Operating systems Books
Taylor & Francis Ltd Raspberry Pi OS System Administration with
Book SynopsisThe second in a new series exploring the basics of Raspberry Pi Operating System administration, this installment builds on the insights provided in Volume 1 to provide a compendium of easy-to-use and essential Raspberry Pi OS system administration for the novice user, with specific focus on Python and Python3.The overriding idea behind system administration of a modern, 21st-century Linux system such as the Raspberry Pi OS is the use of systemd to ensure that the Linux kernel works efficiently and effectively to provide these three foundation stones of computer operation and management: computer system concurrency, virtualization, and secure persistence. Exercises are included throughout to reinforce the readers' learning goals with solutions and example code provided on the accompanying GitHub site.This book is aimed at students and practitioners looking to maximize their use of the Raspberry Pi OS. With plenty of practical examples, projects, and exercises, this volTable of ContentsSeries Preface. Volume 2 Preface. 0. "Quick Start" into Sysadmin for the Raspberry Pi OS. 1. Raspberry Pi OS System Administration Fundamentals. 2. Python3. Questions, Problems, and Projects. Index.
£42.74
Taylor & Francis Ltd Tiny Android Projects Using Kotlin
Book SynopsisIn today's fast-paced world, Android development is a rapidly evolving field that requires regular updates to keep up with the latest trends and technologies. Tiny Android Projects Using Kotlin is an excellent resource for developers who want to learn to build Android applications using the latest tools and frameworks.KEY FEATURES Teaches building Android apps using Kotlin, XML, and Jetpack Compose Includes saving data on the device using the Room database library Teaches communication between an Android device and data on the internet using REST API Shows how to create different Android menu navigations using Jetpack Compose Introduces the most architectures used in Android Projects and implements MVVM With Kotlin being the most preferred language for Android development, this book provides a practical, hands-on approach to learning the language and building high-quality Android apps using Kotlin, XML, and Table of ContentsChapter 1 ◾ Introduction and Getting StartedChapter 2 ◾ Basic XML Widgets in AndroidChapter 3 ◾ More on Android XML Views: Project 2 – Quiz App: Part 1Chapter 4 ◾ Intents in Android: Project 2 – Quiz App – Part 2Chapter 5 ◾ Android Fragments and ViewPager2Chapter 6 ◾ Networking in Android Using RetrofitChapter 7 ◾ Google Firebase Services: Project 5 – Tour Guide AppChapter 8 ◾ Android MVVM Architecture: Project 5 – Tour Guide Part 2Chapter 9 ◾ Basic Jetpack Compose ElementsChapter 10 ◾ More on Compose ElementsChapter 11 ◾ Room Database with Jetpack ComposeChapter 12 ◾ Menus and Navigation in Jetpack ComposeAPPENDIX
£42.74
CRC Press Propaganda
Book SynopsisThe book is a modern primer on propagandaâaspects like disinformation, trolls, bots, information influence, psychological operations, information operations, and information warfare. Propaganda: From Disinformation and Influence to Operations and Information Warfare offers a contemporary model for thinking about the subject.The first two decades of the 21st century have brought qualitative and quantitative technological and societal changes, and the subject of information influence needs to be re-ordered. Now is the time.The book explains the origins of the meaning and phenomenon of propagandaâwhere it came from and how it has changed over the centuries. The book also covers modern methods, including artificial intelligence (AI) and advertising technologies. Legal, political, diplomatic, and military considerations ensure that the material is covered in depth.The book is recommended for security and cybersecurity professionals (both technical and non-tech
£42.74
O'Reilly Media Learning Modern Linux
Book SynopsisIf you use Linux in development or operations and need a structured approach to help you dive deeper, this book is for you. Author Michael Hausenblas also provides tips and tricks for improving your workflow with this open source operating system.
£39.74
O'Reilly Media Ansible Up and Running
Book SynopsisWith this updated third edition, you'll quickly learn how to be productive with Ansible whether you're a developer deploying code or a system administrator looking for a better automation solution.
£39.74
O'Reilly Linux Pocket Guide
Book Synopsis
£20.39
John Wiley & Sons Inc Shell Scripting
Book SynopsisA compendium of shell scripting recipes that can immediately be used or adjusted The Shell is the primary way of communicating with Unix and Linux and provides a direct way to program the system by automating simple-to-intermediate tasks.Table of ContentsIntroduction xxix Part I: About the Ingredients Chapter 1: The History of Unix, Gnu, and Linux 3 Unix 3 “Everything is a File” and Pipelines 5 BSD 6 GNU 7 Linux 11 Summary 12 Chapter 2: Getting Started 15 Choosing an OS 15 GNU/Linux 15 The BSDs 17 Proprietary Unix 17 Microsoft Windows 17 Choosing an Editor 18 Graphical Text Editors 18 Terminal Emulation 21 Nongraphical Text Editors 22 Setting Up the Environment 24 The Shell Profile 24 Aliases 26 vim Settings 30 Summary 31 Chapter 3: Variables 33 Using Variables 33 Typing 34 Assigning Values to Variables 35 Positional Parameters 39 Return Codes 42 Unsetting Variables 45 Preset and Standard Variables 47 BASH_ENV 47 BASHOPTS 47 SHELLOPTS 48 BASH_COMMAND 50 BASH_SOURCE, FUNCNAME, LINENO, and BASH_LINENO 51 SHELL 55 HOSTNAME and HOSTTYPE 55 Working Directory 55 PIPESTATUS 55 TIMEFORMAT 56 PPID 57 RANDOM 58 REPLY 58 SECONDS 58 BASH_XTRACEFD 59 GLOBIGNORE 60 HOME 62 IFS 62 PATH 63 TMOUT 64 TMPDIR 65 User Identification Variables 65 Summary 66 Chapter 4: Wildcard Expansion 67 Filename Expansion (Globbing) 67 Bash Globbing Features 70 Shell Options 71 Regular Expressions and Quoting 75 Overview of Regular Expressions 76 Quoting 77 Summary 81 Chapter 5: Conditional Execution 83 If/Then 83 Else 85 elif 85 Test ([) 87 Flags for Test 88 File Comparison Tests 95 String Comparison Tests 96 Regular Expression Tests 98 Numerical Tests 101 Combining Tests 103 Case 105 Summary 109 Chapter 6: Flow Control Using Loops 111 For Loops 111 When to Use for Loops 112 Imaginative Ways of Feeding “for” with Data 112 C-Style for Loops 118 while Loops 119 When to Use while Loops 119 Ways to Use while Loops 119 Nested Loops 125 Breaking and Continuing Loop Execution 126 while with Case 130 until Loops 131 select Loops 133 Summary 137 Chapter 7: Variables Continued 139 Using Variables 139 Variable Types 141 Length of Variables 142 Special String Operators 144 Stripping Variable Strings by Length 144 Stripping from the End of the String 146 Stripping Strings with Patterns 147 Searching Strings 151 Using Search and Replace 151 Replacing Patterns 153 Deleting Patterns 153 Changing Case 153 Providing Default Values 153 Indirection 157 Sourcing Variables 158 Summary 159 Chapter 8: Functions and Libraries 161 Functions 161 Defining Functions 162 Function Output 162 Writing to a File 164 Redirecting the Output of an Entire Function 167 Functions with Trap 171 Recursive Functions 173 Variable Scope 177 Libraries 181 Creating and Accessing Libraries 183 Library Structures 183 Network Configuration Library 187 Use of Libraries 191 getopts 191 Handling Errors 194 getopts within Functions 195 Summary 197 Chapter 9: Arrays 199 Assigning Arrays 199 One at a Time 200 All at Once 200 By Index 201 All at Once from a Source 201 Read from Input 203 Accessing Arrays 205 Accessing by Index 205 Length of Arrays 206 Accessing by Variable Index 206 Selecting Items from an Array 209 Displaying the Entire Array 209 Associative Arrays 210 Manipulating Arrays 211 Copying an Array 211 Appending to an Array 213 Deleting from an Array 214 Advanced Techniques 216 Summary 217 Chapter 10: Processes 219 The ps Command 219 ps Line Length 220 Parsing the Process Table Accurately 220 killall 223 The /proc pseudo-filesystem 225 prtstat 226 I/O Redirection 227 Appending Output to an Existing File 229 Permissions on Redirections 229 exec 229 Using exec to Replace the Existing Program 230 Using exec to Change Redirection 231 Pipelines 237 Background Processing 237 wait 238 Catching Hangups with nohup 239 Other Features of /proc and /sys 242 Version 242 SysRq 242 /proc/meminfo 245 /proc/cpuinfo 245 /sys 246 /sys/devices/system/node 251 sysctl 253 Summary 254 Chapter 11: Choosing and Using Shells 255 The Bourne Shell 256 The KornShell 256 The C Shell 256 The Tenex C Shell 257 The Z Shell 257 The Bourne Again Shell 257 The Debian Almquist Shell 258 Dotfiles 258 Interactive Login Shells 259 Interactive Non-Login Shells 260 Non-Interactive Shells 261 Logout Scripts 262 Command Prompts 262 The PS1 Prompt 262 The PS2, PS3, and PS4 Prompts 264 Aliases 265 Timesavers 265 Modifying Behaviors 265 History 266 Recalling Commands 267 Searching History 267 Timestamps 268 Tab Completion 269 ksh 269 tcsh 270 zsh 270 bash 271 Foreground, Background, and Job Control 272 Backgrounding Processes 272 Job Control 273 nohup and disown 275 Summary 276 Part II: Recipes For Using and Extending System Tools Chapter 12: File Manipulation 279 stat 279 cat 281 Numbering Lines 282 Dealing with Blank Lines 282 Non-Printing Characters 283 cat Backwards is tac 284 Redirection 285 Redirecting Output: The Single Greater-Than Arrow (>) 285 Appending: The Double Greater-Than Arrow (>>) 286 Input Redirection: The Single Less-Than Arrow (<) 288 Here Documents: The Double Less-Than Arrow (<< EOF) 290 dd 292 df 294 mktemp 295 join 297 install 298 grep 300 grep Flags 300 grep Regular Expressions 301 split 303 tee 304 touch 306 find 307 find-exec 310 Summary 313 Chapter 13: Text Manipulation 315 cut 315 echo 316 dial1 316 dial2 319 fmt 320 head and tail 323 Prizes 323 World Cup 324 od 328 paste 331 pr 334 printf 335 shuf 337 Dice Thrower 337 Card Dealer 338 Travel Planner 340 sort 341 Sorting on Keys 342 Sorting Log Files by Date and Time 344 Sorting Human-Readable Numbers 345 tr 346 uniq 350 wc 351 Summary 352 Chapter 14: Tools For Systems Administration 353 basename 353 date 355 Typical Uses of date 355 More Interesting Uses of date 359 dirname 360 factor 362 identity, groups, and getent 364 logger 367 md5sum 368 mkfi fo 370 Master and Minions 371 Reversing the Order 373 Networking 375 