Computer hardware Books

363 products


  • Surface For Dummies

    John Wiley & Sons Inc Surface For Dummies

    Out of stock

    Book SynopsisMake Microsoft''s Surface workand playjust the way you want it to Microsoft''s Surface tablet has the features and personality you''re looking for, with a robust environment for business computing that doesn''t skimp on fun. Surface for Dummies, 2nd Edition explains how Windows 8.1 Pro and Windows RT differ, and helps you decide which Surface model is best for you. Step by step, this book walks you through both the hardware and software features of the Surface, including the touch cover and type cover, Windows RT and Windows 8.1 Pro operating systems, and the coveted Office Home & Student 2013 software suite that''s bundled with the Surface. Written by bestselling author Andy Rathbone, this easy-to-access book is filled with information on how to use the tablet, figure out the operating system, navigate the app environment, and take advantage of your exciting new Surface. The book is your personal guide to one the fastest, sleekest, and most powerfulTable of ContentsIntroduction 1 Part I: Introductions 5 Chapter 1: Which Microsoft Surface Do You Need? 7 Chapter 2: Getting Started with Your Surface 21 Chapter 3: Setting Up Your Surface 35 Chapter 4: Introducing Your Surface’s Start Screen and Controls 51 Chapter 5: Typing, Touching, and Drawing on the Surface 77 Part II: Connections 101 Chapter 6: Connecting to the Internet, Printers, Monitors, Storage, and More 103 Chapter 7: All About Apps 139 Chapter 8: Browsing the Web 157 Chapter 9: Reaching Out with Mail, People, Calendar, and Skype 175 Part III: Play 205 Chapter 10: Photos and Movies 207 Chapter 11: Listening to Music 219 Part IV: Work 233 Chapter 12: Visiting the Windows Desktop 235 Chapter 13: Working in Microsoft Office 2013 251 Chapter 14: Changing Settings 267 Chapter 15: Troubleshooting and Repair 279 Part V: The Part of Tens 291 Chapter 16: Ten Essential Tips ’n’ Tricks 293 Chapter 17: Ten Handy Accessories 299 Index 307

    Out of stock

    £16.14

  • Adventures in Python

    John Wiley & Sons Inc Adventures in Python

    1 in stock

    Book SynopsisThe complete beginner's guide to Python, for young people who want to start today Adventures in Python is designed for 11-to 15-year olds who want to teach themselves Python programming, but don't know where to start.Table of ContentsIntroduction 1 Adventure 1 Diving into Python 23 What Is Programming? 24 Opening IDLE 25 Returning to Your First Python Program 26 It Isn’t Working—Grrr! 28 Using a File Editor 30 Asking Questions with Variables 33 A Bit About Variables 35 Using Variables for a Fill-in-the-Blanks Story 37 Making the Program Make Decisions: Conditionals 39 Using if Statements 39 Nested if Statements 41 Creating an Imaginary Vending Machine 43 Repeating Code with Loops 45 Using while Loops 45 Infinite while Loops 47 Praise Generator 48 A Bigger Adventure: Spaceship Control Console 50 Set-Up and Password 50 Using the Console to Do Things 52 Adventure 2 Drawing with Turtle Graphics 57 Getting Started with Turtle 57 Using Variables to Change Angles and Lengths 61 Using Addition to Draw a Spiral 64 Saving Some Space with Loops 65 A Shape with 360 Sides: Drawing a Circle 67 Controlling the Number of Sides Using for Loops 68 Changing the Fill Colour in a Shape 71 Creating Functions to Reuse Your Code 72 Shape Presets 75 Adding Randomly Generated Pictures 76 Adventure 3 Windows, Buttons, and Other GUI Stuff 83 Creating Buttons 84 Changing the Button Text on Click 87 Counting Clicks 88 Creating Text Boxes 90 Writing It Backwards 92 Adding Passwords 93 Building a Random Sentence Generator 96 Programming a Guessing Game 99 Adventure 4 More GUI Elements with Tkinter 105 Creating Sliders 105 How Colours Work on Computers and as Hexadecimal Values 109 Changing the Canvas Colour 111 Making the Colour Picker 113 Adding a Text Box 116 Creating a Click Speed Game 117 Adventure 5 Drawing Shapes with PyGame 123 Installing PyGame 123 My First PyGame 124 Creating Rectangles 127 Creating a Rectangle 127 A Rainbow of Rectangles 128 Colour Grid 131 Creating Ellipses 133 Wobbling Circle 133 Saving Your Images 135 Saving a Single Image 135 Saving a Series of Images 136 Adventure 6 Adding Keyboard Input with PyGame 139 Using Keyboard Input 140 Other Keys You Can Use 142 Creating the Game 142 Introducing Full Movement 146 Moving the Player Offscreen 148 Adding the Ball 150 Creating Collisions 152 Goal! 154 Adding a Time Limit 157 Adventure 7 Creative Ways to Use a Mouse with PyGame 161 Getting the Mouse Position 161 Making a Button 163 Moving Target 166 Exploding Clicks 169 Making a Mesh 172 Creating Mouse Trails 175 Adventure 8 Using Images with PyGame 181 Loading an Image 181 Layering Images 184 Randomly Layering Images 186 Adding a Moustache to a Photograph 188 Making Sprites 191 Creating a Walking Animation 191 Walking in All Directions 195 Teleportation 197 Adventure 9 Using Sounds and Music with PyGame 203 Playing Sounds 203 Creating a Noise Loop 205 Making Keyboard Sound Effects 207 Using Music with Python 210 Playing Music 210 Adding Volume Tremolo 212 Making a Music Player 215 Adding Sounds and Music to a Game 218 Adventure 10 Your Really Big Adventure 223 Writing the Program for the Game 224 Setting Up the Files 224 Making the Game 225 Walls 226 Doors, Collisions and Coins 229 Setting Up the Window and Variables 231 Adding the Game Loop 234 Character Controls and Animations 234 Player Collisions and Collecting Coins 237 Displaying Points and Updating the Window 237 Playing the Game 238 Debugging the Game 239 Summary 240 Appendix A Installing and Downloading the Proper Files 243 Installing PyGame 243 Windows 8 243 Windows 7 245 Mac 245 Linux (Ubuntu) 247 Raspberry Pi 248 Downloading the Files for Adventures 8, 9 and 10 248 Windows 8 248 Windows 7 249 Mac 249 Linux (Ubuntu) 250 Raspberry Pi 250 Glossary 251 Index 257

    1 in stock

    £12.75

  • John Wiley & Sons Inc Operating System Concepts Essentials Binder Ready

    10 in stock

    Book Synopsis

    10 in stock

    £84.50

  • Learning Computer Architecture with Raspberry Pi

    John Wiley & Sons Inc Learning Computer Architecture with Raspberry Pi

    15 in stock

    Book SynopsisUse your Raspberry Pi to get smart about computing fundamentals In the 1980s, the tech revolution was kickstarted by a flood of relatively inexpensive, highly programmable computers like the Commodore. Now, a second revolution in computing is beginning with the Raspberry Pi. Learning Computer Architecture with the Raspberry Pi is the premier guide to understanding the components of the most exciting tech product available. Thanks to this book, every Raspberry Pi owner can understand how the computer works and how to access all of its hardware and software capabilities. Now, students, hackers, and casual users alike can discover how computers work with Learning Computer Architecture with the Raspberry Pi. This book explains what each and every hardware component does, how they relate to one another, and how they correspond to the components of other computing systems. You''ll also learn how programming works and how the operating system relates to tTable of ContentsIntroduction 1 Cambridge 1 Cut to the Chase 3 The Knee in the Curve 4 Forward the Foundation 5 Chapter 1 The Shape of a Computer Phenomenon 7 Growing Delicious, Juicy Raspberries 7 System-on-a-Chip 10 An Exciting Credit Card-Sized Computer 12 What Does the Raspberry Pi Do? 14 Meeting and Greeting the Raspberry Pi Board 14 GPIO Pins 15 Status LEDs 16 USB Receptacles 18 Ethernet Connection 18 Audio Out 19 Composite Video 21 CSI Camera Module Connector 21 HDMI 22 Micro USB Power 22 Storage Card 23 DSI Display Connection 24 Mounting Holes 25 The Chips 25 The Future 25 Chapter 2 Recapping Computing 27 The Cook as Computer 28 Ingredients as Data 28 Basic Actions 30 The Box That Follows a Plan 31 Doing and Knowing 31 Programs are Data 32 Memory 33 Registers 34 The System Bus 36 Instruction Sets 36 Voltages, Numbers and Meaning 37 Binary: Counting in 1s and 0s 37 The Digit Shortage 40 Counting and Numbering and 0 40 Hexadecimal as a Shorthand for Binary 41 Doing Binary and Hexadecimal Arithmetic 43 Operating Systems: The Boss of the Box 44 What an Operating System Does 44 Saluting the Kernel 46 Multiple Cores 46 Chapter 3 Electronic Memory 47 There Was Memory Before There Were Computers 47 Rotating Magnetic Memory 48 Magnetic Core Memory 50 How Core Memory Works 50 Memory Access Time 52 Static Random Access Memory (SRAM) 53 Address Lines and Data Lines 54 Combining Memory Chips into Memory Systems 56 Dynamic Random Access Memory (DRAM) 59 How DRAM Works 60 Synchronous vs. Asynchronous DRAM 62 SDRAM Columns, Rows, Banks, Ranks and DIMMs 64 DDR, DDR2 DDR3 and DDR4 SDRAM 66 Error-Correcting Code (ECC) Memory 69 The Raspberry Pi Memory System 70 Power Reduction Features 70 Ball-Grid Array Packaging 71 Cache 72 Locality of Reference 72 Cache Hierarchy 72 Cache Lines and Cache Mapping 74 Direct Mapping 76 Associative Mapping 78 Set-Associative Cache 79 Writing Cache Back to Memory 81 Virtual Memory 81 The Virtual Memory Big Picture 82 Mapping Virtual to Physical 83 Memory Management Units: Going Deeper 84 Multi-Level Page Tables and the TLB 88 The Raspberry Pi Swap Problem 88 Watching Raspberry Pi Virtual Memory 90 Chapter 4 ARM Processors and Systems-on-a-Chip 93 The Incredible Shrinking CPU 93 Microprocessors 94 Transistor Budgets 95 Digital Logic Primer 95 Logic Gates 96 Flip-Flops and Sequential Logic 97 Inside the CPU 99 Branching and Flags 101 The System Stack 102 System Clocks and Execution Time 105 Pipelining 106 Pipelining in Detail 108 Deeper Pipelines and Pipeline Hazards 109 The ARM11 Pipeline 112 Superscalar Execution 113 More Parallelism with SIMD 115 Endianness 118 Rethinking the CPU: CISC vs. RISC 119 RISC's Legacy 121 Expanded Register Files 122 Load/Store Architecture 122 Orthogonal Machine Instructions 123 Separate Caches for Instructions and Data 123 ARMs from Little Acorns Grow 124 Microarchitectures, Cores and Families 125 Selling Licenses Rather Than Chips 125 ARM11 126 The ARM Instruction Set 126 Processor Modes 129 Modes and Registers 131 Fast Interrupts 137 Software Interrupts 137 Interrupt Priority 138 Conditional Instruction Execution 139 Coprocessors 142 The ARM Coprocessor Interface 143 The System Control Coprocessor 143 The Vector Floating Point (VFP) Coprocessor 144 Emulating Coprocessors 145 ARM Cortex 145 Multiple-Issue and Out-Of-Order Execution 146 Thumb 2 147 Thumb EE 147 big.LITTLE 147 The NEON Coprocessor for SIMD 148 ARMv8 and 64-Bit Computing 148 Systems on a Single Chip 150 The Broadcom BCM2835 SoC 150 Broadcom's Second- and Third-Generation SoC Devices 151 How VLSI Chips Happen 151 Processes, Geometries and Masks 152 IP: Cells, Macrocells and Cores 153 Hard and Soft IP 154 Floorplanning, Layout and Routing 154 Standards for On-Chip Communication: AMBA 155 Chapter 5 Programming 159 Programming from a Height 159 The Software Development Process 160 Waterfall vs. Spiral vs. Agile 162 Programming in Binary 165 Assembly Language and Mnemonics 166 High-Level Languages 167 Après BASIC, Le Deluge 170 Programming Terminology 171 How Native-Code Compilers Work 173 Preprocessing 174 Lexical Analysis 175 Semantic Analysis 175 Intermediate Code Generation 176 Optimisation 176 Target Code Generation 176 Compiling C: A Concrete Example 177 Linking Object Code Files to Executable Files 183 Pure Text Interpreters 184 Bytecode Interpreted Languages 186 P-Code 186 Java 187 Just-In-Time (JIT) Compilation 189 Bytecode and JIT Compilation Beyond Java 191 Android, Java and Dalvik 191 Data Building Blocks 192 Identifiers, Reserved Words, Symbols and Operators 192 Values, Literals and Named Constants 193 Variables, Expressions and Assignment 193 Types and Type Definitions 194 Static and Dynamic Typing 196 Two's Complement and IEEE 754 198 Code Building Blocks 200 Control Statements and Compound Statements 200 If/Then/Else 200 Switch and Case 202 Repeat Loops 205 While Loops 205 For Loops 207 The Break and Continue Statements 208 Functions 210 Locality and Scope 211 Object-Oriented Programming 214 Encapsulation 217 Inheritance 219 Polymorphism 221 OOP Wrapup 224 A Tour of the GNU Compiler Collection Toolset 224 gcc as Both Compiler and Builder 225 Using Linux Make 228 Chapter 6 Non-Volatile Storage 231 Punched Cards and Tape 232 Punched Cards 232 Tape Data Storage 232 The Dawn of Magnetic Storage 235 Magnetic Recording and Encoding Schemes 236 Flux Transitions 237 Perpendicular Recording 238 Magnetic Disk Storage 240 Cylinders, Tracks and Sectors 240 Low-Level Formatting 242 Interfaces and Controllers 244 Floppy Disk Drives 246 Partitions and File Systems 247 Primary Partitions and Extended Partitions 247 File Systems and High-Level Formatting 249 The Future: GUID Partition Tables (GPTs) 249 Partitions on the Raspberry Pi SD Card 250 Optical Discs 252 CD-Derived Formats 254 DVD-Derived Formats 254 Ramdisks 255 Flash Storage 257 ROMs, PROMs and EPROMs 257 Flash as EEPROM 258 Single-Level vs. Multi-Level Storage 260 NOR vs. NAND Flash 261 Wear Levelling and the Flash Translation Layer 265 Garbage Collection and TRIM 267 SD Cards 268 eMMC 270 The Future of Non-Volatile Storage 271 Chapter 7 Wired and Wireless Ethernet 273 The OSI Reference Model for Networking 274 The Application Layer 276 The Presentation Layer 276 The Session Layer 278 The Transport Layer 278 The Network Layer 279 The Data Link Layer 281 The Physical Layer 282 Ethernet 282 Thicknet and Thinnet 283 The Basic Ethernet Idea 283 Collision Detection and Avoidance 285 Ethernet Encoding Systems 286 PAM-5 Encoding 290 10BASE-T and Twisted-Pair Cabling 291 From Bus Topology to Star Topology 292 Switched Ethernet 293 Routers and the Internet 296 Names vs. Addresses 296 IP Addresses and TCP Ports 297 Local IP Addresses and DHCP 300 Network Address Translation 302 Wi-Fi 304 Standards within Standards 305 Facing the Real World 305 Wi-Fi Equipment in Use 309 Infrastructure Networks vs. Ad Hoc Networks 311 Wi-Fi Distributed Media Access 312 Carrier Sense and the Hidden Node Problem 314 Fragmentation 315 Amplitude Modulation, Phase Modulation and QAM 316 Spread-Spectrum Techniques 319 Wi-Fi Modulation and Coding in Detail 320 How Wi-Fi Connections Happen 323 Wi-Fi Security 325 Wi-Fi on the Raspberry Pi 326 Even More Networking 329 Chapter 8 Operating Systems 331 Introduction to Operating Systems 333 History of Operating Systems 333 The Basics of Operating Systems 336 The Kernel: The Basic Facilitator of Operating Systems 343 Operating System Control 344 Modes 345 Memory Management 346 Virtual Memory 347 Multitasking 347 Disk Access and File Systems 348 Device Drivers 349 Enablers and Assistants to the Operating System 349 Waking Up the OS 349 Firmware 353 Operating Systems for Raspberry Pi 354 NOOBS 354 Third-Party Operating Systems 356 Other Available Operating Systems 356 Chapter 9 Video Codecs and Video Compression 359 The First Video Codecs 360 Exploiting the Eye 361 Exploiting the Data 363 Understanding Frequency Transform 367 Using Lossless Encoding Techniques 371 Changing with the Times 373 The Latest Standards from MPEG 374 H.265 378 Motion Search 378 Video Quality 381 Processing Power 382 Chapter 10 3D Graphics 383 A Brief History of 3D Graphics 383 The Graphical User Interface (GUI) 384 3D Graphics in Video Games 386 Personal Computing and the Graphics Card 387 Two Competing Standards 390 The OpenGL Graphics Pipeline 391 Geometry Specification and Attributes 393 Geometry Transformation 396 Lighting and Materials 400 Primitive Assembly and Rasterisation 403 Pixel Processing (Fragment Shading) 405 Texturing 407 Modern Graphics Hardware 411 Tiled Rendering 411 Geometry Rejection 413 Shading 415 Caching 416 Raspberry Pi GPU 417 Open VG 421 General Purpose GPUs 423 Heterogeneous Architectures 423 OpenCL 425 Chapter 11 Audio 427 Can You Hear Me Now? 427 MIDI 428 Sound Cards 428 Analog vs. Digital 429 Sound and Signal Processing 430 Editing 431 Compression 431 Recording with Effects 432 Encoding and Decoding Information for Communication 433 1-Bit DAC 434 I2S 436 Raspberry Pi Sound Input/Output 437 Audio Output Jack 437 HDMI 438 Sound on the Raspberry Pi 438 Raspberry Pi Sound on Board 439 Manipulating Sound on the Raspberry Pi 439 Chapter 12 Input/Output 447 Introducing Input/Output 448 I/O Enablers 451 Universal Serial Bus 452 USB Powered Hubs 455 Ethernet 457 Universal Asynchronous Receiver/Transmitters 458 Small Computer Systems Interface 459 Parallel ATA 459 Serial Advanced Technology Attachment 460 RS-232 Serial 460 High Definition Media Interface 461 I2S 462 I2C 463 Raspberry Pi Display, Camera Interface and JTAG 464 Raspberry Pi GPIO 464 GPIO Overview and the Broadcom SoC 465 Meeting the GPIO 466 Programming GPIO 473 Alternative Modes 479 GPIO Experimentation the Easy Way 480 Index 481

    15 in stock

    £19.20

  • The Official BBC microbit User Guide

    John Wiley & Sons Inc The Official BBC microbit User Guide

    15 in stock

    Book SynopsisThe go-to guide to getting started with micro:bit and exploring all of the mini-computer's amazing capabilities The micro:bit is a pocket-sized electronic development platform built with education in mind.Table of ContentsForeword xi Introduction xiii Part I Chapter 1 Meet the BBC micro:bit 3 A Tour of the Board 3 Breaking It Down 5 Display 6 Buttons 7 Processor 8 Radio 9 Accelerometer 10 Compass 11 Input-Output Pins 12 Micro-USB Port 13 Battery Connector 14 Chapter 2 Getting Started with the BBC micro:bit 17 Handling the BBC micro:bit 17 Powering the BBC micro:bit 18 USB Power 18 Battery Power 20 Greetings from the BBC micro:bit 23 Signs of Life 24 Testing the Buttons 24 Motion Gaming 24 Get Coding 25 Resetting the BBC micro:bit 25 Chapter 3 Programming the BBC micro:bit 27 USB Connectivity 27 Drag-and-Drop 29 Automatic Flashing 31 The Code Editor 32 Downloading Your Program 33 About Flash Memory 38 Part II Chapter 4 Programming Languages 41 About Programming Languages 41 The Three Main BBC micro:bit Languages 42 JavaScript Blocks 43 JavaScript 44 Python 45 Comparing Programming Languages 46 Choosing a Programming Language 48 Other Programming Languages 49 Chapter 5 JavaScript Blocks 51 Introducing the JavaScript Blocks Editor 51 Program 1: ‘Hello, World!’ 54 Loops 57 Program 2: Button Inputs 58 Multiple Buttons 60 Program 3: Touch Inputs 61 Variables 62 Program 4: The Temperature Sensor 65 Formatting the Output 67 Program 5: The Compass Sensor 67 Program 6: The Accelerometer Sensor 70 Delays 73 Reading Raw Accelerometer Data 74 Program 7: The Fruit Catcher Game 76 The Setup 77 The Main Program Loop 78 Conditional Loops 80 Conditional Statements 82 The Control Events 84 Further Steps 86 Chapter 6 JavaScript 87 Introducing the JavaScript Editor 88 Program 1: ‘Hello, World!’ 90 Loops 93 Program 2: Button Inputs 94 Multiple Buttons 97 Program 3: Touch Inputs 98 Variables 99 Program 4: The Temperature Sensor 102 Formatting the Output 104 Program 5: The Compass Sensor 104 Program 6: The Accelerometer Sensor 107 Delays 109 Reading Raw Accelerometer Data 110 Program 7: The Fruit Catcher Game 112 The Setup 113 The Main Program Loop 115 The Conditional Loops 116 The Conditional Statements 117 The Control Events 120 Further Steps 123 Chapter 7 Python 125 Introducing the Python Editor 126 Program 1: ‘Hello, World!’ 128 Loops 132 Program 2: Button Inputs 133 Multiple Buttons 136 Program 3: Touch Inputs 137 Variables 138 Program 4: The Temperature Sensor 141 Formatting the Output 142 Program 5: The Compass Sensor 143 Program 6: The Accelerometer Sensor 145 Delays 147 Reading Raw Accelerometer Data 148 Program 7: The Fruit Catcher Game 150 The Setup 150 The Main Program Loop 153 Conditional Loops 154 Conditional Statements 155 Drawing the Sprites 156 Finishing the Program 157 Further Steps 160 Part III Chapter 8 The Wireless BBC micro:bit 163 The BBC micro:bit Radio 163 Program 1: One-to-One Communication 164 Program 2: One-to-Many Communication 167 Program 3: Radio Groups 169 Testing the Group Feature 171 Using the BBC micro:bit with a Smartphone or Tablet 173 Chapter 9 The BBC micro:bit and the Raspberry Pi 175 About the Raspberry Pi 176 Connecting the Raspberry Pi to the BBC micro:bit 177 Reading from the BBC micro:bit 180 Using the BBC micro:bit Display 186 Practical Example: A CPU Monitor 189 Chapter 10 Building Circuits 193 Electronic Equipment 194 The Input-Output Pins 196 The Large Pins 197 The Small Pins 199 Serial Peripheral Interface (SPI) 201 Inter-Integrated Circuit (I2C) 201 Universal Asynchronous Receiver/Transmitter (UART) 201 Your First Circuits 202 Reading from a Button Input 202 Reading Resistor Colour Codes 205 Writing to an LED Output 207 Fading an LED via PWM 211 Reading an Analogue Input 213 Chapter 11 Extending the BBC micro:bit 217 Extending via Breakout Boards 217 Kitronik Edge Connector Breakout Board 218 ScienceScope Micro:bit Breakout Board 219 Proto-Pic Bread:Bit 220 Proto-Pic Exhi:Bit 220 Robotics and the BBC micro:bit 222 Kitronik Line-Following Buggy 222 Kitronik Motor Driver Board 223 Technology Will Save Us Micro:Bot 224 4tronix Bit:Bot 225 BinaryBots 226 Other BBC micro:bit Add-Ons 227 Kitronik Mi:Power 227 Proto-Pic Micro:Pixel Board 228 Proto-Pic Simon:Says Board 229 4tronix Bit:2:Pi Board 230 Kitronik Mi:Pro Protector and Mi:Power Cases 231 Chapter 12 The Wearable BBC micro:bit 233 Advantages of the Wearable BBC micro:bit 234 Conductive Thread 235 Using Conductive Thread 237 The Rain-Sensing Hat 241 Building the Hat 242 Mounting the BBC micro:bit 244 The Rain-Sensing Program 245 Battery Power 246 Chapter 13 Additional Resources 249 The Micro:bit Educational Foundation 249 Official Teaching Resources 251 Third-Party Teaching Resources 252 The Institution of Engineering and Technology 252 Computing At School 253 Micro:bit for Primary Schools 253 TES Magazine 255 Code Clubs 256 Part IV Appendix A JavaScript Blocks Recipes 259 Appendix B JavaScript Recipes 267 Appendix C Python Recipes 275 Appendix D Pin-Out Listing 285 Index 289

