Operating systems Books
O'Reilly Media sed & awk
Book Synopsissed & awk describes two text processing programs that are mainstays of the UNIX programmer's toolbox. sed is a "stream editor" for editing streams of text that might be too large to edit as a single file, or that might be generated on the fly as part of a larger data processing step. The most common operation done with sed is substitution, replacing one block of text with another. awk is a complete programming language. Unlike many conventional languages, awk is "data driven" -- you specify what kind of data you are interested in and the operations to be performed when that data is found. awk does many things for you, including automatically opening and closing data files, reading records, breaking the records up into fields, and counting the records. While awk provides the features of most conventional programming languages, it also includes some unconventional features, such as extended regular expression matching and associative arrays. sed & awk describes both programs in detail and includes a chapter of example sed and awk scripts. This edition covers features of sed and awk that are mandated by the POSIX standard. This most notably affects awk, where POSIX standardized a new variable, CONVFMT, and new functions, toupper() and tolower(). The CONVFMT variable specifies the conversion format to use when converting numbers to strings (awk used to use OFMT for this purpose). The toupper() and tolower() functions each take a (presumably mixed case) string argument and return a new version of the string with all letters translated to the corresponding case. In addition, this edition covers GNU sed, newly available since the first edition. It also updates the first edition coverage of Bell Labs nawk and GNU awk (gawk), covers mawk, an additional freely available implementation of awk, and briefly discusses three commercial versions of awk, MKS awk, Thompson Automation awk (tawk), and Videosoft (VSAwk).Table of ContentsPreface Chapter 1. Power Tools for Editing May You Solve Interesting Problems A Stream Editor A Pattern-Matching Programming Language Four Hurdles to Mastering sed and awk Chapter 2. Understanding Basic Operations Awk, by Sed and Grep, out of Ed Command-Line Syntax Using sed Using awk Using sed and awk Together Chapter 3. Understanding Regular Expression Syntax That's an Expression A Line-Up of Characters I Never Metacharacter I Didn't Like Chapter 4. Writing sed Scripts Applying Commands in a Script A Global Perspective on Addressing Testing and Saving Output Four Types of sed Scripts Getting to the PromiSed Land Chapter 5. Basic sed Commands About the Syntax of sed Commands Comment Substitution Delete Append, Insert, and Change List Transform Print Print Line Number Next Reading and Writing Files Quit Chapter 6. Advanced sed Commands Multiline Pattern Space A Case for Study Hold That Line Advanced Flow Control Commands To Join a Phrase Chapter 7. Writing Scripts for awk Playing the Game Hello, World Awk's Programming Model Pattern Matching Records and Fields Expressions System Variables Relational and Boolean Operators Formatted Printing Passing Parameters Into a Script Information Retrieval Chapter 8. Conditionals, Loops, and Arrays Conditional Statements Looping Other Statements That Affect Flow Control ArraysAn Acronym Processor System Variables That Are Arrays Chapter 9. Functions Arithmetic Functions String Functions Writing Your Own Functions Chapter 10. The Bottom Drawer The getline Function The close() Function The system() Function A Menu-Based Command Generator Directing Output to Files and Pipes Generating Columnar Reports Debugging Limitations Chapter 11. A Flock of awks Original awk Freely Available awks Commercial awks Epilogue Chapter 12. Full-Featured Applications An Interactive Spelling Checker Generating a Formatted Index Spare Details of the masterindex Program Chapter 13. A Miscellany of Scripts uutot.awk--Report UUCP Statistics phonebill--Track Phone Usage combine--Extract Multipart uuencoded Binaries mailavg--Check Size of Mailboxes adj--Adjust Lines for Text Files readsource--Format Program Source Files for troff gent--Get a termcap Entry plpr--lpr Preprocessor transpose--Perform a Matrix Transposition m1--Simple Macro Processor Appendix A. Quick Reference for sed Appendix B. Quick Reference for awk Appendix C. Supplement for Chapter 12 Index
£31.99
O'Reilly Media GNU Emacs Pocket Reference
Book SynopsisGNU Emacs is the most popular and widespread of the Emacs family of editors. It is also the most powerful and flexible. Unlike all other text editors, GNU Emacs is a complete working environment -- you can stay within Emacs all day without leaving. The GNU Emacs Pocket Reference is a companion volume to O'Reilly's Learning GNU Emacs, which tells you how to get started with the GNU Emacs editor and, as you become more proficient, it will help you learn how to use Emacs more effectively. This small book, covering Emacs version 20, is a handy reference guide to the basic elements of this powerful editor, presenting the Emacs commands in an easy-to-use tabular format.Table of ContentsPreface. 1: Emacs Basics A Word About Modes Major Modes Minor Modes Starting and Leaving Emacs Working with Files Letting Emacs Fill in the Blanks. 2: Editing Files Working in Text Mode Moving the Cursor Repeating Commands Cutting Text Marking Text to Delete, Move, or Copy Using a Mouse with Emacs Transposing and Capitalizing Text Stopping Commands Undoing Edits Recovering Lost Changes. 3: Search and Replace Operations Incremental Search Nonincremental and Word Search Query Replace Regular Expression Search and Replace Characters for Creating Regular Expressions Regular Expression Search Commands Spellchecking Word Abbreviations. 4: Using Buffers and Windows Using Buffers Buffer List Commands Using Windows Using Frames Using Bookmarks Bookmark Commands Bookmark List. 5: Emacs as a Work Environment Shell Mode Working with Dired Printing Calendar and Diary Commands. 6: Email and Newsgroups Sending Mail Reading Mail with RMAIL Reading Mail with Gnus Gnus Group Buffer Commands Gnus Summary Buffer Commands Gnus Posting Commands. 7: Emacs and the Internet Telnet Commands Copying Files with Ange-ftp Mode Using the Web with Emacs. 8: Simple Text Formatting and Specialized Editing Centering Commands Inserting Page Breaks and Control Characters Rectangle Editing Outline Mode Commands. 9: Marking Up Text with Emacs nroff Mode TeX Mode HTML Helper Mode HTML Helper Mode Commands 10: Writing Macros Macro Commands 11: Customizing Emacs Keyboard Customization Special Character Conventions Emacs Variables Backups and Auto-Save Search and Replace Display Modes Mail Text Editing Completion Miscellaneous. 12: Emacs for Programmers General Commands C, C++, and Java Modes Customizing Code Indentation Style LISP Mode FORTRAN Mode. 13: Version Control Under Emacs Version Control Commands Version Control Variables. 14: Online Help The Help System Apropos Commands Information about Emacs
£13.59
O'Reilly Media qmail
Book Synopsisqmail has quietly become one of the most widely used applications on the Internet today. It's powerful enough to handle mail for systems with millions of users--Like Yahoo! Mail and Hotmail, while remaining compact and manageable enough for the smallest Unix- and Linux-based PC systems. Its component design makes it easy to extend and customize while keeping its key functions secure, so it's no wonder that adoption of qmail continues at a rapid pace. The downside? Apparently none. Except that qmail's unique design can be disorienting to those familiar with other popular MTAs (Mail Transfer Agents). If you're coming from sendmail, for instance, you might have trouble recasting your problems and solutions in qmail terms. qmail first helps you establish a "qmail frame of mind," then explores the installation, configuration, administration, and extension of this powerful MTA. Whether you're installing from scratch or managing mailing lists with thousands of users, qmail provides detailed information about how to make qmail do precisely what you want qmail concentrates on common tasks like moving a sendmail setup to qmail, or setting up a "POP toaster," a system that provides mail service to a large number of users on other computers sending and retrieving mail remotely. The book also fills crucial gaps in existing documentation, detailing exactly what the core qmail software does. Topics covered include: Installation and configuration, including patching qmail - Moving from sendmail to qmail - Handling locally and remotely originated messages - Managing virtual domains - Logging qmail activity - Tuning qmail performance - Running multiple copies of qmail on the same computer - Mailing list setup and management - Integrating the qmail MTA with POP and IMAP delivery - Filtering out spam and viruses If you need to manage mailing lists, large volumes of mail, or simply find sendmail and other MTAs too complicated, qmail may be exactly what's called for. Our new guide, qmail, will provide the guidance you need to build an email infrastructure that performs well, makes sense, and is easy to maintain.Table of ContentsPreface Part I. Introduction to Qmail 1. Internet Email Mail Basics Mailstore The Structure of Internet Mail 2. How Qmail Works Small Programs Work Together What Does a Mail Transfer Agent (MTA) Do? The Pieces of Qmail 3. Installing Qmail Where to Find Qmail Creating the Users and Groups Configuring and Making the Software Patching Qmail 4. Getting Comfortable with Qmail Mailboxes, Local Delivery, and Logging An Excursion into Daemon Management Setting Up the Qmail Configuration Files Starting and Stopping Qmail Incoming Mail Procmail and Qmail Creating Addresses and Mailboxes Reading Your Mail Configuring Qmail's Control Files Using ~alias fastforward and /etc/aliases 5. Moving from Sendmail to Qmail Running Sendmail and Qmail in Parallel User Issues System Issues Converting Your Aliases File Trusted Users 6. Handling Locally Generated Mail qmail-queue Cleaning Up Injected Mail Accepting Local Mail from Other Hosts Distinguishing