telnet 376 netcat 376 ping 378 Scripting ssh and scp 381 OpenSSL 383 nohup 390 seq 391 Integer Sequences 391 Floating Point Sequences 393 sleep 394 timeout 394 Shutdown Script 396 Network Timeout 399 uname 400 uuencode 401 xargs 402 yes 405 Summary 406 Part III: Recipes For Systems Administration Chapter 15: Shell Features 409 Recipe 15-1: Installing Init Scripts 409 Technologies Used 410 Concepts 410 Potential Pitfalls 410 Structure 410 Recipe 412 Invocation 414 Summary 414 Recipe 15-2: RPM Report 414 Technologies Used 415 Concepts 415 Potential Pitfalls 415 Structure 415 Recipe 417 Invocation 419 Summary 420 Recipe 15-3: Postinstall Scripts 421 Technologies Used 421 Concepts 421 Potential Pitfalls 422 Structure 422 Recipe 423 Invocation 425 Summary 426 Chapter 16: Systems Administration 427 Recipe 16-1: init Scripts 427 Technologies Used 428 Concepts 428 Potential Pitfalls 429 Structure 430 Recipe 431 Invocation 432 Summary 433 Recipe 16-2: CGI Scripts 433 Technologies Used 433 Concepts 434 Potential Pitfalls 434 Structure 435 Recipe 438 Invocation 441 Summary 445 Recipe 16-3: Configuration Files 445 Technologies Used 445 Concepts 445 Potential Pitfalls 446 Structure 446 Recipe 446 Invocation 447 Summary 448 Recipe 16-4: Locks 448 Technologies Used 448 Concepts 448 Potential Pitfalls 449 Structure 450 Recipe 453 Invocation 455 Summary 458 Chapter 17: Presentation 459 Recipe 17-1: Space Game 459 Technologies Used 459 Concepts 460 Potential Pitfalls 462 Structure 462 Recipe 464 Invocation 469 Summary 470 Chapter 18: Data Storage and Retrieval 471 Recipe 18-1: Parsing HTML 471 Technologies Used 471 Concepts 472 Potential Pitfalls 472 Structure 472 Recipe 473 Invocation 474 Summary 476 Recipe 18-2: CSV Formatting 476 Technologies Used 476 Concepts 476 Potential Pitfalls 477 Structure 477 Recipe 478 Invocation 480 Summary 481 Chapter 19: Numbers 483 Recipe 19-1: The Fibonacci Sequence 483 Technologies Used 483 Concepts 484 Potential Pitfalls 484 Structure for Method 1 485 Recipe for Method 1 486 Invocation of Method 1 486 Structure for Method 2 487 Recipes for Method 2 488 Invocations of Method 2 489 Structure for Method 3 490 Recipe for Method 3 490 Invocation of Method 3 491 Summary 492 Recipe 19-2: PXE Booting 492 Technologies Used 492 Concepts 493 Potential Pitfalls 493 Structure 493 Recipe 494 Invocation 497 Summary 499 Chapter 20: Processes 501 Recipe 20-1: Process Control 501 Technologies Used 501 Concepts 502 Potential Pitfalls 503 Structure 503 Recipe 506 Invocation 511 Summary 516 Chapter 21: Internationalization 517 Recipe 21-1: Internationalization 517 Technologies Used 518 Concepts 518 Potential Pitfalls 519 Structure 520 Recipe 521 Invocation 525 Summary 526 Part IV: Reference Appendix: Further Reading 529 Shell Tutorials and Documentation 529 Arrays 530 Tools 530 Unix Flavors 531 Shell Services 531 Glossary 533 Index 539
£32.00
John Wiley & Sons Inc VCADCV VMware Certified Associate on vSphere
Book SynopsisUse this expert guide to prepare for the VCA-DCV exam VCA-DCV VMware Certified Associate on vSphere Study Guide: VCAD-510 is a comprehensive study guide for the VMware Certified Associate Data Center Virtualization exam. Hands-on examples, real-world scenarios, and expert review questions cover the full exam blueprint, and the companion website offers a suite of tools to help you prepare for the exam including practice exams, electronic flashcards, and a glossary of key terms. In addition, the website includes videos that demonstrate how to complete the more challenging tasks. Focused on practical skills, this study guide not only prepares you for the certification exam, but also for the duties expected of a VCA. The VMware Certified Associate-Data Center Virtualization certification targets those with limited virtualization and VMware data center technology experience, providing a springboard to the popular VMware Certified Professional-Data Center VirtualizaTable of ContentsIntroduction xv Assessment Test xxi Chapter 1 Intro to Virtualization 1 What Is Data Center Virtualization? 2 Virtualization Then and Now 3 Physical and Virtual Data Center Components 4 Physical Data Center Components 4 Virtual Data Center Components 5 Physical and Virtual Component Differences 7 Benefits of Using Virtualization 9 Online Tools 13 Summary 14 Exam Essentials 15 Review Questions 16 Chapter 2 VMware Solutions 21 Availability Challenges 22 VMware Availability Products and Technologies 23 Management Challenges 27 VMware Management Products and Technologies 27 Scalability Challenges 28 VMware Scalability Products and Technologies 29 Optimization Challenges 31 VMware Optimization Products and Technologies 32 Summary 36 Exam Essentials 37 Review Questions 39 Chapter 3 vSphere Core Components 43 Virtual Machines 44 What Is a Virtual Machine, Anyway? 44 What Can You Do with Virtual Machines? 45 ESXi Hypervisor 47 vCenter Server 47 vMotion 48 Distributed Resource Scheduler 49 Distributed Power Management 49 Storage vMotion 50 Storage DRS 50 Ftoc.indd 03/24/2015 Page xi vSphere Data Protection 51 High‐Availability Configuration 51 Fault Tolerance 52 vSphere Replication 52 Migration 53 High Availability 54 Host HA 55 Virtual Machine HA 56 Applications HA 57 Fault Tolerance 57 Clusters and Resource Pools 58 Clusters 58 Resource Pools 59 Other VMware Data Center Products 61 vCenter Operations Manager 61 vSphere Data Protection 62 Nsx 62 Virtual SAN 62 vCenter Site Recovery Manager 62 Summary 63 Exam Essentials 64 Review Questions 65 Chapter 4 Storage in a VMware Environment 71 Physical vs. Virtual Storage 72 What Is Shared Storage? 73 VMware Storage Types 75 Local Storage 75 Fibre Channel 76 iSCSI 77 Network File System 77 Virtual Machine File System 78 The VMFS vs. the NFS 78 Disk Provisioning 78 Thick Provisioning 79 Thin Provisioning 80 VMware Virtual Storage Technologies 82 Summary 83 Exam Essentials 84 Review Questions 86 Chapter 5 Networking in a VMware Environment 91 Differentiate Physical and Virtual Networking 92 Physical Switches 92 Ftoc.indd 03/24/2015 Page xii Virtual Switches 94 Differences Between Physical and Virtual Switches 97 Differentiate VMware Virtual Switch Technologies 97 Standard Virtual Switches 98 Distributed Virtual Switches 98 Identify VMware Virtual Switch Components 101 Standard Virtual Switch 101 Distributed Virtual Switch 102 Identify Common Virtual Switch Policies 103 Port Group Policies 103 Distributed Virtual Switch Policies 106 Identify Capabilities of Network I/O Control 108 Summary 113 Exam Essentials 113 Review Questions 115 Chapter 6 Business Challenges Meet VMware Solutions 119 Availability Challenges and Solutions 120 vMotion 121 Storage vMotion 121 Virtual Machine Snapshots 122 High Availability 123 Fault Tolerance 123 vSphere Replication 124 vSphere Data Protection 124 Site Recovery Manager 125 Management Challenges and Solutions 126 Virtual Machines/Physical‐to‐Virtual Conversions 126 vCenter Server 126 vCenter Configuration Manager 127 Optimization Challenges and Solutions 128 vCenter Operations Manager 128 Thin Provisioning 129 Distributed Switches with QoS 130 Distributed Power Management 130 Storage I/O Control 131 vFlash 131 VM Storage Profiles 131 Memory Ballooning 132 Transparent Page Sharing 132 Scalability Challenges and Solutions 133 Virtual Machines 133 Virtual Machine Templates 134 Distributed Resource Scheduler 135 Ftoc.indd 03/24/2015 Page xiii Storage DRS 135 vSphere Storage Appliance 136 Hot Add 136 Distributed Virtual Switches 136 The Differences between SMB and Enterprise Challenges and Solutions 137 Summary 138 Exam Essentials 139 Review Questions 140 Appendices 145 Appendix A Answers to Review Questions 147 Appendix B Online Resources 159 Index 165
£25.60
John Wiley & Sons Inc VMware vSphere PowerCLI Reference
Book SynopsisMaster vSphere automation with this comprehensive reference VMware vSphere PowerCLI Reference, Automating vSphere Administration, 2nd Edition is a one-stop solution for vSphere automation. Fully updated to align with the latest vSphere and PowerCLI release, this detailed guide shows you how to get the most out of PowerCLI''s handy cmdlets using real-world examples and a practical, task-based approach. You''ll learn how to store, access, update, back up, and secure massive amounts of data quickly through the power of virtualization automation, and you''ll get acquainted with PowerCLI as you learn how to automate management, monitoring, and life-cycle operations for vSphere. Coverage includes areas like the PowerCLI SDK, SRM, vCOPS, and vCloud Air. Plus guidance toward scheduling and viewing automation, using DevOps methodology and structured testing and source control of your PowerCLI scripts. Clear language and detailed explanations make this reference the Table of ContentsIntroduction xxiii Part I Install, Configure, and Manage the vSphere Environment 1 Chapter 1 Automating vCenter Server Deployment and Configuration 3 Chapter 2 Automating vSphere Hypervisor Deployment and Configuration 41 Chapter 3 Automating Networking 75 Chapter 4 Automating Storage 119 Rule Sets 146 Chapter 5 Using Advanced vSphere Features 165 Part II Managing the Virtual Machine Life Cycle 211 Chapter 6 Creating Virtual Machines 213 Chapter 7 Using Templates and Customization Specifications 243 Chapter 8 Configuring Virtual Machine Hardware 265 Chapter 9 Advanced Virtual Machine Features 293 Chapter 10 Using vApps 331 Part III Securing Your vSphere Environment 373 Chapter 11 Backing Up and Restoring Your Virtual Machines 375 Chapter 12 Organize Your Disaster Recovery 397 Chapter 13 Hardening the vSphere Environment 441 Chapter 14 Maintain Security in Your vSphere Environment 475 Part IV Monitoring and Reporting 495 Chapter 15 Reporting and Auditing 497 Chapter 16 Using Statistical Data 545 Chapter 17 Alarms 585 Part V Integration 619 Chapter 18 The SDK 621 Managed Object References 644 Chapter 19 vCloud Director 663 Chapter 20 vCloud Air 693 Chapter 21 vRealize Orchestrator 711 Chapter 22 Site Recovery Manager 791 Chapter 23 PowerActions 811 Part VI PowerCLI and DevOps 839 Chapter 24 Source Control 841 Chapter 25 Running Scripts 895 Appendix Example Reports 915 Index 935
£38.00
John Wiley & Sons Inc Decision Making in Systems Engineering and