    15 in stock

    £16.14

  • Cyber Security in Parallel and Distributed

    John Wiley & Sons Inc Cyber Security in Parallel and Distributed

    15 in stock

    Book SynopsisThe book contains several new concepts, techniques, applications and case studies for cyber securities in parallel and distributed computing The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. Also included are various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information concerning various topics relating to cybersecurity technologies is organized within the sixteen chapters of this book. Some of the important topics covered include: Research and solutions for the problem of hidden image detection Security aspects of data mining and possible solution techniques A comparative analysis of various methods used in e-commerce security and how to perform secure payment transactions in an efficient manner Blockchain tTable of ContentsList of Figures xv List of Tables xvii Foreword xix Preface xxi Acknowledgments xxv Acronyms xxvii Part 1 Cybersecurity Concept 1 Introduction on Cybersecurity 3Ishaani Priyadarshini 1.1 Introduction to Cybersecurity 5 1.2 Cybersecurity Objectives 6 1.3 Cybersecurity Infrastructure and Internet Architecture (NIST) 8 1.4 Cybersecurity Roles 10 1.5 Cybercrimes 17 1.5.1 Overview 17 1.5.2 Traditional Computer Crime and Contemporary Computer Crime 18 1.5.3 Combating Crimes 21 1.6 Security Models 23 1.7 Computer Forensics 25 1.8 Cyber Insurance 27 1.8.1 Digital Citizenship 29 1.8.2 Information Warfare and its Countermeasures 31 1.8.3 Network Neutrality 33 1.8.4 Good Practices and Policies 34 1.8.5 Cybersecurity and Human Rights 35 1.9 Future of Cybersecurity 36 1.10 Conclusion 36 References 37 2 Steganography and Steganalysis 39Ho Thi Huong Thom, Nguyen Kim Anh 2.1 Introduction 40 2.2 Steganography 41 2.2.1 Method for Evaluating Hidden Information Schema Security 41 2.2.2 Peak Signal-to-Noise Ratio 42 2.3 Steganalysis 42 2.3.1 Blind Detection Based on LSB 43 2.3.2 Constraint Steganalysis 45 2.4 Conclusion 46 References 46 3 Security Threats and Vulnerabilities in E-business 51Satya Narayan Tripathy, Sisira Kumar Kapat, Susanta Kumar Das 3.1 Introduction to e-Business 52 3.1.1 Benefits of e-Business 52 3.1.2 Business Revolution 53 3.2 Security Issues in e-Business 54 3.2.1 Vulnerabilities 54 3.2.2 Security Attacks 55 3.2.3 Malware as a Threat 55 3.3 Common Vulnerabilities in e-Business 55 3.3.1 Phishing 55 3.3.2 Cross-Site Scripting (XSS) 56 3.4 Threats in e-Business 56 3.4.1 Ransomware 56 3.4.2 Spyware 56 3.4.3 Worms 57 3.4.4 Trojan Horse 57 3.5 Prevention Mechanism 57 3.6 Conclusion 58 References 58 4 e-Commerce Security: Threats, Issues, and Methods 61Prerna Sharma, Deepak Gupta, Ashish Khanna 4.1 Introduction 62 4.2 Literature Review 63 4.3 e-Commerce 63 4.3.1 Characteristics of e-Commerce Technology 63 4.3.2 Architectural Framework of e-Commerce 64 4.3.3 Advantages and Disadvantages of e-Commerce 66 4.4 Security Overview in e-Commerce 67 4.4.1 Purpose of Security in e-Commerce 67 4.4.2 Security Element at Different Levels of e-Commerce System 67 4.5 Security Issues in e-Commerce 68 4.5.1 Client Level 68 4.5.2 Front-End Servers and Software Application Level 68 4.5.3 Network and Server Level 68 4.6 Security Threats in e-Commerce 69 4.7 Security Approaches in e-Commerce 72 4.8 Comparative Analysis of Various Security Threats in e-Commerce 73 4.9 e-Commerce Security Life-Cycle Model 73 4.10 Conclusion 75 References 76 5 Cyberwar is Coming 79T. Manikandan, B. Balamurugan, C. Senthilkumar, R. Rajesh Alias Harinarayan, R. Raja Subramanian 5.1 Introduction 80 5.2 Ransomware Attacks 82 5.2.1 Petya 83 5.2.2 WannaCry 83 5.2.3 Locky 84 5.3 Are Nations Ready? 85 5.4 Conclusion 88 References 88 Part 2 Cybersecurity in Parallel and Distributed Computing Techniques 6 Introduction to Blockchain Technology 93Ishaani Priyadarshini 6.1 Introduction 94 6.2 Need for Blockchain Security 95 6.3 Characteristics of Blockchain Technology 96 6.4 Types of Blockchains 97 6.5 The Architecture of Blockchain Technology 97 6.6 How Blockchain Technology Works 100 6.7 Some Other Case Studies for Blockchain Technology 102 6.8 Challenges Faced by Blockchain Technology 103 6.9 The Future of Blockchain Technology 105 6.10 Conclusion 106 References 106 7 Cyber-Security Techniques in Distributed Systems, SLAs and other Cyber Regulations 109Soumitra Ghosh, Anjana Mishra, Brojo Kishore Mishra 7.1 Introduction 110 7.1.1 Primary Characteristics of a Distributed System 110 7.1.2 Major Challenges for Distributed Systems 111 7.2 Identifying Cyber Requirements 112 7.3 Popular security mechanisms in Distributed Systems 113 7.3.1 Secure Communication 113 7.3.2 Message Integrity and Confidentiality 115 7.3.3 Access Controls 116 7.4 Service Level Agreements 118 7.4.1 Types of SLAs 118 7.4.2 Critical Areas for SLAs 119 7.5 The Cuckoo’s Egg in the Context of IT Security 122 7.6 Searching and Seizing ComputerRelated Evidence 124 7.6.1 Computerized Search Warrants 124 7.6.2 Searching and Seizing 125 7.7 Conclusion 126 References 126 8 Distributed Computing Security: Issues and Challenges 129Munmun Saha, Sanjaya Kumar Panda and Suvasini Panigrahi 8.1 Introduction 130 8.2 Security Issues and Challenges 131 8.2.1 Confidentiality, Integrity and Availability 131 8.2.2 Authentication and Access Control Issue 132 8.2.3 Broken Authentication, Session and Access 132 8.3 Security Issues and Challenges in Advanced Areas 133 8.4 Conclusion 136 References 136 9 Organization Assignment in Federated Cloud Environments based on Multi-Target Optimization of Security 139Abhishek Kumar, Palvadi Srinivas Kumar, T.V.M. Sairam 9.1 Introduction 140 9.2 Background Work Related to Domain 141 9.2.1 Basics on Cloud computing 141 9.2.2 Clouds Which are Federated 141 9.2.3 Cloud Resource Management 141 9.3 Architectural-Based Cloud Security Implementation 142 9.4 Expected Results of the Process 144 9.5 Conclusion 146 References 146 10 An On-Demand and User-friendly Framework for Cloud Data Centre Networks with Performance Guarantee 149P. Srinivas Kumar, Abhishek Kumar, Pramod Singh Rathore, Jyotir Moy Chatterjee 10.1 Introduction 150 10.1.1 Key Research Problems in This Area 150 10.1.2 Problems with Interoperability 151 10.2 Difficulties from a Cloud Adoption Perspective 151 10.3 Security and Privacy 151 10.3.1 Resource Provisioning 152 10.3.2 How Do We Define Cloud? 153 10.3.3 Public vs Private Cloud-Based Services 153 10.3.4 Traffic-Aware VM Migration to Load Balance Cloud Servers 154 10.4 Conclusion and Future Work 157 References 157 Part 3 Cybersecurity Applications and Case Studies 11 Cybersecurity at Organizations: A Delphi Pilot Study of Expert Opinions About Policy and Protection 163Holly Reitmeier, Jolanda Tromp, John Bottoms 11.1 Introduction 164 11.1.1 What is Cybercrime? 164 11.1.2 What is Cybersecurity? 165 11.1.3 Purpose of This Cybersecurity Pilot Study 165 11.1.4 Methods of Cybersecurity Professionals 165 11.2 Shocking Statistics of Cybercrime 166 11.2.1 Role of the Internet Crime Complaint Center 166 11.2.2 2016 Global Economic Crime Survey Report 168 11.2.3 Inadequate Preparation at Organizations 168 11.2.4 Organizations: Be Aware, Be Secure 168 11.3 Cybersecurity Policies for Organizations 169 11.3.1 Classification of Cybersecurity at an Organization 171 11.3.2 Pyramid of Cybersecurity 171 11.4 Blockchain Technology 172 11.5 Research Methodology 173 11.5.1 Quantitative and Qualitative Data Collection 173 11.5.2 Design of the Study 174 11.5.3 Selection of the Delphi Method 174 11.5.4 Procedure of Utilization of the Delphi Method 175 11.5.5 Delphi Activities (Iteration Rounds) of This Pilot Study 175 11.6 Results of the Cybersecurity Delphi Study 176 11.6.1 Results from Round One 176 11.6.2 Results of Round Two 178 11.6.3 Discussion and Limitations Based on the Results 181 11.7 Conclusion 183 11.7.1 The Literature in the Field 183 11.7.2 Next Steps for Future Research 184 References 184 12 Smartphone Triggered Security Challenges - Issues, Case Studies and Prevention 187Saurabh Ranjan Srivastava, Sachin Dube, Gulshan Shrivastava, Kavita Sharma 12.1 Introduction 188 12.2 Classification of Mobile Security Threats 188 12.2.1 Physical Threats 189 12.2.2 Web-Based Threats 189 12.2.3 Application-Based Threats 189 12.2.4 Network-Based Threats 190 12.2.5 Data Transfer-Based Threats 191 12.2.6 Improper Session Management-Based Threats 191 12.2.7 Bluetooth-Based Threats 191 12.2.8 Application Platform-Based Threats 192 12.3 Smartphones as a Tool of Crime 192 12.4 Types of Mobile Phone-Related Crimes 193 12.5 Types of Mobile Fraud 196 12.6 Case Studies 198 12.6.1 Mobile Identity Theft 198 12.6.2 Data Theft by Applications 200 12.6.3 SIM Card Fraud 200 12.7 Preventive Measures and Precautions 201 12.7.1 Against Physical Loss and Theft of the Mobile Device 201 12.7.2 Against SMiShing Attacks 202 12.7.3 Against App-Based Attacks 203 12.7.4 Against Identity Theft and SIM Card Fraud 203 12.8 Conclusion 204 References 205 13 Cybersecurity: A Practical Strategy Against Cyber Threats, Risks with Real World Usages 207Anjana Mishra, Soumitra Ghosh, Brojo Kishore Mishra 13.1 Introduction 208 13.2 Cyberwar 209 13.3 Arms Control in Cyberwar 210 13.4 Internet Security Alliance 211 13.5 Cybersecurity Information Sharing Act 212 13.6 Market for Malware 214 13.7 Mobile Cybersecurity 215 13.8 Healthcare 216 13.9 Human Rights 217 13.10 Cybersecurity Application in Our Life 218 13.11 Conclusion 219 References 219 14 Security in Distributed Operating System: A Comprehensive Study 221Sushree Bibhuprada B. Priyadarshini, Amiya Bhusan Bagjadab, Brojo Kishore Mishra 14.1 Introduction to Security and Distributed Systems 222 14.2 Relevant Terminology 225 14.3 Types of External Attacks 225 14.4 Globus Security Architecture 228 14.5 Distribution of Security Mechanism 229 14.6 Conclusions 230 References 230 15 Security in Healthcare Applications based on Fog and Cloud Computing 231Rojalina Priyadarshini, Mohit Ranjan Panda, Brojo Kishore Mishra 15.1 Introduction 232 15.2 Security Needs of Healthcare Sector 233 15.2.1 Data Integrity 233 15.2.2 Data Confidentiality 233 15.2.3 Authentication and Authorization 233 15.2.4 Availability 234 15.2.5 Access Control 234 15.2.6 Dependability 234 15.2.7 Flexibility 234 15.3 Solutions to Probable Attacks in e-Healthcare 234 15.3.1 Jamming Attack 235 15.3.2 Data Collision Attack 235 15.3.3 Desynchronization Attack 235 15.3.4 Spoofing Attack 236 15.3.5 Man-in-the-Middle Attack 236 15.3.6 Denial-of-Service (DoS) Attack 237 15.3.7 Insider Attack 238 15.3.8 Masquerade Attack 238 15.3.9 Attacks on Virtual Machine and Hypervisor 239 15.4 Emerging Threats in Cloud- and Fog-Based Healthcare System 240 15.4.1 Software Supply Chain Attacks 240 15.4.2 Ransomware Attacks 240 15.4.3 Crypto-Mining and Crypto-Jacking Malware 240 15.5 Conclusion 241 References 241 16 Mapping of e-Wallets with Features 245Alisha Sikri, Surjeet Dalal, N.P Singh, Dac-Nhuong Le 16.1 Introduction 246 16.1.1 e-Wallet 246 16.1.2 Objectives 247 16.2 Review of Literature 250 16.3 Market Share of e-Wallet 251 16.3.1 Technical Features 252 16.3.2 Legal Features 252 16.3.3 Operational Features 253 16.3.4 Security Features 253 16.4 Research Methodology 253 16.5 Result Analysis 255 16.6 Conclusions and future work 256 References 256

    15 in stock

    £164.66

  • The Architecture of Computer Hardware Systems

    John Wiley & Sons Inc The Architecture of Computer Hardware Systems

    15 in stock

    Book SynopsisTable of ContentsPreface xxiii About the Authors xxix Part I An Overview of Computer Systems 1 Computers and Systems 4 1.0 Introduction 5 1.1 The Starting Point 8 1.2 Components of the Computer System 10 The Hardware Component 13 The Software Component 15 The Communication Component 17 The Computer System 17 1.3 The Concept of Virtualization 19 1.4 Protocols and Standards 20 1.5 Overview of This Book 21 1.6 A Brief Architectural History of the Computer 22 Early Work 23 Computer Hardware 24 Operating Systems 27 Communication, Networks, and the Internet 31 Summary and Review 32 For Further Reading 33 Key Concepts and Terms 33 Reading Review Questions 33 Exercises 34 2 An Introduction to System Concepts and Systems Architecture 36 2.0 Introduction 37 2.1 The General Concept of Systems 37 2.2 IT System Architectures 44 The Role of the System Architect 46 Summary and Review 48 For Further Reading 48 Key Concepts and Terms 49 Reading Review Questions 49 Exercises 49 Part II Data in the Computer 3 Number Systems 52 3.0 Introduction 53 3.1 Numbers as a Physical Representation 53 3.2 Counting in Different Bases 54 3.3 Performing Arithmetic in Different Number Bases 59 3.4 Numeric Conversion Between Number Bases 63 Alternative Conversion Methods 65 3.5 A Special Conversion Case—Number Bases That Are Related 67 3.6 Fractions 68 Fractional Conversion Methods 71 3.7 Mixed Number Conversions 73 Summary and Review 73 For Further Reading 74 Key Concepts and Terms 74 Reading Review Questions 74 Exercises 75 4 Data Formats 78 4.0 Introduction 79 4.1 General Considerations 79 4.2 Alphanumeric Character Data 82 4.3 Visual Data 88 Bitmap Images 89 Object Images 93 Representing Characters as Images 96 Video Images 96 4.4 Audio Data 97 4.5 Data Compression 100 4.6 Page Description Languages 102 4.7 Internal Computer Data Format 102 Numerical Character to Integer Conversion 104 Summary and Review 105 For Further Reading 106 Key Concepts and Terms 106 Reading Review Questions 106 Exercises 107 5 Representing Numerical Data 110 5.0 Introduction 111 5.1 Unsigned Binary and Binary-Coded Decimal Representations 111 5.2 Representations for Signed Integers 115 Sign-and-Magnitude Representation 115 Nine’s Decimal and 1’s Binary Complementary Representations 117 Ten’s Complement and 2’s Complement 124 Overflow and Carry Conditions 126 Other Bases 127 Summary of Rules for Complementary Numbers 128 5.3 Real Numbers 128 A Review of Exponential Notation 128 Floating Point Format 130 Normalization and Formatting of Floating Point Numbers 133 A Programming Example 135 Floating Point Calculations 136 Floating Point in the Computer 139 Conversion between Base 10 and Base 2 141 5.4 Programming Considerations 142 Summary and Review 143 For Further Reading 144 Key Concepts and Terms 144 Reading Review Questions 144 Exercises 145 Part III Computer Architecture and Hardware Operation 6 The Little Man Computer 152 6.0 Introduction 153 6.1 Layout of the Little Man Computer 154 6.2 Operation of the LMC 154 6.3 A Simple Program 156 6.4 An Extended Instruction Set 157 6.5 The Instruction Cycle 160 6.6 A Note Regarding Computer Architectures 162 Summary and Review 163 Key Concepts and Terms 163 Reading Review Questions 164 Exercises 164 7 The CPU and Memory 166 7.0 Introduction 167 7.1 The Components of the CPU 168 7.2 The Concept of Registers 169 7.3 The Memory Unit 171 The Operation of Memory 171 Memory Capacity and Addressing Limitations 175 Primary Memory Characteristics and Implementation 176 7.4 The Fetch–Execute Instruction Cycle 178 7.5 Classification of Instructions 181 Data Movement Instructions (load, store, and Other Moves) 183 Arithmetic Instructions 183 Boolean Logic Instructions 184 Single Operand Manipulation Instructions 184 Bit Manipulation Instructions 184 Shift and Rotate Instructions 185 Program Control Instructions 186 Stack Instructions 187 Multiple Data Instructions 189 Other Instructions 190 7.6 Instruction Word Formats 190 7.7 Instruction Word Requirements and Constraints 192 Summary and Review 195 For Further Reading 195 Key Concepts and Terms 195 Reading Review Questions 196 Exercises 197 8 CPU and Memory: Design, Enhancement, and Implementation 200 8.0 Introduction 201 8.1 CPU Architectures 202 Overview 202 Traditional Modern Architectures 202 8.2 CPU Features and Enhancements 203 Introduction 203 Fetch–Execute Cycle Timing Issues 204 A Model for Improved CPU Performance 206 Scalar and Superscalar Processor Organization 210 8.3 Memory Enhancements 213 Wide Path Memory Access 214 Memory Interleaving 214 Cache Memory 215 8.4 The Compleat Modern Superscalar CPU 219 8.5 Multiprocessing 221 8.6 A Few Comments on Implementation 225 Summary and Review 225 For Further Reading 226 Key Concepts and Terms 227 Reading Review Questions 227 Exercises 228 9 Input/Output and Buses 230 9.0 Introduction 231 9.1 Characteristics of Typical I/O Devices 232 9.2 Programmed I/O 237 9.3 Interrupts 239 Servicing Interrupts 239 The Uses of Interrupts 241 Multiple Interrupts and Prioritization 245 9.4 Direct Memory Access 249 9.5 I/O Controllers 252 9.6 Buses 254 Bus Characteristics 254 Summary and Review 258 For Further Reading 259 Key Concepts and Terms 259 Reading Review Questions 259 Exercises 260 10 Computer Peripherals 262 10.0 Introduction 263 10.1 The Hierarchy of Storage 264 10.2 Solid-State Memory 266 10.3 Magnetic Disks 267 Disk Arrays 272 10.4 Optical Disk Storage 274 10.5 Magnetic Tape 276 10.6 Displays 277 Basic Display Design 277 Graphical Processing Units (GPUs) 279 Liquid Crystal Display Technology 282 OLED Display Technology 283 10.7 Printers 284 Laser Printers 285 Inkjet Printers 285 10.8 User Input Devices 286 Keyboards 287 Pointing Devices 287 Alternative Sources of Alphanumeric Input 288 Scanners 291 Multimedia Input 291 Mobile Devices 292 10.9 Network Communication Devices 293 Summary and Review 293 For Further Reading 294 Key Concepts and Terms 294 Reading Review Questions 295 Exercises 295 11 Computer System Organization 298 11.0 Introduction 299 11.1 Putting the Pieces Together 300 11.2 System Architecture 305 Basic System Interconnection Requirements 305 Bus I/O 307 Channel Architecture 311 Blurring the Line 313 Summary and Review 313 For Further Reading 313 Key Concepts and Terms 314 Reading Review Questions 314 Exercises 314 Part IV Networks, Data Communications, and Networked Computer Systems 12 Networks and Data Communications—An Overview 318 12.0 Introduction 319 12.1 The Impact of Networking on Business Processes and User Access to Knowledge and Services 320 12.2 A Simple View of Data Communications 321 12.3 Basic Data Communication Concepts 324 Messages 324 Packets 325 General Channel Characteristics 326 12.4 Networks 330 Network Topology 330 Types of Networks 334 Network Interconnection 347 12.5 Standards 351 Summary and Review 352 For Further Reading 352 Key Concepts and Terms 352 Reading Review Questions 353 Exercises 353 13 Ethernet and T CP/IP Networking 356 13.0 Introduction 357 13.1 TCP/IP, OSI, and Other Communication Protocol Models 357 13.2 Program Applications versus Network Applications 362 13.3 The Physical and Data Link Layers 362 The Physical Layer 363 The Data Link Layer 364 Hub-Based Ethernet 366 Switched Ethernet 366 Wireless Ethernet (Wi-Fi) 367 13.4 The Network Layer 368 13.5 The Transport Layer 372 13.6 IP Addresses 376 IPv4 and DHCP 376 IPv6 379 13.7 Domain Names and DNS Services 380 13.8 Quality of Service 385 13.9 Network Security 386 Physical and Logical Access Restriction 386 Encryption 387 13.10 Alternative Protocols 387 A Comparison of TCP/IP and OSI 388 Other Protocol Suites and Components 388 SCSI Over IP 389 Cellular Technology 389 MPLS 390 Summary and Review 390 For Further Reading 391 Key Concepts and Terms 391 Reading Review Questions 392 Exercises 392 14 Communication Channel T echnology 396 14.0 Introduction 397 14.1 Communication Channel Technology 398 14.2 The Fundamentals of Signaling Technology 400 Analog Signaling 401 Digital Signaling 411 Modems 416 Two Examples of Alternative Advanced Technologies 416 14.3 Transmission Media and Signaling Methods 418 14.4 Wireless Technologies 420 Cellular Technology 421 Wi-Fi 421 Bluetooth 421 Summary and Review 422 For Further Reading 423 Key Concepts and Terms 423 Reading Review Questions 423 Exercises 424 15 Modern Networked Computer Systems 426 15.0 Introduction 427 15.1 Distributed Systems 428 15.2 Client–Server Computing 430 15.3 Web-Based Computing 433 15.4 Peer-to-Peer Computing 435 15.5 Clusters 436 Overview 436 Classification and Configuration 437 Beowulf Clusters 438 15.6 Storage Area Networks 440 15.7 Cloud Computing 441 15.8 Supercomputing 443 Grid Computing 444 15.9 Networked Computer System Architecture Examples 444 Google: A System Architecture Example 445 Another Example: Facebook’s Application Architecture 448 Summary and Review 449 For Further Reading 450 Key Concepts and Terms 450 Reading Review Questions 450 Exercises 451 Part V The Software Component 16 Operating Systems: An Overview 454 16.0 Introduction 455 16.1 The Barebones Computer System 456 16.2 The Operating Systems Concept: An Introduction 457 16.3 Services and Facilities 463 User Interface and Command Execution Services 464 File Management 465 Input/Output Services 466 Process Control Management 467 Memory Management 468 Scheduling and Dispatch 468 Secondary Storage Management 471 Network and Communications Support Services 471 Security and Protection Services 472 System Administration Support 473 16.4 Organization 476 16.5 Types of Computer Systems 479 Summary and Review 483 For Further Reading 483 Key Concepts and Terms 483 Reading Review Questions 484 Exercises 484 17 The User View of Operating Systems 486 17.0 Introduction 487 17.1 Purpose of the User Interface 488 17.2 User Functions and Program Services 490 Program Execution 490 File Commands 491 Disk and Other I/O Device Commands 492 Security and Data Integrity Protection 492 Interuser Communication and Data Sharing Operations 493 System Status Information and User Administration 494 Program Services 495 17.3 Types of User Interface 495 The Command Line Interface 496 Batch System Commands 498 Graphical User Interfaces 499 Touchless Gesture- and Voice-Based Interfaces 504 Trade-Offs in the User Interface 505 Software Considerations 506 17.4 X Window and Other Graphics Display Methodologies 507 17.5 Command and Scripting Languages 510 The Elements of a Command Language 512 The Command Language Start-Up Sequence Files 512 17.6 Services to Programs 513 Summary and Review 515 For Further Reading 515 Key Concepts and Terms 515 Reading Review Questions 516 Exercises 516 18 File Management 518 18.0 Introduction 519 18.1 The Logical and Physical View of Files 519 18.2 The Role of the File Management System 524 18.3 Logical File Access Methods 528 Sequential File Access 529 Random Access 529 Indexed Access 530 18.4 Physical File Storage 531 Contiguous Storage Allocation 531 Noncontiguous Storage Allocation 532 Indexed Allocation 534 Free Space Management 537 Tape Allocation 539 Optical and Flash Drive Allocation 539 18.5 File Systems, Volumes, Disks, Partitions, and Storage Pools 539 18.6 The Directory Structure 542 Tree-Structured Directories 543 Acyclic-Graph Directories 545 18.7 Network File Access 548 18.8 File Protection 550 18.9 Journaling File Systems 551 Summary and Review 552 For Further Reading 552 Key Concepts and Terms 553 Reading Review Questions 553 Exercises 554 19 The Internal Operating System 556 19.0 Introduction 557 19.1 Fundamental OS Requirements 558 Example: A Simple Multitasking Operating System 559 19.2 Starting the Computer System: The Bootstrap 562 19.3 Processes and Threads 564 Process Creation 567 Process States 568 Threads 569 19.4 Basic Loading and Execution Operations 570 19.5 CPU Scheduling and Dispatching 572 Long-Term Scheduler 572 Short-Term Scheduler and Dispatcher 572 Nonpreemptive Scheduling Algorithms 575 Preemptive Short-Term Scheduling Algorithms 576 19.6 Memory Management 577 Memory Partitioning 578 19.7 Virtual Storage 579 Overview 579 Pages and Frames 580 The Concept of Virtual Storage 585 Page Faults 586 Working Sets and the Concept of Locality 588 Page Sharing 588 Page Replacement Algorithms 589 Thrashing 592 Page Table Implementation 592 Segmentation 595 Process Separation 596 19.8 Disk Scheduling 596 First-Come, First-Served Scheduling 597 Shortest Distance First Scheduling 597 Scan Scheduling 597 n-Step c-Scan Scheduling 598 19.9 Network Operating System Services 598 OS Protocol Support and Other Services 598 19.10 Other Operating System Issues 601 Deadlock 601 Other Issues 602 19.11 Virtual Machines 603 Summary and Review 605 For Further Reading 606 Key Concepts and Terms 606 Reading Review Questions 607 Exercises 608 Bibliography B-1 Index I-1