Injected from Relayed Mail 7. Accepting Mail from Other Hosts Accepting Incoming SMTP Mail Accepting and Cleaning Up Local Mail Using the Regular SMTP Daemon Dealing with Roaming Users SMTP Authorization and TLS Security POP-before-SMTP 8. Delivering and Routing Local Mail Mail to Local Login Users Mail Sorting 9. Filtering and Rejecting Spam and Viruses Filtering Criteria Places to Filter Spam Filtering and Virus Filtering Connection-Time Filtering Tools SMTP-Time Filtering Tools Delivery Time Filtering Rules Combination Filtering Schemes Part II. Advanced Qmail 10. Local Mail Delivery How Qmail Delivers Local Mail Mailbox Deliveries Program Deliveries Subaddresses Special Forwarding Features for Mailing Lists The Users Database Bounce Handling 11. Remote Mail Delivery Telling Local from Remote Mail qmail-remote Locating the Remote Mail Host Remote Mail Failures Serialmail 12. Virtual Domains How Virtual Domains Work Some Common Virtual Domain Setups Some Virtual Domain Details 13. POP and IMAP Servers and POP Toasters Each Program Does One Thing Starting the Pop Server Testing Your POP Server Building POP Toasters Picking Up Mail with IMAP and Web Mail 14. Mailing Lists Sending Mail to Lists Using Ezmlm with qmail Using Other List Managers with Qmail Sending Bulk Mail That's Not All the Same 15. The Users Database If There's No Users Database Making the Users File How Qmail Uses the Users Database Typical Users Setup Adding Entries for Special Purposes 16. Logging, Analysis, and Tuning What Qmail Logs Collecting and Analyzing Qmail Logs with Qmailanalog Analyzing Other Logs Tuning Qmail Tuning to Deal with Spam Looking at the Mail Queue with qmail-qread 17. Many Qmails Make Light Work Tools for Multiple Computers and Qmail Setting Up mini-qmail 18. A Compendium of Tips and Tricks Qmail Won't Compile Why Qmail Is Delivering Mail Very Slowly Stuck Daemons and Deliveries Mail to Valid Users Is Bouncing or Disappearing Mail Routing Local Mail Delivery Tricks Delivering Mail on Intermittent Connections Limiting Users' Mail Access Adding a Tag to Each Outgoing Message Logging All Mail Setting Mail Quotas and Deleting Stale Mail Backing Up and Restoring Your Mail Queue A. A Sample Script B. Online Qmail Resources Index
£20.99
O'Reilly Media Palm OS Programming - The Developers Guide 2e
Book SynopsisWith more than 16 million PDAs shipped to date, Palm has defined the market for handhelds, having dominated this class of computing devices ever since it began to outpace competitors six years ago. The company's strength is the Palm OS, and developers loyal to this powerful and versatile operating system have created more than 10,000 applications for it. Devices from Handspring, Sony, Symbol, HandEra, Kyocera, and Samsung now use Palm OS, and the number of registered Palm Developers has jumped to 130,000. If you know C or C++, and want to join those who are satisfying the demand for wireless applications, then Palm OS Programming: The Developer's Guide, Second Edition is the book for you. With expanded coverage of the Palm OS--up to and including the latest version, 4.0--this new edition shows intermediate to experienced C programmers how to build a Palm application from the ground up. There is even useful information for beginners. Everything you need to write a Palm OS application is here, from user interface design, to coding a handheld application, to writing an associated desktop conduit. All the major development environments are discussed, including commercial products such as Metroworks CodeWarrior, Java-based environments such as Sun KVM and IBM VisualAge Micro Edition, and the Free Software Foundation's PRC-Tools or GCC. The focus, however, is C programming with CodeWarrior and PRC-Tools. New additions to the second edition include: A tutorial that takes a C programmer through the installation of necessary tools and the creation of a small handheld application. A new chapter on memory, with a comprehensive discussion of the Memory Manager APIs. Greatly expanded discussions of forms, forms objects, and new APIs for the Palm OS. Updated chapters on conduits that reflect the newer Conduit Development Kit. The best-selling first edition of this book is still considered the definitive guide for serious Palm programmers; it's used as the basis of Palm's own developer training materials. Our expanded second edition promises to set the standard for the next generation of Palm developers.Table of ContentsPreface. Part I. Overview of the Palm OS. 1. The Palm Solution How Palm Succeeded Elements in the Magic Formula Easy to Carry Inexpensive Expandable Effortlessly Connects to a Desktop Computer Works Great and Is Simple to Use Designing Applications for Palm Devices 2. Technical Overview and Development Environments Palm OS Overview Conduit Overview Handheld Development Environments Alternative Development Environments High-Level Forms Development Handheld Development Recommendations Conduit Development 3. Designing a Solution User Interface Elements in the Palm OS Designing with a Particular User in Mind The Well-Designed Form Other Design Issues How the Sample Applications Are Useful User Interface of the Sales Application Designing the Sales Application Designing the Conduit Design Summary Part II. Programming a Palm Application 4. Tutorial POSE CodeWarrior PRC-Tools Installing OReilly Sample project Installing a PRC on the Handheld Installing PRC on POSE Modifying the Sample Application 5. Structure of an Application Terminology Palm OS Conventions The Palm OS and an Application A Simple Application-OReilly Starter Other Times Your Application Is Called Examples What to Remember 6. Memory Manager Types of Memory Dynamic Memory Allocation Stack Space Handling Large Amounts of Data Owner IDs Cards and Local IDs Using Memory Effectively MemoryTestAPIs Example What to Remember 7. Debugging Palm plications POSE Graffiti Debugging Shortcuts Source-Level Debugging Gremlins Error Manager Palm OS Sources Low-Level Debugging with PalmDebugger Device Reset Using Simulator on Mac OS Release/Debug Targets 8. Resources and Forms Resources Form Characteristics Form Events Form-Level APIs Modeless Forms Alerts Modal Dialog Boxes Forms in the Sales Application 9. Form Objects Form Object Characteristics Form Object Events Form Object APIs Types of Form Objects Sales Application Forms and Form Objects 10. Databases Overview of Databases and Records Opening, Creating, and Closing Databases Working with Records Examining Databases in the Sales Sample Summary 11. Menus Menu User Interface Menu Resources Application Code for Menus Adding Menus to the Sample Application Summary 12. Extras Find Exchange 13. Communications Serial Communications TCP/IP Communications Part III. Designing Conduits 14. Getting Started with Conduits Overview of Conduits Using the Backup Conduit Registering and Unregistering Using Desktop APIs Conduit Entry Points The HotSync Log When the HotSync Button Is Pressed Using Conduit Inspector to Verify Your Conduit Syncing from POSE Creating a Minimal Sales Conduit 15. Moving Data to and from the Handheld with a Conduit Conduit Requirements Where to Store Data Creating, Opening, and Closing Databases Moving Data to the Handheld Moving Data to the Desktop Keeping the HotSync Progress Dialog Box Alive When the HotSync Button Is Pressed Portability Issues The Sales Conduit 16. Two-Way Syncing The Logic of Syncing MFC Conduit Framework Generic Conduit Framework Generic Conduit Classes Uing the Wizard to Create a Minimal Generic Conduit Custom File Formats Handling Categories Sales Conduit Based on Generic Conduit Prt IV. Appendixes A. Where to Go from Here B. Sales Source Code C. PilRC Manual Index
£38.99
MC Press, LLC Mastering IBM i: The Complete Resource for
Book SynopsisA comprehensive introduction to IBM i—the operating system that runs on IBM's midrange computer systems (System i, iSeries, AS/400)—and its facilities, this in-depth resource uses step-by-step exercises, review questions, and chapter labs to teach new programmers the latest system concepts and tools. Reflecting system changes that have occurred since 2000, topics include Rational Developer for Power (RDP), RDP Screen Designer and Report Designer, IBM i Access for Windows, IBM i Access for Web, IBM DB2 Web Query for i, and Remote System Explorer (RSE).
£71.25
Reader's Digest Association How to Do Just about Anything on a Computer:
Book Synopsis
£19.95
Manning Publications Hadoop in Practice
Book Synopsis
£47.49
Murphy & Moore Publishing Operating Systems: Design and Implementation
Book Synopsis
£107.42
Larsen and Keller Education Modern Operating Systems
Book Synopsis
£100.49
Clanrye International Understanding Operating Systems
Book Synopsis
£110.84
Arcler Press Operating Systems
Book SynopsisThis book provides a comprehensive overview of the core principles and functionality of computer operating systems. The book covers various topics, including process management, memory management, file systems, device management, and security. It is written to provide readers with a deeper understanding of how operating systems work and how they can be used to optimize computer performance. This book is an essential resource for understanding the intricacies of operating systems.Table of Contents Chapter 1 Fundamentals of Operating System Chapter 2 History of Operating Systems Chapter 3 Structure of Operating Systems Chapter 4 Processes in Operating Systems Chapter 5 Memory Management Chapter 6 File Systems Chapter 7 Mobile Operating Systems Chapter 8 Distributed Operating Systems
£87.20
Packt Publishing Limited Introduction to R for Quantitative Finance
Book SynopsisThis book is a tutorial guide for new users that aims to help you understand the basics of and become accomplished with the use of R for quantitative finance. If you are looking to use R to solve problems in quantitative finance, then this book is for you. A basic knowledge of financial theory is assumed, but familiarity with R is not required. With a focus on using R to solve a wide range of issues, this book provides useful content for both the R beginner and more experience users.