Book SynopsisDECISION MAKING IN SYSTEMS ENGINEERING AND MANAGEMENT A thoroughly updated overview of systems engineering management and decision making In the newly revised third edition of Decision Making in Systems Engineering and Management, the authors deliver a comprehensive and authoritative overview of the systems decision process, systems thinking, and qualitative and quantitative multi-criteria value modeling directly supporting decision making throughout the system lifecycle. This book offers readers major new updates that cover recently developed system modeling and analysis techniques and quantitative and qualitative approaches in the field, including effective techniques for addressing uncertainty. In addition to Excel, six new open-source software applications have been added to illustrate key topics, including SIPmath Modeler Tools, Cambridge Advanced Modeller, SystemiTool2.0, and Gephi 0.9.2. The authors have reshaped the book's organization and presentaTable of ContentsList of Figures xiii List of Tables xxiii 1 Working with Systems 1 1.1 Introduction 1 1.2 The Systems Engineering Perspective 7 1.2.1 Systems Trends That Challenge System Engineers 8 1.2.2 Fundamental Tasks of Systems Engineers 12 1.2.3 Relationship of Systems Engineers to Other Engineering Disciplines 14 1.2.4 Education, Training, and Knowledge of Systems Engineers 15 1.3 Systems thinking 17 1.4 System life cycles 20 1.4.1 System life cycle model 23 1.5 Other major system life cycle models 29 1.6 Systems Decision Process (SDP) 34 1.7 Stakeholders and Vested Interests 39 References 47 2 Applied Systems Thinking 51 2.1 Holism Framing Systems 51 2.1.1 Systems versus Analytic Thinking 54 2.1.2 Check on Learning 56 2.2 Element Dependencies 57 2.2.1 Check on Learning 58 2.3 Expansive and Contractive Thinking 59 2.3.1 Check on Learning 60 2.4 Structure 61 2.5 Classifying Systems 68 2.6 Boundaries 69 2.7 Visibility and Spatial Arrangement 72 2.7.1 Visibility 72 2.7.2 Spatial Arrangement 74 2.7.3 Check on Learning 76 2.8 Evolution and Dynamics 77 References 81 3 System Representations 83 3.1 Introduction 83 3.2 System Model Concepts 84 3.2.1 What Models Are 85 3.2.2 Role of Models in Solution Design 86 3.2.3 Qualities of useful models 87 3.2.4 Building System Models 89 3.2.5 Characteristics of models 95 3.2.6 Exercise the Model 96 3.2.7 Revise the model 97 3.3 Systemigrams 98 3.3.1 Systemigram Rules 99 3.4 Directional Dependency (D2) Diagrams 102 3.4.1 D2 diagrams into math representations 103 3.5 DSM and DMM Models 107 3.5.1 Dependency Structure Matrix (DSM) 108 3.5.2 System Adjacency Matrices 114 3.5.3 Check on Learning 120 3.5.4 Domain Mapping Matrix (DMM) 120 3.6 System Dynamics 122 3.7 IDEF0 Models 129 3.8 Simulation Modeling 138 3.8.1 Analytical Methods versus Simulation 138 3.8.2 Check on Learning 143 3.9 Determining Simulation Sample Size 143 References 147 4 The Systems Decision Process 151 4.1 Introduction 151 4.2 Value versus Alternative Focused Thinking 151 4.3 The SDP in Detail 154 4.3.1 The System Environment 156 4.3.2 When to Use the Systems Decision Process 159 4.3.3 Check on Learning 161 4.4 The Role of Stakeholders 164 References 169 5 Problem Definition 171 5.1 Purpose of the Problem Definition Phase 171 5.1.1 Comparison with Other Systems Engineering Processes 173 5.2 Research and “What is?” 174 5.2.1 Check on Learning 178 5.3 Stakeholder Analysis 179 5.3.1 Techniques for Stakeholder Analysis 181 5.3.2 At Completion FCR Matrix 195 5.4 Requirements Analysis 197 5.4.1 Margins 201 5.5 Functional Analysis 204 5.6 Assessing System Readiness 213 5.7 Initial Risk Assessment 218 5.7.1 Risk identification 219 5.7.2 Risk Mitigation 229 References 231 6 Value Modeling 235 6.1 Introduction 235 6.2 Qualitative Value Modeling 239 6.2.1 Measures 242 6.3 Quantitative Value Model 249 6.3.1 Value Functions 251 6.3.2 Value Increment Method 256 6.3.3 Weighting Options 259 References 275 7 Solution Design 277 7.1 Introduction 277 7.2 Ideation Techniques 279 7.2.1 Brainstorming 279 7.2.2 Brainwriting 282 7.2.3 Design Thinking 282 7.2.4 Affinity Diagramming 284 7.2.5 Delphi 285 7.2.6 Groupware 287 7.2.7 Lateral and Parallel Thinking and Six Thinking Hats 287 7.2.8 Morphology 287 7.2.9 EndsMeans Chains 289 7.2.10 Other Ideation Techniques 289 7.3 Screening and Feasibility 291 7.4 Improving Candidate Alternatives 296 7.4.1 Design of Experiments 299 7.4.2 Fractional factorial design 304 7.4.3 Pareto analysis 312 References 315 8 Costing Systems 317 8.1 Introduction 317 8.2 Types of Costs 323 8.3 Cost Estimating Techniques 324 8.3.1 Estimating by Analogy 325 8.3.2 Parametric Estimation Using Cost Estimating Relationships 326 8.3.3 Learning Curves 339 8.4 Time Effects on Cost 345 8.4.1 Time Value of Money 345 8.4.2 Inflation 346 8.4.3 Net Present Value 348 8.4.4 Breakeven Analysis and Replacement Analysis 350 References 353 9 Decision Making via Tradespace Analysis 355 9.1 Introduction 355 9.2 Tradespace Properties 358 9.3 Scoring Solution Alternatives 360 9.4 Scoring Options 363 9.4.1 Candidate Systems Scoring 364 9.4.2 Candidate Components Scoring 367 9.5 Tradespace Analysis on Scoring Results 372 9.5.1 Analyzing Sensitivity on Weights 377 9.5.2 Sensitivity Analysis on Weights Using Excel 379 9.6 Applying Valuefocused Thinking 380 9.6.1 Improving nonDominated Alternatives 384 9.6.2 Improving Dominated Alternatives 385 9.7 Supporting the Tradespace Decision 386 9.8 Use valuefocused thinking to improve solutions 388 9.8.1 Decision Analysis of Dependent Risks 389 9.9 Reporting and Decision Handoff 392 9.9.1 Developing the Report 392 9.9.2 Developing the Presentation 393 9.9.3 Presenting Analysis Results 394 9.9.4 Concluding the Presentation 395 9.9.5 Using a Storyline Approach 396 References 399 10 Stochastic Tradespace Analysis 401 10.1 Introduction 401 10.2 Uncertainty Concepts 403 10.3 Flaw of Averages Considerations 406 10.4 Uncertainty Distributions 409 10.5 Monte Carlo Uncertainty Simulation 410 10.6 Cost Uncertainty Modeling 413 10.7 Realization Analysis 417 10.7.1 Level 1 Analysis Choice Set Reduction 419 References 429 11 System Reliability 433 11.1 Modeling System Reliability 433 11.2 Math Models in Reliability 434 11.2.1 Common Continuous Reliability Distributions 438 11.2.2 Common Discrete Distributions 444 11.2.3 Check on Learning 446 11.3 Reliability Block Diagrams 446 11.3.1 Series System 449 11.3.2 Parallel System 454 11.3.3 Combined Series and Parallel RBD 455 11.3.4 Koutof N Systems 456 11.3.5 Complex Systems 456 11.4 Component Reliability Importance Measures 458 11.4.1 Importance Measure for Series System 459 11.4.2 Importance Measure for Parallel System 461 11.4.3 Check on Learning 463 11.5 Allocating and Improving Reliability 463 11.5.1 Check on Learning 465 11.6 Markov models of repairable systems 465 11.6.1 Kolmogorov Differential Equations 466 11.6.2 Transient Analysis 466 11.6.3 Steady State Analysis 468 11.6.4 CTMC Models of Repairable Systems 469 11.6.5 Modeling Multiple Machine Problems 471 References 477 12 Solution Implementation 479 12.1 Introduction 479 12.2 Solution Implementation Phase 481 12.3 The Initiating Process 483 12.4 Planning 485 12.5 Executing 488 12.6 Monitoring and Controlling 489 12.7 Closing 492 12.8 Implementation During Life Cycle Stages 492 12.8.1 Implementation in “Produce the System” 492 12.8.2 Implementation in “Deploy the System” 494 12.8.3 Implementation in “Operate the System” 496 12.8.4 Check on Learning 499 References 503 13 EpilogueProfessional Practice 505 13.1 Systems Engineering Activities 507 13.2 Working with the systems development team 510 13.3 Building an Interdisciplinary Team 513 13.4 Systems engineering responsibilities 517 13.5 Roles of the Systems Engineer 524 13.6 Characteristics of the Ideal Systems Engineer 525 13.7 Summary 526 References 527 Appendix A: Realization Analysis Levels 0 and 2 529 A.1 Level 0 Analysis Refined Choice Set Identification 530 A.2 Level 2 Analysis Postselection Insights 533 References 537 Appendix B: Software Fundamentals 539 B.1 SystemiTool 539 B.2 Cambridge Advanced Modeller (CAM) 540 B.3 Mathematica 542 B.4 Gephi 543 B.5 Vensim PLE 544 B.6 SIPmath 545
£107.96
McGraw-Hill Companies Looseleaf for Survey of Operating Systems 7e
Book Synopsis
£174.60
McGraw-Hill Education Survey of Operating Systems ISE
Book SynopsisMcGraw-Hill Education is proud to introduce the seventh edition of Jane and Charles Holcombe''s Survey of Operating Systems. This title provides an introduction to the most widely used desktop operating systems (including Windows, Apple OS X, and Linux) using numerous illustrations and hands-on activities to build a foundation for success in the IT field, empowering students to adapt to different job situations and troubleshoot problems. The new edition features updated information on mobile operating systems, as well as chapters on subjects peripheral to operating systems, such as File Management in the Cloud - previously only offered as online content.
£37.79
Pearson Education Limited Modern Operating Systems Global Edition 4 Ed
Book SynopsisTable of Contents CHAPTER 1 "INTRODUCTION" CHAPTER 2 "PROCESSES AND THREADS" CHAPTER 3 "MEMORY MANAGEMENT" CHAPTER 4 "FILE SYSTEMS" CHAPTER 5 "INPUT/OUTPUT" CHAPTER 6 "DEADLOCKS" CHAPTER 7 "VIRTUALIZATION AND THE CLOUD" CHAPTER 8 "MULTIPLE PROCESSOR SYSTEMS" CHAPTER 9 "SECURITY" CHAPTER 10 "CASE STUDY 1: UNIX, LINUX, AND ANDROID" CHAPTER 11 "CASE STUDY 2: WINDOWS 8" CHAPTER 13 "OPERATING SYSTEM DESIGN" CHAPTER 14 READING LIST AND BIBLIOGRAPHY
£68.39
Cengage Learning, Inc Shelly Cashman Series MicrosoftÂWindows 10
Book SynopsisNo matter what your depth or range of experience, the practical, user-friendly Shelly Cashman Series MICROSOFT WINDOWS 10: COMPREHENSIVE can equip you with the complete skills and thorough knowledge you need to effectively navigate and fully utilize Microsoft Windows 10. Part of the acclaimed Shelly Cashman Series, this book offers a trademark, step-by-step, screen-by-screen approach that encourages you to expand your understanding of the Microsoft Windows 10 operating system through experimentation, exploration, and advanced planning. You'll find proven, hands-on features and accompanying online resources specifically designed to keep your attention and prepare you for future success in working with MS Office and Windows.Table of ContentsFront Matter. 1. Introduction to Windows 10. 2. Working with the Windows 10 Desktop. 3. File and Folder Management. 4. Personalizing Your Work Environment. 5. Advanced Personalization and Customization. 6. Advanced Searching Techniques. 7. Microsoft Edge. 8. Mastering Digital Media. 9. Understanding Security, Networking and Utilities. Index.
