Systems 254 12.7 LoRA 257 12.8 5G Integrated With LoRA 258 12.9 Physical Layer Security and RFID Authentication 259 12.10 Conclusion 259 References 260 13 Use of Machine Learning in Design of Security Protocols 265M. Sundaresan and D. Boopathy 13.1 Introduction 266 13.2 Review of Related Literature 269 13.3 Joint and Offensive Kinetic Execution Resolver 271 13.3.1 Design of JOKER Protocol 273 13.3.2 Procedure 276 13.3.3 Procedure 278 13.3.4 Simulation Details and Parameters 279 13.3.4.1 Packet Delivering Ratio Calculation 279 13.3.4.2 Packet Loss Ratio Calculation 279 13.3.4.3 Latency (Delay) Calculation 279 13.3.4.4 Throughput Calculation 280 13.4 Results and Discussion 280 13.5 Conclusion and Future Scope 283 References 283 14 Privacy and Authentication on Security Protocol for Mobile Communications 287Brajesh Kumar Gupta “Mewadev” 14.1 Introduction 288 14.2 Mobile Communications 289 14.3 Security Protocols 291 14.4 Authentication 294 14.5 Next Generation Networking 298 14.6 Conclusion 302 References 303 15 Cloud Communication: Different Security Measures and Cryptographic Protocols for Secure Cloud Computing 305Anjana Sangwan 15.1 Introduction 305 15.2 Need of Cloud Communication 306 15.3 Application 309 15.4 Cloud Communication Platform 310 15.5 Security Measures Provided by the Cloud 310 15.6 Achieving Security With Cloud Communications 312 15.7 Cryptographic Protocols for Secure Cloud Computing 314 15.8 Security Layer for the Transport Protocol 315 15.9 Internet Protocol Security (IPSec) 317 15.9.1 How IPsec Works 318 15.10 Kerberos 320 15.11 Wired Equivalent Privacy (WEP) 326 15.11.1 Authentication 326 15.12 WiFi Protected Access (WPA) 327 15.13 Wi-Fi Protected Access II and the Most Current Security Protocols 328 15.13.1 Wi-Fi Protected Access 329 15.13.2 Difference between WEP, WPA: Wi-Fi Security Through the Ages 329 15.14 Wired Equivalent Privacy (WEP) 329 15.15 Wi-Fi Protected Access (WPA) 330 15.16 Conclusions 330 References 331 Index 333
£164.66
John Wiley & Sons Inc Microsoft Azure Infrastructure Services for
Book SynopsisAn expert guide for IT administrators needing to create and manage a public cloud and virtual network using Microsoft Azure With Microsoft Azure challenging Amazon Web Services (AWS) for market share, there has been no better time for IT professionals to broaden and expand their knowledge of Microsoft's flagship virtualization and cloud computing service. Microsoft Azure Infrastructure Services for Architects: Designing Cloud Solutionshelps readers develop the skills required to understand the capabilities of Microsoft Azure for Infrastructure Services and implement a public cloud to achieve full virtualization of data, both on and off premise. Microsoft Azure provides granular control in choosing core infrastructure components, enabling IT administrators to deploy new Windows Server and Linux virtual machines, adjust usage as requirements change, and scale to meet the infrastructure needs of their entire organization. This accurate, authoritative book coTable of ContentsIntroduction xix Chapter 1 The Cloud and Microsoft Azure Fundamentals 1 The Evolution of the Datacenter 1 Introducing the Cloud 2 The Private Cloud and Virtualization 4 Types of Service in the Cloud 10 Microsoft Azure 101 13 Microsoft Datacenters and Regions 14 Microsoft Network 24 Azure Resource Providers 26 Getting Access to Microsoft Azure 30 Free Azure Trials and Pay-as-You-Go 31 Azure Benefits from Visual Studio Subscriptions 31 Enterprise Enrollments for Azure 33 Reserved Instances and Azure Hybrid Benefit 37 Reserved Instances 37 Azure Hybrid Benefit 39 Increasing Azure Limits 40 The Azure Portal 41 Portal Basics 42 Azure Portal Dashboards 45 Chapter 2 Governance 47 What is Governance? 