£29.44
Packt Publishing Limited Learning Shell Scripting with Zsh
Book SynopsisA step-by-step tutorial that will teach you, through real world examples, how to configure and use zsh and its various features. If you are a system administrator, developer, or computer professional involved with UNIX who are looking to improve on their daily tasks involving the UNIX shell, "Learning Shell Scripting with zsh" will be great for you. It's assumed that you have some familiarity with an UNIX command line interface and feel comfortable with editors such as Emacs or vi.
£23.99
Packt Publishing Limited SELinux Policy Administration
£25.99
Packt Publishing Limited Kubernetes Cookbook
Book SynopsisKubernetes is one of the most popular, sophisticated, and fast-evolving container orchestrators. In this book, you'll learn the essentials and find out about the advanced administration in Kubernetes. We'll take you through a step-by-step hands-on approach, which will familiarize you with the Kubernetes ecosystem.
£999.99
Springer London Ltd Understanding Concurrent Systems
Book SynopsisCSP notation has been used extensively for teaching and applying concurrency theory, ever since the publication of the text Communicating Sequential Processes by C.A.R. Hoare in 1985. Both a programming language and a specification language, the theory of CSP helps users to understand concurrent systems, and to decide whether a program meets its specification. As a member of the family of process algebras, the concepts of communication and interaction are presented in an algebraic style. An invaluable reference on the state of the art in CSP, Understanding Concurrent Systems also serves as a comprehensive introduction to the field, in addition to providing material for a number of more advanced courses. A first point of reference for anyone wanting to use CSP or learn about its theory, the book also introduces other views of concurrency, using CSP to model and explain these. The text is fully integrated with CSP-based tools such as FDR, and describes how to create new tools based on FDR. Most of the book relies on no theoretical background other than a basic knowledge of sets and sequences. Sophisticated mathematical arguments are avoided whenever possible. Topics and features: presents a comprehensive introduction to CSP; discusses the latest advances in CSP, covering topics of operational semantics, denotational models, finite observation models and infinite-behaviour models, and algebraic semantics; explores the practical application of CSP, including timed modelling, discrete modelling, parameterised verifications and the state explosion problem, and advanced topics in the use of FDR; examines the ability of CSP to describe and enable reasoning about parallel systems modelled in other paradigms; covers a broad variety of concurrent systems, including combinatorial, timed, priority-based, mobile, shared variable, statecharts, buffered and asynchronous systems; contains exercises and case studies to support the text; supplies further tools and information at the associated website: http://www.comlab.ox.ac.uk/ucs/. From undergraduate students of computer science in need of an introduction to the area, to researchers and practitioners desiring a more in-depth understanding of theory and practice of concurrent systems, this broad-ranging text/reference is essential reading for anyone interested in Hoare’s CSP.Trade ReviewFrom the reviews:“This book is divided into four parts … . Part I is designed for an audience of both undergraduate and graduate computer science students. … Part II is designed for people who are familiar with Part I and have fairly theoretical interests. … Part III is intended for people who … want to be able to use them in a better way, or who are specifically interested in timed systems. Part IV is designed for people who already understand CSP.” (Günther Bauer, Zentralblatt MATH, Vol. 1211, 2011)Table of ContentsPart I: A Foundation Course in CSP Building a Simple Sequential Process Understanding CSP Parallel Operators CSP Case Studies Hiding and Renaming Beyond Traces Further Operators Using FDR Part II: Theory Operational Semantics Denotational Semantics and Behavioural Models Finite Observation Models Infinite-behaviour Models The Algebra of CSP Part III: Using CSP Timed Systems 1: tock-CSP Timed Systems 2: Discrete Timed CSP More About FDR State Explosion and Parameterised Verification Part IV: Exploring Concurrency Shared-variable Programs Understanding Shared-variable Concurrency Priority and Mobility
£40.49
Morgan & Claypool Publishers The Continuing Arms Race: Code-Reuse Attacks and
Book SynopsisAs human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system.The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs.The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.Table of Contents Preface 1. How Memory Safety Violations Enable Exploitation of Programs 2. Protecting Dynamic Code 3. Diversity and Information Leaks 4. Code-Pointer Integrity 5. Evaluating Control-Flow Restricting Defenses 6. Attacking Dynamic Code 7. Hardware Control Flow Integrity 8. Multi-Variant Execution Environments References Contributor Biographies
£68.00
Morgan & Claypool Publishers The Continuing Arms Race: Code-Reuse Attacks and
Book SynopsisAs human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system.The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs.The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.Table of Contents Preface 1. How Memory Safety Violations Enable Exploitation of Programs 2. Protecting Dynamic Code 3. Diversity and Information Leaks 4. Code-Pointer Integrity 5. Evaluating Control-Flow Restricting Defenses 6. Attacking Dynamic Code 7. Hardware Control Flow Integrity 8. Multi-Variant Execution Environments References Contributor Biographies
£79.20
Springer Nature Switzerland AG Architecture of Computing Systems – ARCS 2019: 32nd International Conference, Copenhagen, Denmark, May 20–23, 2019, Proceedings
Book SynopsisThis book constitutes the proceedings of the 32nd International Conference on Architecture of Computing Systems, ARCS 2019, held in Copenhagen, Denmark, in May 2019. The 24 full papers presented in this volume were carefully reviewed and selected from 40 submissions. ARCS has always been a conference attracting leading-edge research outcomes in Computer Architecture and Operating Systems, including a wide spectrum of topics ranging from embedded and real-time systems all the way to large-scale and parallel systems. The selected papers are organized in the following topical sections: Dependable systems; real-time systems; special applications; architecture; memory hierarchy; FPGA; energy awareness; NoC/SoC. The chapter 'MEMPower: Data-Aware GPU Memory Power Model' is open access under a CC BY 4.0 license at link.springer.com.Table of ContentsDependable Systems.- Hardware/Software Co-designed Security Extensions for Embedded Devices.- SDES - Scalable Software Support for Dependable Embedded Systems.- Real-Time Systems.- Asynchronous Critical Sections in Real-Time Multiprocessor Systems.- Resource-Aware Parameter Tuning for Real-Time Applications.- A Hybrid NoC Enabling Fail-Operational and Hard Real-Time Communication in MPSoC.- Special Applications.- DSL-based Acceleration of Automotive Environment Perception and Mapping Algorithms for embedded CPUs, GPUs, and FPGAs.- Applying the Concept of Artificial DNA and Hormone System to a Low-Performance Automotive Environment.- A Parallel Adaptive Swarm Search Framework for Solving Black-Box Optimization Problems.- Architecture.- Leros: the Return of the Accumulator Machine.- A Generic Functional Simulation of Heterogeneous Systems.- Evaluating Dynamic Task Scheduling in a Task-based Runtime System for Heterogeneous Architectures.- Dynamic Scheduling of Pipelined Functional Units in Coarse-Grained Reconfigurable Array Elements.- Memory Hierarchy.- CyPhOS { A Component-based Cache-Aware Multi-Core Operating System.- Investigation of L2-Cache interferences in a NXP QorIQ T4240 multicore processor.- MEMPower: Data-Aware GPU Memory Power Model.- FPGA.- Effective FPGA Architecture for General CRC.- Receive-Side Notification for Enhanced RDMA in FPGA Based Networks.- An Efficient FPGA Accelerator Design for Optimized CNNs using OpenCL.- Energy Awareness.- The Return of Power Gating: Smart Leakage Energy Reductions in Modern Out-of-Order Processor Architectures.- A Heterogeneous and Reconfigurable Embedded Architecture for Energy-efficient Execution of Convolutional Neural Networks.- An energy efficient embedded processor for hard real-time Java applications.- NoC/SoC.- A Minimal Network Interface for a Simple Network-on-Chip.- Network Coding in Networks-on-Chip with Lossy Links.- Application Specific Reconfigurable SoC Interconnection Network Architectures.