£180.27
Peter Lang Publishing Inc An Introduction to Visual Communication
Book SynopsisTechnological changes have radically altered the ways in which people use visual images. Since the invention of photography, imagery has increasingly been used for entertainment, journalism, information, medical diagnostics, instruction, branding and communication. These functions move the image beyond aesthetic issues associated with art and into the realm of communication studies.This introductory textbook introduces students to the terminology of visual literacy, methods for analyzing visual media, and theories on the relationship between visual communication and culture. Exploring the meanings associated with visual symbols and the relationship of visual communication to culture, this book provides students with a better understanding of the visually oriented world in which they live. From cave art to virtual reality, all visual media are discussed with methods for evaluation. Student-friendly features such as boxed topics, key terms, web resources, and suggestions for ex
£41.76
Springer Us Implementations of Logic Programming Systems
Book Synopsis1 SelfLog: Language and Implementation.- 2 I.C. Prolog II : a Multi-threaded Prolog System.- 3 Memory Management in Quintus Prolog.- 4 How Concurrent Logic Programming Could Benefit from Using Linda-like Operations.- 5 Implementing Logic Programming Systems: The Quiche-Eating Approach.- 6 Call Forwarding: A Simple Low-Level Code Optimization Technique.- 7 Moving Prolog Toward Objects.- 8 MProlog: an Implementation Overview.- 9 Turbo Erlang: Approaching the Speed of C.- 10 A Framework for Sharing Analysis.- 11 Better Late Than Never.- 12 To Trim or not to Trim?.- 13 Divided We Stand: Parallel Distributed Stack Memory Management.- 14 Or-Parallel Prolog on Distributed Shared Memory Architectures.- 15 Implementing Sets with Hash Tables in Declarative Languages.- 16 Concurrent Logic Programs a la Mode.Table of ContentsSelfLog: Language and Implementation; M. Bugliesi, G. Nardiello. I.C. Prolog II: a Multi-Threaded Prolog System; D. Chu. Memory Management in Quintus Prolog; J. Crammond, T. Lindholm. How Concurrent Logic Programming could Benefit from Using Linda-like Operations; G. Czajkowski, K. Zielinski. Implementing Logic Programming Systems: the Quiche-Eating Approach; S.K. Debray. Call Forwarding: a Simple Low-Level Code Optimization Technique; S.K. Debray, K. De Bosschere, D. Gudeman. Moving Prolog Toward Objects; E. Denti, A. Natali, A. Omicini. MProlog: an Implementation Overview; Z. Farkas, P. Köves, P. Szeredi. Turbo Erlang: Approaching the Speed of C; B. Hausman. A Framework for Sharing Analysis; A. King. Better Late than Never; M. Meier. To Trim or not to Trim? J. Noyé. Divided we Stand: Parallel Distributed Stack Memory Management; K. Shen, M. Hermenegildo. Or-Parallel Prolog on Distributed Shared Memory Architectures; F.M.A. Silva. Implementing Sets with Hash Tables in Declarative Languages; G. Succi, G. Marino, C. Dondina, A. Bergamini. Concurrent Logic Programs à la mode; E. Tick, B. Massey, F. Radkoczi, P. Tulayathun. Index.
£80.99
Taylor & Francis Inc Computer Systems Architecture
Book SynopsisComputer Systems Architecture provides IT professionals and students with the necessary understanding of computer hardware. It addresses the ongoing issues related to computer hardware and discusses the solutions supplied by the industry.The book describes trends in computing solutions that led to the current available infrastructures, tracing the initial need for computers to recent concepts such as the Internet of Things. It covers computers' data representation, explains how computer architecture and its underlying meaning changed over the years, and examines the implementations and performance enhancements of the central processing unit (CPU). It then discusses the organization, hierarchy, and performance considerations of computer memory as applied by the operating system and illustrates how cache memory significantly improves performance.The author proceeds to explore the bus system, algorithms for ensuring data integrity, input andTable of ContentsIntroduction and Historic Perspective. Data Representation. Hardware Architecture. The Central Processing Unit. Memory. Cache Memory. Bus. Input and Output. Storage. Additional Architectures. Software Architectures. References. Bibliography. Glossary.
£99.75
APress Exploring the Raspberry Pi 2 with C
Book SynopsisYou have a Pi 2, but what exactly can you do with it? This book takes you on a tour of the Pi 2 hardware and all of the fantastic things that you can do to create innovative and useful projects with your Pi. Start with creating a workstation that does actual work, and move into installing a custom kernel, creating a clock, learning the ins and outs of the GPIO interface, and pick up some useful C++ skills along the way.Warren Gay, author of Mastering the Raspberry Pi, takes you through a set of experiments to show just what the Pi 2 is capable of and how you can use it to make your own fantastic creations.What You Will Learn: How to create an experimenter''s workstation for the Pi 2, complete with breadboard and even Arduino All the details of GPIO, including a custom command for working with it Useful projects like a general purpose clock and the PiSpy Quick intro to C++ for the Table of ContentsChapter 1: Introduction to Pi 2.- Chapter 2: Workstation.- Chapter 3: The Matrix.- Chapter 4: Installing a Kernel.- Chapter 5: GPIO gp Command.- Chapter 6: General Purpose Clock.- Chapter 7: Pulse Width Modulation.- Chapter 8: Physics of the GPIO Interface.- Chapter 9: PiSpy.- Chapter 10: Debouncing.- Chapter 11: Fast Track to C++.- Chapter 12: Multi-core Webserver.- Appendix A: GPIO Class, Part I.- Appendix B: GPIO Class, Part II.- Appendix C: GPIO Class, Part III.- Appendix D: MAX7219 Class.- Appendix E: Matrix Class.- Appendix F: MTop and Diskstat.- Appendix G: The Rest.
£35.99
APress Cybersecurity for Hospitals and Healthcare
Book SynopsisLearn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support equipment on which lives depend. News reports inform us how hackers strike hospitals with ransomware that prevents staff from accessing patient records or scheduling appointments. Unfortunately, medical equipment also can be hacked and shut down remotely as a form of extortion. Criminal hackers will not ask for a $500 payment to unlock an MRI, PET or CT scan, or X-ray machinethey will ask for much more. Litigation is bound to follow and the resulting punitive awards will drive up hospital insurance costs and healthcare costs in general. This will undoubtedly result in increased regulations for hospitals and higher costs for compliance. Unless hosTable of ContentsChapter 1: Hacker Reconnaissance of a Hospital Network .- Chapter 2: How Hackers Gain Access to a Hospital Network .- Chapter 3: Active Medical Device Cyber-Attacks.- Chapter 4: Medical Facility Cyber-Physical Attacks.- Chapter 5: Hospital Insider Threat.- Chapter 6: Detection of Cyber-Attacks.- Chapter 7: Preventing Cyber-Attacks.- Chapter 8: Cyber-Attack Response and Recovery Planning.- Chapter 9: Appendix. Cyber-Attack Response Procedures Template.-
£51.99
Apress Professional Sitecore 8 Development
Book SynopsisTable of ContentsChapter 1: Getting Started.- Chapter 2: Building Your First Component.- Chapter 3: Data Templates and Content.- Chapter 4: Back-End Dev Architectures.- Chapter 5: Improving the Design with Patterns.- Chapter 6: Front-End Dev Techniques.- Chapter 7: Unit Testing Sitecore.- Chapter 8: Search-Driven Solutions.- Chapter 9: Programming the Customer Journey.- Chapter 10: PowerShell Extensions for Sitecore.- Chapter 11: Extending the Experience Editor.-
£52.24
APress Practical NATS
Book SynopsisLearn to use NATS and messaging as a solution for communication between services. The NATS project has been around since 2010, but it has become more popular in recent years due to how well it fits into the paradigm of cloud native applications and microservices architectures. It''s fast becoming a very attractive option thanks to its great performance characteristics--a single server can push millions of messages per second--and overall simple design. First you will learn the fundamentals of NATS, such as its design, protocol and the styles of communications it enables, internals of the NATS clients, and how to use the basic API provided by all the official clients. You will also understand how to setup and configure NATS servers using the configuration file. Next you''ll work with real-world projects and see how to develop a production-ready cloud native application using NATS as the control plane over which clients communicate. Finally you''ll learn Table of Contents1. Introduction to NATS2. The NATS Protocol3. The NATS Clients4. Setting up NATS5. High Availability with NATS Clustering6. Developing a Cloud Native NATS Application7. Monitoring NATS8. Securing NATS9. Troubleshooting NATS10. Advanced NATS Techniques
£49.49
APress Patterns in the Machine
Book SynopsisDiscover how to apply software engineering patterns to develop more robust firmware faster than traditional embedded development approaches. In the authors'' experience, traditional embedded software projects tend towards monolithic applications that are optimized for their target hardware platforms. This leads to software that is fragile in terms of extensibility and difficult to test without fully integrated software and hardware. Patterns in the Machine focuses on creating loosely coupled implementations that embrace both change and testability.This book illustrates how implementing continuous integration, automated unit testing, platform-independent code, and other best practices that are not typically implemented in the embedded systems world is not just feasible but also practical for today''s embedded projects.After reading this book, you will have a better idea of how to structure your embedded software projects. You will recognize that while writing unit tests, creating simulators, and implementing continuous integration requires time and effort up front, you will be amply rewarded at the end of the project in terms of quality, adaptability, and maintainability of your code. What You Will Learn Incorporate automated unit testing into an embedded project Design and build functional simulators for an embedded project Write production-quality software when hardware is not available Use the Data Model architectural pattern to create a highly decoupled design and implementation Understand the importance of defining the software architecture before implementation starts and how to do it Discover why documentation is essential for an embedded project Use finite state machines in embedded projects Who This Book Is ForMid-level or higher embedded systems (firmware) developers, technical leads, software architects, and development managers.Table of Contents1: Introduction2: Core Concepts3: Design Theory For Embedded Programming4: Persistent Storage Example5: Software Architecture6: Automated Unit Testing7: Functional Simulator8: Continuous Integration9: Data Model10: Finite State Machines11: Documentation12: File Organization and Naming13: More About Late Bindings14: Main and Initialization15: More Best Practices16: Example Code17: Rules For DevelopmentAppendix A: TerminologyAppendix B: UML Cheat SheetAppendix C: Notation for State MachinesAppendix D: Coding ConventionsAppendix E: Why C++
£35.99
APress Salt Open