    15 in stock

    £113.36

  • Exploring BeagleBone

    John Wiley & Sons Inc Exploring BeagleBone

    10 in stock

    Book SynopsisTable of ContentsIntroduction xxix Part I Beagle Board Basics 1 Chapter 1 The Beagle Hardware Platform 3 Introduction to the Boards 3 Who Should Use the Beagle Platform 6 When to Use Beagle Boards 7 When Should You Not Use the Beagle Boards 7 BeagleBone Documentation 8 The Beagle Hardware 10 BeagleBone Versions 10 The Beagle Hardware 12 Beagle Accessories 19 Highly Recommended Accessories 19 Headers for the PocketBeagle 20 Micro-SD Card (for Booting or Flashing eMMCs) 20 External 5V Power Supply (for Peripherals) 22 Ethernet Cable (for Wired BBB Network Connection) 22 HDMI Cable (for Connection to Monitors/Televisions) 22 USB to Serial UART TTL 3.3 (for Finding Problems) 23 Optional Accessories 24 USB Hub (to Connect Several USB Devices to a USB Host) 25 Micro-HDMI to VGA Adapters (for VGA Video and Sound) 25 Wi-Fi Adapters (for Wireless Networking) 25 USB Webcam (for Capturing Images and Streaming Video) 25 USB Keyboard and Mouse (for General-Purpose Computing) 26 Capes 26 How to Destroy Your Board! 27 Summary 29 Support 29 Chapter 2 Beagle Software 31 Linux on the Beagle Boards 32 Linux Distributions for Beagle Boards 32 Create a Linux Micro-SD Card Image 33 Communicating with the Boards 34 Installing Drivers 34 Wired Network Connections 35 Internet-over-USB (All Boards) 36 Regular Ethernet (BBB and BeagleBoard Only) 39 Ethernet Crossover Cable (BBB and BeagleBoard Only) 40 Communicating with Your Board 42 Serial Connection over USB 42 Serial Connection with the USB-to-TTL 3.3 V Cable 43 Connecting Through Secure Shell 44 Secure Shell Connections Using Putty 45 Chrome Apps: Secure Shell Client 45 Transferring Files Using Putty/psftp over SSH 46 Controlling the Beagle Board 48 Basic Linux Commands 48 First Steps 49 Basic File System Commands 50 Environment Variables 52 Basic File Editing 53 What Time Is It? 54 Package Management 56 Beagle-Specific Commands 58 Expand the File System on an SD Card 59 Update the Kernel 60 Interacting with the On-Board LEDs 61 Shutdown 63 Node.js, Cloud9, and BoneScript 64 Introduction to Node.js 64 Introduction to the Cloud9 IDE 66 Introduction to BoneScript 67 Summary 69 Further Reading 69 Chapter 3 Exploring Embedded Linux Systems 71 Introducing Embedded Linux 72 Advantages and Disadvantages of Embedded Linux 73 Is Linux Open Source and Free? 74 Booting the Beagle Boards 74 Bootloaders 74 Kernel Space and User Space 83 The systemd System and Service Manager 85 Managing Linux Systems 90 The Superuser 90 System Administration 92 The Linux File System 92 Links to Files and Directories 94 Users and Groups 95 File System Permissions 98 The Linux Root Directory 102 Commands for File Systems 103 The Reliability of SD Card/eMMC File Systems 111 Linux Commands 113 Output and Input Redirection (>, >>, and <) 113 Pipes (| and tee) 114 Filter Commands (from sort to xargs) 115 echo and cat 117 diff 118 tar 119 md5sum 120 Linux Processes 121 How to Control Linux Processes 121 Foreground and Background Processes 122 Other Linux Topics 124 Using Git for Version Control 124 A Practice-Based Introduction 126 Cloning a Repository (git clone) 126 Getting the Status (git status) 128 Adding to the Staging Area (git add) 128 Committing to the Local Repository (git commit) 129 Pushing to the Remote Repository (git push) 129 Git Branching 130 Creating a Branch (git branch) 130 Merging a Branch (git merge) 132 Deleting a Branch (git branch -d) 132 Common Git Commands 133 Desktop Virtualization 134 Code for This Book 135 Summary 136 Further Reading 136 Bibliography 137 Chapter 4 Interfacing Electronics 139 Analyzing Your Circuits 140 Digital Multimeter 140 Oscilloscopes 141 Basic Circuit Principles 143 Voltage, Current, Resistance, and Ohm’s Law 143 Voltage Division 145 Current Division 146 Implementing Circuits on a Breadboard 147 Digital Multimeters and Breadboards 149 Example Circuit: Voltage Regulation 150 Discrete Components 152 Diodes 152 Light-Emitting Diodes 153 Smoothing and Decoupling Capacitors 156 Transistors 158 Transistors as Switches 159 Field Effect Transistors as Switches 162 Optocouplers/Optoisolators 164 Switches and Buttons 166 Hysteresis 168 Logic Gates 169 Floating Inputs 173 Pull-Up and Pull-Down Resistors 173 Open-Collector and Open-Drain Outputs 174 Interconnecting Gates 175 Analog-to-Digital Conversion 177 Sampling Rate 177 Quantization 178 Operational Amplifi ers 178 Ideal Operational Amplifiers 178 Negative Feedback and Voltage Follower 181 Positive Feedback 181 Concluding Advice 182 Summary 182 Further Reading 183 Chapter 5 Practical Beagle Board Programming 185 Introduction 186 Performance of Different Languages 186 Setting the CPU Frequency 190 Scripting Languages 192 Scripting Language Options 192 Bash 193 Lua 196 Perl 197 Python 198 Dynamically Compiled Languages 201 JavaScript and Node.js on the Beagle boards 201 Java on the Beagle Boards 203 C and C++ on the Beagle Boards 207 C and C++ Language Overview 210 Compiling and Linking 211 Writing the Shortest C/C++ Program 213 Static and Dynamic Compilation 215 Variables and Operators in C/C++ 215 Pointers in C/C++ 219 C-Style Strings 221 LED Flashing Application in C 223 The C of C++ 224 First Example and Strings in C++ 225 Passing by Value, Pointer, and Reference 226 Flashing the LEDs Using C++ (non-OO) 227 Writing a Multicall Binary 228 Overview of Object-Oriented Programming 229 Classes and Objects 229 Encapsulation 230 Inheritance 231 Object-Oriented LED Flashing Code 233 Interfacing to the Linux OS 236 Glibc and Syscall 237 Improving the Performance of Python 239 Cython 239 Boost.Python 242 Summary 244 Further Reading 244 Bibliography 244 Part II Interfacing, Controlling, and Communicating 245 Chapter 6 Interfacing to the Beagle Board Input/Outputs 247 General-Purpose Input/Outputs 248 Introduction to GPIO Interfacing 248 GPIO Digital Output 250 GPIO Digital Input 255 GPIO Confi guration 257 Internal Pull-Up and Pull-Down Resistors 258 GPIO Pin Configuration Settings 258 Interfacing to Powered DC Circuits 265 C++ Control of GPIOs 267 The Linux Device Tree 271 Flattened Device Tree on the Beagle Boards 272 Modifying a Board Device Tree 276 Boot Confi guration Files 278 Analog Inputs and Outputs 280 Analog Inputs 280 Enabling the Analog Inputs 280 Analog Input Application—A Simple Light Meter 282 Analog Outputs (PWM) 285 Output Application—Controlling a Servo Motor 289 BoneScript 290 Digital Read and Write 290 Analog Read 292 Analog Write (PWM) 293 GPIO Performance 294 Advanced GPIO Topics 295 More C++ Programming 295 Callback Functions 295 POSIX Threads 297 Linux poll (sys/poll.h) 298 Enhanced GPIO Class 299 Using GPIOs without Using sudo 302 Root Permissions with setuid 304 Summary 306 Further Reading 306 Chapter 7 Cross-Compilation, Eclipse, and Building Linux 307 Setting Up a Cross-Compilation Toolchain 308 Cross-Compiling Under Debian 309 Testing the Toolchain 311 Emulating the armhf Architecture 312 Cross-Compilation with Third-Party Libraries (Multiarch) 314 Cross-Compilation Using Eclipse 315 Installing Eclipse on Desktop Linux 315 Confi guring Eclipse for Cross-Compilation 316 Remote System Explorer 318 Integrating GitHub into Eclipse 322 Remote Debugging 322 Automatic Documentation (Doxygen) 328 Adding Doxygen Editor Support in Eclipse 330 Cross-Building Linux 330 Downloading the Kernel Source 331 Building the Linux Kernel 332 Building a Poky Linux Distribution (Advanced) 335 Summary 340 Chapter 8 Interfacing to the Beagle Board Buses 341 Introduction to Bus Communication 342 I2C 343 I2C Hardware 343 I2C on the Beagle Boards 344 I2C Devices on the Beagle Boards 345 An I2C Test Circuit 346 A Real-Time Clock 346 The ADXL345 Accelerometer 347 Wiring the Test Circuit 348 Using Linux I2C-Tools 348 i2cdetect 348 i2cdump 349 i2cget 353 i2cset 354 I2C Communication in C 356 Wrapping I2C Devices with C++ Classes 358 SPI 360 SPI Hardware 361 SPI on the Beagle Boards 363 Testing an SPI Bus 363 A First SPI Application (74HC595) 365 Wiring the 74HC595 Circuit 366 SPI Communication Using C 367 Bidirectional SPI Communication in C/C++ 370 The ADXL345 SPI Interface 370 Connecting the ADXL345 to the Beagle Boards 372 Wrapping SPI Devices with C++ Classes 373 Three-Wire SPI Communication 375 Multiple SPI Slave Devices 376 UART 377 The Beagle Board UART 378 UART Examples in C 380 Beagle Board Serial Client 381 LED Serial Server 383 UART Applications: GPS 386 CAN Bus 388 Beagle Board CAN Bus 389 SocketCAN 390 A CAN Bus Test Circuit 392 Linux CAN-utils 393 A SocketCAN C Example 394 Logic-Level Translation 396 Summary 398 Further Reading 399 Chapter 9 Interacting with the Physical Environment 401 Interfacing to Actuators 402 DC Motors 403 Driving Small DC Motors (up to 1.5 A) 406 Controlling a DC Motor Using sysfs 407 Driving Larger DC Motors (Greater Than 1.5 A) 409 Controlling a DC Motor Using C++ 411 Stepper Motors 412 The EasyDriver Stepper Motor Driver 413 A Beagle Board Stepper Motor Driver Circuit 414 Controlling a Stepper Motor Using C++ 415 Relays 417 Interfacing to Analog Sensors 418 Protecting the ADC Inputs 420 Diode Clamping 421 Op-Amp Clamping 422 Analog Sensor Signal Conditioning 427 Scaling Using Voltage Division 427 Signal Offsetting and Scaling 428 Analog Interfacing Examples 431 Infrared Distance Sensing 431 ADXL335 Conditioning Example 436 Interfacing to Local Displays 438 MAX7219 Display Modules 438 Character LCD Modules 441 Building C/C++ Libraries 445 Makefi les 446 CMake 447 A Hello World Example 448 Building a C/C++ Library 449 Using a Shared (.so) or Static (.a) Library 452 Summary 453 Further Reading 454 Chapter 10 Real-Time Interfacing Using External Slave Processors 455 Real-Time Beagle Board 456 Real-Time Kernels 456 Real-Time Hardware Solutions 458 Extended GPIO Availability 458 The MCP23017 and the I2C Bus 460 Controlling the GPIO LED Circuit 461 Reading the GPIO Button State 462 An Interrupt Configuration Example (Advanced) 463 The MCP23S17 and the SPI Bus 464 A C++ Class for the MCP23x17 Devices 465 Adding External UARTs 468 The Arduino 471 An Arduino Serial Slave 474 A UART Echo Test Example 475 UART Command Control of an Arduino 478 An Arduino I2C Slave 481 An I2C Test Circuit 481 I2C Register Echo Example 482 I2C Temperature Sensor Example 484 I2C Temperature Sensor with a Warning LED 486 Arduino Slave Communication Using C/C++ 488 An I2C Ultrasonic Sensor Application 490 Summary 493 Further Reading 493 Part III Advanced Beagle Board Systems 495 Chapter 11 The Internet of Things 497 The Internet of Things 498 A Beagle Board IoT Sensor 499 The Beagle Board as a Sensor Web Server 501 Installing and Configuring a Web Server 502 Configuring the Apache Web Server 503 Creating Web Pages and Web Scripts 503 PHP on the Beagle Board 506 GNU Cgicc Applications (Advanced) 508 Replacing Bone101 with Apache 511 A C/C++ Web Client 512 Network Communications Primer 513 A C/C++ Web Client 514 Secure Communication Using Open SSL 516 A Beagle Board as a “Thing” 518 Thing Speak 518 The Linux Cron Scheduler 521 System crontab 521 User crontab 523 Sending E-mail from the Beagle Board 524 If This Then That 526 IoT Frameworks 528 MQ Telemetry Transport 529 MQTT Server/Broker 531 MQTT Publisher/Subscriber on a Beagle Board 533 The mqtt-spy Debug Tool 534 Writing MQTT Code 535 A Paho MQTT Publisher Example 535 A Paho MQTT Subscriber Example 537 Adafuit IO 539 Configuring the Adafruit IO Account 540 Connecting to Adafruit IO with MQTT 542 An MQTT Node.js Publish Example 543 The C++ Client/Server 545 IoT Device Management 548 Remote Monitoring of a Beagle Board 548 Beagle Board Watchdog Timers 549 Static IP Addresses 551 Power over Ethernet 551 PoE Power Extraction Modules (Advanced Topic) 553 Summary 554 Chapter 12 Wireless Communication and Control 555 Introduction to Wireless Communications 556 Bluetooth Communications 557 Installing a Bluetooth Adapter 558 Checking the LKM 559 Configuring a Bluetooth Adapter 560 Making the Beagle Board Discoverable 561 Android App Development with Bluetooth 563 Wi-Fi Communications 564 Installing a Wi-Fi Adapter 564 The NodeMCU Wi-Fi Slave Processor 568 Flashing with the Latest Firmware 569 Connecting the NodeMCU to Wi-Fi 570 Programming the NodeMCU 571 The NodeMCU Web Server Interface 574 JSON 575 The NodeMCU and MQTT 577 ZigBee Communications 579 Introduction to XBee Devices 579 AT versus API Mode 581 XBee Confi guration 582 XCTU 582 Configuring an XBee Network Using XCTU 583 An XBee AT Mode Example 584 Setting Up the Arduino XBee Device (XBeeA) 584 Setting Up the PocketBeagle XBee Device (XBeePB) 586 An XBee API Mode Example 589 Setting Up the PocketBeagle XBee Device (XBee1) 589 Setting Up the Stand-Alone XBee Device (XBee2) 589 XBee API Mode and Node.js 590 XBee and C/C++ 592 Near Field Communication 593 Summary 596 Chapter 13 Beagle Board with a Rich User Interface 599 Rich UI Beagle Board Architectures 600 Beagle Boards as General-Purpose Computers 601 Connecting a Bluetooth Input Peripheral 603 BeagleBone with a LCD Touchscreen Cape 604 Virtual Network Computing 605 VNC Using VNC Viewer 605 VNC with Xming and PuTTY 606 VNC with a Linux Desktop Computer 607 Fat-Client Applications 608 Rich UI Application Development 608 Introduction to GTK+ on the Beagle Boards 609 The “Hello World” GTK+ Application 609 The Event-Driven Programming Model 610 The GTK+ Temperature Application 611 Introduction to Qt for the Beagle Board 612 Installing Qt Development Tools 613 The “Hello World” Qt Application 613 Qt Primer 615 Qt Concepts 615 The QObject Class 617 Signals and Slots 617 Qt Development Tools 618 A First Qt Creator Example 620 A Qt Temperature Sensor GUI Application 621 Remote UI Application Development 625 Fat-Client Qt GUI Application 626 Multithreaded Server Applications 629 A Multithreaded Temperature Service 632 Parsing Stream Data 634 The Fat Client as a Server 635 Parsing Stream Data with XML 638 The Beagle Board Client Application 639 Summary 641 Further Reading 641 Chapter 14 Images, Video, and Audio 643 Capturing Images and Video 644 USB Webcams 644 Video4Linux2 (V4L2) 646 Image Capture Utility 647 Video4Linux2 Utilities 648 Writing Video4Linux2 Programs 650 Streaming Video 652 Image Processing and Computer Vision 654 Image Processing with Open CV 654 Computer Vision with Open CV 656 Boost 659 BeagleBone Audio 660 Core Audio Software Tools 661 Audio Devices for the Beagle Boards 661 HDMI and USB Audio Playback Devices 661 Internet Radio Playback 664 Recording Audio 664 Audio Network Streaming 666 Bluetooth A2DP Audio 666 Text-to-Speech 669 Summary 670 Further Reading 670 Chapter 15 Real-Time Interfacing with the PRU-ICSS 673 The PRU-ICSS 674 The PRU-ICSS Architecture 674 The Remote Processor Framework 675 Important Documents 676 Development Tools for the PRU-ICSS 676 The PRU Code Generation Tools 677 The PRU Debugger 677 Using the AM335x PRU-ICSS 679 Setting Up the Board for Remoteproc 679 Testing Remoteproc under Linux 680 A First PRU Example 683 PRU-ICSS Enhanced GPIOs 683 A First PRU Program 686 A First PRU Program in C 686 A First PRU Program in Assembly 688 The PRU-ICSS in Detail 691 Registers 691 Local and Global Memory 692 PRU Assembly Instruction Set 696 PRU-ICSS Applications 698 PRU-ICSS Performance Tests 698 Utilizing Regular Linux GPIOs 702 A PRU PWM Generator 704 A PRU Sine Wave Generator 708 An Ultrasonic Sensor Application 709 Summary 714 Further Reading 714 Chapter 16 Embedded Kernel Programming 717 Introduction 718 Why Write Kernel Modules? 718 Loadable Kernel Module Basics 719 A First LKM Example 720 The LKM Make file 722 Building the LKM on a Beagle Board 723 Testing the First LKM Example 724 Testing the LKM Parameter 726 An Embedded LKM Example 727 Interrupt Service Routines 729 Performance 733 Enhanced Button GPIO Driver LKM 733 The object Interface 734 Enhanced LED GPIO Driver LKM 741 Kernel Threads 742 Conclusions 744 Summary 744 Index 745

    10 in stock

    £26.34

  • Design and Analysis of Security Protocol for

    John Wiley & Sons Inc Design and Analysis of Security Protocol for

    1 in stock

    Book SynopsisThe purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.Table of ContentsPreface xiii 1 History and Generations of Security Protocols 1Bright Keswani, Poonam Keswani and Rakhi Purohit 1.1 Introduction 2 1.2 Network Security 2 1.3 Historical Background of Network Security and Network Timeline 4 1.4 Internet Architecture and Security Aspects 5 1.4.1 IPv4 and IPv6 Architecture 6 1.4.1.1 Structure of IPv4 6 1.4.1.2 IPv6 Architecture 7 1.4.2 Attack Through IPv4 8 1.4.2.1 Internet Attacks Common Methods 8 1.4.2.2 Internet Security Technology 10 1.4.3 IPv6 IP Security Issues 11 1.5 Different Aspects of Security of the Network 12 1.6 Evolution of Security Protocols for Network 13 1.6.1 Understanding the Key Components of Network Security 13 1.6.2 A Deep Defense Strategy 14 1.6.3 How Does the Next Generation Network Security System Work Best 15 1.7 Network Security Protocols 17 1.7.1 Application Layer 17 1.7.1.1 Good Privacy (PGP) 17 1.7.1.2 Email/Multipurpose Security (S/MIME) 18 1.7.1.3 HTTP Secure (S-HTTP) 18 1.7.1.4 Hypertext Transfer Protocol (HTTPS) in Secure Sockets Layer 19 1.7.1.5 Secure E-Commerce (SET) 19 1.7.1.6 Kerberos 19 1.7.2 Transport Layer 20 1.7.2.1 Secure Sockets Layer (SSL) 20 1.7.2.2 Transport Layer Security (TLS) 21 1.7.3 Network Layer 21 1.7.3.1 Internet Protocol Security (IPSec) 22 1.7.3.2 Virtual Private Network (VPN) 23 1.7.4 Data Link Layer 24 1.7.4.1 Point-to-Point Protocol (PPP) 24 1.7.4.2 Remote Authentication User Service (RADIO) 24 1.7.4.3 Terminal System Access Control Access Control Equipment (TACACS +) 25 1.8 Current Evolution of Red Security 25 1.8.1 Hardware Development 25 1.8.2 Software Development 27 1.9 Future Security Trends 27 References 27 2 Evolution of Information Security Algorithms 29Anurag Jagetiya and C. Rama Krishna 2.1 Introduction to Conventional Encryption 30 2.2 Classical Encryption Techniques 31 2.2.1 Substitution Based 32 2.2.1.1 Caesar Cipher 32 2.2.1.2 Monoalphabetic Cipher 32 2.2.1.3 Playfair Cipher 33 2.2.1.4 Polyalphabetic Cipher 35 2.2.2 Transposition Based 36 2.2.2.1 Simple Columnar 36 2.2.2.2 Rail Fence Cipher 37 2.3 Evolutions of Modern Security Techniques 38 2.3.1 Stream Cipher Algorithms 38 2.3.1.1 One Time Pad (OTP) 40 2.3.1.2 RC-4 41 2.3.1.3 A5/1 43 2.3.2 Block Cipher Algorithms 44 2.3.2.1 Feistel Cipher Structure 46 2.3.2.2 Data Encryption Standard (DES) 48 2.3.2.3 Triple Data Encryption Standard (TDES) 56 2.3.2.4 International Data Encryption Algorithm (IDEA) 58 2.3.2.5 Blowfish 60 2.3.2.6 CAST-128 62 2.4 Conclusion 66 References 67 Practice Set 67 Review Questions and Exercises 70 3 Philosophy of Security by Cryptostakes Schemes 79Hemant Kumar Saini 3.1 Philosophy of Public Key Cryptosystems (p-k Cryptography) 79 3.2 RSA Algorithm 81 3.3 Security Analysis of RSA 84 3.4 Exponentiation in Modular Arithmetic 85 3.5 Distribution of Public Keys 87 3.6 Distribution of Secret Keys Using Public Key Cryptosystems 89 3.7 Discrete Logarithms 91 3.8 Diffie–Hellman Key Exchange 91 3.9 Review Exercise 93 References 94 4 Zero-Share Key Management for Secure Communication Across a Channel 95P. R. Mahalingam and K. A. Fasila 4.1 Introduction 95 4.2 Background 96 4.3 Zero-Share Key Management System 98 4.4 Simulation 100 4.5 Complexity and Analysis 103 4.6 Conclusion and Future Trends 106 References 107 5 Soft Computing-Based Intrusion Detection System With Reduced False Positive Rate 109Dharmendra G. Bhatti and Paresh V. Virparia 5.1 Introduction 109 5.1.1 Soft Computing for Intrusion Detection 111 5.1.2 False Positive 112 5.1.3 Reasons of False Positive 113 5.2 Existing Technology and Its Review 115 5.3 Research Design 118 5.3.1 Conceptual Framework 118 5.3.2 Preprocessing Module 121 5.3.3 Alert Monitoring Module 123 5.4 Results With Implications 124 5.4.1 Preprocessing Module Benchmark 126 5.4.2 Alert Monitoring Module Benchmark 129 5.4.3 Overall Benchmark 130 5.4.4 Test Bed Network Benchmark 131 5.5 Future Research and Conclusion 133 References 135 6 Recursively Paired Arithmetic Technique (RPAT): An FPGA-Based Block Cipher Simulation and Its Cryptanalysis 141Rajdeep Chakraborty and J.K. Mandal 6.1 Introduction 141 6.2 Recursively Paired Arithmetic Technique (RPAT) 142 6.2.1 An Example of RPAT 144 6.2.2 Options of RPAT 145 6.2.3 Session Key Generation 146 6.3 Implementation and Simulation 147 6.4 Cryptanalysis 150 6.5 Simulation Based Results 152 6.6 Applications 152 6.7 Conclusion 153 Acknowledgment 153 References 153 7 Security Protocol for Multimedia Streaming 155N. Brindha, S. Deepa and S. Balamurugan 7.1 Introduction 156 7.1.1 Significance of Video Streaming 156 7.2 Existing Technology and Its Review 162 7.3 Methodology and Research Design 166 7.4 Findings 167 7.5 Future Research and Conclusion 169 References 169 8 Nature Inspired Approach for Intrusion Detection Systems 171Mohd Shahid Husain 8.1 Introduction 171 8.1.1 Types of Intrusion Detection Systems 172 8.2 Approaches Used for Intrusion Detection Systems 173 8.2.1 Intrusion Detection and Prevention Systems 173 8.2.2 Performance Criteria of Intrusion Detection Systems 174 8.3 Intrusion Detection Tools 175 8.4 Use of Machine Learning to Build Dynamic IDS/IPS 176 8.5 Bio-Inspired Approaches for IDS 178 8.6 Conclusion 179 References 181 9 The Socio-Behavioral Cipher Technique 183Harshit Bhatia, Rahul Johari and Kalpana Gupta 9.1 Introduction 183 9.2 Existing Technology 184 9.3 Methodology 186 9.3.1 Key Arrangement 187 9.3.2 Key Selection 188 9.3.3 Mathematical Operations 189 9.3.4 Algorithm 191 9.3.5 Encryption Operation 192 9.3.6 Decryption Operation 193 9.3.7 Mathematical Modeling 201 9.4 Conclusion: Future Scope and Limitations 205 References 208 10 Intrusion Detection Strategies in Smart Grid 211P. Ponmurugan, C. Venkatesh, M. Divya Priyadharshini and S. Balamurugan 10.1 Introduction 212 10.2 Role of Smart Grid 212 10.3 Technical Challenges Involved in Smart Grid 213 10.4 Intrusion Detection System 216 10.5 General Architecture of Intrusion Detection System 217 10.6 Basic Terms in IDS 218 10.7 Capabilities of IDS 219 10.8 Benefits of Intrusion Detection Systems 219 10.9 Types of IDS 220 10.10 IDS in a Smart Grid Environment 222 10.10.1 Smart Meter 223 10.10.2 Metering Module 223 10.10.3 Central Access Control 224 10.10.4 Smart Data Collector 224 10.10.5 Energy Distribution System 225 10.10.6 SCADA Controller 225 10.11 Security Issues of Cyber-Physical Smart Grid 225 10.12 Protecting Smart Grid From Cyber Vulnerabilities 227 10.13 Security Issues for Future Smart Grid 229 10.14 Conclusion 230 References 230 11 Security Protocol for Cloud-Based Communication 235R. Suganya and S. Sujatha 11.1 Introduction 236 11.2 Existing Technology and Its Review 237 11.3 Methodology (To Overcome the Drawbacks of Existing Protocols) 238 11.4 Findings: Policy Monitoring Techniques 238 11.5 Future Research and Conclusion 240 Reference 241 12 Security Protocols for Mobile Communications 243Divya Priyadharshini M., Divya R., Ponmurugan P. and Balamurugan S. 12.1 Introduction 244 12.2 Evolution of Mobile Communications 246 12.3 Global System for Mobiles (GSM) 248 12.4 Universal Mobile Telecommunications System (UMTS) 250 12.5 Long Term Evolution (LTE) 251 12.6 5G Wireless Systems 254 12.7 LoRA 257 12.8 5G Integrated With LoRA 258 12.9 Physical Layer Security and RFID Authentication 259 12.10 Conclusion 259 References 260 13 Use of Machine Learning in Design of Security Protocols 265M. Sundaresan and D. Boopathy 13.1 Introduction 266 13.2 Review of Related Literature 269 13.3 Joint and Offensive Kinetic Execution Resolver 271 13.3.1 Design of JOKER Protocol 273 13.3.2 Procedure 276 13.3.3 Procedure 278 13.3.4 Simulation Details and Parameters 279 13.3.4.1 Packet Delivering Ratio Calculation 279 13.3.4.2 Packet Loss Ratio Calculation 279 13.3.4.3 Latency (Delay) Calculation 279 13.3.4.4 Throughput Calculation 280 13.4 Results and Discussion 280 13.5 Conclusion and Future Scope 283 References 283 14 Privacy and Authentication on Security Protocol for Mobile Communications 287Brajesh Kumar Gupta “Mewadev” 14.1 Introduction 288 14.2 Mobile Communications 289 14.3 Security Protocols 291 14.4 Authentication 294 14.5 Next Generation Networking 298 14.6 Conclusion 302 References 303 15 Cloud Communication: Different Security Measures and Cryptographic Protocols for Secure Cloud Computing 305Anjana Sangwan 15.1 Introduction 305 15.2 Need of Cloud Communication 306 15.3 Application 309 15.4 Cloud Communication Platform 310 15.5 Security Measures Provided by the Cloud 310 15.6 Achieving Security With Cloud Communications 312 15.7 Cryptographic Protocols for Secure Cloud Computing 314 15.8 Security Layer for the Transport Protocol 315 15.9 Internet Protocol Security (IPSec) 317 15.9.1 How IPsec Works 318 15.10 Kerberos 320 15.11 Wired Equivalent Privacy (WEP) 326 15.11.1 Authentication 326 15.12 WiFi Protected Access (WPA) 327 15.13 Wi-Fi Protected Access II and the Most Current Security Protocols 328 15.13.1 Wi-Fi Protected Access 329 15.13.2 Difference between WEP, WPA: Wi-Fi Security Through the Ages 329 15.14 Wired Equivalent Privacy (WEP) 329 15.15 Wi-Fi Protected Access (WPA) 330 15.16 Conclusions 330 References 331 Index 333

    1 in stock

    £164.66

  • Microsoft Azure Infrastructure Services for

    John Wiley & Sons Inc Microsoft Azure Infrastructure Services for

    15 in stock

    Book SynopsisAn expert guide for IT administrators needing to create and manage a public cloud and virtual network using Microsoft Azure With Microsoft Azure challenging Amazon Web Services (AWS) for market share, there has been no better time for IT professionals to broaden and expand their knowledge of Microsoft's flagship virtualization and cloud computing service. Microsoft Azure Infrastructure Services for Architects: Designing Cloud Solutionshelps readers develop the skills required to understand the capabilities of Microsoft Azure for Infrastructure Services and implement a public cloud to achieve full virtualization of data, both on and off premise. Microsoft Azure provides granular control in choosing core infrastructure components, enabling IT administrators to deploy new Windows Server and Linux virtual machines, adjust usage as requirements change, and scale to meet the infrastructure needs of their entire organization. This accurate, authoritative book coTable of ContentsIntroduction xix Chapter 1 The Cloud and Microsoft Azure Fundamentals 1 The Evolution of the Datacenter 1 Introducing the Cloud 2 The Private Cloud and Virtualization 4 Types of Service in the Cloud 10 Microsoft Azure 101 13 Microsoft Datacenters and Regions 14 Microsoft Network 24 Azure Resource Providers 26 Getting Access to Microsoft Azure 30 Free Azure Trials and Pay-as-You-Go 31 Azure Benefits from Visual Studio Subscriptions 31 Enterprise Enrollments for Azure 33 Reserved Instances and Azure Hybrid Benefit 37 Reserved Instances 37 Azure Hybrid Benefit 39 Increasing Azure Limits 40 The Azure Portal 41 Portal Basics 42 Azure Portal Dashboards 45 Chapter 2 Governance 47 What is Governance? 47 Understanding Governance Requirements in Your Organization 49 Azure Subscriptions and Management Groups 52 Subscriptions 52 Management Groups 55 Resource Groups 62 Role-Based Access Control 63 Naming Conventions 69 Using Tags 70 Azure Policy 75 Azure Templates 80 Azure Blueprints 83 Azure Resource Graph 86 Cost Management 88 Visibility 89 Accountability 91 Optimization 93 Chapter 3 Identity 95 The Importance of Identity 95 A Brief Refresher on Active Directory 97 Using Cloud Services, Federation and Cloud Authentication 98 Federation 98 Cloud Authentication and Authorization 101 Azure Active Directory Fundamentals 103 Azure AD SKUs 106 Populating Azure AD 108 Azure AD B2B 122 Azure AD Authentication Options 128 Azure AD Groups 137 Azure AD Entitlements and Application Publishing 138 Chapter 4 Identity Security and Extended Identity Services 145 Azure AD Security 145 Multi-Factor Authentication 145 Password Policies 149 Azure AD Conditional Access 150 Azure AD Identity Protection 153 Azure AD Log Inspection 154 Azure AD Privileged Identity Management 156 Azure Advanced Threat Protection 158 Azure AD Application Proxy 158 Azure AD B2C 160 Active Directory in the Cloud 162 Active Directory Site Configuration 163 Placing a Domain Controller in Azure 164 Azure AD Domain Services 167 Chapter 5 Networking 171 Connectivity 171 Virtual Networks 171 Adding a VM to a Virtual Network 174 NIC IP Configurations 174 Reserved IPs for VM 176 Accelerated Networking 177 Azure DNS Services and Configuration Options 177 Connecting Virtual Networks 178 Connectivity to Azure 181 Azure Virtual WANs and ExpressRoute Global Reach 193 PaaS VNet Integration 194 Protection 196 Network Security Groups and Application Security Groups 196 Firewall Virtual Appliances 199 Distributed Denial-of-Service Protection 202 Delivery 202 Intra-Region Load Balancing 203 Inter-Region Load Balancing 206 Monitoring 210 Chapter 6 Storage 213 Azure Storage Services 213 Azure Storage Architecture 213 Using Storage Accounts and Types of Replication 215 Storage Account Keys 219 Azure Storage Services 221 Storage with Azure VMs 235 VM Storage Basics 235 Temporary Storage 236 Managed Disks 237 Bulk Data Options 242 Azure Import/Export and Azure Data Box Disk 242 Azure Data Box 242 Azure Data Box Gateway and Data Box Edge 242 Azure Database Offerings 243 Azure SQL Database 243 Azure Cosmos DB 246 Chapter 7 Azure Compute 249 Virtual Machines 249 Fundamentals of IaaS 249 Types of Virtual Machines 252 Azure VM Agent and Extensions 258 Boot Diagnostics 260 Ephemeral OS Disks 261 Proximity Placement Groups 262 Virtual Machine Scale Sets 263 Low-Priority VMs 264 Azure Dedicated Host 264 Windows Virtual Desktop 265 VMware in Azure? 265 Platform as a Service Offerings 266 Containers 266 Azure Application Services 275 Azure Serverless Compute Services 278 Chapter 8 Azure Stack 281 Azure Stack Foundation 281 Azure Stack 101 281 Services Available on Azure Stack 284 How to Buy Azure Stack 285 When to Use Azure Stack 287 Managing Azure Stack 288 How to Interact with Azure Stack 288 Marketplace Syndication 290 Plans, Offers, and Subscriptions 292 Updating Azure Stack 294 Privileged Endpoint and Support Session Tokens 295 Understanding Azure Stack HCI 296 Chapter 9 Backup, High Availability, Disaster Recovery, and Migration 297 Availability 101 297 Distinguishing High Availability vs. Disaster Recovery vs. Backup 297 Understanding Application Structure and Requirements 299 Architecting for Multi-Region Application Deployments 301 Backups in Azure 305 Thinking About Backups 305 Using Azure Backup 307 High Availability in Azure 311 Disaster Recovery in Azure 312 On-Premises Disaster Recovery 313 On Premises to Azure Disaster Recovery 314 Azure to Azure 317 Migrating Workloads to Azure 318 Migration Benefits 319 Migration Approaches 320 Migration Phases 320 Chapter 10 Monitoring and Security 325 Azure Monitoring 325 Why Monitor? 325 Types of Telemetry in Azure 326 Azure Monitor Fundamentals 329 Azure Monitor Logs Fundamentals 334 Alerting 341 Security in Azure 350 Advanced Threat Protection (ATP) 350 Azure Security Center (ASC) 353 Azure Sentinel 355 Keeping Secrets with Azure Key Vault and Managed Identities 357 Chapter 11 Managing Azure 359 Command Line, Scripting, and Automation with Azure 359 Using PowerShell with Azure 360 Using the CLI with Azure 370 Leveraging Azure Cloud Shell 371 Automating with Azure Automation and Azure Functions 376 Deploying Resources with ARM JSON Templates 383 Everything is JSON 383 Anatomy of an ARM JSON Template 386 Template Tips 389 Additional Useful Technologies for Azure Management 393 Azure Bastion Host 393 Windows Admin Center 395 Chapter 12 What to Do Next 399 Understanding and Addressing Azure Barriers 399 Building Trust 400 Understanding Risks for Azure 400 Why You Should Use Azure and Getting Started 408 Understanding Azure’s Place in the Market 408 First Steps with Azure IaaS 411 Index 415