£49.49
Springer Nature Switzerland AG Distributed Computing and Internet Technology: 16th International Conference, ICDCIT 2020, Bhubaneswar, India, January 9–12, 2020, Proceedings
Book SynopsisThis book constitutes the proceedings of the 16th International Conference on Distributed Computing and Internet Technology, ICDCIT 2020, held in Bhubaneswar, India, in January 2020. The 20 full and 3 short papers presented in this volume were carefully reviewed and selected from 110 submissions. In addition, the book included 6 invited papers. The contributions were organized in topical sections named: invited talks; concurrent and distributed systems modelling and verification; cloud and grid computing; social networks, machine learning and mobile networks; data processing and blockchain technology; and short papers. Table of ContentsInvited Talks.- Graph Analytics.- A distributed and trusted web of formal proofs.- Prosperos Books: A Distributed Architecture for AI.- Trust: Anthropomorphic Algorithmic.- A Very Gentle Introduction to Multiparty Session Types.- Constructing Knowledge Graph from Data Catalogues.- Concurrent and Distributed Systems Modelling and Verification.- Round-Message Trade-off in Distributed Steiner Tree Construction in the CON GEST model.- An Efficient Message Transmission and Verification Scheme for VANETs.- Generalised Dining Philosophers as Feedback Control.- Verifying Implicitly Quantified Modal Logic over dynamic networks of processes.- Cloud and Grid Computing.- Secure Content-based Image Retrieval using Combined Features in Cloud.- Design of a Scheduling Approach for Budget-deadline Constrained Applications in Heterogeneous Clouds.- Resource Scheduling for Tasks of a Workflow in Cloud Environment.- Bearing Fault Classification using Wavelet Energy and Autoencoder.- Social Networks, Machine Learning and Mobile Networks.- Community Detection in Social Networks using Deep Learning.- Multi-Winner Heterogeneous Spectrum Auction Mechanism for Channel Allocation in Cognitive Radio Networks.- A Hybrid Approach for Fake News Detection in Twitter based on User Features and Graph Embedding.- Online Context-Adaptive Energy-Aware Security Allocation in Mobile Devices: A Tale of Two Algorithms.- A Framework Towards Generalized Mid-term Energy Forecasting Model for Industrial Sector in Smart Grid.- An Online Low-Cost System for Air Quality Monitoring, Prediction, and Warning.-Word2vecs Distributed Word Representation for Hindi Word Sense Disambiguation.- Text Document Clustering using Community Discovery Approach.- Data Processing and Blockchain Technology.- An Efficient and Novel Buyer and Sellers Distributed Ledger Based Protocol Using Smart Contracts.- Distributed and Lazy Auditing of Outsourced Data HealthChain: A Secure Scalable Health Care Data Management System Using Blockchain.- HealthChain: A Secure Scalable Health Care Data Management System Using Blockchain.- Transcript Management Using Blockchain enabled Smart Contracts.- Short Papers.- Identifying Reduced Features based on IG-Threshold for DoS Attack Detection using PART.- Uniform Circle Formation by Swarm Robots Under Limited Visibility.- Histopathological Image Classification by Optimized Neural Network using IGSA.
£62.99
Springer Nature Switzerland AG High Performance Computing: 35th International Conference, ISC High Performance 2020, Frankfurt/Main, Germany, June 22–25, 2020, Proceedings
Book SynopsisThis book constitutes the refereed proceedings of the 35th International Conference on High Performance Computing, ISC High Performance 2020, held in Frankfurt/Main, Germany, in June 2020.*The 27 revised full papers presented were carefully reviewed and selected from 87 submissions. The papers cover a broad range of topics such as architectures, networks & infrastructure; artificial intelligence and machine learning; data, storage & visualization; emerging technologies; HPC algorithms; HPC applications; performance modeling & measurement; programming models & systems software. *The conference was held virtually due to the COVID-19 pandemic.Chapters "Scalable Hierarchical Aggregation and Reduction Protocol (SHARP) Streaming-Aggregation Hardware Design and Evaluation", "Solving Acoustic Boundary Integral Equations Using High Performance Tile Low-Rank LU Factorization", "Scaling Genomics Data Processing with Memory-Driven Computing to Accelerate Computational Biology", "Footprint-Aware Power Capping for Hybrid Memory Based Systems", and "Pattern-Aware Staging for Hybrid Memory Systems" are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.Table of ContentsArchitectures, Networks & Infrastructure.- Artificial Intelligence and Machine Learning.- Data, Storage & Visualization.- Emerging Technologies.- HPC Algorithms.- HPC Applications.- Performance Modeling & Measurement.- Programming Models & Systems Software.
£66.49
Springer Nature Switzerland AG Automotive Software Architectures: An
Book SynopsisThis book introduces the concept of software architecture as one of the cornerstones of software in modern cars. Following a historical overview of the evolution of software in modern cars and a discussion of the main challenges driving that evolution, Chapter 2 describes the main architectural styles of automotive software and their use in cars’ software. Chapter 3 details this further by presenting two modern architectural styles, i.e. centralized and federated software architectures. In Chapter 4, readers will find a description of the software development processes used to develop software on the car manufacturers’ side. Chapter 5 then introduces AUTOSAR – an important standard in automotive software. Chapter 6 goes beyond simple architecture and describes the detailed design process for automotive software using Simulink, helping readers to understand how detailed design links to high-level design. The new chapter 7 reports on how machine learning is exploited in automotive software e.g. for image recognition and how both on-board and off-board learning are applied. Next, Chapter 8 presents a method for assessing the quality of the architecture – ATAM (Architecture Trade-off Analysis Method) – and provides a sample assessment, while Chapter 9 presents an alternative way of assessing the architecture, namely by using quantitative measures and indicators. Subsequently Chapter 10 dives deeper into one of the specific properties discussed in Chapter 8 – safety – and details an important standard in that area, the ISO/IEC 26262 norm. Lastly, Chapter 11 presents a set of future trends that are currently emerging and have the potential to shape automotive software engineering in the coming years. This book explores the concept of software architecture for modern cars and is intended for both beginning and advanced software designers. It mainly aims at two different groups of audience – professionals working with automotive software who need to understand concepts related to automotive architectures, and students of software engineering or related fields who need to understand the specifics of automotive software to be able to construct cars or their components. Accordingly, the book also contains a wealth of real-world examples illustrating the concepts discussed and requires no prior background in the automotive domain. Compared to the first edition, besides the two new chapters 3 and 7 there are considerable updates in chapters 5 and 8 especially.Table of Contents1 Introduction.- 2. Software Architectures—Views and Documentation.- 3. Contemporary Software Architectures: Federated and Centralized.- 4. Automotive Software Development.- 5. AUTOSAR (AUTomotive Open System ARchitecture).- 6. Detailed Design of Automotive Software.- 7. Machine Learning in Automotive Software.- 8. Evaluation of Automotive Software Architectures.- 9. Metrics for Software Design and Architectures.- 10. Functional Safety of Automotive Software.- 11. Current Trends in Automotive Software Architectures.- 12 Summary.
£55.99
Springer International Publishing AG Supercomputing Frontiers: 7th Asian Conference,
Book SynopsisThis open access book constitutes the refereed proceedings of the 7th Asian Conference Supercomputing Conference, SCFA 2022, which took place in Singapore in March 2022. The 8 full papers presented in this book were carefully reviewed and selected from 21 submissions. They cover a range of topics including file systems, memory hierarchy, HPC cloud platform, container image configuration workflow, large-scale applications, and scheduling.Table of ContentsVapor condensation under electric field: A study using molecular dynamics simulation.- High performance parallel LOBPCG method for large Hamiltonian derived from Hubbard model on multi-GPU systems.- The effect of wing mass and wing elevation motion during insect forward flight.- On the Difference between Shared Memory and Shared Address Space in HPC Communication.- Evaluating GPU Programming Models for the LUMI Supercomputer.- Memory hierarchy.- HPC cloud platform, container image configuration workflow.- scheduling.- .Evaluating methods of transferring large datasets.- Service Function Chaining Design & Implementation Using Network Service Mesh in Kubernetes.
£31.49
Springer Nature Switzerland EuroPar 2023 Parallel Processing Workshops
Book Synopsis
£56.99
Walter de Gruyter Modellierung Betrieblicher Informationssysteme:
Book Synopsis
£49.46
de Gruyter Betriebssysteme
Book Synopsis
£134.09
De Gruyter Lisp Prozzesor mit UnixEinbindung
Book Synopsis
£121.84
Springer International Publishing AG Robot Operating System (ROS): The Complete
Book SynopsisBuilding on the successful first and second volumes, this book is the third volume of the Springer book on the Robot Operating System (ROS): The Complete Reference. The Robot Operating System is evolving from year to year with a wealth of new contributed packages and enhanced capabilities. Further, the ROS is being integrated into various robots and systems and is becoming an embedded technology in emerging robotics platforms. The objective of this third volume is to provide readers with additional and comprehensive coverage of the ROS and an overview of the latest achievements, trends and packages developed with and for it. Combining tutorials, case studies, and research papers, the book consists of sixteen chapters and is divided into five parts. Part 1 presents multi-robot systems with the ROS. In Part 2, four chapters deal with the development of unmanned aerial systems and their applications. In turn, Part 3 highlights recent work related to navigation, motion planning and control. Part 4 discusses recently contributed ROS packages for security, ROS2, GPU usage, and real-time processing. Lastly, Part 5 deals with new interfaces allowing users to interact with robots. Taken together, the three volumes of this book offer a valuable reference guide for ROS users, researchers, learners and developers alike. Its breadth of coverage makes it a unique resource.Table of ContentsA ROS-based framework for simulation and benchmarking of multi-robot patrolling algorithms.- ROS: Developing a new generation of operator interfaces.- Autonomous Exploration and Inspection Path Planning for Aerial Robots using the Robot Operating System.- A generic ROS-based System for Rapid Development and Testing of Algorithms for Autonomous Ground and Aerial Vehicles.- A generic ROS-based System for Rapid Development and Testing of Algorithms for Autonomous Ground and Aerial Vehicles.- ROS-based Approach for Unmanned Vehicles in Civil Applications.- A quadcopter and mobile robot cooperative task using Augmented Reality Tags.- An Extensible Optimization Toolset for Motion Planning and Control Prototyping and Benchmarking.- Online Trajectory Optimization and Navigation for Dynamic Environments in ROS.- A Backstepping Non-smooth Controller for ROS-based Differential-Drive Mobile Robots.- University Rover Challenge: Tutorials and Control System Survey.- SROS: Using and Developing Secure ROS Systems.- GPU and ROS - The use of general parallel processing architecture for robot perception.- Connecting ROS and FIWARE: concepts and tutorial.