Book SynopsisThere is a rapid growth of automation in server rooms and data centers. The days of having many administrators running around busily configuring and maintaining servers are gone and have been replaced with droves of Salt-Minions; agents beavering away on the target nodes ensuring the configuration is as specified. This book covers Salt Open (also known as SaltStack Open) from the ground up and shows you how to work with two Linux distributions. You'll see how Salt Open is duplicated with ArubaOS and IOS networking devices, which can be configured without the underlying OS. As you step through the configuration options, you'll learn how to run remote execution modules from the CLI before looking at stateful configuration using SLS files. Moving on, you'll learn how to configure the systems where you also need to monitor your devices and that is when reactors and beacons come into play. Creating beacons to alert the server when thresholds are exceeded, you will be able to create reactoTable of ContentsChapter 1: Understanding Salt and Configuration AutomationChapter Goal: Learn about Salt Open and its' commercial sibling, SaltConfig, from VMwareNo of pages 8Sub - Topics-Salt Open and the SaltProjectSaltConfig and VMwareSpeed, the Salt advantageSpeed, the Salt advantageChapter 2: Installing Salt Chapter Goal: In this chapter we will outline the labs systems used throughout the book and optional networking equipment before moving onto installing the Salt-Master Salt-Minions and providing basic tests No of pages: 12 Sub - Topics 1. Identity Lab setup 2. Install latest version of Salt Master and Minions 3. Configuring Master and Minions 4. Configuring Times Services 5. Signing Keys 6. Implementing basic tests 7. Implement firewalling on the Salt Master Chapter 3: Installing Additional Minions Chapter Goal: We have just one server and a Minion on the same server. We will now expand this to include additional Linux distribution and learn more about Salt authentication No of pages : 8 Sub - Topics: 1. Authenticating with Minion public keys and key management 2. Automating key signing 3. Locating the Salt Master 4. Automating the Minion ID Chapter 4: Targeting Minions Chapter Goal: Learn how we can target tasks to the required Minions in Salt Open No of pages: 12 Sub - Topics: 1. Salt Targeting 2. Understanding grains and using them as targets 3. Targeting using regular expressions and IP notation 4. Creating Node groups and using them as targets Chapter 5: Working with Remote Execution Modules in Salt Open Chapter Goal: At the heart of Salt we have remote execution modules and we stale a look at the construction in Python and how we use them and find their documentation No of pages: 15Sub topics 1. Using Modules and Functions 2. Listing the salt module indices 3. Using salt and salt-call to execute modules 4. Locate command line help 5. The big three: packages, services, and files Chapter 6: Writing YAML Chapter Goal: Learn to write and understand YAML files. Configure your command line editor for YAML No of pages: 8 Sub - Topics: 1. YAML Ain't Markup Language 2. Using Online Parser to process YAML 3. Configuring the nano editor 4. Configuring the vim editor for YAML and SLS filesChapter 7: Writing Salt State Files Chapter Goal: Create repeatable configurations using SLS files No of pages: 15 Sub - Topics: 1. State vs Flow 2. Jinja and YAML Parsing 3. Creating Jinja2 templates 4. Installing packages with Salt states 5. Managing services with state files 6. Delivering files with salt states 7. Syntax checking state filesChapter 8: Building an effective state tree Chapter Goal: The top.sls file can be referenced as the inverted root of the state tree to include the required states for different systems No of pages: 8 Sub - Topics: 1. Creating the top file 2. Understanding state.sl, state.apply and state.highstate 3. Targeting in the top file Chapter 9: Creating Reusable State Files Chapter Goal: Learn to implement states that fit a variety of systems No of pages: 15 Sub - Topics: 1. Using variables and Jinja 2. Using grains 3. Configuring Salt Pillar 4. Using logic to remove reliance on external data 5. Speeding the process with map files 6. Accessing templated data Chapter 10: Implementing Reactors and Beacons Chapter Goal: The Salt Master maintain the high-speed message bus. Events are written to this bust and we can view the events to help understand and debug the salt system. Working with events we can configure the master to react to events using Reactors. This can move configuration management into the realms of orchestration. Taking this further we can configure beacons on Minions to send events to the bus when triggered by thresholds on the managed device No of pages: 18 Sub - Topics: 1. Reading and Identify events on the event bus 2. Configuring reactors on the Salt Master 3. Configuring Beacons on MinionsChapter 11: Using Salt-SSH Chapter Goal: Where a long running Minion service is not desirable we can use salt-ssh to deploy configuration No of pages: 8 Sub - Topics: 1. Salt-SSH 2. Deploy key based ssh authentication 3. Using Salt-SSH Chapter 12: Deploy Virtual Machines Using Salt-Cloud Chapter Goal: Using salt-cloud the single utility can be used to manage your virtual machine deployment irrespective of the cloud system used No of pages: 10 Sub - Topics: 1. Managing VMs with salt-cloud 2. Using salt-cloud with AWS 3. Configuring providers and profiles 4. Using map files 5. Managing systems Chapter 13: Scaling Configuration Management Using Salt-Syndic Chapter Goal: Implementing Salt-syndic you add additional masters to the system that report back to the Master or Masters. This can load balance your Minions or act to traverse a network link No of pages: 6 Sub - Topics: 1. Installing Salt Syndic 2. Configuring Syndic on minion 3. Configuring Minions to use Syndic Chapter 14: Automating Network Infrastructure with Salt Proxy Chapter Goal: Salt Proxy is used to connect to devices that don’t maintain a long running Minion such as network devices No of pages: 15 Sub - Topics: 1. Configuring Pillar Data for Proxy 2. Installing NAPALM modules 3. Configuring Proxy Systems 4. Enabling SSH on Cisco IOS 5. Configuring NTP services on Cisco Devices 6. Backing up Configuration on Cisco and Aruba systems 7. Restoring configurations 8. Using salt-sproxy as a Proxy Minion alternative
£42.49
APress Foundations of ARM64 Linux Debugging
Book Synopsis Gain a solid understanding of how Linux C and C++ compilers generate binary code. This book explains the reversing and binary analysis of ARM64 architecture now used by major Linux cloud providers and covers topics ranging from writing programs in assembly language, live debugging, and static binary analysis of compiled C and C++ code. It is ideal for those working with embedded devices, including mobile phones and tablets. Using the latest version of Red Hat, you''ll look closely at the foundations of diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems. You''ll also work with the GDB debugger and use it for disassembly and reversing. This book uses practical step-by-step exercises of increasing complexity with explanations and many diagrams, including some necessary background topics. In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct origTable of ContentsChapter 1 - A64.1: Memory, Registers, and Simple Arithmetic 11Memory and Registers inside an Idealized Computer 11Memory and Registers inside ARM 64-bit Computer 12“Arithmetic” Project: Memory Layout and Registers 13“Arithmetic” Project: A Computer Program 14“Arithmetic” Project: Assigning Numbers to Memory Locations 15Assigning Numbers to Registers 18“Arithmetic” Project: Adding Numbers to Memory Cells 19Incrementing/Decrementing Numbers in Memory and Registers 22Multiplying Numbers 25Chapter 2 - A64.2: Code Optimization 29“Arithmetic” Project: C/C++ Program 29Downloading GDB 31GDB Disassembly Output – No Optimization 32GDB Disassembly Output – Optimization 37Chapter 3 - A64.3: Number Representations 39Numbers and Their Representations 39Decimal Representation (Base Ten) 40Ternary Representation (Base Three) 41Binary Representation (Base Two) 42Hexadecimal Representation (Base Sixteen) 43Why are Hexadecimals Used? 44Chapter 4 - A64.4: Pointers 47A Definition 47“Pointers” Project: Memory Layout and Registers 48“Pointers” Project: Calculations 50Using Pointers to Assign Numbers to Memory Cells 51Adding Numbers Using Pointers 58Incrementing Numbers Using Pointers 62Multiplying Numbers Using Pointers 65Chapter 5 - A64.5: Bytes, Half Words, Words, and Double Words 69Using Hexadecimal Numbers 69Byte Granularity 70Bit Granularity 71Memory Layout 72Chapter 6 - A64.6: Pointers to Memory 75Pointers Revisited 75Addressing Types 76Registers Revisited 81NULL Pointers 82Invalid Pointers 83Variables as Pointers 84Pointer Initialization 85Initialized and Uninitialized Data 86More Pseudo Notation 87“MemoryPointers” Project: Memory Layout 88Chapter 7 - A64.7: Logical Instructions and PC 99Instruction Format 99Logical Shift Instructions 100Logical Operations 101Zeroing Memory or Registers 102Instruction Pointer 103Code Section 105Chapter 8 - A64.8: Reconstructing a Program with Pointers 107Example of Disassembly Output: No Optimization 107Reconstructing C/C++ Code: Part 1 110Reconstructing C/C++ Code: Part 2 112Reconstructing C/C++ Code: Part 3 114Reconstructing C/C++ Code: C/C++ program 116Example of Disassembly Output: Optimized Program 117Chapter 9 - A64.9: Memory and Stacks 119Stack: A Definition 119Stack Implementation in Memory 120Things to Remember 122Stack Push Implementation 123Stack Pop Implementation 124Register Review 125Application Memory Simplified 126Stack Overflow 127Jumps 128Calls 130Call Stack 131Exploring Stack in GDB 133Chapter 10 - A64.10: Frame Pointer and Local Variables 137Stack Usage 137Register Review 138Addressing Array Elements 139Stack Structure (No Function Parameters) 140Function Prolog 141Raw Stack (No Local Variables and Function Parameters) 142Function Epilog 144“Local Variables” Project 145Disassembly of Optimized Executable 148Chapter 11- A64.11: Function Parameters 149“FunctionParameters” Project 149Stack Structure 150Function Prolog and Epilog 152Project Disassembled Code with Comments 154Parameter Mismatch Problem 158Chapter 12 - A64.12: More Instructions 159PSTATE Flags 159Testing for 0 160TST - Logical Compare 161CMP – Compare Two Operands 162TST or CMP? 163Conditional Jumps 164Function Return Value 165Chapter 13 - A64.13: Function Pointer Parameters 167“FunctionPointerParameters” Project 167Commented Disassembly 168Chapter 14 - A64.14: Summary of Code Disassembly Patterns 173Function Prolog / Epilog 173ADR (Address) 174Passing Parameters 175Accessing Saved Parameters and Local Variables 176
£37.49
APress Foundations of Linux Debugging Disassembling and
Book SynopsisReview topics ranging from Intel x64 assembly language instructions and writing programs in assembly language, to pointers, live debugging, and static binary analysis of compiled C and C++ code. This book is ideal for Linux desktop and cloud developers.Using the latest version of Debian, you'll focus on the foundations of the diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems, memory forensics, malware, and vulnerability analysis. This requires an understanding of x64 Intel assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the background knowledge and practical foundations you'll need in order to master internal Linux program structure and behavior. It consists of practical step-by-step exercises of increasing complexity with explanations and ample diagrams.You'll also work with the GDB debugger and use it for disassembly and reversing.By the end of the book, yoTable of ContentsChapter One - x64.1: Memory, Registers, and Simple Arithmetic 11Memory and Registers inside an Idealized Computer 11Memory and Registers inside Intel 64-bit PC 12“Arithmetic” Project: Memory Layout and Registers 13“Arithmetic” Project: A Computer Program 14“Arithmetic” Project: Assigning Numbers to Memory Locations 15Assigning Numbers to Registers 17“Arithmetic” Project: Adding Numbers to Memory Cells 18Incrementing/Decrementing Numbers in Memory and Registers 21Multiplying Numbers 24Chapter Two - x64.2: Code Optimization 27“Arithmetic” Project: C/C++ Program 27Downloading GDB 28GDB Disassembly Output – No Optimization 29GDB Disassembly Output – Optimization 32Chapter Three - x64.3: Number Representations 33Numbers and Their Representations 33Decimal Representation (Base Ten) 34Ternary Representation (Base Three) 35Binary Representation (Base Two) 36Hexadecimal Representation (Base Sixteen) 37Why are Hexadecimals Used? 38Chapter Four - x64.4: Pointers 41A Definition 41“Pointers” Project: Memory Layout and Registers 42“Pointers” Project: Calculations 43Using Pointers to Assign Numbers to Memory Cells 44Adding Numbers Using Pointers 50Incrementing Numbers Using Pointers 53Multiplying Numbers Using Pointers 56Chapter Five - x64.5: Bytes, Words, Double, and Quad Words 61Using Hexadecimal Numbers 61Byte Granularity 62Bit Granularity 63Memory Layout 64Chapter Six - x64.6: Pointers to Memory 67Pointers Revisited 67Addressing Types 68Registers Revisited 73NULL Pointers 74Invalid Pointers 75Variables as Pointers 76Pointer Initialization 77Initialized and Uninitialized Data 78More Pseudo Notation 79“MemoryPointers” Project: Memory Layout 80Chapter Seven - x64.7: Logical Instructions and RIP 89Instruction Format 89Logical Shift Instructions 90Logical Operations 91Zeroing Memory or Registers 92Instruction Pointer 93Code Section 95Chapter Eight - x64.8: Reconstructing a Program with Pointers 97Example of Disassembly Output: No Optimization 97Reconstructing C/C++ Code: Part 1 99Reconstructing C/C++ Code: Part 2 101Reconstructing C/C++ Code: Part 3 103Reconstructing C/C++ Code: C/C++ program 104Example of Disassembly Output: Optimized Program 105Chapter Nine - x64.9: Memory and Stacks 107Stack: A Definition 107Stack Implementation in Memory 108Things to Remember 110PUSH Instruction 111POP instruction 112Register Review 113Application Memory Simplified 115Stack Overflow 116Jumps 117Calls 119Call Stack 121Exploring Stack in GDB 123Chapter Ten - x64.10: Frame Pointer and Local Variables 127Stack Usage 127Register Review 128Addressing Array Elements 129Stack Structure (No Function Parameters) 130Function Prolog 131Raw Stack (No Local Variables and Function Parameters) 132Function Epilog 134“Local Variables” Project 135Disassembly of Optimized Executable 138Chapter Eleven - x64.11: Function Parameters 139“FunctionParameters” Project 139Stack Structure 140Function Prolog and Epilog 142Project Disassembled Code with Comments 144Parameter Mismatch Problem 147Chapter Twelve - x64.12: More Instructions 149CPU Flags Register 149The Fast Way to Fill Memory 150Testing for 0 152TEST - Logical Compare 153CMP – Compare Two Operands 154TEST or CMP? 155Conditional Jumps 156The Structure of Registers 157Function Return Value 158Using Byte Registers 159Chapter Thirteen - x64.13: Function Pointer Parameters 161“FunctionPointerParameters” Project 161Commented Disassembly 162Chapter Fourteen - x64.14: Summary of Code Disassembly Patterns 169Function Prolog / Epilog 169LEA (Load Effective Address) 171Passing Parameters 172Accessing Parameters and Local Variables 173