    15 in stock

    £35.62

  • PowerShell 7 for IT Professionals

    John Wiley & Sons Inc PowerShell 7 for IT Professionals

    15 in stock

    Book SynopsisTake advantage of everything Microsoft's new PowerShell 7 has to offer PowerShell 7 for IT Pros is your guide to using PowerShell 7, the open source, cross-platform version of Windows PowerShell. Windows IT professionals can begin setting up automation in PowerShell 7, which features many improvements over the early version of PowerShell Core and Windows PowerShell. PowerShell 7 users can enjoy the high level of compatibility with the Windows PowerShell modules they rely on today. This book shows IT professionalsespecially Windows administrators and developershow to use PowerShell7 to engage in their most important tasks, such as managing networking, using AD/DNS/DHCP, leveraging Azure, and more. To make it easy to learn everything PowerShell 7 has to offer, this book includes robust examples, each containing sample code so readers can follow along. Scripts are based on PowerShell 7 running on Windows 10 19H1 or later and Windows Server 2019. LearTable of ContentsForeword xiii Introduction xxxiii Chapter 1 Setting Up a PowerShell 7 Environment 1 What is New in PowerShell 7 2 Systems Used in This Book and Chapter 3 Installing PowerShell 7 5 Installing and Configuring VS Code 14 Using the PowerShell Gallery 21 Creating a Local PowerShellGet Repository 24 Creating a Code-Signing Environment 30 Summary 35 Chapter 2 PowerShell 7 Compatibility with Windows PowerShell 37 Examining PowerShell Modules 38 Introducing the Compatibility Solution 48 Things That Do Not Work with PowerShell 7 51 Summary 54 Chapter 3 Managing Active Directory 55 Systems Used in This Chapter 58 Establishing a Forest Root Domain 60 Installing a Replica DC 66 Installing a Child Domain 70 Configuring a Cross-Forest Trust 75 Managing AD Users, Computers, and OUs 86 Adding Users to AD via a CSV 96 Configuring Just Enough Administration (JEA) 100 Summary 109 Chapter 4 Managing Networking 111 Systems Used in This Chapter 112 Configuring IP Addressing 113 Testing Network Connectivity 117 Installing the DHCP Service 121 Configuring DHCP Scopes 124 Configuring DHCP Failover 128 Configuring the DNS Service 133 Configuring DNS Zones and Resource Records 138 Summary 144 Chapter 5 Managing Storage 145 Systems Used in This Chapter 146 Managing Disks and Volumes 147 Managing NTFS Permissions 154 Managing Storage Replica 163 Managing Filestore Quotas 175 Managing File Screening 183 Summary 190 Chapter 6 Managing Shared Data 191 Systems Used in This Chapter 193 Setting Up and Securing an SMB File Server 194 Creating and Securing SMB Shares 198 Creating and Using an iSCSI Target 207 Setting Up a Clustered Scale-Out File Server 218 Summary 229 Chapter 7 Managing Printing 231 Systems Used in This Chapter 232 Installing and Sharing Printers 233 Publishing a Printer in AD 238 Changing the Spool Folder 240 Printing a Test Page 245 Creating a Printer Pool 248 Summary 249 Chapter 8 Managing Hyper-V 251 Systems Used in This Chapter 253 Installing and Configuring Hyper-V 254 Creating a Hyper-V VM 257 Using PowerShell Direct 262 Configuring VM Networking 265 Configuring VM Hardware 271 Implementing Nested Virtualization 277 Using VM Checkpoints 282 Using VM Replication 291 Managing VM Movement 305 Measuring VM Resource Usage 311 Summary 314 Chapter 9 Using WMI with CIM Cmdlets 315 Exploring WMI Namespaces 320 Exploring WMI Classes 328 Getting Local and Remote Objects 330 Invoking WMI Methods 334 Managing WMI Events 339 Implementing Permanent WMI Event Handling 347 Summary 355 Chapter 10 Reporting 357 Systems Used in This Chapter 358 Reporting on AD Users and Computers 359 Managing Filesystem Reporting 365 Collecting Performance Information Using PLA 374 Reporting on PLA Performance Data 379 Creating a Performance Monitoring Graph 382 Creating a System Diagnostics Report 385 Reporting on Printer Usage 387 Creating a Hyper-V Status Report 390 Reviewing Event Logs 395 Summary 402 Index 403

    15 in stock

    £28.49

  • LPI Linux Essentials Study Guide

    John Wiley & Sons Inc LPI Linux Essentials Study Guide

    10 in stock

    Book SynopsisTable of ContentsIntroduction xix Assessment Test xxix Chapter 1 Selecting an Operating System 1 What is an OS? 2 What is a Kernel? 2 What Else Identifies an OS? 3 Investigating User Interfaces 4 Using a Text-Mode User Interface 5 Using a Graphical User Interface 7 Where Does Linux Fit in the OS World? 9 Comparing Linux to Unix 9 Comparing Linux to macOS 11 Comparing Linux to Windows 12 What is a Distribution? 14 Creating a Complete Linux-Based OS 14 A Summary of Common Linux Distributions 15 Understanding Release Cycles 17 Embedded Linux Systems 18 Linux in the Cloud 19 What is Cloud Computing? 19 What Are the Cloud Services? 21 Summary 23 Exam Essentials 23 Review Questions 25 Chapter 2 Understanding Software Licensing 27 Investigating Software Licenses 28 Exploring Copyright Protection and Software 28 Using Licenses to Modify Copyright Terms 30 Looking at the Free Software Foundation 31 Understanding the FSF Philosophy 31 Examining Free Software and the GPL 32 Looking at the Open Source Initiative 33 Understanding the Open Source Philosophy 33 Defining Open Source Software 35 Looking at the Creative Commons 36 Using Open Source Licenses 36 Understanding Open Source Licenses 36 Understanding Open Source Business Models 38 Summary 39 Exam Essentials 40 Review Questions 41 Chapter 3 Investigating Linux’s Principles and Philosophy 43 Linux Through the Ages 44 Understanding Linux’s Origins 44 Seeing Today’s Linux World 47 Using Open Source Software 47 Understanding Basic Open Source Principles 47 Linux as a Software Integrator 49 Understanding OS Roles 50 Looking At Embedded Computers 50 Exploring Desktop and Laptop Computers 51 Investigating Server Computers 52 Summary 53 Exam Essentials 53 Review Questions 55 Chapter 4 Using Common Linux Programs 57 Using a Linux Desktop Environment 58 Choosing a Desktop Environment 58 Launching Programs 61 Using a File Manager 63 Working with Productivity Software 66 Finding the Right Tool for the Job 66 Using a Web Browser 67 Using Email Clients 68 Using Office Tools 68 Using Multimedia Applications 69 Using Linux for Cloud Computing 70 Using Mobile Applications 71 Using Server Programs 72 Identifying Common Server Protocols and Programs 72 Focusing on Web Servers 76 Installing and Launching Servers 76 Securing Servers 77 Managing Programming Languages 78 Choosing a Compiled vs. an Interpreted Language 78 Identifying Common Programming Languages 79 Handling Software Packages 81 Understanding Software Packages 81 Identifying Common Package Tools 81 Summary 82 Exam Essentials 83 Review Questions 84 Chapter 5 Getting to Know the Command Line 87 Starting a Command Line 88 Launching a Terminal 88 Logging into a Text-Mode Console 91 Running Programs 92 Understanding Text-Mode Program Syntax 93 Running Text-Mode Programs 94 Running GUI Programs 95 Running Programs in the Background 96 Using Shell Features 97 Using Command Completion 97 Using Command History 98 Getting Help Using Man Pages 99 Understanding the Purpose of Man Pages 100 Locating Man Pages by Section Number 100 Searching for a Man Page 102 Reading Man Pages 102 Using less 104 Getting Help Using Info Pages 106 Understanding the Purpose of Info Pages 106 Reading Info Pages 107 Finding Additional Documentation 109 Locating Program Documentation on Your Computer 109 Locating Program Documentation Online 112 Consulting Experts 112 Summary 114 Exam Essentials 114 Review Questions 116 Chapter 6 Managing Hardware 119 Learning About Your CPU 120 Understanding CPU Families 120 Identifying Your CPU 123 Identifying Motherboard Capabilities 123 Sizing Your Power Supply 125 Understanding Disk Issues 125 Disk Interfaces 126 Partitioning a Disk 127 Understanding Filesystem Issues 130 Using Removable and Optical Disks 133 Managing Displays 134 Understanding the Role of X 134 Using Common Display Hardware 136 Handling USB Devices 137 Managing Drivers 138 Understanding Types of Drivers 138 Locating and Installing Drivers 139 Summary 140 Exam Essentials 140 Review Questions 141 Chapter 7 Managing Files 143 Understanding Where Things Go 144 User Files vs. System Files 144 The Filesystem Hierarchy Standard 146 Important Directories and Their Contents 147 Exploring Files and Directories 149 Obtaining File Listings 149 Changing Directories 151 Using Absolute and Relative File References 152 Manipulating Files 154 Creating Files 154 Copying Files 155 Moving and Renaming Files 157 Using Links 157 Deleting Files 159 Using Wildcards 160 Understanding Case Sensitivity 160 Manipulating Directories 161 Creating Directories 161 Deleting Directories 162 Managing Directories 163 Summary 164 Exam Essentials 164 Review Questions 165 Chapter 8 Searching, Extracting, and Archiving Data 167 Using Regular Expressions 168 Searching For and Extracting Data 170 Using grep 170 Using find 172 Using wc 174 Using cut 175 Using sort 176 Using cat 177 Redirecting Input and Output 178 Using Basic Redirection Operators 178 Using Pipes 181 Generating Command Lines 182 Archiving Data 183 Using tar 183 Using Compression 187 Using zip 188 Summary 191 Exam Essentials 191 Review Questions 193 Chapter 9 Exploring Processes and Process Data 195 Understanding Package Management 196 Linux Package Management Principles 196 Understanding Package Systems 197 Managing Red Hat Systems 199 Managing Debian Systems 200 Understanding the Process Hierarchy 202 Identifying Running Processes 203 Using ps to Identify Processes 203 Using top to Identify Processes 205 Measuring Memory Use 207 Using Log Files 208 Locating Log Files 209 Producing More Verbose Log File Entries 210 Examining the Kernel Ring Buffer 211 Summary 211 Exam Essentials 212 Review Questions 213 Chapter 10 Editing Files 215 Understanding the Role of Text Files 216 Choosing an Editor 218 Editing Files with nano 219 Using Text Editor Conventions 221 Exploring Basic nano Text-Editing Procedures 221 Saving Your Changes from nano 223 Editing Files with vi 224 Understanding vi Modes 224 Exploring Basic vi Text-Editing Procedures 226 Saving Your Changes from vi 229 Summary 230 Exam Essentials 230 Review Questions 231 Chapter 11 Creating Scripts 233 Beginning a Shell Script 234 Using Commands 235 Using Arguments 237 Using Variables 238 Using Conditional Expressions 241 Using Loops 243 Using Functions 244 Setting the Script’s Exit Value 245 Summary 246 Exam Essentials 246 Review Questions 248 Chapter 12 Understanding Basic Security 251 Understanding Accounts 252 Understanding Account Features 253 Identifying Accounts 256 Understanding Groups 258 Using Account Tools 259 Discovering Your Own Identity 260 Learning Who’s Online 261 Working as root 263 Understanding User Types 263 Acquiring root Privileges 264 Using root Privileges Safely 266 Summary 268 Exam Essentials 268 Review Questions 270 Chapter 13 Creating Users and Groups 273 Creating New Accounts 274 Deciding on a Group Strategy 274 Selecting a Good Password 275 Creating Accounts Using GUI Tools 278 Creating Accounts from the Shell 280 Modifying Accounts 283 Deciding When to Modify Accounts 283 Checking for Logged-in Users 283 Modifying Accounts Using GUI Tools 284 Modifying Accounts from the Shell 286 Deleting Accounts 289 Avoiding Account Deletion Pitfalls 289 Deleting Accounts Using GUI Tools 290 Deleting Accounts from the Shell 291 Managing Groups 291 Managing Groups Using GUI Tools 291 Managing Groups from the Shell 294 Summary 295 Exam Essentials 295 Review Questions 297 Chapter 14 Setting Ownership and Permissions 299 Setting Ownership 300 Understanding Ownership 300 Setting Ownership in a File Manager 301 Setting Ownership in a Shell 302 Setting Permissions 304 Understanding Permissions 304 Setting Permissions in a File Manager 308 Setting Permissions in a Shell 309 Setting the umask 310 Using Special Permission Bits and File Features 310 Using Sticky Bits 311 Using Special Execute Permissions 313 Hiding Files from View 314 Viewing Directories 315 Summary 315 Exam Essentials 315 Review Questions 317 Chapter 15 Managing Network Connections 319 Configuring Network Features 320 Graphical Tools 321 Command-Line Tools 323 Basic Network Troubleshooting 329 Sending Test Packets 330 Finding Host Information 331 Advanced Network Troubleshooting 333 The netstat Command 334 Examining Sockets 337 Summary 337 Exam Essentials 338 Review Questions 339 Appendix A Answers to Review Questions 341 Chapter 1: Selecting an Operating System 342 Chapter 2: Understanding Software Licensing 343 Chapter 3: Investigating Linux’s Principles and Philosophy 344 Chapter 4: Using Common Linux Programs 346 Chapter 5: Getting to Know the Command Line 347 Chapter 6: Managing Hardware 348 Chapter 7: Managing Files 349 Chapter 8: Searching, Extracting, and Archiving Data 351 Chapter 9: Exploring Processes and Process Data 352 Chapter 10: Editing Files 353 Chapter 11: Creating Scripts 354 Chapter 12: Understanding Basic Security 356 Chapter 13: Creating Users and Groups 357 Chapter 14: Setting Ownership and Permissions 358 Chapter 15: Managing Network Connections 359 Appendix B Setting Up a Linux Environment 363 Index 365

    10 in stock

    £28.49

  • Samsung Galaxy S20 For Dummies

    Wiley Samsung Galaxy S20 For Dummies

    Out of stock

    Book Synopsis

    Out of stock

    £17.09

  • Windows 10 AllInOne for Dummies

    John Wiley & Sons Inc Windows 10 AllInOne for Dummies

    15 in stock

    Book SynopsisDig into the ins and outs of Windows 10 Computer users have been doing Windows since the 1980s. That long run doesn''t mean everyone knows the best-kept secrets of the globally ubiquitous operating system. Windows 10 All-in-One For Dummies, 4th Edition offers a deep guide for navigating the basics of Windows 10 and diving into more advanced features. Authors and recognized Windows experts Ciprian Rusen and Woody Leonhard deliver a comprehensive and practical resource that provides the knowledge you need to operate Windows 10, along with a few shortcuts to make using a computer feel less like work. This book teaches you all about the most important parts of Windows 10, including: Installing and starting a fresh Windows 10 installation Personalizing Windows 10 Using Universal Apps in Windows 10 How to control your system through the Control Panel in Windows 10 Securing Windows 10 against a universe of Table of ContentsIntroduction 1 About This Book 3 Foolish Assumptions 4 Icons Used in This Book 5 Beyond the Book 6 Where to Go from Here 6 Book 1: Starting Windows 10 7 Chapter 1: Windows 10 4 N00bs 9 Hardware and Software 12 Why Do PCs Have to Run Windows? 12 A Terminology Survival Kit 17 What, Exactly, is the Web? 21 Getting inside the Internet 22 What is the World Wide Web? 24 Who pays for all this stuff? 25 Buying a Windows 10 Computer 26 Inside the big box 29 Inside a touch-sensitive tablet 32 Screening 36 Managing disks and drives 36 Making PC connections 40 Futzing with video, sound, and multitudinous media 44 Ultrabooks and convertibles 46 What’s Wrong with Windows 10? 46 Chapter 2: Windows 10 for the Experienced 49 If You Just Upgraded from Windows 7 or 8.1 to Windows 10 50 A Brief History of Windows 10 52 Exploring the Versions of Windows 10 55 The Different Kinds of Windows Programs, Er, Apps 56 What’s New for the XP Crowd 60 Improved performance 60 Better video 62 A genuinely better browser is emerging 63 Cortana 63 Other improvements 64 What’s New for Windows 7 Users 65 Getting the hang of the new Start menu 66 Exploring new stuff in the old-fashioned desktop 68 What’s New for Windows 8 and 8.1 Users 69 What’s New for All of Windows 70 The Start menu 70 Microsoft Edge 71 Search 73 Cortana 74 Virtual desktops and task view 75 Security improvements 76 Game mode and Xbox 77 Other Windows 10 apps 78 What you lose 79 Do You Need Windows 10? 80 Chapter 3: Which Version? 83 Counting the Editions 84 Buying the right version the first time 87 Narrowing the choices 87 Choosing 32 Bit versus 64 Bit 89 Which Version of Windows Are You Running? 91 Book 2: Personalizing Windows 95 Chapter 1: Getting Around in Windows 97 Windows’ New Beginnings 98 A tale of two homes 99 Switching to tablet mode and back 102 Navigating around the Desktop 103 Keying Keyboard Shortcuts 109 Chapter 2: Changing the Lock and Login Screens 113 Working with the Lock Screen 114 Using your own picture 115 Adding and removing apps on the lock screen 118 Logging On Uniquely 120 Using a picture password 120 Creating a PIN 124 Windows Hello 125 Bypassing passwords and login 126 Chapter 3: Working with the Action/Notification Center 127 What is the Action Center? 128 What, Exactly, is a Notification? 129 Working with Notifications 131 Working with Settings Shortcuts 133 Chapter 4: Controlling Users 137 Why You Need Separate User Accounts 138 Choosing Account Types 139 What’s a standard account? 139 What’s an administrator account? 141 Choosing between standard and administrator accounts 141 What’s Good and Bad about Microsoft Accounts 143 Adding Users 145 Changing Accounts 148 Changing other users’ settings 148 Changing your own settings 153 Switching Users 154 The Changing Environment 154 Chapter 5: Microsoft Account: To Sync or Not to Sync? 157 What, Exactly, is a Microsoft Account? 158 Deciding Whether You Want a Microsoft Account 159 Setting Up a Microsoft Account 161 Setting up a Hotmail/Outlook.com account 163 Making any email address a Microsoft account 164 Stop Using Your Microsoft Account 166 Taking Care of Your Microsoft Account 167 Controlling Sync 168 Chapter 6: Privacy Control 171 Why You Should Be Concerned 172 Privacy Manifesto 174 The past: Watson to WER 175 Customer Experience Improvement Program 175 Feedback & Diagnostics tab and DiagTrack 176 Denial ain’t nuthin’ but a river 178 Knowing What Connections Windows Prefers 179 Controlling Location Tracking 180 Blocking all location tracking 183 Blocking location tracking in an app 184 Minimizing Privacy Intrusion 185 Book 3: Working on the Desktop 187 Chapter 1: Running Your Desktop from Start to Finish 189 Tripping through Windows 10’s Three Personas 190 Working with the Traditional Desktop 192 Changing the background 193 Cleaning up useless icons and programs 195 Mousing with Your Mouse 196 What’s up, dock? 197 Changing the mouse 199 Starting with the Start button 201 Touching on the Taskbar 204 Working with Files and Folders 205 Using File Explorer 207 Navigating 208 Viewing 210 Creating files and folders 211 Modifying files and folders 212 Showing filename extensions 212 Sharing folders 215 Using the \Public folder 216 Recycling 218 Creating Shortcuts 219 Keying Keyboard Shortcuts 221 Sleep: Perchance to Dream 222 Chapter 2: Personalizing the Start Menu 225 Touring the Start Menu 226 Modifying the Start Menu 228 Changing your picture 229 Manipulating the Most Used section 230 Controlling the left-side lists 230 Circumnavigating the Start apps list 233 Resizing the Start Menu 235 Changing Tiles on the Start Menu 236 Organizing Your Start Menu Tiles 238 Add, add, add your tiles 238 Forming and naming your groups 239 Chapter 3: Personalizing the Desktop and Taskbar 241 Decking out the Desktop 242 Resolving Desktop Resolution 247 Setting the screen resolution 247 Changing the size of text, apps, and other items 249 Using magnification 250 Putting Icons and Shortcuts on the Desktop 252 Creating shortcuts 253 Arranging icons on the desktop 255 Tricking out the Taskbar 258 Anatomy of the taskbar 259 Jumping 259 Changing the taskbar 261 Working with the taskbar 263 Chapter 4: Internet Explorer, Chrome, and Firefox 265 Which Browser is Best? 267 Considering security 268 Looking at privacy 269 Picking a browser 270 Setting a browser as your default 272 Using Internet Explorer on the Desktop 274 Navigating in IE 275 Changing the home page 282 Dealing with cookies 283 Why you should stop using IE 285 Customizing Firefox 286 Installing Firefox 286 Browsing privately in Firefox 288 Bookmarking with the Fox 290 Changing the default search engine 292 Adding Firefox’s best add-ons 294 Optimizing Google Chrome 295 Installing Chrome 296 Navigating in Chrome 297 Searching on the Web 300 Finding what you’re looking for 301 Using Advanced Search 303 Pulling out Google parlor tricks 305 Referring to Internet Reference Tools 305 Internet speed test 306 DNSstuff 306 Monitis Traceroute 307 Down for everyone or just me? 308 The Wayback Machine 308 Chapter 5: Hey, Cortana! 309 The Cortana Backstory 311 Make Cortana Respond to “Hey, Cortana” 312 Setting up Cortana 316 Using Cortana Settings 317 Useful or Fun Commands for Cortana 320 Chapter 6: Maintaining Your System 323 Rolling Back with the Three Rs 324 Creating Password Reset Questions 326 Establishing password security questions 327 Using password recovery questions 329 Making Windows Update Work 330 Maintaining Drives 331 What is formatting? 331 Introducing hard-drive-maintenance tools 332 Running an error check 332 Defragmenting a drive 334 Maintaining Solid-State Drives 335 Zipping and Compressing 336 Compressing with NTFS 338 Zipping the easy way with compressed (zipped) folders 340 Book 4: Using the Built-in Windows 10 Apps 343 Chapter 1: Using the Mail and Calendar Apps 345 Choosing a Mail/Calendar App 347 Comparing email programs 348 Comparing Calendar apps 352 Choosing the right package 353 Drilling Down on Windows 10 Mail 354 Creating a new message 358 Searching for email in the Mail app 361 Mail Settings 361 Adding a new email account 362 Setting extra options 364 Avoiding Calendar App Collisions 365 Adding Calendar items 367 Struggling with Calendar shortcomings 368 Beyond Email 369 Chapter 2: Keeping Track of People 371 The Contact List in Windows 10 372 Putting Contacts in the People App 373 Adding accounts to People 373 Editing a contact 377 Adding people in People 379 Putting a Contact on the Taskbar 380 Alternatives to the Win10 People App 382 Chapter 3: Zooming the Photos App and Beyond 385 Discovering What the Windows 10 Photos App Can Do 386 Touring Photos 386 Editing Photos 389 Setting Settings 392 Adding Photos 394 Importing Pictures from a Camera or an External Drive 394 Working with Albums 395 Storing and Managing Photos Online 395 Chapter 4: Noting OneNote 401 Getting Started in OneNote with or without a Pen 402 Setting Up Notebooks, Sections, Pages 403 Embellishing on a OneNote Page 407 Sending to OneNote 409 Setting Settings 411 Chapter 5: Maps, Music, Movies — and TV 413 Making Maps 414 Basic map functions 414 Navigating with the Maps app 417 Taking a map offline 418 Get Your Groove Music On 420 Getting Your Music and Movies into the Apps 422 Running around the Groove Music App 425 Finding music and playlists 427 Running around the Movies & TV App 428 Book 5: Connecting with the Windows 10 Apps 431 Chapter 1: Introducing Edge 433 A Walk through Microsoft Edge 435 Working with the Immersive Reader 439 A Sampler of Edge Settings 440 Adding Edge Extensions 445 Chapter 2: Using Skype in Windows 10 449 Signing Up with Skype 450 Making First Contact 454 Adding a Contact 455 Settings 458 Making Group Calls 459 Recording Calls 460 A Few Tips from Skype-ologists 461 Exploring Skype Alternatives 463 Chapter 3: Navigating the Microsoft Store 467 Checking out What a Universal Windows App Can Do 469 Browsing the Microsoft Store 472 Searching the Microsoft Store 475 Updating Your Microsoft Store Apps 476 Chapter 4: Games, Games, and Games 479 Searching the Store for Games 481 Enabling Game Mode 483 Using the Game Bar 484 Testing Your Connection to Xbox Live Services 486 Bringing Back the Classics 487 Book 6: Socializing and Sharing from Windows 10 491 Chapter 1: Using OneDrive 493 What is OneDrive? 494 Setting Up a OneDrive Account 496 The Four States of OneDrive Data 498 Changing the States of OneDrive Data 505 Sharing OneDrive Files and Folders 506 Chapter 2: Getting Started with Facebook 509 Choosing a Facebook App 511 Signing Up for a Facebook Account 512 Choosing basic Facebook privacy settings 516 Interpreting the Facebook interface lingo 520 Building a Great Timeline 521 Using the Facebook Apps for Windows 10 525 Chapter 3: Getting Started with Twitter 527 Understanding Twitter 528 Setting Up a Twitter Account 532 Tweeting for Beginners 536 Beware hacking 536 Using the @ sign and Reply 537 Retweeting for fun and profit 538 Direct Messaging 538 Hooking Twitter into Windows 539 Chapter 4: Getting Started with LinkedIn 541 Signing Up for LinkedIn 542 Using LinkedIn for Fun and Profit 546 Book 7: Controlling Your System 549 Chapter 1: Settings, Settings, and More Settings 551 Introducing the Settings App 553 Spelunking through the Control Panel 556 Putting Shortcuts to Settings on Your Desktop 558 God Mode 562 Installing New Languages 563 Chapter 2: Troubleshooting and Getting Help 565 Troubleshooting the Easy Way 566 Troubleshooting the Hard Way 567 Tackling installation problems 567 Problems with installing updates 571 System Stability and Reliability Monitor 580 Windows Sandbox 582 Tricks to Using Windows Help 583 The problem(s) with Windows Help 584 Using different kinds of help 584 How to Really Get Help 585 Snapping and Recording Your Problems 588 Taking snaps that snap 588 Recording live 590 Connecting to Remote Assistance 593 Understanding the interaction 593 Making the connection 594 Limiting an invitation 598 Troubleshooting Remote Assistance 599 Getting Help Online 600 Chapter 3: Working with Libraries 603 Understanding Libraries 604 Making Your Libraries Visible 604 Working with Your Default Libraries 608 Customizing Libraries 610 Adding a folder to a library 611 Changing a library’s default save location 613 Creating Your Own Library 614 Chapter 4: Storing in Storage Spaces 617 Understanding the Virtualization of Storage 618 Setting Up Storage Spaces 621 Working with Storage Spaces 625 Storage Space Strategies 626 Chapter 5: Taking Control of Updates and Upgrades 627 The Case Against Windows Automatic Update 628 Terminology 101 629 The Great Divide: Home versus Pro 631 Keeping Your Windows 10 Machine Protected From Updates 632 Postponing Windows 10 Updates 636 Keep Up on the Problems 637 Stopping Windows 10 Updates from Rebooting Your PC 638 Chapter 6: Running the Built-In Applications 641 Setting Alarms & Clock 642 Getting Free Word Processing 645 Running Notepad 645 Writing with WordPad 647 Taming the Character Map 650 Calculating — Free 651 Painting 653 Chapter 7: Working with Printers 657 Installing a Printer 658 Attaching a local printer 659 Connecting a network printer 661 Using the Print Queue 663 Displaying a print queue 663 Pausing and resuming a print queue 664 Pausing, restarting, and resuming a document 665 Canceling a document 666 Troubleshooting Printing 667 Catching a Runaway Printer 669 Book 8: Maintaining Windows 10 671 Chapter 1: File History, Backup, Data Restore, and Sync 673 What Happened to the Windows 7 Backup? 674 The Future of Reliable Storage is in the Cloud 674 Backing Up and Restoring Files with File History 676 Setting up File History 676 Restoring data from File History 680 Changing File History settings 683 Storing to and through the Cloud 686 Considering cloud storage privacy concerns 687 Reaping the benefits of backup and storage in the cloud 688 Choosing an online backup and sharing service 689 Chapter 2: A Fresh Start: Restore and Reset 693 The Three R’s — and an SF and a GB 694 Resetting Your PC 697 Resetting Your PC to Factory Settings 701 Starting Fresh 703 Restoring to an Earlier Point 704 Enabling System Protection 706 Creating a restore point 706 Rolling back to a restore point 708 Entering the Windows Recovery Environment 710 Chapter 3: Monitoring Windows 713 Viewing Events 714 Using Event Viewer 714 Events worthy — and not worthy — of viewing 716 Gauging System Reliability 718 Chapter 4: Using System Tools 723 Tasking Task Manager 724 Task Manager Processes 726 Task Manager Performance 727 Task Manager App History 728 Task Manager Startup and Autoruns 728 Task Manager Details and Services 731 Managing Startup Apps from Settings 732 Installing a Second Hard Drive 733 Running a Virtual Machine 736 Book 9: Securing Windows 10 745 Chapter 1: Spies, Spams, and Scams Are Out to Get You 747 Understanding the Hazards — and the Hoaxes 748 The primary infection vectors 749 Zombies and botnets 751 Phishing 754 419 scams 758 I’m from Microsoft, and I’m here to help 761 0day exploits 762 Staying Informed 763 Relying on reliable sources 764 Ditching the hoaxes 764 Is My Computer Infected? 766 Evaluating telltale signs 767 Where did that message come from? 767 What to do next 769 Shunning scareware 771 Getting Protected 773 Protecting against malware 773 Disabling Java and Flash 774 Using your credit card safely online 775 Defending your privacy 777 Reducing spam 779 Dealing with Data Breaches 781 Chapter 2: Fighting Viri and Scum 785 Basic Windows Security Do’s and Don’ts 786 Making Sense of Malware 790 Deciphering Browsers’ Inscrutable Warnings 793 Chrome 793 Firefox 795 Chapter 3: Running Built-In Security Programs 797 Working with Windows Security 798 Adjusting Windows Security 800 Running Windows Security manually 802 Controlling Folder Access 804 Judging SmartScreen 806 Booting Securely with UEFI 810 A brief history of BIOS 810 How UEFI is different from/better than BIOS 811 How Windows 10 uses UEFI 813 Controlling User Account Control 813 Poking at Windows Defender Firewall 816 Understanding Firewall basic features 817 Speaking your firewall’s lingo 818 Peeking into your firewall 819 Making inbound exceptions 820 Chapter 4: Top Security Helpers 825 Deciding about BitLocker 826 Managing Your Passwords 829 Using password managers 829 Which is better: Online or in-hand? 830 Rockin’ RoboForm 831 Liking LastPass 832 Keeping Your Other Programs Up to Date 834 Blocking Java and Flash in Your Browser 835 Fighting Back at Tough Scumware 838 Securing Your Communication with PIA 839 What’s a VPN? 840 Setting up a VPN 841 Book 10: Enhancing Windows 10 843 Chapter 1: Working Remotely with Windows 10 845 Enabling Remote Desktop Connections 846 Connecting with Remote Desktop Connection 847 Connecting a Second Monitor 849 Installing a Webcam 851 Adding Clocks to the Taskbar 852 Chapter 2: Using Android, iPhone, and Kindle with Windows 10 855 What, Exactly, is Android? 856 Getting clear on Android 858 Making Windows talk to your Android phone or tablet 858 Linking an Android Smartphone to a PC 860 Linking an iPhone to a PC 863 Turning a Smartphone into a Webcam for Your PC 864 Running iTunes on Windows — or Maybe Not 865 Deciding whether to use iTunes for Windows 866 Installing iTunes 868 Setting up iTunes 869 Moving files from Windows 10 to an iPhone 870 Controlling Windows 10 from an iPhone or iPad 872 Wrangling E-Book Files 873 Introducing popular e-book formats 873 Reading e-book files on your PC 874 Organizing your e-book files with calibre 875 Getting Media from Your PC to Your Kindle 878 Emailing books from your PC to your Kindle 878 Receiving emailed books from a friend 879 Adding music to your Kindle 881 Chapter 3: Getting Started with Gmail, Google Apps, and Drive 883 Finding Alternatives to Windows with Google 884 Setting Up Gmail 888 Moving an Existing Account to Gmail 892 Using the Google Apps 894 Moving Your Domain to Google 898 Chapter 4: Using Web-Based Outlook.com (nee Hotmail) 903 Getting Started with Outlook.com 904 Bringing Some Sanity to Outlook.com Organization 909 Handling Outlook.com Failures 911 Importing Outlook.com Messages into Gmail 913 Weighing the Alternatives 915 Chapter 5: Best Free Windows Add-Ons 917 Windows Apps You Absolutely Must Have 918 File History 918 VLC Media Player 919 LastPass 920 Recuva 921 The Best of the Rest — All Free 922 Nextpad (Notepad replacement) 922 Ninite 923 Revo Uninstaller 924 Paint.net 925 7-Zip 925 qBittorrent 926 Dropbox, Google Drive, OneDrive, or 927 Other interesting free software 927 You may not need to buy Microsoft Office 928 Don’t Pay for Software You Don’t Need! 929 Windows 10 has all the antivirus software you need 930 Windows 10 doesn’t need a disk defragger 930 Windows 10 doesn’t need a disk partitioner 930 Windows 10 doesn’t need a Registry cleaner 931 Windows 10 doesn’t need a backup program 931 Don’t turn off services or hack your Registry 932 Index 933

