Operating systems Books

94 products


  • Kafka Troubleshooting in Production

    APress Kafka Troubleshooting in Production

    1 in stock

    Book SynopsisThis book provides Kafka administrators, site reliability engineers, and DataOps and DevOps practitioners with a list of real production issues that can occur in Kafka clusters and how to solve them. The production issues covered are assembled into a comprehensive troubleshooting guide for those engineers who are responsible for the stability and performance of Kafka clusters in production, whether those clusters are deployed in the cloud or on-premises. This book teaches you how to detect and troubleshoot the issues, and eventually how to prevent them. Kafka stability is hard to achieve, especially in high throughput environments, and the purpose of this book is not only to make troubleshooting easier, but also to prevent production issues from occurring in the first place. The guidance in this book is drawn from the author's years of experience in helping clients and internal customers diagnose and resolve knotty production problems and stabilize their Kafka environments. The book Table of Contents

    1 in stock

    £26.99

  • Creative Prototyping with Generative AI

    APress Creative Prototyping with Generative AI

    1 in stock

    Book SynopsisReimagine different generative AI as useful creative prototyping tools that can be used to augment your own creative process and projects. Gain a deeper understanding of how generative AI can elevate your creative future. You will acquire a comprehensive understanding of how AI works, uncover tools that can enhance your AI interactions, learn how to extract maximum potential from AI-produced content, and experiment with methods for assessing, refining, and boosting the content to transform your creative projects. You'll also explore how creative professionals from varied disciplines are employing generative AI in their workflows to produce distinctive contributions to the world. Each chapter provides examples of how designers and other creative individuals can utilize these technological wonders, adopting various prototyping techniques to fast-track and optimize design processes and workflows. Creators from all disciplines can tap into the vast capabilities and benefits of generatiTable of Contents Rapid Prototyping with Generative AI​1. Introduction: Your AI Best Friend2. AI as a Creative Muse3. Prototyping with AI4. Creative Tools and Processes5. AI Structures6. The Master of Mash-Up: Leveraging AI for Prototyping7. Uncanny by Nature8. Layering AI Generation9. The Art of the Prompt10. Five Dilemmas Using AI11. AI Curator for Hire

    1 in stock

    £35.99

  • Pro Bash

    APress Pro Bash

    5 in stock

    Book SynopsisLearn how to effectively utilize the Bash shell in your programming. This refreshed and expanded third edition has been updated to Bash 5.2, and many scripts have been rewritten to make them more idiomatically Bash, taking better advantage of features specific to Bash. It is easy to read, understand, and will teach you how to get to grips with Bash programming without drowning you in pages and pages of syntax. Using this book you will be able to use the shell efficiently, make scripts run faster using expansion and external commands, and understand how to overcome many common mistakes that cause scripts to fail. This book is perfect for all beginning Linux and Unix system administrators who want to be in full control of their systems, and really get to grips with Bash programming. The Bash shell is a complete programming language, not merely a glue to combine external Linux commands. By taking full advantage of Shell internals, Shell programs can perform as snappily as utilities wrTable of Contents1. Hello, World: Your First Shell Program.- 2. Input, Output and Throughput.- 3. Looping and Branching.- 4. Command-Line parsing and Expansion.- 5. Parameters and Variables.- 6. Shell Functions.- 7. String Manipulation.- 8. File Operations and Commands.- 9. Reserved Words and Built-in Commands.- 10. Writing Bug-Free Scripts and Debugging the Rest.- 11. Programming for the Command Line.- 12. Runtime Configuration.- 13. Data Processing.-14. Scripting the Screen.- 15. Entry Level Programming.

    5 in stock

    £42.49

  • Practical GraphQL

    APress Practical GraphQL

    1 in stock

    Book SynopsisMaster the query language that is revolutionizing how websites are developed and built. This book is a hands-on guide to GraphQL, and will teach you how to use this open source tool to develop and deploy applications quickly and with minimal fuss. Using a project-based approach, you'll learn how to use GraphQL from the ground up. You'll start with the basics, including set up and key details regarding queries and mutations, before moving on to more advanced topics and projects. Over the course of the book, you will gain a thorough understanding of the web development ecosystem from frontend to backend by building React applications using Prisma Apollo Client and MongoDB. After completing this book, you'll be equipped with the knowledge and skills needed to turbo charge your own enterprise projects.What You'll LearnUnderstand what GraphQL is and how to use itDistinguish between queries and mutations, and how to leverage themGaina greater knowledge of full-stack applications with ReaTable of Contents1.Getting Started. - 2. Queries.- 3. Mutations.- 4. Full Stack GraphQL.- 5 App with Prisma.- 6. Connecting with the Frontend.

    1 in stock

    £38.24

  • Modern TypeScript

    APress Modern TypeScript

    3 in stock

    Book SynopsisDive into the world of TypeScript, a popular superset of the JavaScript language that enhances the development experience with static typing. This book covers every aspect of TypeScript in a concise and easy-to-understand style, making it the ultimate resource for mastering TypeScript.Author Ben Beattie-Hood provides comprehensive coverage of TypeScript's features, such as structural typing, optionality and union types, computed and recursive types, and much more. Each chapter is packed with practical, real-world examples and insider tips drawn from his 20 years of experience as a trainer, ensuring you understand the most important concepts and learn how to avoid common pitfalls.Modern TypeScript will put you on the path to becoming a TypeScript expert, help you greatly reduce errors, and boost your delivery velocity. Whether you're building small projects or large-scale applications, this book will give you the skills and confidence to write cleaner, scalable, and more maintainable coTable of Contents

    3 in stock

    £28.04

  • How JavaScript Works

    APress How JavaScript Works

    15 in stock

    Book SynopsisJavaScript is a complicated language with a lot of misinformation surrounding how it works. This book provides a comprehensive introduction to JavaScript, from how it works at a technical level to how it is used to create websites and applications. Everything you need to know to start a career in JavaScript development is covered here. How JavaScript Worksbeginswith a practical introduction of the basics before moving into the technical underpinnings of JavaScript, detailing everything you need to know, including variables, memory storage, functions, classes, types, maps, sets and APIs.Once you've fully absorbed these key topics. author Jonathan Simpson will show you how to put them into practice, demonstrating how they are employed for modern web development. You'll learn how to use JavaScript with HTML and CSS to construct web pages and applications, how to change CSS with JavaScript, and how to utilize Fetch and asynchronous operations. Uponcompleting this book, you will have thTable of ContentsCh1 Introduction to JavaScript.- Ch2 Variables, Comments, and Logical Statements.- Ch3 Introduction to Objects, Arrays.- Ch4 Loops and Iterables.- Ch5 References, Values, and Memory Management.- Ch6 Functions and Classes.- Ch7 Types.- Ch8 Manipulating and Interacting with HTML.- Ch9 Maps and Sets.- Ch10 Fetching Data, APIs and Promises.- Ch11 Errors and the Console.- Ch12 Maps and Sets.- Ch13 Websockets.- Conclusion.- Appendix.

    15 in stock

    £28.04

  • Git for Teams

    O'Reilly Media Git for Teams

    1 in stock

    Book SynopsisYou can do more with Git than just build software. This practical guide delivers a unique people-first approach to version control that also explains how using Git as a focal point can help your team work better together.

    1 in stock

    £29.99

  • Monitoring with Graphite

    O'Reilly Media Monitoring with Graphite

    1 in stock

    Book SynopsisWith this practical guide, system administrators and engineers will learn how to use this open source tool to track operational data you need to monitor your systems, as well as application-level metrics for profiling your services.

    1 in stock

    £26.99

  • Automating Junos Administration

    O'Reilly Media Automating Junos Administration

    1 in stock

    Book SynopsisThis practical guide will help you understand the automation features of Junos, show you the tools available to program Junos, and explain which tool is best for your particular network requirement.

    1 in stock

    £29.99

  • Version Control with Git

    O'Reilly Media Version Control with Git

    15 in stock

    Book SynopsisThrough a series of step-by-step tutorials, this practical guide quickly takes you from Git fundamentals to advanced techniques, and provides friendly yet rigorous advice for navigating Git's many functions. You'll learn how to work with everything from small to very large projects with speed and efficiency.