£35.99
APress Beginning Ethereum Smart Contracts Programming
Book SynopsisUse this book to write an Ethereum blockchain smart contract, test it, deploy it, and create a web application to interact with your smart contract. This new edition has been expanded and updated to cover web3.js APIs, additional Consensus Protocols, non-Fungible Tokens (NFTs), developing NFT tokens using ERC-721, and more! Beginning Ethereum Smart Contracts Programming, second edition is your fastest and most efficient means of getting started if you are unsure where to begin and how to connect to the Ethereum blockchain. The book begins with a foundational discussion of blockchain and the motivation behind it. From there, you will get up close and personal with the Ethereum blockchain, learning how to use an Ethereum client (geth) to create a private Ethereum blockchain to perform transactions such as sending Ethers to another account on another node. You will learn about smart contracts without haviTable of Contents---NEW Chapter---- Chapter 1 - Technologies Behind Blockchain Basic Cryptography Types of Cryptographic algorithms Symmetric Asymmetric Hashing Digital Signature Summary Chapter 2 - Understanding Blockchain ---NEW Section--- Consensus Protocols Proof of Stake (PoS) Proof of Elapsed Time Proof of Space ... ----------------- Chapter 3 - Implementing Your Own Blockchain using Python Chapter 4 - Connecting to the Ethereum Blockchain using Geth Chapter 5 - Creating Your Own Private Ethereum Test Networks Chapter 6 - Using the Crypto Wallet - MetaMask Chapter 7 - Getting Started with Solidity Smart Contracts Chapter 8 - Testing Smart Contracts using Ganache Chapter 9 - Building Decentralized Apps using the web3.js APIs Chapter 10 - Handling Smart Contract Events Chapter 11 - Project - Online Lottery Chapter 12 - Creating Tokens using ERC-20 ---revised using OpenZepplin’s contract--- ---NEW Chapters---- Chapter 13 - Creating Non-Fungible Tokens using ERC-721 What is a NFT? Storing Digital Assets using IPFS What is IPFS Uploading a file to IPFS Accessing a file from IPFS NFT and IPFS Creating the NFT Token Contract Deploying the contract Minting the NFT Token Contract Getting the Owner of the NFT Getting the Name and Symbol of NFT Finding the Balance of NFT for an Address Getting the Owner of the NFT Getting the TokenURI Transferring a NFT Transferring Ownership of the NFT Contract Chapter 14 – Introduction to DeFi What is Decentralized Finance Stablecoins Types of Stablecoins USDC DAI Services in DeFi Components in DeFi Applications of DeFi ------------------
£41.24
APress Deploy Container Applications Using Kubernetes
Book SynopsisNavigate through the Kubernetes landscape to create and deploy container-based applications. This book will show you how to choose between the various available container-based operating systems, and how to design a better continuous integration pipeline for your container images, where to store them, and how to scan and secure them.In the first half of the book, you'll learn the practical tips on how to setup the system for visibility and troubleshooting, how to reduce the attack vector and reduce risks. The second half of the book focuses on Kubernetes, the popular container orchestration system. You'll see how to setup your Kubernetes for practical applications such as show/chargeback using tagging, efficient use of namespaces and pods, various isolation layers. It also shows you how to integrate with popular implementations of K8S such as AWS EKS (Elastic Container Service), GCP Google Kubernetes Engine (GKE) in touch points such as authentication and authorization, optimization, lTable of ContentsChapter 1. Running your first container application Chapter 2.Introducing Kubernetes Chapter 3.A Closer Look at Kubernetes Chapter 4. Scaling the deployment.- Chapter 5.Node management and RBAC Chapter 6. Artifact Repository and Container Registry.- Chapter 7. AWS EKSChapter 8.Installing and configuring command line tools to work with AWS EKS service.- Chapter 9. Data-PersistenceChapter 10.Networking and IngressChapter 11. Kubernetes Tools
£47.49
APress Practical Rust Projects
Book SynopsisGo beyond the basics and build complete applications using the Rust programming language, updated for Rust 2021 edition. The applications you''ll build over the course of this book include a high-performance web client, an embedded computer (for a robot, for example), a game, a serverless web app, and an application that incorporates AI and machine learning. Each chapter is organized in the following format: what the kind of should application look like; requirements and user stories of our example program; an introduction to the Rust libraries used; the actual implementation of the example program, including common pitfalls and their solutions; and a brief comparison of libraries for building each application, if there is no clear preference. Practical Rust Projects, Second Edition will open your eyes to how Rust can be put to practical, real-world use. After reading this book, you will be able to use Rust to build a varTable of Contents1. Welcome to the World of Rust2. Building a Command-Line Program3. Creating Graphical User Interfaces (GUIs)4. High-performance Web Frontend using WebAssembly5. Building REST APIs6. Going Serverless with Amazon AWS Rust SDK7. Building a Game8. Physical Computing in Rust9. Artificial Intelligence and Machine Learning10. What else can you do with Rust?---------------------------------------------------------1. Welcome to the World of Rust * Add a note on what's changed in the 2nd edition. * Add a note on Rust 20212. Building a Command-Line Program3. Creating Graphical User Interfaces (GUIs) * Upgrade to GTK 4?4. High-performance Web Frontend using WebAssembly5. Building REST APIs 6. 6. Going Serverless with Amazon AWS Rust SDK * Using the new AWS SDK for Rust and Rust runtime for AWS Lambda7. Building a Game * Use a different game engine because the one used in the 1st edition seized development8. Physical Computing in Rust * Maybe add a section on using WebAssembly on RPi9. Artificial Intelligence and Machine Learning * Maybe add a section on deep learning10. What else can you do with Rust? * Remove the web part that is included in 2nd edition
£46.74
APress Beginning Helidon
Book SynopsisLearn how to build cloud-native microservices with Helidon - an open-source Java framework from Oracle. This book will show you how to take full advantage of the cloud by optimizing applications with fast start times, low memory consumption, and a small disk footprint. The open-source Helidon framework provides all that, and more. It''s based on Java 17, giving you full access to new code features. This book reveals how Helidon also supports modern enterprise Java standards such as MicroProfile. Plus, you''ll see how Helidon lets you use GraalVM to build lightning-fast native executables, and its unique reactive layer allows you to develop efficient low-level APIs.Each chapter in the book teaches a new Helidon concept through practical examples based on real-life use-cases. You''ll learn how to add observability and security to your microservices, how to work with databases, and call other services. You''ll also look at all MicroProfile 5.0 platform specificationsTable of Contents1:Introduction.- 2: Your First Application.- 3: Configuration.- 4: Observability.- 5: Communicating with other Services.- 6: Accessing Data.- 7: Resiliency.- 8:Security.- 9: Using Open API.- 10: Testing Your Application.- 11: Scheduling Tasks.- 12: Integration with other Technologies.- 13: Going Reactive.- 14: Long Running Actions.- 15: Helidon SE.
£52.24
APress Kafka Troubleshooting in Production
Book SynopsisThis book provides Kafka administrators, site reliability engineers, and DataOps and DevOps practitioners with a list of real production issues that can occur in Kafka clusters and how to solve them. The production issues covered are assembled into a comprehensive troubleshooting guide for those engineers who are responsible for the stability and performance of Kafka clusters in production, whether those clusters are deployed in the cloud or on-premises. This book teaches you how to detect and troubleshoot the issues, and eventually how to prevent them. Kafka stability is hard to achieve, especially in high throughput environments, and the purpose of this book is not only to make troubleshooting easier, but also to prevent production issues from occurring in the first place. The guidance in this book is drawn from the author's years of experience in helping clients and internal customers diagnose and resolve knotty production problems and stabilize their Kafka environments. The book Table of Contents
£26.99
APress Creative Prototyping with Generative AI
Book SynopsisReimagine different generative AI as useful creative prototyping tools that can be used to augment your own creative process and projects. Gain a deeper understanding of how generative AI can elevate your creative future. You will acquire a comprehensive understanding of how AI works, uncover tools that can enhance your AI interactions, learn how to extract maximum potential from AI-produced content, and experiment with methods for assessing, refining, and boosting the content to transform your creative projects. You'll also explore how creative professionals from varied disciplines are employing generative AI in their workflows to produce distinctive contributions to the world. Each chapter provides examples of how designers and other creative individuals can utilize these technological wonders, adopting various prototyping techniques to fast-track and optimize design processes and workflows. Creators from all disciplines can tap into the vast capabilities and benefits of generatiTable of Contents Rapid Prototyping with Generative AI1. Introduction: Your AI Best Friend2. AI as a Creative Muse3. Prototyping with AI4. Creative Tools and Processes5. AI Structures6. The Master of Mash-Up: Leveraging AI for Prototyping7. Uncanny by Nature8. Layering AI Generation9. The Art of the Prompt10. Five Dilemmas Using AI11. AI Curator for Hire
£35.99
APress Pro Bash
Book SynopsisLearn how to effectively utilize the Bash shell in your programming. This refreshed and expanded third edition has been updated to Bash 5.2, and many scripts have been rewritten to make them more idiomatically Bash, taking better advantage of features specific to Bash. It is easy to read, understand, and will teach you how to get to grips with Bash programming without drowning you in pages and pages of syntax. Using this book you will be able to use the shell efficiently, make scripts run faster using expansion and external commands, and understand how to overcome many common mistakes that cause scripts to fail. This book is perfect for all beginning Linux and Unix system administrators who want to be in full control of their systems, and really get to grips with Bash programming. The Bash shell is a complete programming language, not merely a glue to combine external Linux commands. By taking full advantage of Shell internals, Shell programs can perform as snappily as utilities wrTable of Contents1. Hello, World: Your First Shell Program.- 2. Input, Output and Throughput.- 3. Looping and Branching.- 4. Command-Line parsing and Expansion.- 5. Parameters and Variables.- 6. Shell Functions.- 7. String Manipulation.- 8. File Operations and Commands.- 9. Reserved Words and Built-in Commands.- 10. Writing Bug-Free Scripts and Debugging the Rest.- 11. Programming for the Command Line.- 12. Runtime Configuration.- 13. Data Processing.-14. Scripting the Screen.- 15. Entry Level Programming.
£42.49
APress Practical GraphQL
Book SynopsisMaster the query language that is revolutionizing how websites are developed and built. This book is a hands-on guide to GraphQL, and will teach you how to use this open source tool to develop and deploy applications quickly and with minimal fuss. Using a project-based approach, you'll learn how to use GraphQL from the ground up. You'll start with the basics, including set up and key details regarding queries and mutations, before moving on to more advanced topics and projects. Over the course of the book, you will gain a thorough understanding of the web development ecosystem from frontend to backend by building React applications using Prisma Apollo Client and MongoDB. After completing this book, you'll be equipped with the knowledge and skills needed to turbo charge your own enterprise projects.What You'll LearnUnderstand what GraphQL is and how to use itDistinguish between queries and mutations, and how to leverage themGaina greater knowledge of full-stack applications with ReaTable of Contents1.Getting Started. - 2. Queries.- 3. Mutations.- 4. Full Stack GraphQL.- 5 App with Prisma.- 6. Connecting with the Frontend.