    15 in stock

    £23.79

  • From Traditional Fault Tolerance to Blockchain

    John Wiley & Sons Inc From Traditional Fault Tolerance to Blockchain

    Out of stock

    Book SynopsisTable of ContentsList of Figures xiii List of Tables xix Acknowledgments xxi Preface xxiii References xxix 1 Introduction 1 1.1 Basic Concepts and Terminologies for Dependable Computing 2 1.1.1 System Models 2 1.1.2 Threat Models 3 1.1.3 Dependability Attributes and Evaluation Metrics 6 1.2 Means to Achieve Dependability 9 1.2.1 Fault Avoidance 9 1.2.2 Fault Detection and Diagnosis 9 1.2.3 Fault Removal 10 1.2.4 Fault Tolerance 11 1.3 System Security 13 References 18 2 Logging and Checkpointing 21 2.1 System Model 22 2.1.1 Fault Model 23 2.1.2 Process State and Global State 23 2.1.3 Piecewise Deterministic Assumption 26 2.1.4 Output Commit 26 2.1.5 Stable Storage 27 2.2 Checkpoint-Based Protocols 27 2.2.1 Uncoordinated Checkpointing 27 2.2.2 Tamir and Sequin Global Checkpointing Protocol 29 2.2.3 Chandy and Lamport Distributed Snapshot Protocol 35 2.2.4 Discussion 38 2.3 Log Based Protocols 40 2.3.1 Pessimistic Logging 42 2.3.2 Sender-Based Message Logging 51 References 60 3 Recovery-Oriented Computing 63 3.1 System Model 65 3.2 Fault Detection and Localization 68 3.2.1 Component Interactions Modeling and Anomaly Detection 72 3.2.2 Path Shapes Modeling and Root Cause Analysis 76 3.2.3 Inference-Based Fault Diagnosis 80 3.3 Microreboot 89 3.3.1 Microrebootable System Design Guideline 90 3.3.2 Automatic Recovery with Microreboot 91 3.3.3 Implications of the Microrebooting Technique 92 3.4 Overcoming Operator Errors 93 3.4.1 The Operator Undo Model 94 3.4.2 The Operator Undo Framework 95 References 99 4 Data and Service Replication 103 4.1 Service Replication 105 4.1.1 Replication Styles 107 4.1.2 Implementation of Service Replication 109 4.2 Data Replication 111 4.3 Optimistic Replication 116 4.3.1 System Models 117 4.3.2 Establish Ordering among Operations 119 4.3.3 State Transfer Systems 122 4.3.4 Operation Transfer System 126 4.3.5 Update Commitment 131 4.4 CAP Theorem 136 4.4.1 2 out 3 139 4.4.2 Implications of Enabling Partition Tolerance 140 References 143 5 Group Communication Systems 147 5.1 System Model 149 5.2 Sequencer Based Group Communication System 152 5.2.1 Normal Operation 153 5.2.2 Membership Change 157 5.2.3 Proof of Correctness 165 5.3 Sender Based Group Communication System 166 5.3.1 Total Ordering Protocol 167 5.3.2 Membership Change Protocol 174 5.3.3 Recovery Protocol 183 5.3.4 The Flow Control Mechanism 190 5.4 Vector Clock Based Group Communication System 192 References 197 6 Consensus and the Paxos Algorithms 199 6.1 The Consensus Problem 200 6.2 The Paxos Algorithm 202 6.2.1 Algorithm for Choosing a Value 202 6.2.2 Algorithm for Learning a Value 204 6.2.3 Proof of Correctness 204 6.2.4 Reasoning of the Paxos Algorithm 206 6.3 Multi-Paxos 212 6.3.1 Checkpointing and Garbage Collection 213 6.3.2 Leader Election and View Change 214 6.4 Dynamic Paxos 216 6.4.1 Dynamic Paxos 217 6.4.2 Cheap Paxos 220 6.5 Fast Paxos 227 6.5.1 The Basic Steps 228 6.5.2 Collision Recovery, Quorum Requirement, and Value Selection Rule 229 6.6 Implementations of the Paxos Family Algorithms 235 6.6.1 Hard Drive Failures 236 6.6.2 Multiple Coordinators 236 6.6.3 Membership Changes 237 6.6.4 Limited Disk Space for Logging 241 References 242 7 Byzantine Fault Tolerance 245 7.1 The Byzantine Generals Problem 246 7.1.1 System Model 247 7.1.2 The Oral Message Algorithms 250 7.1.3 Proof of Correctness for the Oral Message Algorithms 260 7.2 Practical Byzantine Fault Tolerance 261 7.2.1 System Model 262 7.2.2 Overview of the PBFT Algorithm 263 7.2.3 Normal Operation of PBFT 265 7.2.4 Garbage Collection 267 7.2.5 View Change 268 7.2.6 Proof of Correctness 271 7.2.7 Optimizations 273 7.3 Fast Byzantine Agreement 277 7.4 Speculative Byzantine Fault Tolerance 278 7.4.1 The Agreement Protocol 279 7.4.2 The View Change Protocol 283 7.4.3 The Checkpointing Protocol 288 7.4.4 Proof of Correctness 288 References 290 8 Cryptocurrency and Blockchain 295 8.1 History of Cryptocurrency 295 8.2 Bitcoin 298 8.2.1 Decentralized Network and Architecture 301 8.2.2 Self-Contained Cryptography 302 8.2.3 Decentralized Data Structure 304 8.2.4 Decentralized Algorithms 313 8.3 Ethereum 317 8.3.1 Ethereum Computing Model 318 8.3.2 Block and Consensus 326 8.3.3 Tokenization 340 8.4 Attacks on Blockchain 342 References 347 9 Consensus Algorithms for Blockchain 349 9.1 Model on Blockchain Consensus 353 9.1.1 Requirements on Puzzle Design 354 9.1.2 Zero-Knowledge Proof 355 9.2 Proof of Work 356 9.3 Proof of Resources 357 9.3.1 Using Storage as Resource 357 9.3.2 Using Computing as Resource 359 9.4 Virtual Mining 360 9.4.1 PeerCoin PoS 360 9.4.2 Fixed-Epoch Time Based PoS Schemes 368 9.4.3 Proof of Elapsed Time 371 References 375 10 Blockchain Applications 377 10.1 The Value of Blockchain 378 10.1.1 Non-Functional Benefits 379 10.1.2 Functional Benefits 382 10.2 Blockchain-Enabled Cyber-Physical Systems 383 10.2.1 Cyber-Physical Systems 383 10.2.2 Application Categories 385 10.2.3 Blockchain-Enabled Operations in CPS 390 10.3 On Blockchain Throughput 398 10.3.1 On-Chain Approach 399 10.3.2 Off-Chain Approach 402 10.4 A Critical Look on Blockchain from Economy Perspective 408 10.4.1 Blockchain Technology from the Economic View 409 10.4.2 Economic Functions of Blockchain 412 10.4.3 Blockchain as a Financial Infrastructure 416 References 419 Index 427

    Out of stock

    £169.16

  • Teach Yourself VISUALLY Windows 10 Teach Yourself

    John Wiley & Sons Inc Teach Yourself VISUALLY Windows 10 Teach Yourself

    1 in stock

    Book SynopsisTable of ContentsChapter 1 Getting Started with Windows Explore the PC Screen 4 Explore the Tablet Screen 5 Start and Close an App 6 Connect to Your Wireless Network 8 Put Windows to Sleep 10 Restart or Shut Down Windows 11 Switch to a Microsoft Account 12 Install an App 16 Switch Between Running Apps 18 Uninstall an App 20 Chapter 2 Customizing Windows Pin an App to the Start Menu 24 Open the Settings App 26 Change the Lock Screen Background 28 Add an App to the Lock Screen 30 Synchronize Settings Between PCs 32 Access an App’s Features 34 Pin an App to the Taskbar 36 Adjust the Volume 38 Set the Time Zone 39 Configure Windows to Work with Multiple Monitors 40 Customize the Taskbar’s Notification Area 42 Set Up Multiple Desktops 44 Chapter 3 Surfing the Web Open a Web Page 48 Open a Web Page in a Tab 50 Navigate Web Pages 52 Find Text on a Page 53 Navigate with the History List 54 Change Your Startup Page 56 Save Favorite Web Pages 58 Take Advantage of the Favorites Bar 60 Share a Web Page 62 Search for Sites 64 Download a File 66 Chapter 4 Sending and Receiving Email Configure an Email Account 70 Send an Email Message 72 Format the Message Text 74 Add a File Attachment 76 Save a Draft of a Message 78 Receive and Read Email Messages 80 Reply to a Message 82 Forward a Message 84 Open and Save an Attachment 86 Delete a Message 88 Create a Folder for Saving Messages 90 Configure Mail Options 92 Chapter 5 Getting Social with Windows Create a Contact 96 Add Your Google Account 98 Add Your iCloud Account 100 View a Contact 102 Edit a Contact 104 Assign a Photo to a Contact 106 Add Extra Fields to a Contact 108 Filter the Contacts List 110 Combine Multiple Profiles for a Contact 112 View Your Calendar 114 Add an Event to Your Calendar 116 Create a Recurring Event 118 Add an Event Reminder 119 Send or Respond to an Event Invitation 120 Customize Your Calendar 122 Chapter 6 Performing Day-to-Day Tasks with Apps Search Your PC 126 Configure the Cortana Voice Assistant 128 Control Your PC with Cortana 130 Configure Skype 132 Call Someone Using Skype 134 Display a Location on a Map 136 Get Directions to a Location 138 Check Your Weather Forecast 140 Check Another City’s Weather Forecast 142 Perform Calculations 144 Record a Voice Memo 146 Set an Alarm 148 Write a Note 150 Chapter 7 Working with Images Import Images from a Digital Camera 154 Scan an Image 156 Navigate the Pictures Folder 158 View Your Images 160 Start a Slide Show 162 Repair an Image 164 Add a Photo Effect 166 Crop an Image 168 Rotate an Image 170 Delete an Image 171 Print an Image 172 Take a Picture with Your PC Camera 174 Chapter 8 Working with Multimedia Import Videos from a Digital Camera 178 Navigate the Videos Folder 180 Watch a Video 182 Edit a Video 184 Make a Movie 188 Play a Music CD 192 Copy Tracks from a Music CD 196 Navigate the Music Folder 198 Play Music 200 Create a Playlist 202 Switch Between Audio Devices 204 Chapter 9 Editing Documents Create and Save a Document 208 Open a Document 210 Change the Text Font 212 Find Text 214 Replace Text 216 Insert Special Symbols 218 Make a Copy of a Document 220 Create a OneNote Notebook 222 Add Pages and Sections to a Notebook 224 Add Text Notes 226 Add an Image to a Notebook Page 228 Work with Notebook Lists 230 Print a Document 232 Chapter 10 Working with Files Select a File 236 Change the File View 238 Preview a File 239 Copy a File 240 Move a File 241 Rename a File 242 Create a New File 243 Delete a File 244 Restore a Deleted File 245 Add a File to Your OneDrive 246 Extract Files from a Compressed Folder 248 Specify a Different Program When Opening a File 250 Chapter 11 Sharing Your Computer Display User Accounts 254 Create a User Account 256 Switch Between Accounts 258 Change Your User Account Picture 260 Change a User’s Password 262 Delete an Account 264 Add a Child to Your PC 266 Set Restrictions on a Child Account 268 Share a Document or Folder 270 View Network Resources 272 Chapter 12 Getting More from a Tablet PC Understanding Gestures 276 Using Gestures to Control Windows 278 Input Text with the Touch Keyboard 280 Configure the Touch Keyboard 282 Configure Your Tablet to Work with a Second Monitor 284 Adjust Screen Brightness 286 Monitor Battery Life 287 Chapter 13 Implementing Security Understanding Windows Security 290 Check for Security Problems 292 Create a Picture Password 294 Sign In with a PIN 298 Set Up a Fingerprint Sign‐In 300 Lock Your Computer 302 Configure Your PC to Lock Automatically 304 Browse the Web Privately 306 Control Your Private Information 308 Clear Your Activity History 310 Chapter 14 Maintaining Windows Check Hard Drive Free Space 314 Delete Unnecessary Files 316 Refresh Your Computer 318 Create a Recovery Drive 320 Keep a History of Your Files 322 Restore a File from Your History 324 Check Your Hard Drive for Errors 326 Check Your Devices for Errors 328 Index 33

    1 in stock

    £17.24

  • Microgrid Technologies

    John Wiley & Sons Inc Microgrid Technologies

    Out of stock

    Book SynopsisMicrogrid technology is an emerging area, and it has numerous advantages over the conventional power grid. A microgrid is defined as Distributed Energy Resources (DER) and interconnected loads with clearly defined electrical boundaries that act as a single controllable entity concerning the grid. Microgrid technology enables the connection and disconnection of the system from the grid. That is, the microgrid can operate both in grid-connected and islanded modes of operation. Microgrid technologies are an important part of the evolving landscape of energy and power systems. Many aspects of microgrids are discussed in this volume, including, in the early chapters of the book, the various types of energy storage systems, power and energy management for microgrids, power electronics interface for AC & DC microgrids, battery management systems for microgrid applications, power system analysis for microgrids, and many others. The middle section of the book presents the power quality problTable of ContentsForeword xxi Acknowledgements xxiii 1 A Comprehensive Review on Energy Management in Micro-Grid System 1Sanjay Kumar, R. K. Saket, P. Sanjeevikumar and Jens Bo Holm-Nielsen 1.1 Introduction 2 1.2 Generation and Storage System in MicroGrid 6 1.2.1 Distributed Generation of Electrical Power 6 1.2.2 Incorporation of Electric Car in Micro-Grid as a Device for Backup 7 1.2.3 Power and Heat Integration in Management System 8 1.2.4 Combination of Heat and Electrical Power System 9 1.3 System of Energy Management 10 1.3.1 Classification of MSE 10 1.3.1.1 MSE Based on Conventional Sources 10 1.3.1.2 MSE Based on SSE 10 1.3.1.3 MSE Based on DSM 11 1.3.1.4 MSE Based on Hybrid System 11 1.3.2 Steps of MSE During Problem Solving 11 1.3.2.1 Prediction of Uncertain Parameters 12 1.3.2.2 Uncertainty Modeling 12 1.3.2.3 Mathematical Formulation 12 1.3.2.4 Optimization 13 1.3.3 Micro-Grid in Islanded Mode 13 1.3.3.1 Objective Functions and Constraints of System 13 1.3.4 Micro-Grid Operation in Grid-Connected Mode 14 1.3.4.1 Objective Functions and Constraints of the Systems 14 1.4 Algorithms Used in Optimizing Energy Management System 16 1.5 Conclusion 19 References 20 2 Power and Energy Management in Microgrid 25Jayesh J. Joglekar 2.1 Introduction 25 2.2 Microgrid Structure 26 2.2.1 Selection of Source for DG 27 2.2.1.1 Phosphoric Acid Fuel Cell (PAFC) 27 2.2.1.2 Mathematical Modeling of PAFC Fuel Cell 27 2.3 Power Flow Management in Microgrid 31 2.4 Generalized Unified Power Flow Controller (GUPFC) 33 2.4.1 Mathematical Modeling of GUPFC 34 2.5 Active GUPFC 38 2.5.1 Active GUPFC Control System 39 2.5.1.1 Series Converter 40 2.5.1.2 Shunt Converter 42 2.5.2 Simulation of Active GUPFC With General Test System 43 2.5.3 Simulation of Active GUPFC With IEEE 9 Bus Test System 43 2.5.3.1 Test Case: 1—Without GUPFC and Without Fuel Cell 45 2.5.3.2 Test Case: 2—Without GUPFC and With Fuel Cell 47 2.5.3.3 Test Case: 3—With GUPFC and Without Fuel Cell 48 2.5.3.4 Test Case: 4—With GUPFC and With Fuel Cell 49 2.5.3.5 Test Case: 5—With Active GUPFC 49 2.5.4 Summary 52 2.6 Appendix General Test System 53 2.6.1 IEEE 9 Bus Test System 53 References 55 3 Review of Energy Storage System for Microgrid 57G.V. Brahmendra Kumar and K. Palanisamy 3.1 Introduction 58 3.2 Detailed View of ESS 60 3.2.1 Configuration of ESS 60 3.2.2 Structure of ESS With Other Devices 60 3.2.3 ESS Classifications 62 3.3 Types of ESS 62 3.3.1 Mechanical ESS 62 3.3.2 Flywheel ESS 63 3.3.3 CAES System 64 3.3.4 PHS System 65 3.3.5 CES Systems 66 3.3.6 Hydrogen Energy Storage (HES) 67 3.3.7 Battery-Based ESS 68 3.3.8 Electrical Energy Storage (EES) System 71 3.3.8.1 Capacitors 71 3.3.8.2 Supercapacitors (SCs) 72 3.3.9 SMES 73 3.3.10 Thermal Energy Storage Systems (TESS) 74 3.3.10.1 SHS 75 3.3.10.2 Latent 75 3.3.10.3 Absorption 75 3.3.10.4 Hybrid ESS 76 3.4 Comparison of Current ESS on Large Scale 77 3.5 Importance of Storage in Modern Power Systems 77 3.5.1 Generation Balance and Fluctuation in Demand 77 3.5.2 Intermediate Penetration of Renewable Energy 77 3.5.3 Use of the Grid 80 3.5.4 Operations on the Market 80 3.5.5 Flexibility in Scheduling 80 3.5.6 Peak Shaving Support 80 3.5.7 Improve the Quality of Power 81 3.5.8 Carbon Emission Control 81 3.5.9 Improvement of Service Efficiency 81 3.5.10 Emergency Assistance and Support for Black Start 81 3.6 ESS Issues and Challenges 81 3.6.1 Selection of Materials 82 3.6.2 ESS Size and Cost 82 3.6.3 Energy Management System 83 3.6.4 Impact on the Environment 83 3.6.5 Issues of Safety 83 3.7 Conclusion 84 Acknowledgment 85 References 85 4 Single Phase Inverter Fuzzy Logic Phase Locked Loop 91Maxwell Sibanyoni, S.P. Daniel Chowdhury and L.J. Ngoma 4.1 Introduction 91 4.2 PLL Synchronization Techniques 92 4.2.1 T/4 Transport Delay PLL 95 4.2.2 Inverse Park Transform PLL 96 4.2.3 Enhanced PLL 97 4.2.4 Second Order Generalized Integrator Orthogonal Signal Generator Synchronous Reference Frame (SOGI-OSG SRF) PLL 98 4.2.5 Cascaded Generalized Integrator PLL (CGI-PLL) 99 4.2.6 Cascaded Delayed Signal Cancellation PLL 100 4.3 Fuzzy Logic Control 101 4.4 Fuzzy Logic PLL Model 103 4.4.1 Fuzzification 103 4.4.2 Inference Engine 105 4.4.3 Defuzzification 108 4.5 Simulation and Analysis of Results 110 4.5.1 Test Signal Generator 110 4.5.2 Proposed SOGI FLC PLL Performance Under Fault Conditions 113 4.5.2.1 Test Case 1 113 4.5.2.2 Test Case 2 114 4.5.2.3 Test Case 3 115 4.5.2.4 Test Case 4 115 4.5.2.5 Test Case 5 116 4.5.2.6 Test Case 6 117 4.6 Conclusion 118 Acknowledgment 118 References 119 5 Power Electronics Interfaces in Microgrid Applications 121Indrajit Sarkar 5.1 Introduction 122 5.2 Microgrid Classification 122 5.2.1 AC Microgrid 122 5.2.2 DC Microgrids 124 5.2.3 Hybrid Microgrid 126 5.3 Role of Power Electronics in Microgrid Application 127 5.4 Power Converters 128 5.4.1 DC/DC Converters 128 5.4.2 Non-Isolated DC/DC Converters 129 5.4.2.1 Maximum Power Point Tracking (MPPT) 130 5.4.3 Isolated DC/DC Converters 135 5.4.4 AC to DC Converters 137 5.4.5 DC to AC Converters 139 5.5 Conclusion 143 References 143 6 Reconfigurable Battery Management System for Microgrid Application 145Saravanan, S., Pandiyan, P., Chinnadurai, T., Ramji, Tiwari., Prabaharan, N., Senthil Kumar, R. and Lenin Pugalhanthi, P. 6.1 Introduction 146 6.2 Individual Cell Properties 147 6.2.1 Modeling of Cell 147 6.2.1.1 Second Order Model 147 6.2.2 Simplified Non-Linear Model 148 6.3 State of Charge 149 6.4 State of Health 150 6.5 Battery Life 150 6.6 Rate Discharge Effect 151 6.7 Recovery Effect 152 6.8 Conventional Methods and its Issues 152 6.8.1 Series Connected 152 6.8.2 Parallel Connected 154 6.9 Series-Parallel Connections 154 6.10 Evolution of Battery Management System 155 6.10.1 Necessity for Reconfigurable BMS 156 6.10.2 Conventional R-BMS Methods 156 6.10.2.1 First Design 157 6.10.2.2 Series Topology 158 6.10.2.3 Self X Topology 158 6.10.2.4 Dependable Efficient Scalable Architecture Method 159 6.10.2.5 Genetic Algorithm-Based Method 160 6.10.2.6 Graph-Based Technique 161 6.10.2.7 Power Tree-Based Technique 162 6.11 Modeling of Reconfigurable-BMS 163 6.12 Real Time Design Aspects 164 6.12.1 Sensing Module Stage 165 6.12.2 Control Module Stage 165 6.12.2.1 Health Factor of Reconfiguration 166 6.12.2.2 Reconfiguration Time Delay and Transient Load Supply 166 6.12.3 Actuation Module 167 6.12.3.1 Order of Switching 167 6.12.3.2 Stress and Faults of Switches 169 6.12.3.3 Determining Number of Cells in a Module 170 6.13 Opportunities and Challenges 171 6.13.1 Modeling and Simulation 171 6.13.2 Hardware Design 171 6.13.3 Granularity 171 6.13.4 Hardware Overhead 172 6.13.5 Intelligent Algorithms 172 6.13.6 Distributed Reconfigurable Battery Systems 172 6.14 Conclusion 173 References 173 7 Load Flow Analysis for Micro Grid 177P. Sivaraman, Dr. C. Sharmeela and Dr. S. Elango 7.1 Introduction 177 7.1.1 Islanded Mode of Operation 178 7.1.2 Grid Connected Mode of Operation 178 7.2 Load Flow Analysis for Micro Grid 179 7.3 Example 179 7.3.1 Power Source 180 7.4 Energy Storage System 180 7.5 Connected Loads 182 7.6 Reactive Power Compensation 182 7.7 Modeling and Simulation 182 7.7.1 Case 1 182 7.7.2 Case 2 184 7.7.3 Case 3 187 7.7.4 Case 4 189 7.7.5 Case 5 191 7.8 Conclusion 193 References 195 8 AC Microgrid Protection Coordination 197Ali M. Eltamaly, Yehia Sayed Mohamed, Abou-Hashema M. El-Sayed and Amer Nasr A. Elghaffar 8.1 Introduction 197 8.2 Fault Analysis 200 8.2.1 Symmetrical Fault Analysis 201 8.2.2 Single Line to Ground Fault 202 8.2.3 Line-to-Line Fault 204 8.2.4 Double Line-to-Ground Fault 206 8.3 Protection Coordination 208 8.3.1 Overcurrent Protection 209 8.3.2 Directional Overcurrent/Earth Fault Function 211 8.3.3 Distance Protection Function 214 8.3.4 Distance Acceleration Scheme 217 8.3.5 Under/Over Voltage/Frequency Protection 219 8.4 Conclusion 221 Acknowledgment 224 References 224 9 A Numerical Approach for Estimating Emulated Inertia With Decentralized Frequency Control of Energy Storage Units for Hybrid Renewable Energy Microgrid System 227Shubham Tiwari, Jai Govind Singh and Weerakorn Ongsakul 9.1 Introduction 228 9.2 Proposed Methodology 231 9.2.1 Response in Conventional Grids 231 9.2.2 Strategy for Digital Inertia Emulation in Hybrid Renewable Energy Microgrids 232 9.2.3 Proposed Mathematical Formulation for Estimation of Digital Inertia Constant for Static Renewable Energy Sources 235 9.3 Results and Discussions 238 9.3.1 Test System 238 9.3.2 Simulation and Study of Case 1 241 9.3.2.1 Investigation of Scenario A 241 9.3.2.2 Investigation of Scenario B 243 9.3.2.3 Discussion for Case 1 245 9.3.3 Simulation and Study of Case 2 246 9.3.3.1 Investigation of Scenario A 246 9.3.3.2 Investigation of Scenario B 248 9.3.3.3 Discussion for Case 2 250 9.3.4 Simulation and Study for Case 3 250 9.3.4.1 Discussion for Case 3 251 9.4 Conclusion 252 References 253 10 Power Quality Issues in Microgrid and its Solutions 255R. Zahira, D. Lakshmi and C.N. Ravi 10.1 Introduction 256 10.1.1 Benefits of Microgrid 257 10.1.2 Microgrid Architecture 257 10.1.3 Main Components of Microgrid 258 10.2 Classification of Microgrids 258 10.2.1 Other Classifications 259 10.2.2 Based on Function Demand 259 10.2.3 By AC/DC Type 259 10.3 DC Microgrid 260 10.3.1 Purpose of the DC Microgrid System 260 10.4 AC Microgrid 261 10.5 AC/DC Microgrid 262 10.6 Enhancement of Voltage Profile by the Inclusion of RES 263 10.6.1 Sample Microgrid 263 10.7 Power Quality in Microgrid 267 10.8 Power Quality Disturbances 270 10.9 International Standards for Power Quality 270 10.10 Power Quality Disturbances in Microgrid 271 10.10.1 Modeling of Microgrid 271 10.11 Shunt Active Power Filter (SAPF) Design 272 10.11.1 Reference Current Generation 274 10.12 Control Techniques of SAPF 276 10.13 SPWM Controller 277 10.14 Sliding Mode Controller 277 10.15 Fuzzy-PI Controller 278 10.16 GWO-PI Controller 279 10.17 Metaphysical Description of Optimization Problems With GWO 281 10.18 Conclusion 284 References 285 11 Power Quality Improvement in Microgrid System Using PSO-Based UPQC Controller 287T. Eswara Rao, Krishna Mohan Tatikonda, S. Elango and J. Charan Kumar 11.1 Introduction 288 11.2 Microgrid System 289 11.2.1 Wind Energy System 290 11.2.1.1 Modeling of Wind Turbine System 290 11.2.2 Perturb and Observe MPPT Algorithm 291 11.2.3 MPPT Converter 291 11.3 Unified Power Quality Conditioner 293 11.3.1 UPQC Series Converter 293 11.3.2 UPQC Shunt APF Controller 295 11.4 Particle Swarm Optimization 297 11.4.1 Velocity Function 297 11.4.2 Analysis of PSO Technique 298 11.5 Simulation and Results 299 11.5.1 Case 1: With PI Controller 300 11.5.2 Case 2: With PSO Technique 301 11.6 Conclusion 304 References 305 12 Power Quality Enhancement and Grid Support Using Solar Energy Conversion System 309CH. S. Balasubrahmanyam, Om Hari Gupta and Vijay K. Sood 12.1 Introduction 309 12.2 Renewable Energy and its Conversion Into Useful Form 312 12.3 Power System Harmonics and Their Cause 313 12.4 Power Factor (p.f.) and its Effects 316 12.5 Solar Energy System With Power Quality Enhancement (SEPQ) 317 12.6 Results and Discussions 320 12.6.1 Mode-1 (SEPQ as STATCOM) 320 12.6.2 Mode-2 (SEPQ as Shunt APF) 320 12.6.3 Mode-3 (SEPQ as D-STATCOM) 322 12.7 Conclusion 326 References 327 13 Power Quality Improvement of a 3-Phase-3-Wire Grid-Tied PV-Fuel Cell System by 3-Phase Active Filter Employing Sinusoidal Current Control Strategy 329Rudranarayan Senapati, Sthita Prajna Mishra, Rajendra Narayan Senapati and Priyansha Sharma 13.1 Introduction 330 13.2 Active Power Filter (APF) 333 13.2.1 Shunt Active Power Filter (ShPF) 334 13.2.1.1 Configuration of ShPF 334 13.2.2 Series Active Power Filter (SAF) 335 13.2.2.1 Configuration of SAF 336 13.3 Sinusoidal Current Control Strategy (SCCS) for APFs 337 13.4 Sinusoidal Current Control Strategy for ShPF 342 13.5 Sinusoidal Current Control Strategy for SAF 349 13.6 Solid Oxide Fuel Cell (SOFC) 353 13.6.1 Operation 354 13.6.2 Anode 355 13.6.3 Electrolyte 355 13.6.4 Cathode 356 13.6.5 Comparative Analysis of Various Fuel Cells 356 13.7 Simulation Analysis 356 13.7.1 Shunt Active Power Filter 358 13.7.1.1 ShPF for a 3-φ 3-Wire (3P3W) System With Non-Linear Loading 358 13.7.1.2 For a PV-Grid System (Constant Irradiance Condition) 360 13.7.1.3 For a PV-SOFC Integrated System 364 13.7.2 Series Active Power Filter 366 13.7.2.1 SAF for a 3-φ 3-Wire (3P3W) System With Non-Linear Load Condition 366 13.7.2.2 For a PV-Grid System (Constant Irradiance Condition) 368 13.7.2.3 For a PV-SOFC Integrated System 370 13.8 Conclusion 373 References 373 14 Application of Fuzzy Logic in Power Quality Assessment of Modern Power Systems 377V. Vignesh Kumar and C.K. Babulal 14.1 Introduction 378 14.2 Power Quality Indices 379 14.2.1 Total Harmonic Distortion 379 14.2.2 Total Demand Distortion 380 14.2.3 Power and Power Factor Indices 380 14.2.4 Transmission Efficiency Power Factor (TEPF) 381 14.2.5 Oscillation Power Factor (OSCPF) 382 14.2.6 Displacement Power Factor (DPF) 383 14.3 Fuzzy Logic Systems 383 14.4 Development of Fuzzy Based Power Quality Evaluation Modules 384 14.4.1 Stage I: Fuzzy Logic Based Total Demand Distortion 385 14.4.1.1 Performance of FTDDF Under Sinusoidal Situations 388 14.4.1.2 Performance of FTDDF Under Nonsinusoidal Situations 389 14.4.2 Stage II—Fuzzy Representative Quality Power Factor (FRQPF) 390 14.4.2.1 Performance of FRQPF Under Sinusoidal and Nonsinusoidal Situations 393 14.4.3 Stage III—Fuzzy Power Quality Index (FPQI) Module 395 14.4.3.1 Performance of FPQI Under Sinusoidal and Nonsinusoidal Situations 397 14.5 Conclusion 401 References 401 15 Applications of Internet of Things for Microgrid 405Vikram Kulkarni, Sarat Kumar Sahoo and Rejo Mathew 15.1 Introduction 405 15.2 Internet of Things 408 15.2.1 Architecture and Design 409 15.2.2 Analysis of Data Science 410 15.3 Smart Micro Grid: An IoT Perspective 410 15.4 Literature Survey on the IoT for SMG 411 15.4.1 Advanced Metering Infrastructure Based on IoT for SMG 414 15.4.2 Sub-Systems of AMI 414 15.4.3 Every Smart Meter Based on IoT has to Provide the Following Functionalities 416 15.4.4 Communication 417 15.4.5 Cloud Computing Applications for SMG 418 15.5 Cyber Security Challenges for SMG 419 15.6 Conclusion 421 References 423 16 Application of Artificial Intelligent Techniques in Microgrid 429S. Anbarasi, S. Ramesh, S. Sivakumar and S. Manimaran 16.1 Introduction 430 16.2 Main Problems Faced in Microgrid 431 16.3 Application of AI Techniques in Microgrid 431 16.3.1 Power Quality Issues and Control 432 16.3.1.1 Preamble of Power Quality Problem 432 16.3.1.2 Issues with Control and Operation of MicroGrid Systems 433 16.3.1.3 AI Techniques for Improving Power Quality Issues 434 16.3.2 Energy Storage System With Economic Power Dispatch 438 16.3.2.1 Energy Storage System in Microgrid 438 16.3.2.2 Need for Intelligent Approaches in Energy Storage System 440 16.3.2.3 Intelligent Methodologies for ESS Integrated in Microgrid 441 16.3.3 Energy Management System 444 16.3.3.1 Description of Energy Management System 444 16.3.3.2 EMS and Distributed Energy Resources 445 16.3.3.3 Intelligent Energy Management for a Microgrid 446 16.4 Conclusion 448 References 449 17 Mathematical Modeling for Green Energy Smart Meter for Microgrids 451Moloko Joseph Sebake and Meera K. Joseph 17.1 Introduction 451 17.1.1 Smart Meter 452 17.1.2 Green Energy 453 17.1.3 Microgrid 453 17.1.4 MPPT Solar Charge Controller 454 17.2 Related Work 454 17.3 Proposed Technical Architecture 456 17.3.1 Green Energy Smart Meter Architecture 456 17.3.2 Solar Panel 456 17.3.3 MPPT Controller 456 17.3.4 Battery 457 17.3.5 Solid-State Switch 457 17.3.6 Electrical Load 457 17.3.7 Solar Voltage Sensor 457 17.3.8 Batter Voltage Sensor 458 17.3.9 Current Sensor 458 17.3.10 Microcontroller 458 17.3.11 Wi-Fi Module 458 17.3.12 GSM/3G/LTE Module 459 17.3.13 LCD Display 459 17.4 Proposed Mathematical Model 459 17.5 Results 462 Conclusion 468 References 469 18 Microgrid Communication 471R. Sandhya and C. Sharmeela 18.1 Introduction 471 18.2 Reasons for Microgrids 473 18.3 Microgrid Control 474 18.4 Control Including Communication 474 18.5 Control with No Communication 475 18.6 Requirements 478 18.7 Reliability 478 18.8 Microgrid Communication 479 18.9 Microgrid Communication Networks 481 18.9.1 Wi-Fi 481 18.9.2 WiMAX-Based Network 482 18.9.3 Wired and Wireless-Based Integrated Network 482 18.9.4 Smart Grids 482 18.10 Key Aspects of Communication Networks in Smart Grids 483 18.11 Customer Premises Network (CPN) 483 18.12 Architectures and Technologies Utilized in Communication Networks Within the Transmission Grid 485 References 487 19 Placement of Energy Exchange Centers and Bidding Strategies for Smartgrid Environment 491Balaji, S. and Ayush, T. 19.1 Introduction 491 19.1.1 Overview 491 19.1.2 Energy Exchange Centers 492 19.1.3 Energy Markets 493 19.2 Local Energy Centers and Optimal Placement 495 19.2.1 Problem Formulation (Clustering of Local Energy Market) 496 19.2.2 Clustering Algorithm 496 19.2.3 Test Cases 497 19.2.4 Results and Discussions 498 19.2.5 Conclusions for Simulations Based on Modified K Means Clustering for Optimal Location of EEC 501 19.3 Local Energy Markets and Bidding Strategies 503 19.3.1 Prosumer Centric Retail Electricity Market 504 19.3.2 System Modeling 505 19.3.2.1 Prosumer Centric Framework 505 19.3.2.2 Electricity Prosumers 505 19.3.2.3 Modeling of Utility Companies 507 19.3.2.4 Modeling of Distribution System Operator (DSO) 507 19.3.2.5 Supply Function Equilibrium 507 19.3.2.6 Constraints 508 19.3.3 Solution Methodology 509 19.3.3.1 Game Theory Approach 509 19.3.3.2 Relaxation Algorithm 511 19.3.3.3 Bi-Level Algorithm 511 19.3.3.4 Simulation Results 512 19.3.3.5 Nikaido-Isoda Formulation 513 19.3.4 Case Study 513 19.3.4.1 Plots 514 19.3.4.2 Anti-Dumping 514 19.3.4.3 Macro-Control 514 19.3.4.4 Sensitivity Analysis 514 Conclusion 517 References 518 Index 521