    15 in stock

    £39.74

  • Graph Polynomials

    Taylor & Francis Inc Graph Polynomials

    1 in stock

    Book SynopsisThis book covers both theoretical and practical results for graph polynomials. Graph polynomials have been developed for measuring combinatorial graph invariants and for characterizing graphs. Various problems in pure and applied graph theory or discrete mathematics can be treated and solved efficiently by using graph polynomials. Graph polynomials have been proven useful areas such as discrete mathematics, engineering, information sciences, mathematical chemistry and related disciplines.Table of ContentsThe Alliance Polynomial of a Graph. Aspects of the Interlace Polynomial of a Graph. The clique-transversal set problem in clawfree graphs with degree at most 4. Permanental Polynomials of Graphs. Tutte polynomial and its generalizations. Graphs characterized by various polynomials. Recurrence relations of graph polynomials. Independence polynomials of k-tree related graphs. Generatingfunctionology for Graph Polynomials. Symmetric representations and the connection with linear recurrences. From the Ising and Potts model to the general graph homomorphism polynomial.

    1 in stock

    £147.25

  • Learn Linux in 5 Days

    Createspace Independent Publishing Platform Learn Linux in 5 Days

    15 in stock

    15 in stock

    £17.36

  • MCSA Windows Server 2016 Exam Ref 3Pack

    Microsoft Press,U.S. MCSA Windows Server 2016 Exam Ref 3Pack

    1 in stock

    Book Synopsis

    1 in stock

    £62.89

  • sed & awk

    O'Reilly Media sed & awk

    1 in stock

    Book Synopsissed & awk describes two text processing programs that are mainstays of the UNIX programmer's toolbox. sed is a "stream editor" for editing streams of text that might be too large to edit as a single file, or that might be generated on the fly as part of a larger data processing step. The most common operation done with sed is substitution, replacing one block of text with another. awk is a complete programming language. Unlike many conventional languages, awk is "data driven" -- you specify what kind of data you are interested in and the operations to be performed when that data is found. awk does many things for you, including automatically opening and closing data files, reading records, breaking the records up into fields, and counting the records. While awk provides the features of most conventional programming languages, it also includes some unconventional features, such as extended regular expression matching and associative arrays. sed & awk describes both programs in detail and includes a chapter of example sed and awk scripts. This edition covers features of sed and awk that are mandated by the POSIX standard. This most notably affects awk, where POSIX standardized a new variable, CONVFMT, and new functions, toupper() and tolower(). The CONVFMT variable specifies the conversion format to use when converting numbers to strings (awk used to use OFMT for this purpose). The toupper() and tolower() functions each take a (presumably mixed case) string argument and return a new version of the string with all letters translated to the corresponding case. In addition, this edition covers GNU sed, newly available since the first edition. It also updates the first edition coverage of Bell Labs nawk and GNU awk (gawk), covers mawk, an additional freely available implementation of awk, and briefly discusses three commercial versions of awk, MKS awk, Thompson Automation awk (tawk), and Videosoft (VSAwk).Table of ContentsPreface Chapter 1. Power Tools for Editing May You Solve Interesting Problems A Stream Editor A Pattern-Matching Programming Language Four Hurdles to Mastering sed and awk Chapter 2. Understanding Basic Operations Awk, by Sed and Grep, out of Ed Command-Line Syntax Using sed Using awk Using sed and awk Together Chapter 3. Understanding Regular Expression Syntax That's an Expression A Line-Up of Characters I Never Metacharacter I Didn't Like Chapter 4. Writing sed Scripts Applying Commands in a Script A Global Perspective on Addressing Testing and Saving Output Four Types of sed Scripts Getting to the PromiSed Land Chapter 5. Basic sed Commands About the Syntax of sed Commands Comment Substitution Delete Append, Insert, and Change List Transform Print Print Line Number Next Reading and Writing Files Quit Chapter 6. Advanced sed Commands Multiline Pattern Space A Case for Study Hold That Line Advanced Flow Control Commands To Join a Phrase Chapter 7. Writing Scripts for awk Playing the Game Hello, World Awk's Programming Model Pattern Matching Records and Fields Expressions System Variables Relational and Boolean Operators Formatted Printing Passing Parameters Into a Script Information Retrieval Chapter 8. Conditionals, Loops, and Arrays Conditional Statements Looping Other Statements That Affect Flow Control ArraysAn Acronym Processor System Variables That Are Arrays Chapter 9. Functions Arithmetic Functions String Functions Writing Your Own Functions Chapter 10. The Bottom Drawer The getline Function The close() Function The system() Function A Menu-Based Command Generator Directing Output to Files and Pipes Generating Columnar Reports Debugging Limitations Chapter 11. A Flock of awks Original awk Freely Available awks Commercial awks Epilogue Chapter 12. Full-Featured Applications An Interactive Spelling Checker Generating a Formatted Index Spare Details of the masterindex Program Chapter 13. A Miscellany of Scripts uutot.awk--Report UUCP Statistics phonebill--Track Phone Usage combine--Extract Multipart uuencoded Binaries mailavg--Check Size of Mailboxes adj--Adjust Lines for Text Files readsource--Format Program Source Files for troff gent--Get a termcap Entry plpr--lpr Preprocessor transpose--Perform a Matrix Transposition m1--Simple Macro Processor Appendix A. Quick Reference for sed Appendix B. Quick Reference for awk Appendix C. Supplement for Chapter 12 Index

    1 in stock

    £31.99

  • Mastering IBM i: The Complete Resource for

    MC Press, LLC Mastering IBM i: The Complete Resource for

    2 in stock

    Book SynopsisA comprehensive introduction to IBM i—the operating system that runs on IBM's midrange computer systems (System i, iSeries, AS/400)—and its facilities, this in-depth resource uses step-by-step exercises, review questions, and chapter labs to teach new programmers the latest system concepts and tools. Reflecting system changes that have occurred since 2000, topics include Rational Developer for Power (RDP), RDP Screen Designer and Report Designer, IBM i Access for Windows, IBM i Access for Web, IBM DB2 Web Query for i, and Remote System Explorer (RSE).

    2 in stock

    £71.25

  • Manning Publications Hadoop in Practice

    10 in stock

    Book Synopsis

    10 in stock

    £47.49

  • Operating Systems

    Arcler Press Operating Systems

    1 in stock

    Book SynopsisThis book provides a comprehensive overview of the core principles and functionality of computer operating systems. The book covers various topics, including process management, memory management, file systems, device management, and security. It is written to provide readers with a deeper understanding of how operating systems work and how they can be used to optimize computer performance. This book is an essential resource for understanding the intricacies of operating systems.Table of Contents Chapter 1 Fundamentals of Operating System Chapter 2 History of Operating Systems Chapter 3 Structure of Operating Systems Chapter 4 Processes in Operating Systems Chapter 5 Memory Management Chapter 6 File Systems Chapter 7 Mobile Operating Systems Chapter 8 Distributed Operating Systems

    1 in stock

    £87.20

  • Learning Shell Scripting with Zsh

    Packt Publishing Limited Learning Shell Scripting with Zsh

    15 in stock

    Book SynopsisA step-by-step tutorial that will teach you, through real world examples, how to configure and use zsh and its various features. If you are a system administrator, developer, or computer professional involved with UNIX who are looking to improve on their daily tasks involving the UNIX shell, "Learning Shell Scripting with zsh" will be great for you. It's assumed that you have some familiarity with an UNIX command line interface and feel comfortable with editors such as Emacs or vi.