£38.24
APress Modern TypeScript
Book SynopsisDive into the world of TypeScript, a popular superset of the JavaScript language that enhances the development experience with static typing. This book covers every aspect of TypeScript in a concise and easy-to-understand style, making it the ultimate resource for mastering TypeScript.Author Ben Beattie-Hood provides comprehensive coverage of TypeScript's features, such as structural typing, optionality and union types, computed and recursive types, and much more. Each chapter is packed with practical, real-world examples and insider tips drawn from his 20 years of experience as a trainer, ensuring you understand the most important concepts and learn how to avoid common pitfalls.Modern TypeScript will put you on the path to becoming a TypeScript expert, help you greatly reduce errors, and boost your delivery velocity. Whether you're building small projects or large-scale applications, this book will give you the skills and confidence to write cleaner, scalable, and more maintainable coTable of Contents
£28.04
APress Kubernetes Fundamentals
Book SynopsisExplore the world of Kubernetes and learn the concepts needed to develop, deploy, and manage applications on this container orchestrator. This step-by-step development guide is designed for application developers and support members aiming to learn Kubernetes and/or prepare for interviews. All the concepts in the book are presented in Q&A format,with questions framed exactly the way they are asked in an interview, giving you a distinctive edge in interviews. You'll start by understanding how application development and deployment have evolved over the decades leading up to containerization. You'll then dive deep into core Kubernetes concepts, learning Kubernetes architecture, Kubernetes objects and workload resources, and how to exploit them to their full potential. You'll also learn Kubernetes deployment strategies and concepts related to rollout and rollback. Moving on, you'll look at two very important aspects of any computing ecosystem: networking and storage. You will gain an Table of ContentsChapter 1: Welcome to the World of Containers.- Chapter 2: Kubernetes- Deep Dive Begins.- Chapter 3: Essential Objects in Kubernetes Cluster.- CHAPTER 4: Objects Important for Secure Kubernetes Cluster.- CHAPTER 5: Networking in Kubernetes.- CHAPTER 6: Kubernetes Storage System.- CHAPTER 7: Manage Your Kubernetes Cluster Efficiently.- CHAPTER 8: Best Practices – Kubernetes and Docker.- CHAPTER 9: kubectl – The Command Line Tool
£37.99
APress How JavaScript Works
Book SynopsisJavaScript is a complicated language with a lot of misinformation surrounding how it works. This book provides a comprehensive introduction to JavaScript, from how it works at a technical level to how it is used to create websites and applications. Everything you need to know to start a career in JavaScript development is covered here. How JavaScript Worksbeginswith a practical introduction of the basics before moving into the technical underpinnings of JavaScript, detailing everything you need to know, including variables, memory storage, functions, classes, types, maps, sets and APIs.Once you've fully absorbed these key topics. author Jonathan Simpson will show you how to put them into practice, demonstrating how they are employed for modern web development. You'll learn how to use JavaScript with HTML and CSS to construct web pages and applications, how to change CSS with JavaScript, and how to utilize Fetch and asynchronous operations. Uponcompleting this book, you will have thTable of ContentsCh1 Introduction to JavaScript.- Ch2 Variables, Comments, and Logical Statements.- Ch3 Introduction to Objects, Arrays.- Ch4 Loops and Iterables.- Ch5 References, Values, and Memory Management.- Ch6 Functions and Classes.- Ch7 Types.- Ch8 Manipulating and Interacting with HTML.- Ch9 Maps and Sets.- Ch10 Fetching Data, APIs and Promises.- Ch11 Errors and the Console.- Ch12 Maps and Sets.- Ch13 Websockets.- Conclusion.- Appendix.
£28.04
APress LowCode Development with Appsmith
Book SynopsisThis book will show you how to harness the power of Appsmith, an open-source low-code platform with a large set of integration tools and an active community. The book begins with an introduction to Appsmith and its features. As you explore the platform, you will learn about widgets, UI Canvas, and data stores, among other things. Authors Rahul Sharma and Rajat Arora then show you how to build customizations and navigation workflows, as well as how to handle error handling, debugging, and troubleshooting with Appsmith. You will also learn efficient monitoring and authentication for deploying production-ready systems. Low-Code Development with AppSmith provides examples, realistic scenarios, and explanations of the tools you'll need to build successful low-code apps, helping you gain practical skills. Upon completing this book, you will be able to use Appsmith to build low-code solutions that suit your business requirements. What You Will LearnUnderstand low-code development and thTable of ContentsChapter 1: Introduction to Appsmith.- Chapter 2: Working with the Appsmith Platform.- Chapter 3: Working with Data.- Chapter 4: Building Application Flows.- Chapter 5: Integration with Web Services.- Chapter 6: Access Control.- Chapter 7: Error Handling and Troubleshooting.- Chapter 8: Monitoring Appsmith.- Chapter 9: Implementation Patterns with Appsmith.- Chapter 10: Working with Appsmith Cloud.
£42.74
O'Reilly Media Git for Teams
Book SynopsisYou can do more with Git than just build software. This practical guide delivers a unique people-first approach to version control that also explains how using Git as a focal point can help your team work better together.
£29.99
O'Reilly Media Monitoring with Graphite
Book SynopsisWith this practical guide, system administrators and engineers will learn how to use this open source tool to track operational data you need to monitor your systems, as well as application-level metrics for profiling your services.
£26.99
O'Reilly Media Automating Junos Administration
Book SynopsisThis practical guide will help you understand the automation features of Junos, show you the tools available to program Junos, and explain which tool is best for your particular network requirement.
£29.99
O'Reilly Media Version Control with Git
Book SynopsisThrough a series of step-by-step tutorials, this practical guide quickly takes you from Git fundamentals to advanced techniques, and provides friendly yet rigorous advice for navigating Git's many functions. You'll learn how to work with everything from small to very large projects with speed and efficiency.
£39.74
Taylor & Francis Inc Operating System Design
Book SynopsisAn Update of the Most Practical A-to-Z Operating System BookWidely lauded for avoiding the typical black box approach found in other operating system textbooks, the first edition of this bestselling book taught readers how an operating system works and explained how to build it from the ground up. Continuing to follow a logical pattern for system design, Operating System Design: The Xinu Approach, Second Edition removes the mystery from operating system design and consolidates the body of material into a systematic discipline. It presents a hierarchical design paradigm that organizes major operating system components in an orderly, understandable manner. The book guides readers through the construction of a conventional process-based operating system using practical, straightforward primitives. It gives the implementation details of one set of primitives, usually the most popular set. Once readers understand how priTrade Review"What sets this book aside from the mass of books on operating systems is its focus on a single real-world operating systems, namely Xinu, which is a commercially used, yet lean, clearly designed, modular operating system for embedded, single-core systems. … The book is surprisingly easy to read; essential data structures and algorithms are presented in source code and discussed adequately, allowing for a very good understanding of the entire operating system. … an ideal book for anyone who aims to understand one operating system in detail, in particular for those working with embedded systems."—Zentralblatt MATH 1314Praise for the First Edition:"Operating System Design: The Xinu Approach is the best book for students and professionals to learn how a computer operating system works. The computer code, along with clear, concise explanations, is simply the best way to learn OS. Readers who study this book carefully will benefit greatly and find it time well spent."—John C. Lin, Bell Labs"… [the author’s] focused, clear, and thorough writing have given ‘systematic’ a new meaning (or perhaps restored its original one). … non-OS specialists also stand to learn much of what they generally need to know from this excellent book. Furthermore, it is no faint praise for me to say that the book’s seamless integration of source code listings into the text … is the best I’ve encountered and works very well indeed. Superior and consistently followed C-language coding conventions give further evidence of the meticulousness with which this book was written. … a most outstanding and practical A-to-Z OS book. It has my highest recommendation."—George Hacken, Computing Reviews, April 2012"This Xinu book is the best operating systems book on the market because it removes the black magic and explains how to build an OS from the ground up. It’s not like other books I tried to read — they gave mTable of ContentsIntroduction and Overview. Concurrent Execution and Operating System Services. An Overview of the Hardware and Runtime Environment. List and Queue Manipulation. Scheduling and Context Switching. More Process Management. Coordination of Concurrent Processes. Message Passing. Basic Memory Management. High-Level Memory Management and Virtual Memory. High-Level Message Passing. Interrupt Processing. Real-Time Clock Management. Device-Independent Input and Output. An Example Device Driver. DMA Devices And Drivers (Ethernet). A Minimal Internet Protocol Stack. A Remote Disk Driver. File Systems. A Remote File Mechanism. A Syntactic Namespace. System Initialization. Subsystem Initialization and Memory Marking. Exception Handling. System Configuration. An Example User Interface: The Xinu Shell. Appendices. Index.
£80.74
Taylor & Francis Inc Crossing Numbers of Graphs
Book SynopsisCrossing Numbers of Graphs is the first book devoted to the crossing number, an increasingly popular object of study with surprising connections. The field has matured into a large body of work, which includes identifiable core results and techniques. The book presents a wide variety of ideas and techniques in topological graph theory, discrete geometry, and computer science. The first part of the text deals with traditional crossing number, crossing number values, crossing lemma, related parameters, computational complexity, and algorithms. The second part includes the rich history of alternative crossing numbers, the rectilinear crossing number, the pair crossing number, and the independent odd crossing number.It also includes applications of the crossing number outside topological graph theory. Aimed at graduate students and professionals in both mathematics and computer science The first book of its kind devoted to the topicTable of Contents1. Introduction and History Part I: The Crossing Number 2. Crossing Number 3. Crossing Number and other Parameters 4. Computational Complexity 5. Algorithms Part II: Crossing Number Variants 6. Rectilinear Crossing Number 7. Local Crossing Number 8. Monotone and Book crossing numbers 9. Pair Crossing Number 10. k-planar Crossing Number 11. Independent Odd Crossing Number 12. Maximum Crossing Numbers Part III: Applications 13. Crossing Minimization 14. Geometric Configurations Appendix A Topological Graph Theory Basics B Complexity Theory
£99.75
Taylor & Francis Inc Graph Polynomials
Book SynopsisThis book covers both theoretical and practical results for graph polynomials. Graph polynomials have been developed for measuring combinatorial graph invariants and for characterizing graphs. Various problems in pure and applied graph theory or discrete mathematics can be treated and solved efficiently by using graph polynomials. Graph polynomials have been proven useful areas such as discrete mathematics, engineering, information sciences, mathematical chemistry and related disciplines.Table of ContentsThe Alliance Polynomial of a Graph. Aspects of the Interlace Polynomial of a Graph. The clique-transversal set problem in clawfree graphs with degree at most 4. Permanental Polynomials of Graphs. Tutte polynomial and its generalizations. Graphs characterized by various polynomials. Recurrence relations of graph polynomials. Independence polynomials of k-tree related graphs. Generatingfunctionology for Graph Polynomials. Symmetric representations and the connection with linear recurrences. From the Ising and Potts model to the general graph homomorphism polynomial.