    Out of stock

    £164.66

  • Laptops for Dummies

    John Wiley & Sons Inc Laptops for Dummies

    15 in stock

    Book SynopsisTable of ContentsIntroduction 1 Part 1: This Laptop Thing 5 Chapter 1: The Portable Computing Quest 7 Chapter 2: A Laptop of Your Own 21 Part 2: Say Hello to Your Laptop 31 Chapter 3: From Laptop Box to Lap 33 Chapter 4: To Turn On a Laptop 43 Chapter 5: To Turn Off a Laptop 55 Chapter 6: Traditional Laptop Tour 67 Chapter 7: The Tablet PC Tour 81 Chapter 8: Your Laptop and Windows 95 Part 3: Out and About with Mr. Laptop 109 Chapter 9: You and Your Laptop 111 Chapter 10: Portable Power 127 Chapter 11: The Printing Chapter 137 Chapter 12: Expanding Your Laptop’s Universe 149 Chapter 13: O the Places You’ll Go 161 Chapter 14: Presentation Information 171 Chapter 15: A Laptop at Play 181 Part 4: Laptop Networking 197 Chapter 16: The Networking Thing 199 Chapter 17: Network Life in Laptop Land 209 Chapter 18: Your Files from Afar 223 Part 5: Security and Maintenance 231 Chapter 19: Internet Safety 233 Chapter 20: A More Secure Laptop 247 Chapter 21: Laptop Troubleshooting 263 Chapter 22: Laptop Maintenance and Upgrading 271 Part 6: The Part of Tens 277 Chapter 23: Ten Battery Tips and Tricks 279 Chapter 24: Ten Handy Laptop Accessories 287 Chapter 25: Ten Things to Throw in Your Laptop Bag 293 Index 297

    15 in stock

    £20.79

  • Windows 10 Portable Genius

    John Wiley & Sons Inc Windows 10 Portable Genius

    2 in stock

    Book SynopsisTable of ContentsAcknowledgments iii Introduction x Chapter 1 How Do I Customize Windows? 2 Working with Settings 4 Opening the Settings app 4 Synchronizing settings between PCs 6 Accessing an app’s settings 6 Customizing the Start Menu 7 Pinning an app to the Start menu 7 Arranging and sizing Start menu tiles 8 Customizing Start menu settings 9 Customizing the Taskbar 10 Pinning an app to the taskbar 10 Customizing taskbar settings 11 Customizing the taskbar’s notification area 13 Customizing the Lock Screen 15 Changing the Lock screen background 16 Adding an app to the Lock screen 17 Extending Your Desktop with Multiple Monitors 18 Setting Up Multiple Desktops 20 Adding a new desktop 20 Switching to another desktop 21 Moving an app to a different desktop 22 Chapter 2 How Can I Make the Most of Surfing the Web? 24 Taking Advantage of Tabs 26 Opening a link in a new tab 26 Creating a new tab 26 Customizing the new tab page 26 Navigating tabs 28 Duplicating a tab 28 Pinning a tab 28 Controlling which tabs appear at startup 28 Closing tabs 30 Saving Your Favorite Pages 30 Adding a page to the Favorites list 30 Working with the Favorites bar 31 Opening a page from the Favorites list 33 Maintaining favorites 33 Customizing Edge 34 Changing the Edge search engine 34 Changing the theme 35 Setting the default zoom level 36 Customizing the toolbar 37 Customizing the font 39 Chapter 3 How Do I Maximize Sending and Receiving Email? 42 Managing Mail Accounts 44 Adding an account 44 Changing the account name 46 Deleting an account 47 Setting Options for Incoming Messages 47 Customizing account sync settings 48 Combining the Focused and Other tabs 49 Grouping messages individually 49 Controlling notifications 50 Switching between accounts 51 Setting Send Options 51 Creating a signature 51 Setting the default message font 52 Changing your message priority 54 Running the spell-checker to eliminate message errors 55 Chapter 4 Can I Use Windows to Manage Contacts and Appointments? 58 Managing Your Contacts 60 Adding contacts from an existing account 60 Creating a contact 62 Viewing contacts 64 Editing a contact 65 Assigning a photo to a contact 65 Creating a new contact from an electronic business card 67 Filtering your contacts 68 Linking multiple profiles to a contact 69 Deleting a contact 70 Tracking Your Events 71 Viewing your calendar 71 Adding an event to your calendar 72 Creating a recurring event 73 Adding an event reminder 74 Setting up an online meeting 74 Customizing your calendar 76 Chapter 5 What Other Day-to-Day Tasks Can I Perform? 78 Finding Stuff on Your PC 80 Viewing your timeline 80 Searching your PC 80 Configuring the Cortana Voice Assistant 83 Controlling your PC with Cortana 84 Making Video Calls 85 Configuring Skype 85 Calling someone using Skype 86 Dealing with an incoming Skype call 86 Working with Maps 87 Giving Maps access to your location 87 Displaying a location on a map 88 Getting directions to a location 90 Checking the Weather 93 Checking your weather forecast 93 Checking another city’s weather forecast 95 Chapter 6 How Do I Max Out the Windows Image Tools? 96 Getting Images into Your PC 98 Importing images from a smartphone or digital camera 98 Scanning an image 99 Taking a picture or video with your PC camera 101 Viewing Your Images 103 Using File Explorer to view your images 103 Using the Photos app to view your images 104 Starting a slide show 106 Enhancing Your Images 107 Cropping an image 107 Applying a filter 108 Adding a vignette effect 110 Repairing Your Images 111 Rotating an image 111 Straightening an image 111 Adjusting the light 112 Adjusting the colors 114 Enhancing image clarity 115 Getting rid of red eye 115 Fixing small flaws 116 Chapter 7 Can I Share My Computer? 118 Sharing Your PC via User Accounts 120 Creating a user account 120 Switching between accounts 122 Changing your user account picture 125 Changing the account type 126 Deleting an account 127 Sharing Your PC with a Child 127 Adding a child to your PC 128 Setting restrictions on a child’s account 128 Sharing PC Resources 132 Sharing a document or folder 132 Switching to advanced sharing 134 Sharing a folder with other users on the network 135 Protect your shared folders with advanced file permissions 136 chapter 8 How Can I Get More from a Tablet PC? 138 Working in Tablet Mode 140 Controlling Windows with Gestures 141 Understanding gestures 142 Using gestures to control Windows 142 Inputting Text with the Touch Keyboard 143 Displaying the touch keyboard 143 Selecting a touch keyboard type 144 Using the touch keyboard 145 Entering text using the handwriting panel 147 Configuring the touch keyboard 149 Setting Power and Battery Options 149 Monitoring battery life 150 Setting the power mode 150 Adjusting screen brightness 151 Switching to Battery Saver mode 151 Creating a custom power plan to improve battery life 152 Checking out more ways to save energy 153 Chapter 9 How Do I Work with Documents? 156 Editing Documents 158 Creating a new document 158 Saving a document 158 Opening a document 159 Changing the text font 160 Finding text 162 Replacing text 164 Inserting special symbols 165 Saving a copy of a document 167 Taking Notes with OneNote 168 Creating a OneNote notebook 168 Adding pages and sections to a notebook 168 Adding and working with text notes 170 Adding an image to a notebook page 172 Working with notebook lists 173 Working with Files 175 Selecting a file 175 Changing the file view 176 Previewing a file 176 Copying a file 178 Moving a file 178 Renaming a document 179 Creating a new file 180 Deleting a document 181 Extracting files from a compressed folder 183 Specifying a different app when opening a document 185 Chapter 10 What Are Some Ways to Enhance PC Security? 188 Enhancing Sign-In Security 190 Creating a strong password 190 Updating your account password 191 Creating a picture password 192 Signing in with a PIN 193 Setting up a fingerprint sign-in 194 Locking Your PC to Prevent Others from Using It 195 Locking your computer 196 Configuring your PC to lock automatically 196 Enhancing Your Privacy 198 Making the Start menu more private 198 Controlling your private information 199 Stopping an app’s notifications 201 Clearing your activity history 201 Resetting your computer to preserve privacy 202 Chapter 11 How Do I Increase Internet Privacy and Security? 204 Making the Web More Secure 206 Avoiding viruses 206 Opting to never save a site’s password 208 Deleting a saved website password 208 Making the Web More Private 209 Deleting your browsing data to ensure privacy 209 Turning on private browsing 211 Preventing ad sites from tracking you online 211 Enabling strict tracking prevention 212 Preventing sites from requesting your location 213 Enhancing Email Security and Privacy 215 Avoiding viruses in email 215 Preventing messages from opening automatically 216 Thwarting web bugs by blocking images in messages 216 Avoiding phishing scams 217 chapter 12 How Do I Maintain Windows? 220 Performing a Few Maintenance Chores 222 Scheduling automatic maintenance 222 Checking hard drive free space 223 Deleting unnecessary files 225 Safeguarding Your Files 226 Keeping a history of your files 226 Restoring a file from your history 227 Creating a system image backup 228 Using the Windows Recovery Environment 229 Understanding the Recovery Environment’s tools 229 Accessing the Recovery Environment 230 Working with a Recovery Drive 233 Creating the recovery drive 233 Booting your PC using the recovery drive 234 Working with Restore Points 235 Creating a system restore point 235 Reverting to an earlier restore point 235 Index 238

    2 in stock

    £11.99

  • iPad Portable Genius

    John Wiley & Sons Inc iPad Portable Genius

    15 in stock

    Book SynopsisIncrease your iPad IQ with this genius-level guide to the Apple iPad If you want to squeeze every last bit of incredible from your Apple iPad we''ve got you covered with this newly revised iPad Portable Genius. Want to learn how to connect to a network? How to configure your tablet? How to surf the web more comfortably? All while keeping your identity and accounts private and secure? With the iPad Portable Genius as your guide, you''ll unlock the full potential of your iPad in no time at all. You''ll learn how to: Get the most out of sending and receiving your email Have fun with your images and take crystal-clear photos every time Shoot and edit video right on your iPad Manage your busy schedule with calendars Perfect for anyone looking to save time and reveal the true power and flexibility of their iPad, the iPad Portable Genius, Fourth Edition contains all the new, engaging, and extensTable of ContentsAcknowledgments iii Introduction x Chapter 1 How Do Get Started with My iPad? 2 Using the Top Button 4 Sleeping and waking the iPad 5 Turning the iPad off and back on again 5 Making a purchase 6 Using the Home Button 7 Setting the Volume 8 Working with the Touchscreen 8 Understanding touchscreen gestures 9 Searching for stuff on your iPad 9 Switching from one app to another 11 Shutting down an app 11 Typing on the touchscreen keyboard 12 Editing with Your iPad 14 Editing text 14 Selecting, copying, and pasting text 15 Copying and pasting an image 17 Undoing an edit 17 Configuring iPad from the Control Center 18 Chapter 2 How Do I Connect to a Network? 20 Making Wi-Fi Network Connections 22 Displaying nearby Wi-Fi networks automatically 23 Making a connection to a hidden Wi-Fi network 23 Working with Wi-Fi Connections 24 Checking Wi-Fi security 25 Using Wi-Fi to transfer a file from your Mac to your iPad 25 Preventing your iPad from automatically joining a known network connection 26 Shutting off the Wi-Fi antenna 26 Tethering to an iPhone Internet Connection 27 Working with Cellular-Enabled iPads 29 Tracking cellular data usage 29 Shutting off the LTE antenna 29 Preventing your iPad from using cellular data 30 Controlling app access to cellular data 30 Disabling data roaming 30 Switching to Low Data Mode 31 Activating Airplane Mode 31 Connecting Bluetooth Devices 32 Making your iPad discoverable 32 Pairing with a Bluetooth keyboard 33 Pairing with Bluetooth headphones 34 Selecting paired headphones as the audio output device 34 Unpairing your iPad from a Bluetooth device 35 Chapter 3 How Do I Configure My iPad? 36 Customizing the iPad Home Screen 38 Rearranging the Home screen icons 38 Storing multiple app icons in an app folder 39 Adding a web page icon to the Home screen 40 Dealing with App Notifications 41 Opening the Notification Center 41 Working with notifications 42 Configuring an app’s notifications 43 Configuring Do Not Disturb settings 45 Trying Out a Few More Useful iPad Customizations 46 Changing your iPad’s name 46 Customizing iPad sounds 46 Customizing the iPad keyboard 47 Configuring the Siri voice assistant 51 Configuring and using multitasking 52 Controlling your iPad’s privacy settings 54 Configuring your iPad to use Apple Pay 54 Chapter 4 How Can I Get More Out of Web Surfing? 56 Surfing with the Touchscreen 58 Utilizing Pro Tips for Easier Web Browsing 59 Browsing with tabs 59 Opening a tab in the foreground 61 Working with iCloud tabs 62 Viewing a page without distractions 62 Requesting a website’s desktop version 63 Working with bookmarks 64 Adding pages to your Reading List 67 Revisiting pages using the History list 67 Dealing with Forms 68 Filling in forms faster with AutoFill 69 Storing website login data 70 Storing website logins manually 72 Enhancing Web Browsing Privacy 73 Deleting sites from your browsing history 73 Removing website data 74 Browsing privately 75 Making Safari Even Easier and Better 76 Switching the default search engine 76 Searching for text in a web page 76 Searching the web with Siri 77 Sharing a link via AirDrop 78 Chapter 5 How Do I Make the Most of Email? 80 Managing Your Accounts 82 Adding an email account manually 82 Changing the default account 84 Disabling an account 85 Removing an account 85 Switching from one account to another 86 Configuring Some Useful Mail Settings 86 Creating a custom email signature 86 Thwarting spammers by disabling remote images 87 Stopping messages from getting organized by thread 88 Customizing Mail’s swipe options 89 Working with Email Messages 89 Adding iCloud folders 89 Attaching a document from iCloud Drive 90 Formatting message text 90 Maintaining messages with swipe gestures 91 Marking every message as read 92 Controlling email with Siri voice commands 92 Chapter 6 How Can I Have Fun with Photos? 94 Browsing and Viewing Your Photos 96 Navigating and manipulating photos 97 Creating a photo album 98 Marking a photo as a favorite 98 Streaming photos to Apple TV 98 Editing a Photo 99 Enhancing color and brightness 99 Cropping and straightening a photo 100 Applying a filter to a photo 102 Adjusting the lighting in a photo 102 Using the Cameras 103 Launching the Camera app 104 Taking a photo 104 Learning the Camera app’s features 105 Focusing your shot 106 Locking the exposure and focus 106 Zooming in and out of the shot 107 Shooting live photos 108 Shooting a panoramic photo 108 Shooting a photo with a time delay 110 Reducing blurry iPad photos 110 Chapter 7 How Can I Create Video on My iPad? 112 Recording Video 114 Recording video on your iPad 114 Shooting a time-lapse video 116 Setting the recording format for video and slow motion 116 Editing Recorded Video 117 Creating Videos with the Clips App 118 Creating a Clips video 119 Adding a new Clips project 122 Making Movies with iMovie 122 Creating a new iMovie project 122 Opening a project for editing 123 Importing media into your project 124 Working with video clips 126 Working with your project 131 Chapter 8 How Do I Manage My Contacts? 134 Getting Started with Contacts 136 Creating a Contact 137 Editing a Contact 138 Assigning phone numbers to a contact 138 Assigning email addresses to a contact 140 Assigning web addresses to a contact 140 Assigning social media data to a contact 141 Assigning physical addresses to a contact 142 Adding a photo to a contact 143 Deleting a contact 144 Getting More Out of Contacts 145 Creating a custom field label 145 Adding fields to a contact 145 Deleting fields from a contact 146 Creating a new contact from a vCard 147 Sending and receiving a contact via AirDrop 148 Sorting contacts 149 Syncing contacts 149 Chapter 9 How Do I Track My Events and Appointments? 150 Getting Started with the Calendar App 152 Tracking Your Events 153 Adding an event to your calendar 154 Editing an event 154 Repeating an event 155 Converting an event to an all-day event 156 Adding an alert to an event 157 Getting More Out of the Calendar App 158 Setting the default calendar 159 Subscribing to a calendar 159 Controlling events with Siri voice commands 160 Handling Microsoft Exchange meeting requests 161 Working with Reminders 162 Creating a time reminder 162 Creating a location reminder 163 Creating a new list and setting the default list 164 Completing a reminder 164 Deleting a reminder 165 Setting reminders with Siri voice commands 165 Chapter 10 How Can I Navigate My World with iPad? 166 Working with Location Services 168 Controlling how apps access Location Services 168 Shutting off Location Services 170 Mapping Locations 171 Searching for a location 171 Marking a location 173 Flying over your destination 174 Mapping your current location 174 Mapping a contact’s address 176 Mapping an address from an email 177 Saving a location as a favorite 177 Sharing a map 178 Mapping locations with Siri voice commands 178 Navigating with Maps 178 Getting directions to a location 179 Getting live traffic information 180 Getting directions with Siri voice commands 181 Chapter 11 How Do I Protect My iPad? 182 Locking Your iPad 184 Locking your iPad with a passcode 184 Locking your iPad with a fingerprint 186 Locking your iPad with facial recognition 188 Configuring Your Tablet to Sleep Automatically 190 Backing Up Your Tablet 190 Setting Restrictions on a Child’s iPad 191 Chapter 12 How Do I Solve iPad Problems? 194 Troubleshooting iPad Problems: A Quick Guide 196 Troubleshooting iPad Problems Step-by-Step 196 Step 1: Shut down whatever app you’re using 197 Step 2: Restore a changed setting 198 Step 3: Shut down and then restart your iPad 198 Step 4: Reboot the iPad hardware 200 Step 5: Recharge your iPad 200 Step 6: Check for iPadOS updates 200 Step 7: Free up storage space 201 Step 8: Check your Wi-Fi connection 202 Step 9: Reset your settings 204 Step 10: Erase and restore your content and settings 205 Index 208