    15 in stock

    £23.99

  • SELinux Policy Administration

    Packt Publishing Limited SELinux Policy Administration

    15 in stock

    15 in stock

    £25.99

  • Understanding Concurrent Systems

    Springer London Ltd Understanding Concurrent Systems

    1 in stock

    Book SynopsisCSP notation has been used extensively for teaching and applying concurrency theory, ever since the publication of the text Communicating Sequential Processes by C.A.R. Hoare in 1985. Both a programming language and a specification language, the theory of CSP helps users to understand concurrent systems, and to decide whether a program meets its specification. As a member of the family of process algebras, the concepts of communication and interaction are presented in an algebraic style. An invaluable reference on the state of the art in CSP, Understanding Concurrent Systems also serves as a comprehensive introduction to the field, in addition to providing material for a number of more advanced courses. A first point of reference for anyone wanting to use CSP or learn about its theory, the book also introduces other views of concurrency, using CSP to model and explain these. The text is fully integrated with CSP-based tools such as FDR, and describes how to create new tools based on FDR. Most of the book relies on no theoretical background other than a basic knowledge of sets and sequences. Sophisticated mathematical arguments are avoided whenever possible. Topics and features: presents a comprehensive introduction to CSP; discusses the latest advances in CSP, covering topics of operational semantics, denotational models, finite observation models and infinite-behaviour models, and algebraic semantics; explores the practical application of CSP, including timed modelling, discrete modelling, parameterised verifications and the state explosion problem, and advanced topics in the use of FDR; examines the ability of CSP to describe and enable reasoning about parallel systems modelled in other paradigms; covers a broad variety of concurrent systems, including combinatorial, timed, priority-based, mobile, shared variable, statecharts, buffered and asynchronous systems; contains exercises and case studies to support the text; supplies further tools and information at the associated website: http://www.comlab.ox.ac.uk/ucs/. From undergraduate students of computer science in need of an introduction to the area, to researchers and practitioners desiring a more in-depth understanding of theory and practice of concurrent systems, this broad-ranging text/reference is essential reading for anyone interested in Hoare’s CSP.Trade ReviewFrom the reviews:“This book is divided into four parts … . Part I is designed for an audience of both undergraduate and graduate computer science students. … Part II is designed for people who are familiar with Part I and have fairly theoretical interests. … Part III is intended for people who … want to be able to use them in a better way, or who are specifically interested in timed systems. Part IV is designed for people who already understand CSP.” (Günther Bauer, Zentralblatt MATH, Vol. 1211, 2011)Table of ContentsPart I: A Foundation Course in CSP Building a Simple Sequential Process Understanding CSP Parallel Operators CSP Case Studies Hiding and Renaming Beyond Traces Further Operators Using FDR Part II: Theory Operational Semantics Denotational Semantics and Behavioural Models Finite Observation Models Infinite-behaviour Models The Algebra of CSP Part III: Using CSP Timed Systems 1: tock-CSP Timed Systems 2: Discrete Timed CSP More About FDR State Explosion and Parameterised Verification Part IV: Exploring Concurrency Shared-variable Programs Understanding Shared-variable Concurrency Priority and Mobility

    1 in stock

    £40.49

  • The Continuing Arms Race: Code-Reuse Attacks and

    Morgan & Claypool Publishers The Continuing Arms Race: Code-Reuse Attacks and

    15 in stock

    Book SynopsisAs human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system.The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs.The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.Table of Contents Preface 1. How Memory Safety Violations Enable Exploitation of Programs 2. Protecting Dynamic Code 3. Diversity and Information Leaks 4. Code-Pointer Integrity 5. Evaluating Control-Flow Restricting Defenses 6. Attacking Dynamic Code 7. Hardware Control Flow Integrity 8. Multi-Variant Execution Environments References Contributor Biographies

    15 in stock

    £68.00

  • The Continuing Arms Race: Code-Reuse Attacks and

    Morgan & Claypool Publishers The Continuing Arms Race: Code-Reuse Attacks and

    15 in stock

    Book SynopsisAs human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system.The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs.The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.Table of Contents Preface 1. How Memory Safety Violations Enable Exploitation of Programs 2. Protecting Dynamic Code 3. Diversity and Information Leaks 4. Code-Pointer Integrity 5. Evaluating Control-Flow Restricting Defenses 6. Attacking Dynamic Code 7. Hardware Control Flow Integrity 8. Multi-Variant Execution Environments References Contributor Biographies

    15 in stock

    £79.20

  • Architecture of Computing Systems – ARCS 2019: 32nd International Conference, Copenhagen, Denmark, May 20–23, 2019, Proceedings

    Springer Nature Switzerland AG Architecture of Computing Systems – ARCS 2019: 32nd International Conference, Copenhagen, Denmark, May 20–23, 2019, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the proceedings of the 32nd International Conference on Architecture of Computing Systems, ARCS 2019, held in Copenhagen, Denmark, in May 2019. The 24 full papers presented in this volume were carefully reviewed and selected from 40 submissions. ARCS has always been a conference attracting leading-edge research outcomes in Computer Architecture and Operating Systems, including a wide spectrum of topics ranging from embedded and real-time systems all the way to large-scale and parallel systems. The selected papers are organized in the following topical sections: Dependable systems; real-time systems; special applications; architecture; memory hierarchy; FPGA; energy awareness; NoC/SoC. The chapter 'MEMPower: Data-Aware GPU Memory Power Model' is open access under a CC BY 4.0 license at link.springer.com.Table of ContentsDependable Systems.- Hardware/Software Co-designed Security Extensions for Embedded Devices.- SDES - Scalable Software Support for Dependable Embedded Systems.- Real-Time Systems.- Asynchronous Critical Sections in Real-Time Multiprocessor Systems.- Resource-Aware Parameter Tuning for Real-Time Applications.- A Hybrid NoC Enabling Fail-Operational and Hard Real-Time Communication in MPSoC.- Special Applications.- DSL-based Acceleration of Automotive Environment Perception and Mapping Algorithms for embedded CPUs, GPUs, and FPGAs.- Applying the Concept of Artificial DNA and Hormone System to a Low-Performance Automotive Environment.- A Parallel Adaptive Swarm Search Framework for Solving Black-Box Optimization Problems.- Architecture.- Leros: the Return of the Accumulator Machine.- A Generic Functional Simulation of Heterogeneous Systems.- Evaluating Dynamic Task Scheduling in a Task-based Runtime System for Heterogeneous Architectures.- Dynamic Scheduling of Pipelined Functional Units in Coarse-Grained Reconfigurable Array Elements.- Memory Hierarchy.- CyPhOS { A Component-based Cache-Aware Multi-Core Operating System.- Investigation of L2-Cache interferences in a NXP QorIQ T4240 multicore processor.- MEMPower: Data-Aware GPU Memory Power Model.- FPGA.- Effective FPGA Architecture for General CRC.- Receive-Side Notification for Enhanced RDMA in FPGA Based Networks.- An Efficient FPGA Accelerator Design for Optimized CNNs using OpenCL.- Energy Awareness.- The Return of Power Gating: Smart Leakage Energy Reductions in Modern Out-of-Order Processor Architectures.- A Heterogeneous and Reconfigurable Embedded Architecture for Energy-efficient Execution of Convolutional Neural Networks.- An energy efficient embedded processor for hard real-time Java applications.- NoC/SoC.- A Minimal Network Interface for a Simple Network-on-Chip.- Network Coding in Networks-on-Chip with Lossy Links.- Application Specific Reconfigurable SoC Interconnection Network Architectures.

    1 in stock

    £49.49

  • Distributed Computing and Internet Technology: 16th International Conference, ICDCIT 2020, Bhubaneswar, India, January 9–12, 2020, Proceedings