47 Understanding Governance Requirements in Your Organization 49 Azure Subscriptions and Management Groups 52 Subscriptions 52 Management Groups 55 Resource Groups 62 Role-Based Access Control 63 Naming Conventions 69 Using Tags 70 Azure Policy 75 Azure Templates 80 Azure Blueprints 83 Azure Resource Graph 86 Cost Management 88 Visibility 89 Accountability 91 Optimization 93 Chapter 3 Identity 95 The Importance of Identity 95 A Brief Refresher on Active Directory 97 Using Cloud Services, Federation and Cloud Authentication 98 Federation 98 Cloud Authentication and Authorization 101 Azure Active Directory Fundamentals 103 Azure AD SKUs 106 Populating Azure AD 108 Azure AD B2B 122 Azure AD Authentication Options 128 Azure AD Groups 137 Azure AD Entitlements and Application Publishing 138 Chapter 4 Identity Security and Extended Identity Services 145 Azure AD Security 145 Multi-Factor Authentication 145 Password Policies 149 Azure AD Conditional Access 150 Azure AD Identity Protection 153 Azure AD Log Inspection 154 Azure AD Privileged Identity Management 156 Azure Advanced Threat Protection 158 Azure AD Application Proxy 158 Azure AD B2C 160 Active Directory in the Cloud 162 Active Directory Site Configuration 163 Placing a Domain Controller in Azure 164 Azure AD Domain Services 167 Chapter 5 Networking 171 Connectivity 171 Virtual Networks 171 Adding a VM to a Virtual Network 174 NIC IP Configurations 174 Reserved IPs for VM 176 Accelerated Networking 177 Azure DNS Services and Configuration Options 177 Connecting Virtual Networks 178 Connectivity to Azure 181 Azure Virtual WANs and ExpressRoute Global Reach 193 PaaS VNet Integration 194 Protection 196 Network Security Groups and Application Security Groups 196 Firewall Virtual Appliances 199 Distributed Denial-of-Service Protection 202 Delivery 202 Intra-Region Load Balancing 203 Inter-Region Load Balancing 206 Monitoring 210 Chapter 6 Storage 213 Azure Storage Services 213 Azure Storage Architecture 213 Using Storage Accounts and Types of Replication 215 Storage Account Keys 219 Azure Storage Services 221 Storage with Azure VMs 235 VM Storage Basics 235 Temporary Storage 236 Managed Disks 237 Bulk Data Options 242 Azure Import/Export and Azure Data Box Disk 242 Azure Data Box 242 Azure Data Box Gateway and Data Box Edge 242 Azure Database Offerings 243 Azure SQL Database 243 Azure Cosmos DB 246 Chapter 7 Azure Compute 249 Virtual Machines 249 Fundamentals of IaaS 249 Types of Virtual Machines 252 Azure VM Agent and Extensions 258 Boot Diagnostics 260 Ephemeral OS Disks 261 Proximity Placement Groups 262 Virtual Machine Scale Sets 263 Low-Priority VMs 264 Azure Dedicated Host 264 Windows Virtual Desktop 265 VMware in Azure? 265 Platform as a Service Offerings 266 Containers 266 Azure Application Services 275 Azure Serverless Compute Services 278 Chapter 8 Azure Stack 281 Azure Stack Foundation 281 Azure Stack 101 281 Services Available on Azure Stack 284 How to Buy Azure Stack 285 When to Use Azure Stack 287 Managing Azure Stack 288 How to Interact with Azure Stack 288 Marketplace Syndication 290 Plans, Offers, and Subscriptions 292 Updating Azure Stack 294 Privileged Endpoint and Support Session Tokens 295 Understanding Azure Stack HCI 296 Chapter 9 Backup, High Availability, Disaster Recovery, and Migration 297 Availability 101 297 Distinguishing High Availability vs. Disaster Recovery vs. Backup 297 Understanding Application Structure and Requirements 299 Architecting for Multi-Region Application Deployments 301 Backups in Azure 305 Thinking About Backups 305 Using Azure Backup 307 High Availability in Azure 311 Disaster Recovery in Azure 312 On-Premises Disaster Recovery 313 On Premises to Azure Disaster Recovery 314 Azure to Azure 317 Migrating Workloads to Azure 318 Migration Benefits 319 Migration Approaches 320 Migration Phases 320 Chapter 10 Monitoring and Security 325 Azure Monitoring 325 Why Monitor? 325 Types of Telemetry in Azure 326 Azure Monitor Fundamentals 329 Azure Monitor Logs Fundamentals 334 Alerting 341 Security in Azure 350 Advanced Threat Protection (ATP) 350 Azure Security Center (ASC) 353 Azure Sentinel 355 Keeping Secrets with Azure Key Vault and Managed Identities 357 Chapter 11 Managing Azure 359 Command Line, Scripting, and Automation with Azure 359 Using PowerShell with Azure 360 Using the CLI with Azure 370 Leveraging Azure Cloud Shell 371 Automating with Azure Automation and Azure Functions 376 Deploying Resources with ARM JSON Templates 383 Everything is JSON 383 Anatomy of an ARM JSON Template 386 Template Tips 389 Additional Useful Technologies for Azure Management 393 Azure Bastion Host 393 Windows Admin Center 395 Chapter 12 What to Do Next 399 Understanding and Addressing Azure Barriers 399 Building Trust 400 Understanding Risks for Azure 400 Why You Should Use Azure and Getting Started 408 Understanding Azure’s Place in the Market 408 First Steps with Azure IaaS 411 Index 415
£35.62