    15 in stock

    £13.59

  • iPhone Portable Genius

    John Wiley & Sons Inc iPhone Portable Genius

    1 in stock

    Book SynopsisYour step-by-step guide to iPhone mastery iPhone Portable Genius delivers a practical and simple guide to quickly learning everything you need to know about the iPhone. Whether you''re a novice user with Apple products or a seasoned pro, you''ll find a wealth of info designed to show you how to configure your iPhone, set up accounts, manage your contacts and appointments, take stunning pictures, and surf the web. All while keeping your identity and accounts private and secure. Before you know it, you''ll be: Mastering the touchscreen Setting up your iPhone to suit the way you work and play Connecting your iPhone to Wi-Fi and setting up your phone as an internet hub Solving the most common iPhone problems Getting the most out of email With straightforward and step-by-step instructions in a portable and convenient package and engaging illustrations, iPhone Portable Genius is the ideal resTable of ContentsAcknowledgments iv Introduction x Chapter 1 How Do I Start Using My iPhone? 2 Working with the Side Button 4 Sleeping and waking the iPhone 5 Powering the iPhone on and off 5 Silencing or declining a call 7 Making a purchase 7 Working with the Ring/Silent Switch 8 Operating the Volume Controls 8 Inserting a SIM Card 9 Operating the Touchscreen 10 Navigating the touchscreen 10 Searching your iPhone 11 Switching between running apps 13 Typing on the keyboard 13 Running Your iPhone from the Control Center 19 Chapter 2 How Do I Configure My iPhone? 22 Customizing the Home Screen 24 Creating an app folder 24 Adding a web page bookmark to the Home screen 26 Working with App Notifications 26 Displaying the Notification Center 27 Handling notifications within the Notification Center 27 Customizing notifications 28 Configuring Do Not Disturb settings 30 More Useful iPhone Configuration Techniques 31 Changing the name of your iPhone 32 Turning sounds on and off 32 Customizing the keyboard 33 Setting up Apple Pay 35 Configuring Siri 38 Controlling your privacy 39 Protecting Your iPhone 39 Locking your iPhone with a passcode 39 Unlocking your iPhone biometrically 40 Configuring parental controls 41 Locating and protecting a lost iPhone 41 Chapter 3 How Do I Connect My iPhone to a Network? 46 Connecting to a Wi-Fi Network 48 Making your first connection 48 Showing available Wi-Fi networks automatically 49 Connecting to known networks 50 Connecting to a hidden Wi-Fi network 50 Sending a file from your Mac to your iPhone 51 Forgetting a Wi-Fi network 52 Turning off the Wi-Fi antenna 53 Setting Up Your iPhone as an Internet Hub 53 Activating the Personal Hotspot 54 Connecting to the hotspot using Wi-Fi 54 Keeping an Eye on Your Data Usage 55 Controlling Network Data 56 Turning off LTE 56 Turning off cellular data 56 Controlling cellular data usage 57 Turning off data roaming 58 Switching to Low Data Mode 58 Switching your iPhone to Airplane Mode 58 Pairing Your iPhone to Bluetooth Devices 59 Making your iPhone discoverable 60 Pairing your iPhone with a Bluetooth keyboard 60 Pairing your iPhone with a Bluetooth headset 61 Selecting a paired headset as the audio output device 62 Unpairing your iPhone from a Bluetooth device 62 Chapter 4 How Can I Get More Out of the Phone App? 64 Working with Outgoing Calls 66 Making calls quickly 66 Automatically dialing extensions or menu options 68 Voice dialing a call with Siri 68 Configuring your iPhone not to show your caller ID 70 Handling Incoming Calls 70 Answering a call on other devices 70 Sending an incoming call directly to voicemail 71 Replying with a message 71 Setting a callback reminder 73 Turning off the call waiting feature 73 Blocking incoming calls 73 Forwarding calls to another number 74 Juggling Multiple Calls and Conference Calls 75 Managing Your Favorites List 77 Chapter 5 How Can I Make the Most of iPhone Web Surfing? 80 Touchscreen Tips for Web Sites 82 Browsing Tips for Faster Surfing 83 Opening and managing multiple browser tabs 84 Opening a tab in the background 86 Viewing a page without distractions 86 Requesting a web site’s desktop version 86 Saving sites as bookmarks 89 Managing your bookmarks 89 Saving a page to read later 90 Retracing your steps with the handy History list 91 Filling in Online Forms 91 Turning on AutoFill for faster form input 93 Saving web site login passwords 94 Adding web site passwords manually 97 Getting More Out of Safari on Your iPhone 97 Maintaining your privacy by deleting the History list 97 Deleting website data 98 Browsing privately 99 Changing the default search engine 100 Searching web page text 100 Searching the web with Siri voice commands 101 Sharing a link via AirDrop 102 Chapter 6 How Do I Maximize iPhone Email? 104 Managing Your iPhone Email Accounts 106 Adding an account by hand 106 Specifying the default account 108 Temporarily disabling an account 109 Deleting an account 110 Switching to another account 110 Configuring Email Accounts 111 Managing multiple devices by leaving messages on the server 111 Fixing outgoing email problems by using a different server port 112 Configuring authentication for outgoing mail 113 Configuring Email Messages 114 Creating iCloud message folders 114 Attaching a file from iCloud Drive 115 Formatting email text 115 Creating a custom iPhone signature 116 Disabling remote images in messages 117 Preventing Mail from organizing messages by thread 118 Maintaining messages with gestures 119 Configuring Mail’s swipe options 119 Marking all messages as read 120 Controlling email with Siri voice commands 120 Chapter 7 How Do I Max Out My iPhone’s Photo and Video Features? 122 Taking Great iPhone Pictures 124 Taking a basic photo 124 Checking out the iPhone camera features 126 Focusing the shot 127 Locking the focus and exposure 128 Shooting in low light with Night Mode 128 Taking live photos 130 Taking a portrait photo 130 Taking a panoramic photo 132 Changing the zoom level 133 Changing the aspect ratio 134 Applying a filter 135 Taking a time-delayed photo 135 Taking time-lapse photos 136 Preventing blurry iPhone photos 136 Getting More Out of iPhone Photos 137 Scrolling, rotating, zooming, and panning photos 138 Enhancing a photo 139 Cropping and straightening 139 Applying a filter 141 Adjusting a photo’s lighting 141 Creating a photo album 142 Getting More Out of iPhone Videos 143 Recording video with an iPhone camera 143 Setting the recording format for video and slo-mo 144 Editing recorded video 145 Playing iPhone videos on your TV 147 Streaming iPhone video to Apple TV 148 Mirroring the iPhone screen on your TV 148 Chapter 8 Can I Use My iPhone to Manage Contacts and Appointments? 150 Managing Your Contacts 152 Creating a new contact 152 Editing an existing contact 153 Adding a photo to a contact 154 Creating a custom label 154 Managing contacts with Siri voice commands 155 Tracking Your Events 156 Adding an event to your calendar 156 Editing an existing event 157 Setting up a repeating event 157 Converting an event to an all-day event 158 Adding an alert to an event 158 Controlling events with Siri voice commands 160 Creating Reminders 161 Setting a reminder for a specific time 162 Setting a reminder for a specific location 163 Creating a new list 164 Completing a reminder 164 Deleting a reminder 165 Setting the default Reminders list 165 Setting reminders with Siri voice commands 165 Chapter 9 How Do I Use My iPhone to Navigate My World? 168 Finding Your Way with Maps and GPS 170 Searching for a destination 171 Getting info about a destination 172 Displaying your current location 172 Seeing what’s near you 174 Displaying a map of a contact’s location 174 Mapping an address from an email 175 Specifying a location when you don’t know the exact address 176 Getting directions to a location 177 Getting more info about a location 179 Controlling Maps with Siri voice commands 180 Configuring Location Services 180 Turning off location services 181 Controlling app access to GPS 181 Enabling or disabling system location services 182 Sharing Map Data 183 Chapter 10 How Do I Keep My Life in Sync with iCloud? 184 Understanding iCloud 186 Understanding iCloud System Support 187 Configuring iCloud on Your iPhone 187 Setting up your iCloud account on your iPhone 188 Setting up iCloud synchronization on your iPhone 189 Setting up and using Family Sharing 189 Setting up iCloud Keychain 191 Backing up your iPhone 192 Managing your iCloud storage 192 Changing your iCloud storage plan 194 Upgrading to iCloud Drive 194 Configuring iCloud on Your Mac 195 Setting up an iCloud account on your Mac 195 Setting up iCloud synchronization on your Mac 195 Configuring iCloud on Your Windows PC 196 Chapter 11 How Do I Fix My iPhone? 198 General Techniques for Troubleshooting Your iPhone 200 Troubleshooting connected devices 201 Resetting the iPhone 202 Erasing and restoring data and settings 204 Updating software 205 Taking Care of the iPhone Battery 205 Tracking battery use 206 Checking battery health 207 Tips for extending battery life 208 Solving Specific Problems 211 The iPhone screen won’t respond to taps 212 Your battery won’t charge 212 You have trouble accessing a Wi-Fi network 212 An app is taking up a large amount of space 214 Index 218

    1 in stock

    £11.99

  • Mastering Linux System Administration

    John Wiley & Sons Inc Mastering Linux System Administration

    15 in stock

    Book SynopsisAchieve Linux system administration mastery with time-tested and proven techniques In Mastering Linux System Administration, Linux experts and system administrators Christine Bresnahan and Richard Blum deliver a comprehensive roadmap to go from Linux beginner to expert Linux system administrator with a learning-by-doing approach. Organized by do-it-yourself tasks, the book includes instructor materials like a sample syllabus, additional review questions, and slide decks. Amongst the practical applications of the Linux operating system included within, you'll find detailed and easy-to-follow instruction on: Installing Linux servers, understanding the boot and initialization processes, managing hardware, and working with networksAccessing the Linux command line, working with the virtual directory structure, and creating shell scripts to automate administrative tasksManaging Linux user accounts, system security, web and database servers, and virtualization environments Perfect for entry-level Linux system administrators, as well as system administrators familiar with Windows, Mac, NetWare, or other UNIX systems, Mastering Linux System Administration is a must-read guide to manage and secure Linux servers.Table of ContentsIntroduction xxv Part 1 Basic Admin Functions 1 Chapter 1 Understanding the Basics 3 What is Linux? 3 Looking into the Linux Kernel 4 The GNU Utilities 12 Linux User Interfaces 12 Linux Distributions 18 Core Linux Distributions 19 Specialized Linux Distributions 19 The Bottom Line 20 Chapter 2 Installing an Ubuntu Server 23 Pre-Installation Requirements 23 Hardware Requirements 24 Virtual Server Requirements 25 Finding the Software 26 Oracle VirtualBox 26 Ubuntu Server 26 Running the Installation 29 Oracle VirtualBox 29 Ubuntu Server 33 Checking the Installation 49 The Bottom Line 50 Chapter 3 Installing and Maintaining Software in Ubuntu 53 Exploring Package Management 53 Inspecting the Debian-Based Systems 54 Managing Packages with apt 54 Installing Software Packages with apt 56 Upgrading Software with apt 59 Uninstalling Software with apt 60 The apt Repositories 61 Using Snap Containers 62 Installing from Source Code 64 The Bottom Line 66 Chapter 4 Installing a Red Hat Server 69 Pre-Installation Requirements 69 Hardware Requirements 70 Virtual Server Requirements 71 Finding the Software 72 Oracle VirtualBox 72 CentOS 73 Running the Installation 76 Oracle VirtualBox 77 CentOS 77 Checking the Installation 96 The Bottom Line 97 Chapter 5 Installing and Maintaining Software in Red Hat 99 Exploring Red Hat Packages 99 Automated Package Management 100 Listing Installed Packages 100 Installing Software with dnf 102 Upgrading Software with dnf 104 Uninstalling Software with dnf 104 Handling Broken Dependencies 105 Working with RPM Repositories 106 Working Directly with Packages 107 Finding Package Files 107 Inspecting Package Files 108 Installing Package Files 109 Removing Package Files 110 Using Flatpak Containers 111 The Bottom Line 113 Chapter 6 Working with the Shell 115 Exploring the Shell 115 The Shell Prompt 116 The Shell Manual 117 Working with Commands 121 Entering Commands 121 Retrieving Past Commands 123 Redirecting Commands 125 Environment Variables 129 Global Environment Variables 129 User-Defined Environment Variables 131 The Bottom Line 133 Chapter 7 Exploring Linux File Management 135 Filesystem Navigation 135 The Linux Filesystem 135 Traversing Directories 138 Linux Files 139 Determining File Types 139 Filenames 140 Hidden Files 140 File Inodes 141 File and Directory Listing 142 Basic Listing 142 Modifying Listing Information 143 The Complete Parameter List 143 Directory Handling 146 Creating Directories 146 Deleting Directories 146 File Handling 147 Creating Files 147 Copying Files 148 Linking Files 150 Renaming Files 152 Deleting Files 152 File Features 154 Using Wildcards 154 Quoting 155 Case Sensitivity 156 Finding Files 156 The which Command 156 The locate Command 156 The whereis Command 157 The find Command 157 Archiving Files 159 Compressing Files 159 Creating Archive Files 160 Archiving Scenarios 161 The Bottom Line 163 Chapter 8 Working with Text Files 165 The vim Editor 165 Checking Your vim Editor Program 166 Using the vim Editor 167 The nano Editor 170 Working with Data Files 172 Sorting 172 Searching 175 Compressing 181 Archiving 182 The Bottom Line 187 Part 2 Intermediate Admin Functions 189 Chapter 9 Managing Hardware 191 Device Driver Modules 191 Listing Installed Modules 192 Installing New Modules 193 Removing Modules 196 Communicating with Devices 196 Device Interfaces 196 The /dev Directory 198 The /proc Directory 199 The /sys Directory 202 Working with Devices 203 Finding Devices 203 Working with PCI Cards 205 Working with USB Devices 206 Using Hot Pluggable Devices 207 Detecting Dynamic Devices 208 Working with Dynamic Devices 208 The Bottom Line 209 Chapter 10 Booting Linux 211 Understanding the Boot Process 211 Overview of the Boot Process 211 Watching the Boot Process 212 The Firmware Startup 212 The GRUB2 Bootloader 214 Configuring the GRUB2 Bootloader 215 Exploring the GRUB2 Configuration 215 Interacting with GRUB2 217 The systemd Initialization Process 219 Exploring Unit Files 220 Focusing on Service Unit Files 221 Focusing on Target Unit Files 225 Changing a Unit Configuration File 226 Changing the systemd Configuration File 227 Looking at systemctl 227 Jumping Targets 230 Analyzing with systemd 232 The Bottom Line 234 Chapter 11 Working with Storage Devices 235 Storage Basics 235 Drive Connections 235 Partitioning Drives 236 Automatic Drive Detection 236 Partitioning Tools 237 Working with fdisk 237 Working with gdisk 239 The GNU parted Command 241 Formatting Filesystems 243 Common Filesystem Types 243 Creating Filesystems 245 Mounting Filesystems 246 Manually Mounting Devices 246 Automatically Mounting Devices 247 Managing Filesystems 249 Retrieving Filesystem Stats 249 Filesystem Tools 250 Storage Alternatives 251 Multipath 251 Logical Volume Manager 251 Using RAID Technology 253 The Bottom Line 254 Chapter 12 Configuring Network Settings 255 Network Settings 255 Ubuntu Servers 256 Red Hat Servers 258 Using Network Command-Line Tools 260 NetworkManager Tools 260 Other Tools 262 Basic Network Troubleshooting 269 Sending Test Packets 269 Finding Host Information 271 Advanced Network Troubleshooting 273 The netstat Command 273 Examining Sockets 276 The Bottom Line 277 Chapter 13 Managing Users and Groups 279 Understanding Linux Permissions 279 Understanding Ownership 280 Controlling Access Permissions 282 Exploring Special Permissions 284 Managing Default Permissions 285 Using Access Control Lists 288 Managing User Accounts 290 Adding Accounts 290 Maintaining Accounts 298 Removing Accounts 301 Maintaining the Environment 302 Setting Environment Variables 302 Exploring User Entries 302 Exploring Global Entries 303 Managing Groups 304 Adding Groups 305 Removing Groups 306 The Bottom Line 307 Chapter 14 Working with Processes and Jobs 309 Looking at Processes 309 Monitoring Processes in Real Time 311 Managing Processes 314 Setting Priorities 314 Stopping Processes 315 Running Programs in Background Mode 317 Running in the Background 317 Running Multiple Background Jobs 318 Running Programs Without a Console 319 Job Control 320 Viewing Jobs 320 Restarting Stopped Jobs 322 Scheduling Jobs 323 Scheduling a Job Using the at Command 323 Scheduling Recurring Programs 326 The Bottom Line 328 Chapter 15 Managing Log Files 329 The systemd Journaling System 329 Configuring systemd-journald 330 Looking at Journal Files 331 Making the Journal Persistent 332 Viewing Journal Entries 332 Maintaining the Journal 335 Viewing Different Journal Files 337 Protecting Journal Files 337 Making Journal Entries 337 The rsyslog Legacy System 338 The syslog Protocol 338 Basic Logging Using rsyslogd 340 Layering Your Logging 342 Making Log Entries 343 Finding Event Messages 344 The Bottom Line 344 Chapter 16 Managing Printers 347 The Common Unix Printing System 347 Printer Drivers 347 Web Interface 348 Command-Line Commands 348 Printer Sharing 349 Printer Classes 350 Installing and Configuring CUPS 350 Installing CUPS 351 Preparing the Server to Use CUPS 354 Using CUPS 356 Administration Functions 356 Managing Printers and Jobs in CUPS 360 The Bottom Line 361 Part 3 Advanced Admin Functions 363 Chapter 17 Exploring Ubuntu Security 365 Locking Down Root 365 Looking at Linux Account Types 366 Gaining Super User Privileges 367 Using OpenSSH on Ubuntu 369 Exploring Basic SSH Concepts 370 Configuring SSH 372 Generating SSH Keys 373 Authenticating with SSH Keys 374 The AppArmor System 376 Network Security Using Firewalls 380 Understanding UFW 380 Configuring UFW 381 The Bottom Line 385 Chapter 18 Exploring Red Hat Security 387 Working with Root Access 387 Keeping Track of Root Logins 388 Disabling Root Access from SSH 388 Enabling Automatic Logout 389 Blocking Root Access 390 Using SELinux 391 Enabling SELinux 391 Understanding Security Context 392 Using Policies 393 Network Security Using Firewalls 395 Red Hat Firewall Concepts 395 Checking the Firewall Status 397 Working with Zones 398 Working with Firewall Rules 399 The Bottom Line 401 Chapter 19 Writing Scripts 403 Beginning a Shell Script 403 Creating a Script File 403 Displaying Messages 405 Using Variables 407 Environment Variables 407 User Variables 408 Command Substitution 409 Exiting the Script with Status 410 Passing Parameters 411 Adding Conditional Expressions 414 Working with the if-then Statement 414 Using Compound Tests 417 Working with the if-then-else Statement 418 Trying the case Statement 419 Using Loops 420 Looking at the for Command 420 Working with the while Format 423 Using the until Command 424 Using Functions 427 Creating Functions 427 Calling Functions 427 The Bottom Line 430 Chapter 20 Managing Web Servers 433 Linux Web Servers 433 Apache 433 nginx 434 The Apache Web Server 435 Installing an Apache Server 435 Configuring the Apache Server 437 Hosting Dynamic Web Applications 445 Creating a Secure Web Server 447 The nginx Server 448 Installing nginx 448 Configuring nginx 449 The Bottom Line 451 Chapter 21 Managing Database Servers 453 Linux Database Servers 453 Organizing the Data 454 Querying the Data 455 Controlling the Data 456 Installing and Using MySQL/MariaDB 457 Conducting a MariaDB Installation 458 Accessing a MariaDB Database 462 Populating and Using MariaDB Database 466 Installing and Using PostgreSQL 471 Conducting a PostgreSQL Installation 471 Accessing a PostgreSQL Database 474 Populating and Using a PostgreSQL Database 477 The Bottom Line 478 Chapter 22 Exploring the Virtualization Environment 481 Hypervisors 481 Managing VMs 481 Creating a Virtual Machine 483 Integrating via Linux Extensions 485 Containers 486 Exploring Container Types 487 Looking at Container Software 487 Organizing Containers 489 Software Packaging 491 Looking at Ubuntu Snap 491 Looking at Flatpak 499 The Bottom Line 503 Appendix The Bottom Line 505 Chapter 1: Understanding the Basics 505 Chapter 2: Installing an Ubuntu Server 506 Chapter 3: Installing and Maintaining Software in Ubuntu 507 Chapter 4: Installing a Red Hat Server 509 Chapter 5: Installing and Maintaining Software in Red Hat 510 Chapter 6: Working with the Shell 512 Chapter 7: Exploring Linux File Management 513 Chapter 8: Working with Text Files 515 Chapter 9: Managing Hardware 516 Chapter 10: Booting Linux 517 Chapter 11: Working with Storage Devices 519 Chapter 12: Configuring Network Settings 520 Chapter 13: Managing Users and Groups 521 Chapter 14: Working with Processes and Jobs 523 Chapter 15: Managing Log Files 524 Chapter 16: Managing Printers 526 Chapter 17: Exploring Ubuntu Security 527 Chapter 18: Exploring Red Hat Security 528 Chapter 19: Writing Scripts 529 Chapter 20: Managing Web Servers 532 Chapter 21: Managing Database Servers 533 Chapter 22: Exploring the Virtualization Environment 535 Index 537

    15 in stock

    £28.49

  • iMac For Dummies

    John Wiley & Sons Inc iMac For Dummies

    15 in stock

    Book SynopsisTable of ContentsIntroduction 1 Part 1: Getting Started with Your iMac 5 Chapter 1: Okay, This Machine Looks Really, Really Weird 7 Chapter 2: Life! Give My iMac Life! 25 Chapter 3: The Basics Behind macOS Monterey 33 Part 2: Shaking Hands with macOS 77 Chapter 4: What’s New in Monterey? 79 Chapter 5: A Nerd’s Guide to System Preferences 85 Chapter 6: Searching Amidst iMac Chaos 107 Chapter 7: Putting Common Apps to Work 117 Part 3: Connecting and Communicating 135 Chapter 8: Let’s Go on Safari! 137 Chapter 9: Expanding Your Horizons with iCloud 159 Chapter 10: Creating a Multiuser iMac 167 Chapter 11: Working Well with Networks 187 Chapter 12: Hooking Up with Handy Helpers 207 Part 4: Living the Digital Life 219 Chapter 13: The Multimedia Joys of Music and TV 221 Chapter 14: Focusing on Photos 245 Chapter 15: Making Film History with iMovie 265 Chapter 16: Recording Your Hits with GarageBand 285 Part 5: Getting Productive with Your iMac 303 Chapter 17: Desktop Publishing with Pages. 305 Chapter 18: Creating Spreadsheets with Numbers 319 Chapter 19: Building Presentations with Keynote 335 Part 6: The Necessary Evils: Troubleshooting, Upgrading, and Maintaining 349 Chapter 20: It Just Sits There 351 Chapter 21: I Want to Add Stuff 365 Chapter 22: Tackling the Housekeeping 377 Part 7: The Part of Tens 393 Chapter 23: Ten Ways to Speed Up Your iMac 395 Chapter 24: Ten Things to Avoid Like the Plague 401 Index 409

    15 in stock

    £18.39

  • CompTIA Linux Certification Kit

    John Wiley & Sons Inc CompTIA Linux Certification Kit

    7 in stock

    Book Synopsis

    7 in stock

    £52.50

  • TI84 Plus CE Graphing Calculator For Dummies

    John Wiley & Sons Inc TI84 Plus CE Graphing Calculator For Dummies

    3 in stock

    Book SynopsisTable of ContentsIntroduction 1 Part 1: Making Friends with the Calculator 5 Chapter 1: Starting with the Basics 7 Chapter 2: Doing Basic Arithmetic 25 Chapter 3: Dealing with Fractions 35 Chapter 4: Solving Equations 41 Part 2: Taking Your Calculator Relationship to the Next Level 53 Chapter 5: Working with Complex Numbers 55 Chapter 6: Understanding the Math Menu and Submenus 61 Chapter 7: The Angle and Test Menus 69 Chapter 8: Creating and Editing Matrices 79 Part 3: Graphing and Analyzing Functions 89 Chapter 9: Graphing Functions 91 Chapter 10: Exploring Functions 111 Chapter 11: Evaluating Functions 127 Chapter 12: Graphing Inequalities 143 Chapter 13: Graphing Parametric Equations 155 Chapter 14: Graphing Polar Equations 163 Part 4: Working with Probability and Statistics 173 Chapter 15: Probability 175 Chapter 16: Dealing with Statistical Data 183 Chapter 17: Analyzing Statistical Data 193 Part 5: Doing More with Your Calculator 209 Chapter 18: Communicating with a PC Using TI Connect CE Software 211 Chapter 19: Communicating Between Calculators 221 Chapter 20: Fun with Images 227 Chapter 21: Managing Memory 231 Part 6: The Part of Tens 237 Chapter 22: Ten Essential Skills 239 Chapter 23: Ten Common Errors 243 Chapter 24: Ten Common Error Messages 249 Part 7: Appendices 253 Appendix A: Creating Calculator Programs 255 Appendix B: Controlling Program Input and Output 259 Appendix C: Controlling Program Flow 269 Appendix D: Introducing Python Programming 281 Appendix E: Mastering the Basics of Python Programming 287 Index 293

    3 in stock

    £19.79

  • Quantum Computing For Dummies

    John Wiley & Sons Inc Quantum Computing For Dummies

    15 in stock

    Book SynopsisTable of ContentsIntroduction 1 Part 1: The Power of Quantum Computing 7 Chapter 1: Quantum Computing Boot Camp 9 Chapter 2: Looking Back to Early and Classical Computing 27 Chapter 3: Examining the Roots of Quantum Computing 47 Chapter 4: Introducing Quantum Technology 1.0 69 Chapter 5: Unveiling Quantum Computing 83 Chapter 6: Quantum Computing Accelerates 99 Part 2: Quantum Computing Options 113 Chapter 7: Choosing Between Classical and Quantum Computing 115 Chapter 8: Getting Started with Quantum Computing 131 Chapter 9: It’s All about the Stack 153 Chapter 10: Racing for the Perfect Qubit 173 Chapter 11: Choosing a Qubit Type 187 Part 3: Getting Entangled with Quantum Computing 207 Chapter 12: Programming a Quantum Computer 209 Chapter 13: Quantum Computing Applications 237 Chapter 14: Quantum Computing Algorithms 255 Chapter 15: Cloud Access Options 281 Chapter 16: Educational Resources 305 Part 4: The Part of Tens 327 Chapter 17: Ten Myths Surrounding Quantum Computing 329 Chapter 18: Ten Tech Questions Answered 339 Chapter 19: Ten Business Questions Answered 347 Chapter 20: Ten University Research Programs 355 Index 361