£112.49
Springer Fachmedien Wiesbaden BASIC-Wegweiser für den Commodore 64:
Book SynopsisDas Wegweiser-Buch weist Wege zum erfolgreichen Einsatz des Commo dore 64. Das Wegweiser-Buch vermittelt aktuelles Grundlagenwissen zur Datenver arbeitung bzw. Informatik: -Was ist Hardware, Software und Firmware? - Was sind Großcomputer und Mikrocomputer? - Was sind Datenstrukturen und Programmstrukturen? -Was sind Betriebssysteme und Anwenderprogramme? - Was heißt ,fertige Programm-Pakete einsetzen'? -Was beinhaltet das eigene Programmieren? Nach der Lektüre dieses Abschnitts sind Sie in der Lage, den Commodore 64 in den Gesamtrahmen des Gebiets "Datenverarbeitung/Informatik" einzu ordnen. Das Wegweiser-Buch gibt eine erste Bedienungsanleitung: -Wie bediene ich Tastatur, Bildschirm, Floppy bzw. Disketteneinheit und Drucker des Commodore 64? -Wie erstelle ich mein erstes Programm in der Programmiersprache BASIC 2.0? -Welche Befehle umfaßt BASIC 2.0 (zu jedem Befehl wird ein Beispiel an gegeben)? -Welche Möglichkeiten bieten die drei Sprachversionen BASIC 2.0, BASIC 4.0 und SIMON's BASIC? - Laufen die Programme des Commodore 64 auf anderen Mikrocomputern von Commodore? Nach dem Durcharbeiten dieses Abschnitts können Sie Ihren Commodore 64 bedienen, Programme laufen lassen und einfache BASIC-Programme selbst erstellen und speichern. Das Wegweiser-Buch enthält einen kompletten Programmierkurs mit folgen den grundlegenden BASIC-Anwendungen: - Programme mit den wichtigen Ablaufstrukturen (Folge-, Auswahl-, W- derholungs-und Unterprogrammstrukturen). - Verarbeitung von Text, Ein-/Ausgabe und Tabellen. - Maschinennahe Programmierung( ... Bit für Bit). - Suchen, Sortieren, Mischen und Gruppieren von Daten. - Sequentielle Datei und Direktzugriff-Datei mit den Sprachen BASIC 2.0 und BASIC 4.0. Vorwort VI - Normale Grafik mit der Standardsprache BASIC 2.0. - Hl RES-Grafik und Sprite-Grafik mit SIMON's BASIC.Table of Contents1 Computer allgemein.- 2 Einstieg in die BASIC-Programmierung des Commodore 64.- 3 Programmierkurs mit BASIC 2.0, BASIC 4.0 und SIMON’s BASIC.- Programmverzeichnis.- Sachwortverzeichnis.
£52.24
Springer Fachmedien Wiesbaden Rechneraufbau am konkreten Beispiel: Dargestellt
Book SynopsisTable of Contents1: Einleitung.- 1.1 Zielsetzung und Strategie.- 1.2 Inhaltlicher Aufbau.- 2: Computersysteme im Überblick.- 2.1 Grundlagen.- 2.2 Einordnung und Spezifikation.- 2.3 Übungen.- 3: Bestandteile des Computersystems.- 3.1 Grundlagen.- 3.2 Hardware-Einheiten.- 3.2.1 Konfiguration der Basiseinheit.- 3.2.2 Anschluß der peripheren Einheiten.- 3.3 Software-Architektur.- 3.3.1 User Interface Toolbox.- 3.3.2 Betriebssystem.- 3.4 Übungen.- 4: Systemkern - Die Hauptplatine.- 4.1 Grundlagen.- 4.2 Organisationsstruktur der Hauptplatine.- 4.3 Prozessor/Coprozessor.- 4.3.1 68 020 – Prozessor.- Architektur.- Mikrocode.- Befehlsabarbeitung.- Leistungsmerkmale.- Registersatz.- Programmierung.- Signalleitungen.- Busstruktur und Buszyklen.- Coprozessor-Schnittstelle.- 4.3.2 68 881 - Floating Point Coprozessor.- 4.4 Speicherorganisation.- 4.4.1 Speicherverwaltung.- AMU - Address Mapping Unit.- PMMU - Paged Memory Management Unit.- 4.4.2 Hauptspeicher.- RAM-Bereich.- ROM-Bereich.- 4.5 Schnittstellen-Bausteine.- 4.5.1 VIA - Versatile Interface Adapter.- 4.5.2 SCC - Serial Communication Controller.- 4.5.3 SCSI - Small Computer System Interface.- 4.6 Spezial-Bausteine.- 4.6.1 ASIC-Entwurf.- 4.6.2 Beispiele.- ASC - Apple Sound Chip.- IWM - Integrated Woz Machine.- GLUE - General Logic Unit.- 4.7 Bussysteme.- 4.7.1 ADB - Apple Desktop Bus.- 4.7.2 SCSI –Bus.- 4.8 NuBus-Systemerweiterung.- 4.8.1 Standard-NuBus.- 4.8.2 Apple-NuBus.- 4.8.3 Erweiterungskarten.- 4.9 Übungen.- 5: Peripherieeinheiten des Systems.- 5.1 Grundlagen.- 5.2 Eingabeperipherie.- 5.2.1 Tastatur.- 5.2.2 Maus.- 5.3 Ausgabeperipherie.- 5.3.1 Videosystem.- Grafikkarte.- Monitor.- 5.3.2 Drucker.- Nadeldrucker.- Laserdrucker.- 5.4 Speicherperipherie.- 5.4.1 Magnetisctie Speichermedien.- Diskettenlaufwerke.- Festplatten.- 5.4.2 Optische Speichermedien.- 5.5 Kommunikationsperipherie.- 5.5.1 AppleTalk – Netzwerk.- 5.5.2 MS-DOS – Verbindung.- 5.5.3 Ethernet – Anschluß.- 5.6 Übungen.- 6: Neuentwiciclungen.- 6.1 Prozessoren.- MC 68.- MC 68.- 6.2 Computersysteme.- A: Entwicklungsgeschichte des Macintosh.- B: Lösungen ausgewählter Übungsaufgaben.- C: Literaturverzeichnis.- D: Verzeichnis der Grafiken, Bilder und Tabellen.- E: Verzeichnis der Abkürzungen und Akronyme.- F: Sachwortverzeichnis.