    Springer Nature Switzerland AG Distributed Computing and Internet Technology: 16th International Conference, ICDCIT 2020, Bhubaneswar, India, January 9–12, 2020, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the proceedings of the 16th International Conference on Distributed Computing and Internet Technology, ICDCIT 2020, held in Bhubaneswar, India, in January 2020. The 20 full and 3 short papers presented in this volume were carefully reviewed and selected from 110 submissions. In addition, the book included 6 invited papers. The contributions were organized in topical sections named: invited talks; concurrent and distributed systems modelling and verification; cloud and grid computing; social networks, machine learning and mobile networks; data processing and blockchain technology; and short papers. Table of ContentsInvited Talks.- Graph Analytics.- A distributed and trusted web of formal proofs.- Prosperos Books: A Distributed Architecture for AI.- Trust: Anthropomorphic Algorithmic.- A Very Gentle Introduction to Multiparty Session Types.- Constructing Knowledge Graph from Data Catalogues.- Concurrent and Distributed Systems Modelling and Verification.- Round-Message Trade-off in Distributed Steiner Tree Construction in the CON GEST model.- An Efficient Message Transmission and Verification Scheme for VANETs.- Generalised Dining Philosophers as Feedback Control.- Verifying Implicitly Quantified Modal Logic over dynamic networks of processes.- Cloud and Grid Computing.- Secure Content-based Image Retrieval using Combined Features in Cloud.- Design of a Scheduling Approach for Budget-deadline Constrained Applications in Heterogeneous Clouds.- Resource Scheduling for Tasks of a Workflow in Cloud Environment.- Bearing Fault Classification using Wavelet Energy and Autoencoder.- Social Networks, Machine Learning and Mobile Networks.- Community Detection in Social Networks using Deep Learning.- Multi-Winner Heterogeneous Spectrum Auction Mechanism for Channel Allocation in Cognitive Radio Networks.- A Hybrid Approach for Fake News Detection in Twitter based on User Features and Graph Embedding.- Online Context-Adaptive Energy-Aware Security Allocation in Mobile Devices: A Tale of Two Algorithms.- A Framework Towards Generalized Mid-term Energy Forecasting Model for Industrial Sector in Smart Grid.- An Online Low-Cost System for Air Quality Monitoring, Prediction, and Warning.-Word2vecs Distributed Word Representation for Hindi Word Sense Disambiguation.- Text Document Clustering using Community Discovery Approach.- Data Processing and Blockchain Technology.- An Efficient and Novel Buyer and Sellers Distributed Ledger Based Protocol Using Smart Contracts.- Distributed and Lazy Auditing of Outsourced Data HealthChain: A Secure Scalable Health Care Data Management System Using Blockchain.- HealthChain: A Secure Scalable Health Care Data Management System Using Blockchain.- Transcript Management Using Blockchain enabled Smart Contracts.- Short Papers.- Identifying Reduced Features based on IG-Threshold for DoS Attack Detection using PART.- Uniform Circle Formation by Swarm Robots Under Limited Visibility.- Histopathological Image Classification by Optimized Neural Network using IGSA.

    1 in stock

    £62.99

  • High Performance Computing: 35th International Conference, ISC High Performance 2020, Frankfurt/Main, Germany, June 22–25, 2020, Proceedings

    Springer Nature Switzerland AG High Performance Computing: 35th International Conference, ISC High Performance 2020, Frankfurt/Main, Germany, June 22–25, 2020, Proceedings

    15 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 35th International Conference on High Performance Computing, ISC High Performance 2020, held in Frankfurt/Main, Germany, in June 2020.*The 27 revised full papers presented were carefully reviewed and selected from 87 submissions. The papers cover a broad range of topics such as architectures, networks & infrastructure; artificial intelligence and machine learning; data, storage & visualization; emerging technologies; HPC algorithms; HPC applications; performance modeling & measurement; programming models & systems software. *The conference was held virtually due to the COVID-19 pandemic.Chapters "Scalable Hierarchical Aggregation and Reduction Protocol (SHARP) Streaming-Aggregation Hardware Design and Evaluation", "Solving Acoustic Boundary Integral Equations Using High Performance Tile Low-Rank LU Factorization", "Scaling Genomics Data Processing with Memory-Driven Computing to Accelerate Computational Biology", "Footprint-Aware Power Capping for Hybrid Memory Based Systems", and "Pattern-Aware Staging for Hybrid Memory Systems" are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.Table of ContentsArchitectures, Networks & Infrastructure.- Artificial Intelligence and Machine Learning.- Data, Storage & Visualization.- Emerging Technologies.- HPC Algorithms.- HPC Applications.- Performance Modeling & Measurement.- Programming Models & Systems Software.

    15 in stock

    £66.49

  • Automotive Software Architectures: An

    Springer Nature Switzerland AG Automotive Software Architectures: An

    1 in stock

    Book SynopsisThis book introduces the concept of software architecture as one of the cornerstones of software in modern cars. Following a historical overview of the evolution of software in modern cars and a discussion of the main challenges driving that evolution, Chapter 2 describes the main architectural styles of automotive software and their use in cars’ software. Chapter 3 details this further by presenting two modern architectural styles, i.e. centralized and federated software architectures. In Chapter 4, readers will find a description of the software development processes used to develop software on the car manufacturers’ side. Chapter 5 then introduces AUTOSAR – an important standard in automotive software. Chapter 6 goes beyond simple architecture and describes the detailed design process for automotive software using Simulink, helping readers to understand how detailed design links to high-level design. The new chapter 7 reports on how machine learning is exploited in automotive software e.g. for image recognition and how both on-board and off-board learning are applied. Next, Chapter 8 presents a method for assessing the quality of the architecture – ATAM (Architecture Trade-off Analysis Method) – and provides a sample assessment, while Chapter 9 presents an alternative way of assessing the architecture, namely by using quantitative measures and indicators. Subsequently Chapter 10 dives deeper into one of the specific properties discussed in Chapter 8 – safety – and details an important standard in that area, the ISO/IEC 26262 norm. Lastly, Chapter 11 presents a set of future trends that are currently emerging and have the potential to shape automotive software engineering in the coming years. This book explores the concept of software architecture for modern cars and is intended for both beginning and advanced software designers. It mainly aims at two different groups of audience – professionals working with automotive software who need to understand concepts related to automotive architectures, and students of software engineering or related fields who need to understand the specifics of automotive software to be able to construct cars or their components. Accordingly, the book also contains a wealth of real-world examples illustrating the concepts discussed and requires no prior background in the automotive domain. Compared to the first edition, besides the two new chapters 3 and 7 there are considerable updates in chapters 5 and 8 especially.Table of Contents1 Introduction.- 2. Software Architectures—Views and Documentation.- 3. Contemporary Software Architectures: Federated and Centralized.- 4. Automotive Software Development.- 5. AUTOSAR (AUTomotive Open System ARchitecture).- 6. Detailed Design of Automotive Software.- 7. Machine Learning in Automotive Software.- 8. Evaluation of Automotive Software Architectures.- 9. Metrics for Software Design and Architectures.- 10. Functional Safety of Automotive Software.- 11. Current Trends in Automotive Software Architectures.- 12 Summary.

    1 in stock

    £55.99

  • Supercomputing Frontiers: 7th Asian Conference,

    Springer International Publishing AG Supercomputing Frontiers: 7th Asian Conference,

    1 in stock

    Book SynopsisThis open access book constitutes the refereed proceedings of the 7th Asian Conference Supercomputing Conference, SCFA 2022, which took place in Singapore in March 2022. The 8 full papers presented in this book were carefully reviewed and selected from 21 submissions. They cover a range of topics including file systems, memory hierarchy, HPC cloud platform, container image configuration workflow, large-scale applications, and scheduling.Table of ContentsVapor condensation under electric field: A study using molecular dynamics simulation.- High performance parallel LOBPCG method for large Hamiltonian derived from Hubbard model on multi-GPU systems.- The effect of wing mass and wing elevation motion during insect forward flight.- On the Difference between Shared Memory and Shared Address Space in HPC Communication.- Evaluating GPU Programming Models for the LUMI Supercomputer.- Memory hierarchy.- HPC cloud platform, container image configuration workflow.- scheduling.- .Evaluating methods of transferring large datasets.- Service Function Chaining Design & Implementation Using Network Service Mesh in Kubernetes.