    15 in stock

    £18.39

  • XDA Developers Android Hackers Toolkit

    John Wiley & Sons Inc XDA Developers Android Hackers Toolkit

    15 in stock

    Book SynopsisMake your Android device truly your own Are you eager to make your Android device your own but you''re not sure where to start? Then this is the book for you. XDA is the world''s most popular resource for Android hacking enthusiasts, and a huge community has grown around customizing Android devices with XDA. XDA''s Android Hacker''s Toolkit gives you the tools you need to customize your devices by hacking or rooting the android operating system. Providing a solid understanding of the internal workings of the Android operating system, this book walks you through the terminology and functions of the android operating system from the major nodes of the file system to basic OS operations. As you learn the fundamentals of Android hacking that can be used regardless of any new releases, you''ll discover exciting ways to take complete control over your device. Teaches theory, preparation and practice, and understanding of the OS Explains the distTable of ContentsForeword xv Introduction 1 First Things First: What Is XDA? 1 The Dragons that Lie Ahead 3 Who This Book Is For 6 What This Book Covers 6 How This Book Is Structured 6 What You Need to Use This Book 7 Part I: What You Need to Know 9 Chapter 1: Android OS Internals: Understanding How Your Device Starts 11 The Penguin Down Below 12 How Your Android Device Starts 13 Bootstrapping 13 Adding a Custom Bootloader 15 Understanding the Bootloader Process 15 Custom Recoveries: The Holy Grail 17 Chapter 2: Rooting Your Android Device 21 Why Should You Root? 22 Increasing the Service Life of the Device 22 Fixing OEM Defects 23 Increasing Capability 24 Customizing the Device 25 Backing Up Data 26 Contact Information 26 Applications and Their Data 27 Data on the SD Card 27 How You Can Root and Leave Your OEM’s Control 28 OEM Flash Software 28 Exploits 30 Native Fastboot Flash 31 Scripted and One-Click Methods 31 Rooting Two Devices 32 Nexus One 32 HTC Thunderbolt 33 The Root of It All 34 Chapter 3: The Right Tool for the Job 37 Ready, Set, . . . Wait I Have to Have What? 38 Connecting a Phone to a Computer 38 Hacking Tools 38 USB Cables 39 USB Debugging 40 What’s Driving This Thing? 41 Using the Android Debug Bridge 42 Checking Device Connectivity 43 Restarting the ADB Service 44 Copying Files to and from Your Device 45 Rebooting a Device 48 The Power of Fastboot 49 Unlocking a Device 50 Updating a Device 50 Flashing a Device 50 Rebooting a Device 51 Harnessing the Power of the Penguin with ADB Shell 51 File System Navigation 52 File Management 54 File Access Permissions 57 Redirection and Piping 60 Concatenation 60 BusyBox: Giving the Penguin Back Its Power 61 The dd Command 61 The echo Command 62 The md5sum Command 62 Chapter 4: Rooting and Installing a Custom Recovery 63 How to Use Exploits 64 Exploit Scripts 64 Exploit Applications 65 Using a Script or Application on a Device 66 Hacking Utilities 68 OEM Tools 68 Developer Utilities 68 Image Files 68 Recovery Mode 69 What Is Recovery Mode? 69 Make It All So Easy: Get A Custom Recovery! 70 Using ClockworkMod Recovery 71 Rebooting the Device 72 Updating a Device from the SD Card 72 Resetting a Device to Factory Condition 74 Wiping the Cache 74 Installing a Zip File from the SD Card 74 Backing Up and Restoring a Device 76 Mounting Partitions and Managing Storage 79 Advanced Functions 79 Backup and Disaster Recovery 81 Precautions for Success and Data Recovery 82 Backing Up Applications 83 Backing Up Through a Recovery Process 83 Backing Up Through an Application 84 What Happens If It Goes Really Wrong? 84 Chapter 5: Theming: Digital Cosmetic Surgery 87 Changing the Look and Feel of Android 88 Theming the Launcher 89 Theming with an Add-on Launcher 89 Tools Used in Theming 89 APKManager 89 Android SDK 90 Eclipse 90 A ROM of Your Choice 91 7-Zip 91 Paint.NET 91 Update.zip Creator 91 Amend2Edify 92 The Editing Process 92 Walkthrough for Creating Theme Files 92 Walkthrough for Creating a Flashable ZIP File 97 Chapter 6: You’ve Become Superuser: Now What? 99 Popular Multi-Device Custom ROMs 100 CyanogenMod 100 Android Open Kang Project 101 VillainROM 101 Kernel Tweaks 101 Backlight Notifications 101 Voodoo Enhancements 102 Performance and Battery Life Tweaks 103 Root Applications 103 SetCPU 103 Adfree Android 104 Chainfire 3D 104 Titanium Backup 105 Part II: Manufacturer Guidelines and Device-specific Guides 107 Chapter 7: HTC EVO 3D: A Locked Device 109 Obtaining Temporary Root 110 Using S-OFF and Permanent Root Requirements 111 Running the Revolutionary Tool 112 Installing a Custom Recovery 115 Installing the Superuser Binary 116 Installing a SuperUser Application 117 Chapter 8: Nexus One: An Unlockable Device 119 Root Methods Available 120 Resources Required for This Walkthrough 120 Walkthrough 121 Placing the Nexus One in Fastboot Mode 122 Flashing a Boot Partition 123 Getting Full Root Access 124 Installing a Custom Recovery 125 Chapter 9: HTC ThunderBolt: A Tightly Locked Device 127 Root Methods Available 128 Resources Required for This Walkthrough 128 Walkthrough 129 Pushing Files to the Device 129 Gaining Temporary Root 130 Checking a File’s MD5 Signature 131 Writing the Temporary Bootloader 131 Downgrading the Firmware 132 Gaining Temporary Root to Unlock the mmc 133 Rewriting the Bootloader 134 Upgrading the Firmware 135 Chapter 10: Droid Charge: Flashing with ODIN 137 Resources Required for This Walkthrough 138 Walkthrough 138 Connecting the Device to ODIN 138 Flashing the Device 139 Troubleshooting 140 Chapter 11: Nexus S: An Unlocked Device 143 Connecting the Device to a PC 144 Resources Required for This Walkthrough 144 Walkthrough 144 Unlocking the Device 144 Flashing the Device with a Recovery 145 Flashing the Device with the SuperUser Application 146 Chapter 12: Motorola Xoom: An Unlocked Honeycomb Tablet 147 Resources Required for This Walkthrough 148 Walkthrough 148 Pushing the Root File to the SD Card 148 Unlocking the Xoom 148 Flashing the Device with a Recovery 149 Flashing the Device with a Universal Root 150 Chapter 13: Nook Color: Rooting with a Bootable SD Card 153 Resources Required for This Walkthrough 154 Walkthrough 154 Creating a Bootable SD Card 155 Booting the Device from the SD Card 155 Making the Device More Usable 156 Appendix A: Setting Up Android SDK and ADB Tools 159 Installing the Java Development Kit 160 Installing the Android SDK 161 Installing the Platform Tools 162 Setting Up Windows Environment Variables 163 Index 165

    15 in stock

    £18.39

  • macOS Sonoma For Dummies

    John Wiley & Sons Inc macOS Sonoma For Dummies

    15 in stock

    Book SynopsisMake friends with macOS Sonoma thanks to simple, Dummies-style instructions macOS Sonoma For Dummies is the go-to guide for finding your way around Apple's laptop and desktop operating system. For first-time Mac owners and longtime Apple aficionados alike, this book covers the essentials you need to navigate macOS Sonoma with ease. Get a guided tour of the latest updates to macOS widgets, improved video conferencing features, updated privacy and security help, and all the classic features of the software that powers MacBook, iMac, and Mac computers. With easy-to-follow instructions and crystal-clear illustrations, this Dummies guide makes you macOS proficient in no timeeven if you've never used a Mac computer before. Learn the ins and outs of macOS Sonoma for desktop and laptop computersDiscover valuable shortcuts, tips, and tricks for troubleshootingOrganize your files and ensure data securityCustomize your computer so you can get things done faster If you're looking for a user-friTable of ContentsIntroduction 1 Part 1: Getting Started with macOS 5 Chapter 1: macOS Sonoma 101 (Prerequisites: None) 7 Chapter 2: Desktop and Windows and Menus (Oh My!) 23 Chapter 3: What’s Up, Dock? 43 Chapter 4: Getting to Know Finder and Its Desktop 59 Chapter 5: Getting Fancy with the Desktop and Finder 89 Chapter 6: Setting Your Mac Straight 103 Part 2: Getting Things Done 125 Chapter 7: Opening and Saving Files 127 Chapter 8: Managing Files and Folders the Smart Way 149 Chapter 9: Eight Terrific Time-Saving Tools 159 Chapter 10: Organizing Your Life 189 Chapter 11: Finding Your Way with Maps 211 Chapter 12: Using Stocks, News, Voice Memos, Shortcuts, and Home 225 Part 3: Getting Along with Others 237 Chapter 13: (Inter)Networking 239 Chapter 14: Dealing with People 261 Chapter 15: Communicating with Mail and Messages 271 Chapter 16: Sharing Your Mac with Others 297 Part 4: Making the Most of Your Mac 327 Chapter 17: Mac Machine Music 329 Chapter 18: The Multimedia Mac 343 Chapter 19: Creating Documents and Printing 355 Chapter 20: Features for the Way You Work 375 Chapter 21: Safety First: Backups and Other Security Issues 399 Chapter 22: Troubleshooting macOS 415 Part 5: The Part of Tens 425 Chapter 23: Ten Ways to Improve Your Mac Experience 427 Chapter 24: Ten Utilities That Make Your Life Easier 435 Index 449

    15 in stock

    £18.39

  • The Designers Guide to VerilogAMS

    Springer-Verlag New York Inc. The Designers Guide to VerilogAMS

    Out of stock

    Book SynopsisThe Verilog Hardware Description Language (Verilog-HDL) has long been the most popular language for describing complex digital hardware. It started life as a prop- etary language but was donated by Cadence Design Systems to the design community to serve as the basis of an open standard. That standard was formalized in 1995 by the IEEE in standard 1364-1995. About that same time a group named Analog Verilog International formed with the intent of proposing extensions to Verilog to support analog and mixed-signal simulation. The first fruits of the labor of that group became available in 1996 when the language definition of Verilog-A was released. Verilog-A was not intended to work directly with Verilog-HDL. Rather it was a language with Similar syntax and related semantics that was intended to model analog systems and be compatible with SPICE-class circuit simulation engines. The Table of ContentsTop-Down Design.- Analog Modeling.- Mixed-Signal Modeling.- Language Reference.

    Out of stock

    £143.99

  • The Definitive Guide to Plone

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG The Definitive Guide to Plone

    1 in stock

    Book SynopsisPlone allows big and small companies, freelancers, individuals, institutions and organizations to create and manage Internet sites, intranets, and Web applications. This book details how to use and customize Plone for a wide-range of online applications.Table of ContentsA table of contents is not available for this title.

    1 in stock

    £30.17

  • Extreme NXT

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Extreme NXT

    1 in stock

    Book SynopsisAlthough LEGO MINDSTORMS NXT allows anyone to build complex inventions, there are limits to what you can do with what comes inside the box. Details are presented for practically unlimited expansion of the NXT inputs and outputs by using the I2C communications bus, and several power amplifier designs allow the NXT outputs to drive bigger motors.Table of Contents In the Beginning Extreme Software Making a Connection Contact Sensors Resistive Sensors Potentiometer Sensors Voltage Sensors 4.3V Powered Sensors Two-Wire Powered Sensors Light Sensor with LED Control LEGO Motor Interfaces Beyond LEGO Motors I2C Bus Communication Cool Combinations

    1 in stock

    £30.15

  • Foundations of Python Network Programming

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Foundations of Python Network Programming

    2 in stock

    Book SynopsisThis second edition of Foundations of Python Network Programming targets Python 2.5 through Python 2.7, the most popular production versions of the language. Python has made great strides since Apress released the first edition of this book back in the days of Python 2.3. The advances required new chapters to be written from the ground up, and others to be extensively revised. You will learn fundamentals like IP, TCP, DNS and SSL by using working Python programs; you will also be able to familiarize yourself with infrastructure components like memcached and message queues. You can also delve into network server designs, and compare threaded approaches with asynchronous event-based solutions. But the biggest change is this edition''s expanded treatment of the web. The HTTP protocol is covered in extensive detail, with each feature accompanied by sample Python code. You can use your HTTP protocol expertise by studying an entire chapter on screen scraping and you can Table of Contents Introduction to Client/Server Networking UDP TCP Socket Names and DNS Network Data and Network Errors TLS and SSL Server Architecture Caches, Message Queues, and Map-Reduce HTTP Screen Scraping Web Applications E-mail Composition and Decoding SMTP POP IMAP Telnet and SSH FTP RPC

    2 in stock

    £49.49

  • Learn Electronics with Arduino Technology in Action

    Apress Learn Electronics with Arduino Technology in Action

    15 in stock

    Book SynopsisYou'll discover that there is no mystery behind how to design and build your own circuits, practical devices, cool gadgets, and electronic toys.Table of Contents An Electronic “Singing” Bird A Mini Digital Roulette Game An Interactive Light Sequencer Device Physical Computing and DC Motor Control Motion Control with an Arduino: Servo and Stepper Motor Controls The Music Box Fun with Haptics Creating Smart Power with an Arduino A Logic Checker Man It's Hot: Temperature Measurement and Control

    15 in stock

    £29.99

  • Practical LEGO Technics Bring Your LEGO Creations to Life Technology in Action

    Apress Practical LEGO Technics Bring Your LEGO Creations to Life Technology in Action

    15 in stock

    Book SynopsisYou already know you can create amazing things with LEGO, but did you know you can also make vehicles that roll and model plans that include landing gear and flaps that actually extend and retract?Table of ContentsChapter 1: Getting Started With LEGO Technic Chapter 2: Creating a Motorized LEGO Technic Vehicle Chapter 3: Steering and Controlling Your LEGO Technic Creation Chapter 4: Light it Up With LEGO Lights! Chapter 5: Creating a LEGO Technic Vehicle for all Terrains Chapter 6: Technic Contruction Vehicles and Equipment Chapter 7: LEGO Technic Aviation: Airplanes and Helicopters Chapter 8: Appendix: Parts List

    15 in stock

    £52.24

  • LEGO Technic Robotics

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG LEGO Technic Robotics

    1 in stock

    Book SynopsisBuilding robots is a snap with LEGO Technic Robotics! This book shows you how to use LEGO bricks and Power Functions components such as motors and remote controls to create all kinds of robots. Best of all, you don’t have to learn any programming. You just need your imagination and the expert building principles that you’ll find inside LEGO Technic Robotics. Author Mark Rollins teaches you the hows and whys of Technic project design. You’re not just snapping pieces here and there; with LEGO Technic Robotics you’re actively learning the fundamentals of good design so you can go on to create truly spectacular LEGO robot creations.From robots that run on wheels, walk on two or four legs, or move and function in ways that only you can dream up, this book will help you create your own robot army. Turn to LEGO Technic Robotics and build with real power! After you’ve mastered the techniques in this book, if you&rTable of Contents Where to Begin with Your LEGO Technic Robot Kit Creating a Robot Body Bring Your LEGO Technic Robots to Life with Power Functions Designing a Robot Arm Creating Robots with Extensions The Robot Head Enabling a LEGO Technic Robot to Walk Parts List

    1 in stock

    £58.49

  • Intel Xeon Phi Coprocessor Architecture and Tools The Guide for Application Developers Experts Voice in Microprocessors

    Apress Intel Xeon Phi Coprocessor Architecture and Tools The Guide for Application Developers Experts Voice in Microprocessors

    15 in stock

    Table of Contents1. Introduction to Xeon Phi Architecture 2. Programming Xeon Phi 3. Xeon Phi Vector Architecture and Instruction Set 4. Xeon Phi Core Microarchitecture 5. Xeon Phi Cache and Memory Subsystem 6. Xeon Phi PCIe Bus Data Transfer and Power Management 7. Xeon Phi System Software 8. Xeon Phi Application Development Tools 9. Xeon Phi Application Design and Implementation Considerations 10. Application Performance Tuning on Xeon Phi 11. Algorithms and Data Structures for Xeon Phi 12. Xeon Phi Application Development on Windows OS 13. OpenCL on Intel 14. Shared Memory Programming on Intel Xeon Phi

    15 in stock

    £28.49

  • Complex Intelligent Systems and Their

    Springer-Verlag New York Inc. Complex Intelligent Systems and Their

    Out of stock

    Book Synopsis"Complex Intelligent Systems and Applications" presents the most up-to-date advances in complex, software intensive and intelligent systems.The book is divided into three parts focusing on complex intelligent network systems, efficient resource management in complex systems, and artificial data mining systems.Table of ContentsEfficient Integration of Complex Information Systems in the ATM Domain with Explicit Expert Knowledge Models.- An Ontology-Based Approach for Supporting Business-IT Alignment.- EPCIS-Based Supply Chain Event Management.- Cost-Benefit Analysis to Hedge with Third-Party Producers in Demand-Driven Production.- A Security Assurance Model to Holistically Assess the Information Security Posture.- Risk-Aware Business Process Management—Establishing the Link Between Business and Security.- Self-Optimised Tree Overlays Using Proximity-Driven Self-Organised Agents.- Filtering Order Adaptation Based on Attractor Selection for Data Broadcasting System.- StreamAPAS: Query Language and Data Model.- Agent-Supported Programming of Multicore Computing Systems.- Multimodal and Agent-Based Human–Computer Interaction in Cultural Heritage Applications: an Overview.- Reinforced Operators in Fuzzy Clustering Systems.

    Out of stock

    £67.49

  • SystemVerilog for Design Second Edition A Guide to Using SystemVerilog for Hardware Design and Modeling

    Springer Us SystemVerilog for Design Second Edition A Guide to Using SystemVerilog for Hardware Design and Modeling

    15 in stock

    Book SynopsisIn its updated second edition, this book has been extensively revised on a chapter by chapter basis.Table of Contentsto SystemVerilog.- SystemVerilog Declaration Spaces.- SystemVerilog Literal Values and Built-in Data Types.- SystemVerilog User-Defined and Enumerated Types.- SystemVerilog Arrays, Structures and Unions.- SystemVerilog Procedural Blocks, Tasks and Functions.- SystemVerilog Procedural Statements.- Modeling Finite State Machines with SystemVerilog.- SystemVerilog Design Hierarchy.- SystemVerilog Interfaces.- A Complete Design Modeled with SystemVerilog.- Behavioral and Transaction Level Modeling.

    15 in stock

    £125.99

  • Verilog and SystemVerilog Gotchas 101 Common Coding Errors and How to Avoid Them

    Springer Us Verilog and SystemVerilog Gotchas 101 Common Coding Errors and How to Avoid Them

    15 in stock

    Book SynopsisIntroduction, What Is A Gotcha?.- Declaration and Literal Number Gotchas.- RTL Modeling Gotchas.- Operator Gotchas.- General Programming Gotchas.- Object Oriented and Multi-Threaded Programming Gotchas.- Randomization, Coverage and Assertion Gotchas.- Tool Compatibility Gotchas.Table of ContentsIntroduction, What Is A Gotcha?.- Declaration and Literal Number Gotchas.- RTL Modeling Gotchas.- Operator Gotchas.- General Programming Gotchas.- Object Oriented and Multi-Threaded Programming Gotchas.- Randomization, Coverage and Assertion Gotchas.- Tool Compatibility Gotchas.

    15 in stock

    £103.99

  • Environmental Monitoring with Arduino

    O'Reilly Media Environmental Monitoring with Arduino

    Out of stock

    Book SynopsisThis book teaches anyone to build simple, usable devices to gather data about different conditions in the environment, by using Arduinos and basic DIY electronics. Each chapter briefly explains a particular environmental problem, and features step-by-step instructions to build the appropriate monitoring device.

    Out of stock

    £6.18

  • The Verilog PLI Handbook A Users Guide and Comprehensive Reference on the Verilog Programming Language Interface

    Springer Us The Verilog PLI Handbook A Users Guide and Comprehensive Reference on the Verilog Programming Language Interface

    15 in stock

    Book SynopsisThe Verilog Programming Language Interface, commonly called the Verilog PU, is one of the more powerful features of Verilog.Table of ContentsList of Examples. Foreword. Acknowledgments. Introduction. Part One: The VPI Portion of the Verilog PLO Standard. 1. Creating PLI Applications Using VPI Routines. 2. Interfacing VPI based PLI Applications to Verilog Simulators. 3. How to Use the VPI Routines. 4. Details about the VPI Routine Library. 5. Reading and Modifying Values Using VPI Routines. 6. Synchronizing to Verilog Simulations Using VPI Callbacks. 7. Interfacing to C Models Using VPI Routines. Part Two: The TF/ACC Portion of the Verilog PLI Standard. 8. Creating PLI Applications Using TF and ACC Routines. 9. Interfacing TF/ACC PLI Applications to Verilog Simulators. 10. How to Use the TF Routines. 11. Reading and Writing Values Using TF Routines. 12. Synchronizing to Verilog Simulations Using Misctf Routines. 13. Interfacing to C Models Using TF Routines. 14. How to Use the ACC Routines. 15. Details on the ACC Routine Library. 16. Reading and Modifying Values Using ACC Routines. 17. Synchronizing to Simulations Using the Value Change Link. 18. Interfacing to C Models Using ACC Routines. Appendices: A. Linking PLI Applications to Verilog Simulators. B. The IEEE 1364-1995 VPI Routine Library. C. The IEEE 1364-1995 TF Routine Library. D. The IEEE 1364-1995 ACC Routine Library. Index.

    15 in stock

    £49.49

  • SystemVerilog for Verification

    Springer-Verlag New York Inc. SystemVerilog for Verification

    1 in stock

    Book SynopsisBased on the highly successful second edition, this extended edition of SystemVerilog for Verification: A Guide to Learning the Testbench Language Features teaches all verification features of the SystemVerilog language, providing hundreds of examples to clearly explain the concepts and basic fundamentals. It contains materials for both the full-time verification engineer and the student learning this valuable skill.In the third edition, authors Chris Spear and Greg Tumbush start with how to verify a design, and then use that context to demonstrate the language features, including the advantages and disadvantages of different styles, allowing readers to choose between alternatives. This textbook contains end-of-chapter exercises designed to enhance students'' understanding of the material. Other features of this revision include: New sections on static variables, print specifiers, and DPI from the 2009 IEEE language standard Descriptions of UVM featTable of ContentsVerification Guidelines.- Data Types.- Procedural Statements and Routines.- Connecting the Testbench and Design.- Basic OOP.- Randomization.- Threads and Interprocess Communication.- Advanced OOP and Testbench Guidelines.- Functional Coverage.- Advanced Interfaces.- A Complete SystemVerilog Testbench.- Interfacing with C/C++.

    1 in stock

    £89.99

  • Beginning C for Arduino Second Edition

    Apress Beginning C for Arduino Second Edition

    15 in stock

    Trade Review“The book is highly readable and starts from basics, like how to install the Arduino integrated development environment (IDE). The appendix of the book has a lot of good information on how and where to order the parts and boards. … I would strongly advise reading the book in a hands-on fashion and not just reading it alone. … High school and beginning college students will have a blast reading it and implementing the programs. I highly recommend it.” (Naga Narayanaswamy, Computing Reviews, April, 2016)Table of Contents Introduction to Arduino Microcontrollers Arduino C Data Types Decision Making in C Program Loops Functions in C Storage Classes and Scope Introduction to Pointers Using Pointers Effectively I/O Operations The C Preprocessor A Gentle Introduction to Object-Oriented Programming Arduino Libraries Arduino I/O Appendix A - Suppliers Appendix B - Hardware Components

    15 in stock

    £52.24

  • Crafting Wearables

    APress Crafting Wearables

    1 in stock

    Book SynopsisEnter the exciting intersection of technology and fashion known as wearable computing. Learn about the future of electronics in clothing and textiles, and be a part of creating that future! Crafting Wearables begins with the history of the field, then covers current practices and future trends. You will gain deeper insight into the strategy behind the design of wearable devices while learning about the tools and materials needed to start your own wearables toolbox.In a time when consumer electronics are becoming smaller and seamlessly integrated into our lives, it is important to understand how technology can improve and augment your lifestyle. Wearables are in a sense the most organic and natural interface we can design, yet there is still doubt about how quickly wearable technologies will become the cultural norm. Furthermore, skills that have become less valuable over the years, such as sewing, are making a return with the wearablesTable of ContentsIntroductionPart I: What Are Wearables?1. A Brief History of Wearables2. Wearable FictionsPart II: Methods and Techniques3. From Textiles to Wearables4. Cutting and Sewing5. Making Electronics Sewable6. Soft Circuits7. Materials that Matter8. Digital Design for Wearables9. Digital Fabrication for Wearables10. Designing for the Body, On the BodyPart III: Fashion and Product11. Wearable Wellness12. Beauty Tech13. Superhumans and Cyborgs14. Activated Garments15. Wearable Costumes16. Speculations of Wearable Futures17. Looking into the FuturePart IV AppendixA. Cyborg "Fingercaps" and Resources

    1 in stock

    £49.49

  • Learn Raspberry Pi Programming with Python

    APress Learn Raspberry Pi Programming with Python

    3 in stock

    Book SynopsisLearn how to program your nifty new $35 computer to make a web spider, a weather station, a media server, and more. This book explores how to make a variety of fun and even useful projects, from a web bot to search and download files to a toy to drive your pets insane. Even if you''re completely new to programming in general, you''ll see how easy it is to create a home security system, an underwater photography system, an RC plane with a camera, and even a near-space weather balloon with a camera.  You''ll learn how to use Pi with Arduino as well as Pi with Gertboard, an expansion board with an onboard ATmega microcontroller. Learn Raspberry Pi Programming with Python has been fully updated in this new edition to cover the features of the new boards. You''ll learn how to program in Python on your Raspberry Pi with hands-on examples and fun projects.  What You''ll Learn Set up your new Raspberry Pi<Trade Review“Donat (independent scholar) provides a volume that is about equally divided between background material (Python, Circuits, the Raspberry Pi) and a set of stimulating ‘maker’ projects that combine coding, circuit-building, and mechanical construction. The writing style is casual but clear. … the determined hobbyist with sufficient experience will find the background material useful and the projects challenging, stimulating, and rewarding, and the book likewise serves as a useful resource for libraries hosting makerspaces.” (C. Vickery, Choice, Vol. 56 (6), February, 2019)Table of ContentsLearn Raspberry Pi Programming with Python · Chapter 1: Introduction to the Raspberry Pi · Chapter 2: Linux by the Seat of Your Pants · Chapter 3: Introduction to Python · Chapter 4: Electronics at 100 MPF · Chapter 5: The Web bot · Chapter 6: The Weather Station · Chapter 7: The Media Server · Chapter 8: The Home Security System · Chapter 9: The Cat Toy · Chapter 10: The Radio-controlled Airplane · Chapter 11: The Weather Balloon · Chapter 12: The Submersible · Chapter 13: The Raspberry Pi and the Arduino ·

    3 in stock

    £42.49

  • Learn Electronics with Raspberry Pi

    APress Learn Electronics with Raspberry Pi

    1 in stock

    Book SynopsisUpdated for the recent Raspberry Pi boards, including the Raspberry Pi 4, this new edition offers an all new digital logic circuits project, explaining the theory behind how digital electronics work while creating a new project for measuring temperature.Raspberry Pi is everywhere, it''s inexpensive, and it''s a wonderful tool for teaching about electronics and programming. This book demonstrates how to make a variety of cool projects using the Pi with programming languages like Scratch and Python, with no experience necessary. You''ll see how the Pi works, how to work with Raspbian Linux on the Pi, and how to design and create electronic circuits. You''ll create projects like an arcade game, disco lights, and infrared transmitter, and an LCD display. You''ll also learn how to control Minecraft''s Steve with a joystick and how to build a Minecraft house with a Pi, and even how to control a LEGO train with a Pi. And, you''ll build your own robot, including how to soldeTable of ContentsChapter 1 - Getting Started with Electronic Circuits Introduction to electronics Chapter 2 - All About Raspberry Pi Explanation about Raspberry Pi and getting started Chapter 3 - Starting with the Basics: Programming with Scratch A first project introducing Scratch and simple electronics Creates a controller for a game Chapter 4 - Using Python for Input and Output: GPIO Zero Introduction to GPIO Zero, switching larger loads. Disco light projects Chapter 5 - More Input and Output: Infrared Sensors and LCD Displays Motion sensor camera True and False game Chapter 6 - Adding Control in Python and Linux Control a lego train RGB LEDs Chapter 7 - Creating Video with a Pi Camera Using infrared remote control to control camera Making those images into a stop-frame animation Chapter 8 - Rolling Forward: Designing and Building a Robot Creating a simple wheeled robot Controlling motors using H-Bridge Measuring distance with ultrasonic range sensor Using a wireless controller Chapter 9 - Customize Your Gameplay: Minecraft Hardware Programming Interfacing between Minecraft and electronics Chapter 10 - Understanding Digital Logic How logic gates work Combining logic gates Measuring temperature and displaying using a BCD to 7-segment decoder Chapter 11 - Making Your Circuits Permanent Soldering Creating enclosures Multimeter and Oscilloscope Chapter 12 - Let the Innovation Begin: Designing Your Own Circuits Understanding datasheets Creating circuits in Fritzing Creating a PCB Powering electronic projects

    1 in stock

    £44.99

  • Advanced Arduino Techniques in Science

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Advanced Arduino Techniques in Science

    1 in stock

    Book SynopsisIf you''re already a comfortable programmer, familiar with your single board computer and microcontroller, and are ready to refine your projects, then let''s get started! This book covers advanced methods and techniques for creating, implementing, monitoring and controlling your experiments and projects with your Raspberry Pi and Arduino. Projects will use Python and the Tkinter GUI and will also cover software development for adding real time data display to the Raspberry Pi.You''ll review concepts of frequency occurring in nature and the techniques used to measure the frequency of electrically varying signal voltages. You''ll also study procedures for safe design, implementation and operation of experimental measurement systems operating at high heats and high temperatures. Throughout the book you''ll look at sources and types of errors, and best practices for minimizing and reducing them. Often times there are simple environmental issues hinderTable of ContentsChapter 1: Arduino and Raspberry Pi.- Chapter 2: Development of a Simplified Python Supervisory Control and Data Acquisition System.- Chapter 3:Experimental Work at High Temperatures and High Heats.- Chapter 4 The PID Process Control Algorithm.- Chapter 5: Real Time Data Plotting and Visualization.- Chapter 6: Frequency Measurement.- Chapter 7: Quality Assurance, Quality Control, and Error Analysis.- Chapter 8: Power and Noise from the USB.- Chapter 9: Analytical Front Ends.- Chapter 10: The Kalman Filter.- Appendix 1: List of abbreviations.- Appendix 2: List of Suppliers.

    1 in stock

    £25.19

  • The Podcasters Audio Handbook

    APress The Podcasters Audio Handbook

    5 in stock

    Book SynopsisPodcasting is a powerful tool of communication and creative expression that doesn''t need to be intimidating. This book brings together the creative and technical aspects of audio engineering to help podcasters communicate their ideas effectively and creatively. The Podcaster''s Audio Handbook focuses on simple techniques that immediately elevate the audio quality of your podcast. The book provides an overview of podcast recording and editing techniques, so that podcasters can avoid common pitfalls. Readers will also gain access to audio downloads to enhance the learning process. With this book, you can improve the technical aspects of recording and editing your podcasts. Anyone can learn audio techniques and I encourage anyone to share their stories through podcasting. Unleash your creativity and connect with your audience!  What You Will Learn  Choose the correct file formats and settings  Set up a portable recorder  MaTable of ContentsThe Podcaster's Audio HandbookPreface (old chapter 1)Chapter 1: File Formats and Settings (old chapter 2)Chapter 2: Gear (old chapter 3)Chapter 3: Getting a Good Take (old chapter 7)Chapter 4: Recording InsideChapter 5: Recording OutsideChapter 6: Recording RemotelyChapter 7: Editing (old chapter 8)

    5 in stock

    £35.99

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account