£147.25
Createspace Independent Publishing Platform Learn Linux in 5 Days
£17.36
Microsoft Press,U.S. MCSA Windows Server 2016 Exam Ref 3Pack
Book Synopsis
£62.89
O'Reilly Media Exploring Expect
Book SynopsisWritten by the author of Expect, this book explains how this part of the UNIX toolbox can be used to automate TelNet, FTP, PASSWD, RLOGIN and other interactive applications. Based on TCL (tool control language), Expect lets the user automate interactive applications that have previously been extremely difficult to handle with any scripting language.Table of ContentsPreface. Expect-Why another tool? Tcl-A Little History. Acknowledgments. How To Read This Book. Notational Conventions. Exercises. Chapter 1: Intro-What Is Expect? Ouch, Those Programs Are Painful! A Very Brief Overview A First Script-dialback Total Automation Differing Behavior When Running Non-Interactively Partial Automation Dangerous, Unfriendly, Or Otherwise Unlikable User Interfaces Graphical Applications A Little More About Tcl Job Control Background Processes Using Expect With Other Programs Using Expect On UNIX Using Expect On Other Operating Systems Using Expect In Real Applications Using Expect In Commercial Applications-Legalese Obtaining Expect and the Examples Expect And Tcl Resources Exercises. Chapter 2: Tcl-Introduction And Overview Everything Is A String Quoting Conventions Expressions Braces-Deferring Evaluation Control Structures More On Expressions Lists More Ways To Manipulate Strings Arrays Indirect References Handling Errors Evaluating Lists As Commands Passing By Reference Working With Files File I/O Executing UNIX Commands Environment Variables Handling Unknown Commands Libraries Is There More To Tcl? Exercises. Chapter 3: Getting Started With Expect The send Command The expect Command Anchoring What Happens When Input Does Not Match Pattern-Action Pairs Example-Timed Reads In The Shell The spawn Command The interact Command Example-Anonymous ftp Exercises. Chapter 4: Glob Patterns And Other Basics The * Wildcard More Glob Patterns Backslashes Handling Timeout Handling End Of File (eof) Hints On The spawn Command Back To Eof The close Command Programs That Ignore Eof The wait Command Exercises. Chapter 5: Regular Expressions Regular Expressions-A Quick Start Identifying Regular Expressions And Glob Patterns Using Parentheses To Override Precedence Using Parentheses For Feedback More On The timed-read Script Pattern Matching Strategy Nested Parentheses Always Count Parentheses Even Inside Of Alternatives Example-The Return Value From A Remote Shell Matching Customized Prompts Example-A Smart Remote Login Script What Else Gets Stored In expect_out More On Anchoring Exercises. Chapter 6: Patterns, Actions, And Limits Matching Anything But Really Complex Patterns Really Simple Patterns Matching One Line And Only One Line Tcl's string match Command Tcl's regexp Command Tcl's regsub Command Ignoring Case All Those Other String Functions Are Handy, Too Actions That Affect Control Flow Example-rogue Character Graphics More Actions That Affect Control Flow Matching Multiple Times Recognizing Prompts (Yet Again) Speed Is On Your Side Controlling The Limits Of Pattern Matching Input The full_buffer Keyword Double Buffering Perpetual Buffering The Politics Of Patterns Expecting A Null Character Parity Length Limits Comments In expect Commands Restrictions On expect Arguments eval-Good, Bad, And Ugly Exercises. Chapter 7: Debugging Patterns And Controlling Output Pattern Debugging Enabling Internal Diagnostics Logging Internal Diagnostics Disabling Normal Program Output The log_user Command Example-su2 Recording All Expect Output Sending Messages To The Log About File Names Log And Diagnostic State Exercises. Chapter 8: Handling A Process And A User The send_user Command The send_error Command The expect_user Command Dealing With Programs That Reprompt Dealing With Programs That Miss Input Sleeping Line Versus Character-Oriented And Other Terminal Modes Echoing Prompting For A Password On Behalf Of A Program Security And Insecurity Resetting The Terminal Upon Exit More On The stty Command The system Command Redirecting The Standard Input Or Output The expect_tty Command The send_tty Command Exercises. Chapter 9: The Expect Program Expect-Just Another Program Invoking Scripts Without saying "expect" Rewriting The #! Line The .exp Extension The -- And Other Flags The -c Flag The -f Flag Writing The #! Line The -i Flag The -n And -N Flags The -d Flag The -D Flag The -b Flag The - Flag The interpreter Command Exercises. Chapter 10: Handling Multiple Processes The spawn_id Variable Example-chess Versus chess Example-Automating The write Command How exp_continue Affects spawn_id The Value Of spawn_id Affects Many Commands Symbolic Spawn Ids Job Control Procedures Introduce New Scopes How Expect Writes Variables In Different Scopes Predefined Spawn Ids Exercises. Chapter 11: Handling Multiple Processes Simultaneously Implicit Versus Explicit Spawn Ids Waiting From Multiple Processes Simultaneously Example-Answerback Which Pattern Goes With Which Spawn Id Which Spawn Id Matched Spawn Id Lists Example-Connecting Together Two Users To An Application Example-Timing All Commands Matching Any Spawn Id Already Listed The expect_before And expect_after Commands Indirect Spawn Ids Exercises. Chapter 12: Send Implicit Versus Explicit Spawn Ids Sending To Multiple Processes Sending Without Echoing Sending To Programs In Cooked Mode Sending Slowly Sending Humanly Sending Nulls Sending Breaks Sending Strings That Look Like Flags Sending Character Graphics Comparing send To puts Exercises. Chapter 13: Spawn The Search Path Philosophy-Processes Are Smart Treating Files As Spawned Processes Opening Ttys Bugs And Workarounds Process Pipelines And Ptys Automating xterm Checking For Errors From spawn spawn -noecho Example-unbuffer Obtaining Console Output Setting Pty Modes From spawn Hung Ptys Restrictions On Spawning Multiple Processes Getting The Process Id From A Spawn Id Using File I/O Commands On Spawned Processes Exercises. Chapter 14: Signals Signals Signals In Spawned Processes Notes On Specific Signals When And Where Signals Are Evaluated Overriding The Original Return Value Using A Different Interpreter To Process Signals Exit Handling Exercises. Chapter 15: Interact The interact Command Simple Patterns Exact Matching Matching Patterns From The Spawned Process Regular Expressions What Happens To Things That Do Not Match More Detail On Matching Echoing Avoiding Echoing Giving Feedback Without -echo Telling The User About New Features Sending Characters While Pattern Matching The continue And break Actions The return Action The Default Action Detecting End-Of-File Matching A Null Character Timing Out More On Terminal Modes (Or The -reset Flag) Example-Preventing Bad Commands Exercises. Chapter 16: Interacting With Multiple Processes Connecting To A Process Other Than The Currently Spawned Process Connecting To A Process Instead Of The User Example-rz And sz Over rlogin Redirecting Input And Output Default Input And Output Controlling Multiple Processes-kibitz Combining Multiple Inputs Or Outputs Which Spawn Id Matched Indirect Spawn Ids An Extended Example-xkibitz Exercises. Chapter 17: Background Processing Putting Expect In The Background Running Expect Without A Controlling Terminal Disconnecting The Controlling Terminal The fork Command The disconnect Command Reconnecting Using kibitz From Other Expect Scripts Mailing From Expect A Manager For Disconnected Processes-dislocate Expect As A Daemon Example-Automating Gopher and Mosaic telnet Connections Exercises. Chapter 18: Debugging Scripts Tracing Logging Command Tracing Variable Tracing Example-Logging By Tracing UNIX System Call Tracing Tk And tkinspect Traditional Debugging Debugger Command Overview And Philosophy Stepping Over Procedure Calls Stepping Into Procedure Calls Where Am I The Current Scope Moving Up And Down The Stack Returning From A Procedure Continuing Execution Defining Breakpoints Help Changing Program Behavior Changing Debugger Behavior Exercises. Chapter 19: Expect + Tk = Expectk Tk-A Brief Technical Overview Expectk The send Command An Extended Example-tkpasswd Using Tk Widgets To Prompt For Passwords The expect Command And The Tk Event Loop The expect_background Command Multiple Spawn Ids In expect_background Background Actions Example-A Dumb Terminal Emulator Example-A Smarter Terminal Emulator Using The Terminal Emulator For Testing And Automation Exercises. Chapter 20: Extended Examples Encrypting A Directory File Transfer Over telnet You Have Unread News-tknewsbiff Exercises. Chapter 21: Expect, C, And C++ Overview Linking Include Files Ptys And Processes Allocating Your Own Pty Closing The Connection To The Spawned Process Expect Commands Regular Expression Patterns Exact Matching Matching A Null What Characters Matched When The Number Of Patterns Is Not Known In Advance Expecting From Streams Running In The Background Handling Multiple Inputs And More On Timeouts Output And Debugging Miscellany Pty Trapping Exercises. Chapter 22: Expect As Just Another Tcl Extension Adding Expect To Another Tcl-based Program Differences Between Expect And The Expect Extension In Another Program Adding Extensions To Expect Adding Extensions To Expectk Creating Script-less Expect Programs Functions And Variables In The Expect Extension Exercises. Chapter 23: Miscellaneous Random Numbers Example-Generating Random Passwords The Expect Library Expect Versions Timestamps The time Command Exercises. Appendix: Commands and Variables Commands And Flags Variables Index Of Scripts Index
£23.99
O'Reilly Media Using csh and tsch
Book SynopsisIf you use UNIX, you probably use csh to type commands even if you've never heard of it. It's the standard shell (command line) on most UNIX systems. tcsh is an enhanced version that's freely available and highly recommended. Using csh & tcsh describes from the beginning how to use these shells interactively. More important, it shows how to get your work done faster with less typing. Even if you've used UNIX for years, techniques described in this book can make you more efficient. You'll learn how to: * Make your prompt tell you where you are (no more pwd) * Use what you've typed before (history) * Type long command lines with very few keystrokes (command and filename completion) * Remind yourself of filenames when in the middle of typing a command * Edit a botched command instead of retyping it This book does not cover programming or script writing in csh or tcsh because the tasks are better done with a different shell, such as sh (the Bourne shell) or a language like Perl.Table of ContentsPreface Part 1: Learning the Basics Chapter 1: Introduction Using the Examples Selecting a Login Shell Before You Read Further Chapter 2: A Shell Primer Entering Commands Command Input and Output Files and Directories Combining Commands Running Commands in the Background When Do Spaces Matter? The Shell Startup Files Chapter 3: Using the Shell Effectively Using Filenames Reusing and Editing Commands Creating Command Shortcuts Using Command Substitution Navigating the File System Using Your Prompt Using Job Control Part 2: Becoming More Efficient Chapter 4: The Shell Startup Files Startup and Shutdown Files Getting To Know .cshrc and .login Modifying .cshrc and .login Using Variables Organizing Your Startup Files The .logout File Chapter 5: Setting Up Your Terminal Identifying Your Terminal Settings What the Settings Mean Changing Your Terminal Settings Did Your Terminal Stop Working? Chapter 6: Using Your Command History The History List Reviewing Your History Using Commands from Your History Event Specifiers Word Designators Event Modifiers Making History Persist Across Login Sessions Chapter 7: The tcsh Command-Line Editor Editing a Command Command Key Bindings emacs Editing Mode vi Editing Mode Examining and Modifying Key Bindings Chapter 8: Using Aliases To Create Command Shortcuts Defining Aliases Uses for Aliases Using Sets of Aliases Chapter 9: File-Naming Shortcuts Using Filename Patterns Using {} To Generate Arguments Directory Naming Shorthand Chapter 10: Filename and Programmed Completion Using Built-In Filename Completion Programmed Completions Syntax of the complete Command Displaying and Removing Programmed Completions When Programmed Completions Do Not Apply Chapter 11: Quoting and Special Characters Special Characters The Shell's Quote Characters Referring to Files with Problematic Names Passing Special Characters to Commands Using Partial Quoting Quoting Oddities Chapter 12: Using Commands To Generate Arguments Command Substitution Repeating Substituted Commands Deferred Command Substitution When To Avoid Command Substitution Chapter 13: Navigating the File System Moving Around Working in Multiple Locations Letting the Shell Find Directories for You Using Aliases and Variables To Move Around Chapter 14: Keeping Track of Where You Are Types of Location Reporting Displaying Your Location in the Prompt Display Your Location in the Window Title Putting It All Together Displaying Other Types of Information Chapter 15: Job Control Job States Obtaining Job Information Changing a Job's State Other Applications of Job Control Job Control and Window Systems Part 3: Appendixes Appendix A: Obtaining and Installing tcsh Obtaining the Source Distribution Build the Distribution-Quick Instructions Build the Distribution-Detailed Instructions Testing and Installing tcsh Allowing tcsh To Be a Login Shell Appendix B: csh and tcsh Quick Reference Command Structure Startup and Shutdown Files Variables Special Characters Command History Moving Around the File System Aliases Filename Completion Programmed Completion Job Control Command Editing in tcsh Appendix C: Other Sources of Information Documents Newsgroups Mailing Lists Index
£20.99