    1 in stock

    £31.49

  • Walter de Gruyter Modellierung Betrieblicher Informationssysteme:

    1 in stock

    Book Synopsis

    1 in stock

    £49.46

  • BASIC-Wegweiser für den Commodore 64:

    Springer Fachmedien Wiesbaden BASIC-Wegweiser für den Commodore 64:

    1 in stock

    Book SynopsisDas Wegweiser-Buch weist Wege zum erfolgreichen Einsatz des Commo­ dore 64. Das Wegweiser-Buch vermittelt aktuelles Grundlagenwissen zur Datenver­ arbeitung bzw. Informatik: -Was ist Hardware, Software und Firmware? - Was sind Großcomputer und Mikrocomputer? - Was sind Datenstrukturen und Programmstrukturen? -Was sind Betriebssysteme und Anwenderprogramme? - Was heißt ,fertige Programm-Pakete einsetzen'? -Was beinhaltet das eigene Programmieren? Nach der Lektüre dieses Abschnitts sind Sie in der Lage, den Commodore 64 in den Gesamtrahmen des Gebiets "Datenverarbeitung/Informatik" einzu­ ordnen. Das Wegweiser-Buch gibt eine erste Bedienungsanleitung: -Wie bediene ich Tastatur, Bildschirm, Floppy bzw. Disketteneinheit und Drucker des Commodore 64? -Wie erstelle ich mein erstes Programm in der Programmiersprache BASIC 2.0? -Welche Befehle umfaßt BASIC 2.0 (zu jedem Befehl wird ein Beispiel an­ gegeben)? -Welche Möglichkeiten bieten die drei Sprachversionen BASIC 2.0, BASIC 4.0 und SIMON's BASIC? - Laufen die Programme des Commodore 64 auf anderen Mikrocomputern von Commodore? Nach dem Durcharbeiten dieses Abschnitts können Sie Ihren Commodore 64 bedienen, Programme laufen lassen und einfache BASIC-Programme selbst erstellen und speichern. Das Wegweiser-Buch enthält einen kompletten Programmierkurs mit folgen­ den grundlegenden BASIC-Anwendungen: - Programme mit den wichtigen Ablaufstrukturen (Folge-, Auswahl-, W- derholungs-und Unterprogrammstrukturen). - Verarbeitung von Text, Ein-/Ausgabe und Tabellen. - Maschinennahe Programmierung( ... Bit für Bit). - Suchen, Sortieren, Mischen und Gruppieren von Daten. - Sequentielle Datei und Direktzugriff-Datei mit den Sprachen BASIC 2.0 und BASIC 4.0. Vorwort VI - Normale Grafik mit der Standardsprache BASIC 2.0. - Hl RES-Grafik und Sprite-Grafik mit SIMON's BASIC.Table of Contents1 Computer allgemein.- 2 Einstieg in die BASIC-Programmierung des Commodore 64.- 3 Programmierkurs mit BASIC 2.0, BASIC 4.0 und SIMON’s BASIC.- Programmverzeichnis.- Sachwortverzeichnis.

    1 in stock

    £52.24

  • Springer Fachmedien Wiesbaden Rechneraufbau am konkreten Beispiel: Dargestellt

    1 in stock

    Book SynopsisTable of Contents1: Einleitung.- 1.1 Zielsetzung und Strategie.- 1.2 Inhaltlicher Aufbau.- 2: Computersysteme im Überblick.- 2.1 Grundlagen.- 2.2 Einordnung und Spezifikation.- 2.3 Übungen.- 3: Bestandteile des Computersystems.- 3.1 Grundlagen.- 3.2 Hardware-Einheiten.- 3.2.1 Konfiguration der Basiseinheit.- 3.2.2 Anschluß der peripheren Einheiten.- 3.3 Software-Architektur.- 3.3.1 User Interface Toolbox.- 3.3.2 Betriebssystem.- 3.4 Übungen.- 4: Systemkern - Die Hauptplatine.- 4.1 Grundlagen.- 4.2 Organisationsstruktur der Hauptplatine.- 4.3 Prozessor/Coprozessor.- 4.3.1 68 020 – Prozessor.- Architektur.- Mikrocode.- Befehlsabarbeitung.- Leistungsmerkmale.- Registersatz.- Programmierung.- Signalleitungen.- Busstruktur und Buszyklen.- Coprozessor-Schnittstelle.- 4.3.2 68 881 - Floating Point Coprozessor.- 4.4 Speicherorganisation.- 4.4.1 Speicherverwaltung.- AMU - Address Mapping Unit.- PMMU - Paged Memory Management Unit.- 4.4.2 Hauptspeicher.- RAM-Bereich.- ROM-Bereich.- 4.5 Schnittstellen-Bausteine.- 4.5.1 VIA - Versatile Interface Adapter.- 4.5.2 SCC - Serial Communication Controller.- 4.5.3 SCSI - Small Computer System Interface.- 4.6 Spezial-Bausteine.- 4.6.1 ASIC-Entwurf.- 4.6.2 Beispiele.- ASC - Apple Sound Chip.- IWM - Integrated Woz Machine.- GLUE - General Logic Unit.- 4.7 Bussysteme.- 4.7.1 ADB - Apple Desktop Bus.- 4.7.2 SCSI –Bus.- 4.8 NuBus-Systemerweiterung.- 4.8.1 Standard-NuBus.- 4.8.2 Apple-NuBus.- 4.8.3 Erweiterungskarten.- 4.9 Übungen.- 5: Peripherieeinheiten des Systems.- 5.1 Grundlagen.- 5.2 Eingabeperipherie.- 5.2.1 Tastatur.- 5.2.2 Maus.- 5.3 Ausgabeperipherie.- 5.3.1 Videosystem.- Grafikkarte.- Monitor.- 5.3.2 Drucker.- Nadeldrucker.- Laserdrucker.- 5.4 Speicherperipherie.- 5.4.1 Magnetisctie Speichermedien.- Diskettenlaufwerke.- Festplatten.- 5.4.2 Optische Speichermedien.- 5.5 Kommunikationsperipherie.- 5.5.1 AppleTalk – Netzwerk.- 5.5.2 MS-DOS – Verbindung.- 5.5.3 Ethernet – Anschluß.- 5.6 Übungen.- 6: Neuentwiciclungen.- 6.1 Prozessoren.- MC 68.- MC 68.- 6.2 Computersysteme.- A: Entwicklungsgeschichte des Macintosh.- B: Lösungen ausgewählter Übungsaufgaben.- C: Literaturverzeichnis.- D: Verzeichnis der Grafiken, Bilder und Tabellen.- E: Verzeichnis der Abkürzungen und Akronyme.- F: Sachwortverzeichnis.

    1 in stock

    £44.64

  • A Pathology of Computer Viruses

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG A Pathology of Computer Viruses