£44.64
Springer Fachmedien Wiesbaden 100 Rezepte für MS-DOS 6.0: Tips, Tricks und
Book SynopsisHandlungsorientierte Darstellung Mit diesem Buch führen wir Sie in einer aufbauenden Folge von Rezepten in die Welt des Betriebssystems MS DOS in der Version 6 ein. An einfachen Beispielen erleben Sie Problemlösungen mit dieser Generation des weit verbreiteten Einplatz Betriebssystems. Hilfe Sie lernen die mitgelieferten Hilfeprogramme zu nutzen. Wenn Sie mehr Informa tionen wollen, lesen Sie, wie Sie die Microsoft Support CDs und den Zugang zu CompuServe bekommen und dort das Forum MSDOS nutzen. Für alle zusätzli chen Hilfen finden Sie Bezugsadressen. Brücken Wir zeigen Ihnen Aussichtspunkte, von denen Sie die Blicke in die Nachbarwelt von Windows 3.1 werfen können. Viele Tabellen veranschaulichen Handlungsal ternativen an der DOS-Eingabeaufforderung, der DOS-Shell und Windows. Alles automatisch? Mit Batch-Programmen und Makros gestalten Sie eigene Abläufe. Sie erhalten viele Tips und Anregungen für die Organisation und Planung Ihrer Arbeit mit DOS. Bilderbuch Die zahlreichen exakten Abbildungen von Bildschirmen und Ausdrucken vermit teln Ihnen auch ohne PC jederzeit eine genaue Vorstellung von den Beispielen und der Arbeit mit DOS. Beispiele Sie finden durchweg einfache und übersichtliche abgeschlossene Beispiele, die Sie auch noch am Feierabend bequem nachvollziehen können. Danke ... Wir danken CompuServe, Creative Daten Systeme, der GD Gesellschaft für Datenkommunikation, Microsoft und Andreas Müller Software für die vielfältige Unterstützung. Viel Erfolg! Wir wünschen Ihnen viel Freude und Erfolg beim Lesen und Arbeiten mit diesem Rezept-Buch und MS DOS 6.0. Über Ihre Anregungen freuen wir uns.Table of Contents1 DOS installieren.- 1–1 Festplatte vorbereiten.- 1–2 Automatisches SETUP.- 1–3 Dateien expandieren.- 1–4 Dateien schreibschützen.- 1–5 Verzeichnisse verbergen.- 1–6 Notstartdiskette einrichten.- 1–7 Alte DOS-Programme.- 1–8 Systemdateien.- 1–9 Systeminformationen mit MSD.- 2 Anwendungen installieren.- 2–1 Verzeichnisse/Pfade einrichten.- 2–2 Suchpfade erweitern.- 2–3 Suchpfade automatisch laden.- 2–4 DOS-Version vorgaukeln.- 2–5 Programme starten (Überblick).- 2–6 Programmzuordnungen einrichten.- 2–7 Parameter in der Programmzuordnung.- 2–8 Programmumschaltung.- 3 Datenträger und Datenstrukturen.- 3–1 Verzeichnisse umbenennen.- 3–2 Verzeichnisse löschen.- 3–3 Verzeichnisstruktur sehen und ausdrucken.- 3–4 Zerstörte Daten wiederherstellen.- 3–5 Festplattenplatz schaffen.- 3–6 Zugriffzeit verkürzen (Defragmentieren).- 4 Mit Dateien arbeiten.- 4–1 Stellvertreterzeichen (Joker) verwenden.- 4–2 Mehrere Dateien markieren..- 4–3 Dateien kopieren.- 4–4 Kopieren und Verschieben mit der Maus und den Funktionstasten.- 4–5 Datenträger, Verzeichnisse und Dateien umbenennen.- 4–6 Dateien verschieben.- 4–7 Dateien vergleichen.- 4–8 Dateien löschen.- 4–9 Dateibewegungen verfolgen.- 4–10 Dateien wiederherstellen.- 4–11 Verzeichnisse wiederherstellen.- 4–12 Dateien verknüpfen.- 4–13 Eingaben umlenken.- 4–14 Ausgaben umlenken.- 4–15 Daten übergeben.- 5 Textverarbeitung.- 5–1 Textdateien ansehen.- 5–2 Textdateien ausdrucken.- 5–3 Textdateien erstellen mit COPY CON ....- 5–4 Textdateien bearbeiten (EDLIN).- 5–5 Textdateien bearbeiten (EDIT).- 5–6 Textdateien verbinden.- 5–7 Textdateien ergänzen.- 5–8 Zeichen in Texten suchen.- 5–9 Textzeilen sortieren.- 6 Stapelprogramme.- 6–1 Kommentare.- 6–2 Fallunterscheidungen.- 6–3 Beendigungscodes.- 6–4 Hilfefunktionen programmieren.- 6–5 Unterprogramme verwenden.- 6–6 Benutzereingaben.- 6–7 Menüführung für Benutzer.- 6–8 ANSI-Escape-Befehle.- 6–9 Vorteile inverser Zeichendarstellung.- 6–10 Parameter verwenden.- 6–11 Pausen im Programmablauf.- 7 Hohe Schule der Konfiguration.- 7–1 Speicherbereiche und -begriffe.- 7–2 Speicherbelegung ansehen.- 7–3 Speicherbereiche aktivieren.- 7–4 Programme in bestimmte Speicherbereiche laden.- 7–5 Speicher für Egoisten.- 7–6 Speicheroptimierung mit MemMaker.- 7–7 64 k-Bereich meiden.- 7–8 FASTOPEN verwenden.- 7–9 Festplattenpuffer (Cache).- 7–10 Konfigurationsbefehle übergehen.- 7–11 AUTOEXEC.BAT protokollieren.- 7–12 Variable Konfiguration.- 7–13 Variable AUTOEXEC.BAT.- 7–14 Konfigurationszeilen ausklammern.- 7–15 Prompt gestalten.- 7–16 Ländereinstellung.- 7–17 Laufwerke umlenken.- 7–18 Serielle Schnittstellen konfigurieren.- 7–19 Parallele Schnittstelle umleiten.- 7–20 Bildschirm konfigurieren.- 7–21 Zeichenwiederholung einstellen.- 7–22 Systeminformationen (DEBUG).- 7–23 Maschinenprogramme schreiben (DEBUG).- 8 Arbeitsvereinfachung.- 8–1 Online-Hilfe.- 8–2 Befehlswiederholung (DOSKey).- 8–3 Stapelprogramme mit DOSKey.- 8–4 DOSKey-Makros.- 8–5 Gleichnamige DOS-Befehle und Makros.- 8–6 DOS-Funktionstasten.- 8–7 Funktionstasten belegen.- 8–8 Tasten umlegen.- 8–9 Tastaturlayout umschalten.- 8–10 Rechner vernetzen.- 8–11 Rechner fernbedienen.- 9 Systemsicherheit.- 9–1 Laufwerke blockieren und umleiten.- 9–2 Alte Datensicherungen zurückspeichern.- 9–3 Datenträgernamen überprüfen.- 9–4 Dateien endgültig löschen.- 9–5 Nutzungszeiten protokollieren.- 9–6 Paßwortabfrage programmieren.- 9–7 Abbruch der AUTOEXEC.BAT verhindern.- 9–8 Programmbenutzer registrieren.- Anhang A — Symbole und Tabellen.- Anhang B — Hilfe aus CompuServe.- Anhang C — Weitere Hilfe von CD.- Anhang D — Adressen und Bestellinformationen.
£41.39
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG A Pathology of Computer Viruses
Book SynopsisThe 1980's saw the advent of widespread (and potentially damaging) computer virus infection of both personal computer and mainframe systems. The computer security field has been comparatively slow to react to this emerging situation. It is only over the last two years that a significant body of knowledge on the operation, likely evolution and prevention of computer viruses has developed. A Pathology of Computer Viruses gives a detailed overview of the history of the computer virus and an in-depth technical review of the principles of computer virus and worm operation under DOS, Mac, UNIX and DEC operating systems. David Ferbrache considers the possible extension of the threat to the mainframe systems environment and suggests how the threat can be effectively combatted using an antiviral management plan. The author addresses the latest developments in "stealth" virus operations, specifically the trend for virus authors to adopt extensive camouflage and concealment techniques, which allow viruses to evade both existing anti-viral software and to avoid detection by direct observation of machine behaviour. A Pathology of Computer Viruses addresses a distinct need - that of the computer specialist and professional who needs a source reference work detailing all aspects of the computer virus threat.Table of Contents1 Introduction.- 1.1 Preamble.- 1.2 What is a Computer Virus?.- 1.3 Worms: Networked Viruses.- 1.4 Terminology.- 2 Historical Perspectives.- 2.1 Introduction.- 2.2 1960s: Early Rabbits.- 2.3 1970s: Fiction and the Worm.- 2.4 1980–1983: Genesis.- 2.5 1984–1986: Exodus.- 2.6 1987: Mac, Atari and Amiga Next.- 2.7 1988: Proliferation and Disbelief.- 2.7.1 January-March.- 2.7.2 April-September.- 2.7.3 October-December.- 2.8 1989: Reaction by the Community.- 2.8.1 January-March.- 2.8.2 April-June.- 2.8.3 July-September.- 2.8.4 October-December.- 2.9 1990: Organisation and Litigation.