    15 in stock

    Book SynopsisThe 1980's saw the advent of widespread (and potentially damaging) computer virus infection of both personal computer and mainframe systems. The computer security field has been comparatively slow to react to this emerging situation. It is only over the last two years that a significant body of knowledge on the operation, likely evolution and prevention of computer viruses has developed. A Pathology of Computer Viruses gives a detailed overview of the history of the computer virus and an in-depth technical review of the principles of computer virus and worm operation under DOS, Mac, UNIX and DEC operating systems. David Ferbrache considers the possible extension of the threat to the mainframe systems environment and suggests how the threat can be effectively combatted using an antiviral management plan. The author addresses the latest developments in "stealth" virus operations, specifically the trend for virus authors to adopt extensive camouflage and concealment techniques, which allow viruses to evade both existing anti-viral software and to avoid detection by direct observation of machine behaviour. A Pathology of Computer Viruses addresses a distinct need - that of the computer specialist and professional who needs a source reference work detailing all aspects of the computer virus threat.Table of Contents1 Introduction.- 1.1 Preamble.- 1.2 What is a Computer Virus?.- 1.3 Worms: Networked Viruses.- 1.4 Terminology.- 2 Historical Perspectives.- 2.1 Introduction.- 2.2 1960s: Early Rabbits.- 2.3 1970s: Fiction and the Worm.- 2.4 1980–1983: Genesis.- 2.5 1984–1986: Exodus.- 2.6 1987: Mac, Atari and Amiga Next.- 2.7 1988: Proliferation and Disbelief.- 2.7.1 January-March.- 2.7.2 April-September.- 2.7.3 October-December.- 2.8 1989: Reaction by the Community.- 2.8.1 January-March.- 2.8.2 April-June.- 2.8.3 July-September.- 2.8.4 October-December.- 2.9 1990: Organisation and Litigation.- 2.9.1 January-April.- 2.9.2 May-September.- 2.9.3 October-December.- 2.10 Summary.- 3 Theory of Viruses.- 3.1 Introduction.- 3.2 Addition of Viral Code.- 3.3 Detection of Viruses.- 3.4 Classes of Viruses.- 3.5 Thompson: and Trusting Trust.- 3.6 Biological Analogies.- 3.6.1 Biological Viruses.- 3.6.2 Parallels Between Low Level Operation.- 3.6.3 High Level Parallels.- 3.7 Quest for Life.- 3.8 Evolution: Genetic Algorithms.- 3.8.1 Random Mutation.- 3.8.2 Programmed Mutation.- 3.8.3 Genetic Algorithms.- 3.8.4 Growth and Death.- 4 Operation of PC Viruses.- 4.1 Introduction.- 4.2 PC Boot Sequence: Initialisation.- 4.3 BIOS and DOS.- 4.4 Master Boot Record.- 4.5 DOS Boot Sector.- 4.6 System Initialisation.- 4.7 Batch Processing Viruses.- 4.8 COM and EXE Viruses.- 4.8.1 Non-overwriting Prepending COM Infectors.- 4.8.2 Overwriting COM Infectors.- 4.8.3 Non-overwriting Appending COM Infectors.- 4.8.4 EXE Viruses.- 4.9 Resident and Transient Viruses.- 4.10 Manipulation by Viral Code.- 4.11 Activation Criteria.- 4.12 Camouflage.- 4.12.1 Concealment in Infected Files.- 4.12.2 Encryption of Viral Code.- 4.12.3 Hiding of Viral Code.- 4.12.4 Checksum Calculation.- 4.12.5 Prevention of Alteration Detection.- 4.12.6 Concealment of Viral Code in Memory.- 4.12.7 Concealment of Viral Activity.- 4.12.8 Concealing Disk Activity.- 4.12.9 Concealing System Slowdown.- 4.13 Replication.- 4.13.1 Locating a Host.- 4.13.2 Signatures.- 4.13.3 Miscellaneous Topics.- 4.13.3.1 Corresponding File Virus.- 4.13.3.2 SYS Virus.- 4.13.3.3 Multi-vector Viruses.- 4.13.3.4 Multi-architecture Viruses.- 4.13.3.5 Architecture Dependent Viruses.- 5 Management of PC Viruses.- 5.1 Perspective on Security.- 5.2 Components of a Virus Control Scheme.- 5.3 Prevention of Virus Attack.- 5.3.1 Physical Access Constraints.- 5.3.2 Electronic Measures.- 5.3.2.1 Physical Feature Verification.- 5.3.2.2 Knowledge Verification.- 5.3.2.2.1 Passwords.- 5.3.2.2.2 Background Verification.- 5.3.2.2.3 Other Techniques.- 5.3.2.3 Possession Verification.- 5.3.3 Media Access Controls.- 5.3.4 Network Access Controls.- 5.3.4.1 Identification of Access Controls.- 5.3.4.1.1 Centralised Network File Servers.- 5.3.4.1.2 Distributed Trust.- 5.3.4.1.3 Network Transport by Public Carrier or Accessible Media.- 5.3.5 Ideological Controls.- 5.3.5.1 User Education.- 5.3.6 Management Policies.- 5.3.6.1 Training of Employees.- 5.3.6.2 Use of Anti-viral Measures.- 5.3.6.3 Compartmentalisation.- 5.3.6.4 Centralisation.- 5.3.6.5 Personnel Policies.- 5.3.7 Vaccination and Inoculation.- 5.4 Detection of Viral Code.- 5.4.1 Monitoring and Logging.- 5.4.2 Signature Recognition.- 5.4.3 Generic Code Recognition.- 5.4.4 Sacrificial Lamb.- 5.4.5 Auditing.- 5.4.6 Use of Expert Systems to Analyse Viral Behaviour.- 5.4.7 Fighting Fire with Fire.- 5.5 Containment of Viral Code.- 5.5.1 Hardware Compartmentalisation.- 5.5.1.1 Virtual Machine.- 5.5.1.1.1 80386 Task Switching Support.- 5.5.1.1.2 80386 Paged Segmented Memory.- 5.5.1.1.3 Accessing OS Code.- 5.5.1.1.4 Segment Permissions.- 5.5.1.1.5 Paged Memory Operation.- 5.5.1.1.6 Input/Output Operations.- 5.5.1.1.7 Virtual Machine in Software.- 5.5.1.2 Automatic Flow Verification.- 5.5.1.3 Software Distribution: Ensuring Trust.- 5.5.2 Software Compartmentalisation.- 5.5.2.1 Interrupt Trapping Code.- 5.5.2.1.1 Configurable Monitors.- 5.5.2.1.2 Operation of a Monitor.- 5.5.2.1.3 Extensions to Real Time Monitoring.- 5.5.2.2 OS Support.- 5.5.3 Network Compartmentalisation.- 5.5.4 Investigation and Response.- 5.5.4.1 What is the Infection?.- 5.5.4.1.1 Acquisition.- 5.5.4.1.2 Logging of Relevant Information.- 5.5.4.1.3 Disassembly.- 5.5.4.2 Dissemination of Information.- 5.5.4.3 General Containment.- 5.5.4.4 Tracing of Infection Source.- 5.5.5 Disinfection of Viral Code.- 5.5.5.1 Re-installation.- 5.5.5.2 Recompilation from Source.- 5.5.6 Checking for Re-infection.- 5.5.7 Disinfection Utilities.- 5.6 Recovery from Viral Infection.- 5.6.1 Backup Procedures.- 5.7 Contingency Planning.- 5.7.1 Redundancy.- 5.7.2 Insurance.- 5.7.3 Public Relations.- 5.8 Remedial Action.- 6 Apple Macintosh Viruses.- 6.1 Introduction.- 6.2 Macintosh: The Abstract Operating System.- 6.2.1 Initialisation.- 6.2.2 Resources.- 6.2.3 Trap Dispatch Table Structure.- 6.2.4 Non-link Viruses.- 6.2.5 Link Viruses.- 6.2.6 Notes on Keyboard Sequences.- 6.2.7 Summary of Mac Protection.- 7 Mainframe Systems: The Growing Threat.- 7.1 Introduction.- 7.2 Hardware Architectures.- 7.3 Software Architecture.- 7.3.1 Discretionary Access Controls.- 7.3.2 Integrity versus Confidentiality.- 7.3.3 Mandatory Access Controls.- 7.3.4 Commentary on Security Standardisation.- 7.4 UNIX: A Viral Risk Assessment.- 7.4.1 System Startup.- 7.4.2 Login and User Commands.- 7.4.3 Bugs and Loopholes.- 7.4.4 Mechanics of UNIX Viruses.- 7.4.4.1 Batch Viruses.- 7.4.4.2 Link Viruses.- 7.4.4.3 Dynamic Loading.- 7.4.4.4 Other Considerations.- 7.4.4.5 Protecting Against UNIX Viruses.- 7.4.4.6 Cohen: Early UNIX Viruses.- 8 Network Viruses: The Worms.- 8.1 Introduction.- 8.2 Standardisation.- 8.3 History of Network Pests.- 8.3.1 Early Work: Pre-1980.- 8.3.2 Recent Benign and Malicious Worms.- 8.3.3 CHRISTMA EXEC Chain Letter.- 8.3.4 Chain Letters on UNIX.- 8.4 Internet Protocols.- 8.4.1 Architecture.- 8.4.2 Peer Authentication.- 8.4.3 Access Controls.- 8.4.4 Data Stream Integrity.- 8.4.5 Daemons and Servers.- 8.4.6 Distributed Trust.- 8.4.7 Trusted Ports.- 8.4.8 Problems and Solutions.- 8.4.9 Internet Worm: Black Thursday — 3 November 1988.- 8.4.9.1 Internals.- 8.4.9.2 Action and Reaction.- 8.4.9.3 The Aftermath.- 8.4.10 DISNET: A Child of the Internet.- 8.5 OSI: Security in the Making.- 8.6 DECNET: Insecurity Through Default.- 8.6.1 HI.COM: The Christmas Worm.- 8.6.1.1 Reaction of the DECNET Community.- 8.6.1.2 Worms Against Nuclear Killers.- 9 Reactions of the IT Community.- 9.1 Discussion and Advice.- 9.1.1 Bulletin Board and Casual Users.- 9.1.2 Academic Establishments.- 9.1.2.1 CREN/CSNET.- 9.1.2.2 NSFNET.- 9.1.2.3 HEPNET/SPAN.- 9.1.2.4 General Community Responses.- 9.1.3 Government Research Organisations.- 9.1.4 Military Organisations.- 9.1.5 Commercial Organisations.- 9.1.6 Criminal Investigation Organisations.- 9.1.7 Professional Organisations.- 9.2 Legislative Issues.- 9.2.1 Scottish Law Commission.- 9.2.2 English Law Commission.- 9.2.3 Computer Misuse Act.- 9.2.4 Summary of Legislation.- 9.3 Professionalism and Software Development.- 10 Conclusions: The Future Ahead.- Appendices.- 1 DOS Filestore Structure.- 1.1 Introduction.- 1.2 Master Boot Record.- 1.3 DOS Boot Sector.- 1.4 File Allocation Table.- 1.5 Root Directory.- 2 Low Level Disk Layout.- 3 EXE File Format.- 4 Mac Filestore Structure.- 5 PC Virus Relationship Chart.- 6 Macintosh Virus Relationship Chart.- 7 PC Boot Sequence.- 8 AIDS Trojan: Accompanying Licence.- 9 Software Infected at Source.- 10 Nomenclature.- 10.1 Types of Virus.- 10.1.1 Master Boot Sector Viruses.- 10.1.2 DOS Boot Sector Viruses.- 10.1.3 Executable COM/EXE Viruses.- 10.1.4 Memory Resident Viruses.- 10.1.5 Overwriting Viruses.- 10.1.6 Prepending Viruses.- 10.1.7 Appending Viruses.- 10.2 Generations of Virus.- 10.3 Classes of Anti-virus Product.- 11 UNIX Boot Sequence.- 12 CERT Press Release.- 13 CERT/CIAC Advisories.- 14 Contact Points.- 15 Abbreviations.- 16 Further Reading.- 17 Virus-1 Archive Sites.- 18 Relative Frequencies of IBM Viruses.