- 2.9.1 January-April.- 2.9.2 May-September.- 2.9.3 October-December.- 2.10 Summary.- 3 Theory of Viruses.- 3.1 Introduction.- 3.2 Addition of Viral Code.- 3.3 Detection of Viruses.- 3.4 Classes of Viruses.- 3.5 Thompson: and Trusting Trust.- 3.6 Biological Analogies.- 3.6.1 Biological Viruses.- 3.6.2 Parallels Between Low Level Operation.- 3.6.3 High Level Parallels.- 3.7 Quest for Life.- 3.8 Evolution: Genetic Algorithms.- 3.8.1 Random Mutation.- 3.8.2 Programmed Mutation.- 3.8.3 Genetic Algorithms.- 3.8.4 Growth and Death.- 4 Operation of PC Viruses.- 4.1 Introduction.- 4.2 PC Boot Sequence: Initialisation.- 4.3 BIOS and DOS.- 4.4 Master Boot Record.- 4.5 DOS Boot Sector.- 4.6 System Initialisation.- 4.7 Batch Processing Viruses.- 4.8 COM and EXE Viruses.- 4.8.1 Non-overwriting Prepending COM Infectors.- 4.8.2 Overwriting COM Infectors.- 4.8.3 Non-overwriting Appending COM Infectors.- 4.8.4 EXE Viruses.- 4.9 Resident and Transient Viruses.- 4.10 Manipulation by Viral Code.- 4.11 Activation Criteria.- 4.12 Camouflage.- 4.12.1 Concealment in Infected Files.- 4.12.2 Encryption of Viral Code.- 4.12.3 Hiding of Viral Code.- 4.12.4 Checksum Calculation.- 4.12.5 Prevention of Alteration Detection.- 4.12.6 Concealment of Viral Code in Memory.- 4.12.7 Concealment of Viral Activity.- 4.12.8 Concealing Disk Activity.- 4.12.9 Concealing System Slowdown.- 4.13 Replication.- 4.13.1 Locating a Host.- 4.13.2 Signatures.- 4.13.3 Miscellaneous Topics.- 4.13.3.1 Corresponding File Virus.- 4.13.3.2 SYS Virus.- 4.13.3.3 Multi-vector Viruses.- 4.13.3.4 Multi-architecture Viruses.- 4.13.3.5 Architecture Dependent Viruses.- 5 Management of PC Viruses.- 5.1 Perspective on Security.- 5.2 Components of a Virus Control Scheme.- 5.3 Prevention of Virus Attack.- 5.3.1 Physical Access Constraints.- 5.3.2 Electronic Measures.- 5.3.2.1 Physical Feature Verification.- 5.3.2.2 Knowledge Verification.- 5.3.2.2.1 Passwords.- 5.3.2.2.2 Background Verification.- 5.3.2.2.3 Other Techniques.- 5.3.2.3 Possession Verification.- 5.3.3 Media Access Controls.- 5.3.4 Network Access Controls.- 5.3.4.1 Identification of Access Controls.- 5.3.4.1.1 Centralised Network File Servers.- 5.3.4.1.2 Distributed Trust.- 5.3.4.1.3 Network Transport by Public Carrier or Accessible Media.- 5.3.5 Ideological Controls.- 5.3.5.1 User Education.- 5.3.6 Management Policies.- 5.3.6.1 Training of Employees.- 5.3.6.2 Use of Anti-viral Measures.- 5.3.6.3 Compartmentalisation.- 5.3.6.4 Centralisation.- 5.3.6.5 Personnel Policies.- 5.3.7 Vaccination and Inoculation.- 5.4 Detection of Viral Code.- 5.4.1 Monitoring and Logging.- 5.4.2 Signature Recognition.- 5.4.3 Generic Code Recognition.- 5.4.4 Sacrificial Lamb.- 5.4.5 Auditing.- 5.4.6 Use of Expert Systems to Analyse Viral Behaviour.- 5.4.7 Fighting Fire with Fire.- 5.5 Containment of Viral Code.- 5.5.1 Hardware Compartmentalisation.- 5.5.1.1 Virtual Machine.- 5.5.1.1.1 80386 Task Switching Support.- 5.5.1.1.2 80386 Paged Segmented Memory.- 5.5.1.1.3 Accessing OS Code.- 5.5.1.1.4 Segment Permissions.- 5.5.1.1.5 Paged Memory Operation.- 5.5.1.1.6 Input/Output Operations.- 5.5.1.1.7 Virtual Machine in Software.- 5.5.1.2 Automatic Flow Verification.- 5.5.1.3 Software Distribution: Ensuring Trust.- 5.5.2 Software Compartmentalisation.- 5.5.2.1 Interrupt Trapping Code.- 5.5.2.1.1 Configurable Monitors.- 5.5.2.1.2 Operation of a Monitor.- 5.5.2.1.3 Extensions to Real Time Monitoring.- 5.5.2.2 OS Support.- 5.5.3 Network Compartmentalisation.- 5.5.4 Investigation and Response.- 5.5.4.1 What is the Infection?.- 5.5.4.1.1 Acquisition.- 5.5.4.1.2 Logging of Relevant Information.- 5.5.4.1.3 Disassembly.- 5.5.4.2 Dissemination of Information.- 5.5.4.3 General Containment.- 5.5.4.4 Tracing of Infection Source.- 5.5.5 Disinfection of Viral Code.- 5.5.5.1 Re-installation.- 5.5.5.2 Recompilation from Source.- 5.5.6 Checking for Re-infection.- 5.5.7 Disinfection Utilities.- 5.6 Recovery from Viral Infection.- 5.6.1 Backup Procedures.- 5.7 Contingency Planning.- 5.7.1 Redundancy.- 5.7.2 Insurance.- 5.7.3 Public Relations.- 5.8 Remedial Action.- 6 Apple Macintosh Viruses.- 6.1 Introduction.- 6.2 Macintosh: The Abstract Operating System.- 6.2.1 Initialisation.- 6.2.2 Resources.- 6.2.3 Trap Dispatch Table Structure.- 6.2.4 Non-link Viruses.- 6.2.5 Link Viruses.- 6.2.6 Notes on Keyboard Sequences.- 6.2.7 Summary of Mac Protection.- 7 Mainframe Systems: The Growing Threat.- 7.1 Introduction.- 7.2 Hardware Architectures.- 7.3 Software Architecture.- 7.3.1 Discretionary Access Controls.- 7.3.2 Integrity versus Confidentiality.- 7.3.3 Mandatory Access Controls.- 7.3.4 Commentary on Security Standardisation.- 7.4 UNIX: A Viral Risk Assessment.- 7.4.1 System Startup.- 7.4.2 Login and User Commands.- 7.4.3 Bugs and Loopholes.- 7.4.4 Mechanics of UNIX Viruses.- 7.4.4.1 Batch Viruses.- 7.4.4.2 Link Viruses.- 7.4.4.3 Dynamic Loading.- 7.4.4.4 Other Considerations.- 7.4.4.5 Protecting Against UNIX Viruses.- 7.4.4.6 Cohen: Early UNIX Viruses.- 8 Network Viruses: The Worms.- 8.1 Introduction.- 8.2 Standardisation.- 8.3 History of Network Pests.- 8.3.1 Early Work: Pre-1980.- 8.3.2 Recent Benign and Malicious Worms.- 8.3.3 CHRISTMA EXEC Chain Letter.- 8.3.4 Chain Letters on UNIX.- 8.4 Internet Protocols.- 8.4.1 Architecture.- 8.4.2 Peer Authentication.- 8.4.3 Access Controls.- 8.4.4 Data Stream Integrity.- 8.4.5 Daemons and Servers.- 8.4.6 Distributed Trust.- 8.4.7 Trusted Ports.- 8.4.8 Problems and Solutions.- 8.4.9 Internet Worm: Black Thursday — 3 November 1988.- 8.4.9.1 Internals.- 8.4.9.2 Action and Reaction.- 8.4.9.3 The Aftermath.- 8.4.10 DISNET: A Child of the Internet.- 8.5 OSI: Security in the Making.- 8.6 DECNET: Insecurity Through Default.- 8.6.1 HI.COM: The Christmas Worm.- 8.6.1.1 Reaction of the DECNET Community.- 8.6.1.2 Worms Against Nuclear Killers.- 9 Reactions of the IT Community.- 9.1 Discussion and Advice.- 9.1.1 Bulletin Board and Casual Users.- 9.1.2 Academic Establishments.- 9.1.2.1 CREN/CSNET.- 9.1.2.2 NSFNET.- 9.1.2.3 HEPNET/SPAN.- 9.1.2.4 General Community Responses.- 9.1.3 Government Research Organisations.- 9.1.4 Military Organisations.- 9.1.5 Commercial Organisations.- 9.1.6 Criminal Investigation Organisations.- 9.1.7 Professional Organisations.- 9.2 Legislative Issues.- 9.2.1 Scottish Law Commission.- 9.2.2 English Law Commission.- 9.2.3 Computer Misuse Act.- 9.2.4 Summary of Legislation.- 9.3 Professionalism and Software Development.- 10 Conclusions: The Future Ahead.- Appendices.- 1 DOS Filestore Structure.- 1.1 Introduction.- 1.2 Master Boot Record.- 1.3 DOS Boot Sector.- 1.4 File Allocation Table.- 1.5 Root Directory.- 2 Low Level Disk Layout.- 3 EXE File Format.- 4 Mac Filestore Structure.- 5 PC Virus Relationship Chart.- 6 Macintosh Virus Relationship Chart.- 7 PC Boot Sequence.- 8 AIDS Trojan: Accompanying Licence.- 9 Software Infected at Source.- 10 Nomenclature.- 10.1 Types of Virus.- 10.1.1 Master Boot Sector Viruses.- 10.1.2 DOS Boot Sector Viruses.- 10.1.3 Executable COM/EXE Viruses.- 10.1.4 Memory Resident Viruses.- 10.1.5 Overwriting Viruses.- 10.1.6 Prepending Viruses.- 10.1.7 Appending Viruses.- 10.2 Generations of Virus.- 10.3 Classes of Anti-virus Product.- 11 UNIX Boot Sequence.- 12 CERT Press Release.- 13 CERT/CIAC Advisories.- 14 Contact Points.- 15 Abbreviations.- 16 Further Reading.- 17 Virus-1 Archive Sites.- 18 Relative Frequencies of IBM Viruses.