    15 in stock

    £42.74

  • Pearl 2000: Echtzeitbetriebssysteme und LINUX

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Pearl 2000: Echtzeitbetriebssysteme und LINUX

    15 in stock

    Book SynopsisLeitthema des vorliegenden Tagungsbandes ist die Eignung von LINUX für Echtzeit-Aufgaben. Dieser Frage wird zunächst in einem Grundsatz-Beitrag nachgegangen, gefolgt von anspruchsvollen Erfahrungsberichten. Ergänzt werden sie durch Untersuchungen zur Zusammenarbeit mit digitalen Signalprozessoren. Vervollständigt wird der LINUX-Schwerpunkt durch traditionelle Themen aus der Echtzeitprogrammierung. Echtzeit-Betriebssysteme und Anwendungsberichte runden den Band ab.Table of ContentsEchtzeit und LINUX.- Die Eignung von Linux für zeitkritische Anwendungen.- Routing mit QoS-Eigenschaften unter LINUX.- Realzeitfähige serielle Datenübertragung mit Fehlerkorrektur.- Konzeption von Echtzeitbetriebssystemen.- Orthogonale Walsh-Korrelation zur qualitativen Beurteilung der Reaktivität von Betriebssystemen.- OSEK/VDX-OS — Betriebssystemstandard für Steuergeräte in Kraftfahrzeugen.- Integration von Open Source Betriebssystemen in industriellen Embedded Networking Devices.- Anwendungen.- Online Datenmanagement mit LINUX auf dem Forschungsschiff Sonne.- Multimedia Home Platform (MHP) für das digitale Fernsehen (DVB).- System-Entwicklung.- Die kombinierte Verwendung von UML und PASS.- Geräteübergreifendes webbasierendes Servicekonzept für den Anlagenbau.- Set-Top-Boxen für den digitalen Fernsehempfang.- Embedded LINUX.- Signalprozessoren als Koprozessoren für LINUX.- Linux für eingebettete Systeme.- Erfahrungen mit Embedded LINUX.

    15 in stock

    £44.64

  • Job Scheduling Strategies for Parallel

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Job Scheduling Strategies for Parallel

    15 in stock

    Book SynopsisThis volume contains the papers selected after a very careful refereeing process for presentation during the Workshop on Job Scheduling Stategies for Parallel Processing, held in Santa Barbara, California, as a prelude to the IPPS '95 conference in April 1995.The 19 full papers presented demonstrate that parallel job scheduling takes on a crucial role as multi-user parallel supercomputers become more widespread. All aspects of job scheduling for parallel systems are covered, from the perspectives of academic research, industrial design of parallel systems, as well as user needs. Of particular interest, also for nonexpert readers, is the introductory paper "Parallel Job Scheduling: Issues and Approaches" by the volume editors.Table of ContentsParallel job scheduling: Issues and approaches.- Scheduling on the Tera MTA.- A scalable multi-discipline, multiple-processor scheduling framework for IRIX.- Scheduling to reduce memory coherence overhead on coarse-grain multiprocessors.- Time Space Sharing Scheduling and architectural support.- Demand-based coscheduling of parallel jobs on multiprogrammed multiprocessors.- Multiprocessor scheduling for high-variability service time distributions.- The interaction between memory allocation and adaptive partitioning in message-passing multicomputers.- Analysis of non-work-conserving processor partitioning policies.- Loop-Level Process Control: An effective processor allocation policy for multiprogrammed shared-memory multiprocessors.- A microeconomic scheduler for parallel computers.- On the benefits and limitations of dynamic partitioning in parallel computer systems.- Intelligent fuzzy control to augment scheduling capabilities of network queuing systems.- Parallel processing on dynamic resources with CARMI.- Job scheduling under the Portable Batch System.- The ANL/IBM SP scheduling system.- Requirements of the Cornell Theory Center for resource management and process scheduling.- Job management requirements for nas parallel systems and clusters.- Job characteristics of a production parallel scientific workload on the NASA Ames iPSC/860.

    15 in stock

    £42.74

  • Cloud Computing and Virtualization

    VDM Verlag Cloud Computing and Virtualization

    15 in stock

    15 in stock

    £38.64

  • Introduction to Reliable and Secure Distributed

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Introduction to Reliable and Secure Distributed

    15 in stock

    Book SynopsisIn modern computing a program is usually distributed among several processes. The fundamental challenge when developing reliable and secure distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail. Failures may range from crashes to adversarial attacks by malicious processes.Cachin, Guerraoui, and Rodrigues present an introductory description of fundamental distributed programming abstractions together with algorithms to implement them in distributed systems, where processes are subject to crashes and malicious attacks. The authors follow an incremental approach by first introducing basic abstractions in simple distributed environments, before moving to more sophisticated abstractions and more challenging environments. Each core chapter is devoted to one topic, covering reliable broadcast, shared memory, consensus, and extensions of consensus. For every topic, many exercises and their solutions enhance the understanding This book represents the second edition of "Introduction to Reliable Distributed Programming". Its scope has been extended to include security against malicious actions by non-cooperating processes. This important domain has become widely known under the name "Byzantine fault-tolerance". Table of Contents1. Introduction. - 1.1 Motivation. -1.2 Distributed Programming Abstractions. 1.3 The End-to-End Argument. 1.4 Software Components. - 1.5 Classes of Algorithms. -1.6 Chapter Notes. 2. Basic Abstractions. - 2.1 Distributed Computation. - 2.2 Abstracting Processes. - 2.3 Cryptographic Abstractions. - 2.4 Abstracting Communication. - 2.5 Timing Assumptions. - 2.6 Abstracting Time. - 2.7 Distributed-System Models. - 2.8 Exercises. - 2.9 Solutions. - 2.10 Chapter Notes . - . - 3. Reliable Broadcast. - 3.1 Motivation. - 3.2 Best-Effort Broadcast. - 3.3 Regular Reliable Broadcast. - 3.4 Uniform Reliable Broadcast. - 3.5 Stubborn Broadcast. - 3.6 Logged Best-Effort Broadcast. - 3.7 Logged Uniform Reliable Broadcast. - 3.8 Probabilistic Broadcast. - 3.9 FIFO and Causal Broadcast. - 3.10 Byzantine Consistent Broadcast. - 3.11 Byzantine Reliable Broadcast. - 3.12 Byzantine Broadcast Channels. - 3.13 Exercises. - 3.14 Solutions. - 3.15 Chapter Notes . - . - 4. Shared Memory. - 4.1 Introduction. - 4.2 (1, N) Regular Register. - 4.3 (1, N) Atomic Register. - 4.4 (N, N) Atomic Register. - 4.5 (1, N) Logged Regular Register. - 4.6 (1,N) Byzantine Safe Register. - 4.7 (1, N) Byzantine Regular Register. - 4.8 (1,N) Byzantine Atomic Register. - 4.9 Exercises. - 4.10 Solutions. - 4.11 Chapter Notes . - . - 5. Consensus. - 5.1 Regular Consensus. - 5.2 Uniform Consensus. - 5.3 Uniform Consensus in the Fail-Noisy Model. - 5.4 Logged Consensus. - 5.5 Randomized Consensus. - 5.6 Byzantine Consensus. - 5.7 Byzantine Randomized Consensus. - 5.8 Exercises. - 5.9 Solutions. - 5.10 Chapter Notes . - . - 6. Consensus Variants. - 6.1 Total-Order Broadcast. - 6.2 Byzantine Total-Order Broadcast. - 6.3 Terminating Reliable Broadcast. - 6.4 Fast Consensus. - 6.5 Fast Byzantine Consensus. - 6.6 Non-blocking Atomic Commit. - 6.7 Group Membership. - 6.8 View-Synchronous Communication. - 6.9 Exercises. - 6.10 Solutions. - 6.11 Chapter Notes . - . - 7. Concluding Remarks. - 7.1 Implementation in Appia. - 7.2 Further Implementations. - 7.3 Further Reading

    15 in stock

    £71.24

  • PowerShell für die Windows-Administration: Ein

    Springer Fachmedien Wiesbaden PowerShell für die Windows-Administration: Ein

    1 in stock

    Book SynopsisDas Buch stellt die Windows PowerShell als vielseitiges Werkzeug für die Administration von Windows Server 2008 R2/2012/2012 R2 vor. Es beschreibt zunächst die Kernkonzepte wie Cmdlets, Pipeline und Objekte und stellt danach die PowerShell in der Praxis vor, wobei typische Einsatzszenarien bei der Windows Server-Administration im Mittelpunkt stehen.Table of ContentsInstallation, Überblick, der erste Start - Befehlseingabe - Cmdlets - Objekte und Pipeline - Laufwerke und Ablagen - Pipeline-Ausgaben formatieren und konvertieren - PowerShell-Skripte - PowerShell-Skriptbefehle - Funktionen - Fehlerbehandlung - WMI - Befehle und Skripte remote ausführen - Zugriff auf das Active Directory - Windows Server-Administration - Ein- und Ausgaben - Grafische Oberflächen - PowerShell-Workflows - Module - Die PowerShell und das .NET Framework - PowerShell-Spezialitäten - Deklaratives Konfigurationsmanagement

    1 in stock

    £34.19

  • Raspberry Pi – Das technische Handbuch:

    Springer Fachmedien Wiesbaden Raspberry Pi – Das technische Handbuch:

    1 in stock

    Book SynopsisAufbau und Funktion des Raspberry Pi werden sachlich und praxisorientiert vorgestellt. Zunächst wird das System in Betrieb gesetzt, um damit eine Grundlage zu schaffen, auf die auch in Problemsituationen zurückgegriffen werden kann. Die Konfigurierung, Optimierung und Programmierung ist von besonderer Bedeutung, weil die gegenüber anderen Architekturen limitierten Ressourcen stets mit zu berücksichtigen sind. Die Schaltungstechnik der verschiedenen Raspberry Pi Boards (A, B, A+, B+, Compute Module) wird ausführlich behandelt. Der Schwerpunkt des Buches liegt auf der Hardware mit den Schnittstellen (LAN, WLAN, GPIO, seriell SPI, I2C, I2S, One-Wire), die für die Kommunikation und den Datenaustausch mit Sensoren und anderen Einheiten prädestiniert sind. Damit sind optimale und zudem kostengünstige Ergebnisse zu erzielen. Dies beinhaltet den Low Power-Betrieb, wie er insbesondere für akkubetriebene und somit für mobile Anwendungen essenziell ist.Die 3. Auflage wurde überarbeitet, erweitert und auf Raspberry Pi 4 aktualisiert.Table of ContentsEinführung: Entwicklung, Open Source, Modelle im Überblick - Schnellstart: Vorbereitung, anschließen und starten - Hardware: ARM-Architektur, Speicher, Ethernet, WLAN, Bluetooth - Konfigurierung und Optimierung: Setup, Netzwerke, Mobilfunk, Audio, Video - Software und Programmiergrundlagen: Firmware, Linux, Windows 10 IoTCore, Programmiersprachen - Hardware-Programmierung: GPIO, UART, SPI, I2C, I2S, One-Wire - Professioneller Einsatz: Low Power-Betrieb, USV, PoE, Compute Module

    1 in stock

    £32.99

  • Betriebssysteme: Grundlagen und Konzepte

    Springer Fachmedien Wiesbaden Betriebssysteme: Grundlagen und Konzepte

    1 in stock

    Book SynopsisDer Autor präsentiert die Grundlagen und Konzepte der heutigen Betriebssysteme und behandelt die Gebiete Prozesse (Prozesszustände, Prozessscheduling, Prozesssynchronisation und Prozesskommunikation), Speicherverwaltung (virtueller Speicher, paging, swapping), Dateiverwaltung (Files, Ordner, Sicherheitsmechanismen), Ein-und Ausgabeverwaltung (Treiber, I/O-memory mapping, Systemfunktionen) sowie Netzwerke (Netzwerkschichten, Arbeitsverteilung, Schattenserver) und Sicherheitsmechanismen (Angriffsarten, root kits, Kerberos). Dabei werden sowohl Einprozessor- als auch Mehrprozessorsysteme betrachtet und die Konzepte an wichtigen existierenden Betriebssystemen wie Unix und Windows NT verdeutlicht.In der vorliegenden vierten Auflage wurden viele Erfahrungen aus der Lehrpraxis berücksichtigt. So wurden nicht nur die Entwicklungen in Windows NT und Unix, speziell Linux, aktualisiert, sondern auch einige Kapitel neu gegliedert und um das Thema „Sicherheit“ ergänzt. Weitere Aufgaben und Beispiele mit Musterlösungen runden das Werk ab. Alle Vorlesungsfolien, die Vorlesungsvideos sowie eine umfangreiche Klausursammlung mit Musterlösungen stehen auf den Webseiten des Autors zum Herunterladen bereit.Table of ContentsVorwort.- Übersicht.- Einleitung.- Prozesse.- Speicherverwaltung.- Dateiverwaltung.- Ein- und Ausgabeverwaltung.- Netzwerkdienste.- Sicherheit.- Benutzeroberflächen.- Musterlösungen.- Modellierung von Trashing.- Literatur.- Index.

    1 in stock

    £42.74

  • Raspberry Pi 3: A Practical Beginner's Guide To

    1 in stock

    £16.19

  • Raspberry Pi 3: A Practical Beginner's Guide To

    1 in stock

    £21.24

  • BPB Publications Problems and Solutions of Operating Systems

    1 in stock

    Book Synopsis

    1 in stock

    £4.86

  • Ediciones Daz de Santos, S.A. Introducción rápida a Matlab y Simulink para

    1 in stock

    Book Synopsis

    1 in stock

    £17.19

  • Linux Server Cookbook: Get Hands-on Recipes to

    BPB Publications Linux Server Cookbook: Get Hands-on Recipes to

    1 in stock

    Book SynopsisThe book will then guide you through new technologies related to automation, containers, and continuous integration/delivery pipelines. Lastly, it will help you explore concepts such as Infrastructure as Code and Infrastructure as a Service and the usage of Linux on Public and Private clouds in detail with multiple examples.

    1 in stock

    £28.49

  • Source Code Exploration with Memcached: A

    BPB Publications Source Code Exploration with Memcached: A

    1 in stock

    Book Synopsis

    1 in stock

    £29.92

  • LPI Linux Essentials 010-160 Questions & Dumps:

    Independently Published LPI Linux Essentials 010-160 Questions & Dumps:

    15 in stock

    Book Synopsis

    15 in stock

    £10.54

  • Bitcoin for everyone step by step guide for

    Independently Published Bitcoin for everyone step by step guide for

    15 in stock

    Book Synopsis

    15 in stock

    £10.64

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account