£42.74
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Pearl 2000: Echtzeitbetriebssysteme und LINUX
Book SynopsisLeitthema des vorliegenden Tagungsbandes ist die Eignung von LINUX für Echtzeit-Aufgaben. Dieser Frage wird zunächst in einem Grundsatz-Beitrag nachgegangen, gefolgt von anspruchsvollen Erfahrungsberichten. Ergänzt werden sie durch Untersuchungen zur Zusammenarbeit mit digitalen Signalprozessoren. Vervollständigt wird der LINUX-Schwerpunkt durch traditionelle Themen aus der Echtzeitprogrammierung. Echtzeit-Betriebssysteme und Anwendungsberichte runden den Band ab.Table of ContentsEchtzeit und LINUX.- Die Eignung von Linux für zeitkritische Anwendungen.- Routing mit QoS-Eigenschaften unter LINUX.- Realzeitfähige serielle Datenübertragung mit Fehlerkorrektur.- Konzeption von Echtzeitbetriebssystemen.- Orthogonale Walsh-Korrelation zur qualitativen Beurteilung der Reaktivität von Betriebssystemen.- OSEK/VDX-OS — Betriebssystemstandard für Steuergeräte in Kraftfahrzeugen.- Integration von Open Source Betriebssystemen in industriellen Embedded Networking Devices.- Anwendungen.- Online Datenmanagement mit LINUX auf dem Forschungsschiff Sonne.- Multimedia Home Platform (MHP) für das digitale Fernsehen (DVB).- System-Entwicklung.- Die kombinierte Verwendung von UML und PASS.- Geräteübergreifendes webbasierendes Servicekonzept für den Anlagenbau.- Set-Top-Boxen für den digitalen Fernsehempfang.- Embedded LINUX.- Signalprozessoren als Koprozessoren für LINUX.- Linux für eingebettete Systeme.- Erfahrungen mit Embedded LINUX.
£44.64
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Job Scheduling Strategies for Parallel
Book SynopsisThis volume contains the papers selected after a very careful refereeing process for presentation during the Workshop on Job Scheduling Stategies for Parallel Processing, held in Santa Barbara, California, as a prelude to the IPPS '95 conference in April 1995.The 19 full papers presented demonstrate that parallel job scheduling takes on a crucial role as multi-user parallel supercomputers become more widespread. All aspects of job scheduling for parallel systems are covered, from the perspectives of academic research, industrial design of parallel systems, as well as user needs. Of particular interest, also for nonexpert readers, is the introductory paper "Parallel Job Scheduling: Issues and Approaches" by the volume editors.Table of ContentsParallel job scheduling: Issues and approaches.- Scheduling on the Tera MTA.- A scalable multi-discipline, multiple-processor scheduling framework for IRIX.- Scheduling to reduce memory coherence overhead on coarse-grain multiprocessors.- Time Space Sharing Scheduling and architectural support.- Demand-based coscheduling of parallel jobs on multiprogrammed multiprocessors.- Multiprocessor scheduling for high-variability service time distributions.- The interaction between memory allocation and adaptive partitioning in message-passing multicomputers.- Analysis of non-work-conserving processor partitioning policies.- Loop-Level Process Control: An effective processor allocation policy for multiprogrammed shared-memory multiprocessors.- A microeconomic scheduler for parallel computers.- On the benefits and limitations of dynamic partitioning in parallel computer systems.- Intelligent fuzzy control to augment scheduling capabilities of network queuing systems.- Parallel processing on dynamic resources with CARMI.- Job scheduling under the Portable Batch System.- The ANL/IBM SP scheduling system.- Requirements of the Cornell Theory Center for resource management and process scheduling.- Job management requirements for nas parallel systems and clusters.- Job characteristics of a production parallel scientific workload on the NASA Ames iPSC/860.
£42.74
VDM Verlag Cloud Computing and Virtualization
£38.64
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Introduction to Reliable and Secure Distributed
Book SynopsisIn modern computing a program is usually distributed among several processes. The fundamental challenge when developing reliable and secure distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail. Failures may range from crashes to adversarial attacks by malicious processes.Cachin, Guerraoui, and Rodrigues present an introductory description of fundamental distributed programming abstractions together with algorithms to implement them in distributed systems, where processes are subject to crashes and malicious attacks. The authors follow an incremental approach by first introducing basic abstractions in simple distributed environments, before moving to more sophisticated abstractions and more challenging environments. Each core chapter is devoted to one topic, covering reliable broadcast, shared memory, consensus, and extensions of consensus. For every topic, many exercises and their solutions enhance the understanding This book represents the second edition of "Introduction to Reliable Distributed Programming". Its scope has been extended to include security against malicious actions by non-cooperating processes. This important domain has become widely known under the name "Byzantine fault-tolerance". Table of Contents1. Introduction. - 1.1 Motivation. -1.2 Distributed Programming Abstractions. 1.3 The End-to-End Argument. 1.4 Software Components. - 1.5 Classes of Algorithms. -1.6 Chapter Notes. 2. Basic Abstractions. - 2.1 Distributed Computation. - 2.2 Abstracting Processes. - 2.3 Cryptographic Abstractions. - 2.4 Abstracting Communication. - 2.5 Timing Assumptions. - 2.6 Abstracting Time. - 2.7 Distributed-System Models. - 2.8 Exercises. - 2.9 Solutions. - 2.10 Chapter Notes . - . - 3. Reliable Broadcast. - 3.1 Motivation. - 3.2 Best-Effort Broadcast. - 3.3 Regular Reliable Broadcast. - 3.4 Uniform Reliable Broadcast. - 3.5 Stubborn Broadcast. - 3.6 Logged Best-Effort Broadcast. - 3.7 Logged Uniform Reliable Broadcast. - 3.8 Probabilistic Broadcast. - 3.9 FIFO and Causal Broadcast. - 3.10 Byzantine Consistent Broadcast. - 3.11 Byzantine Reliable Broadcast. - 3.12 Byzantine Broadcast Channels. - 3.13 Exercises. - 3.14 Solutions. - 3.15 Chapter Notes . - . - 4. Shared Memory. - 4.1 Introduction. - 4.2 (1, N) Regular Register. - 4.3 (1, N) Atomic Register. - 4.4 (N, N) Atomic Register. - 4.5 (1, N) Logged Regular Register. - 4.6 (1,N) Byzantine Safe Register. - 4.7 (1, N) Byzantine Regular Register. - 4.8 (1,N) Byzantine Atomic Register. - 4.9 Exercises. - 4.10 Solutions. - 4.11 Chapter Notes . - . - 5. Consensus. - 5.1 Regular Consensus. - 5.2 Uniform Consensus. - 5.3 Uniform Consensus in the Fail-Noisy Model. - 5.4 Logged Consensus. - 5.5 Randomized Consensus. - 5.6 Byzantine Consensus. - 5.7 Byzantine Randomized Consensus. - 5.8 Exercises. - 5.9 Solutions. - 5.10 Chapter Notes . - . - 6. Consensus Variants. - 6.1 Total-Order Broadcast. - 6.2 Byzantine Total-Order Broadcast. - 6.3 Terminating Reliable Broadcast. - 6.4 Fast Consensus. - 6.5 Fast Byzantine Consensus. - 6.6 Non-blocking Atomic Commit. - 6.7 Group Membership. - 6.8 View-Synchronous Communication. - 6.9 Exercises. - 6.10 Solutions. - 6.11 Chapter Notes . - . - 7. Concluding Remarks. - 7.1 Implementation in Appia. - 7.2 Further Implementations. - 7.3 Further Reading
£71.24
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG UNIX System V.4: Begriffe, Konzepte, Kommandos,
Book SynopsisNeben einer Kommando-Übersicht (UNIX V.4) werden häufig gebrauchte Kommandos und Funktionen detailliert beschrieben. Den Themen Editoren, C-Systemanschlüsse, Systempflege und Programmentwicklung sind eigene Kapitel gewidmet, und es wird ein Überblick über den grafischen Desktop gegeben.Die Neuauflage berücksichtigt insbesondere die Systemversion V.4, die sich im kommerziellen Umfeld etabliert hat.Trade Review"Einführung in die Begriffe und Grundlagen von Unix und Nachschlagewerk für nahezu alle Standard-Kommandos, mit Listen, Tabellen und Übersichten, von den altbekannten regulären Ausdrücken bis hin zu sämtlichen System- und Bibliotheksaufrufen aus SVR4, Spec1170 und Posix." (Output) "Auf dem Weg zum Linux-/UNIX-Fachmann werden Sie mit Sicherheit UNIX System V.4 begegnen, einem Unix-Standardwerk... Linux-Eigenheiten kommen hier nicht vor, dafür finden Sie aber um so umfassendere Informationen zu Geschichte und Konzept von UNIX, zu den zur Verfügung stehenden Kommandos und den dem Programmierer zugänglichen Systemaufrufen. Was in den anderen Büchern kurz zusammengefasst ist, können Sie hier ausführlicher, mit Beispielen illustriert und vollständiger nachlesen." (Inside Multimedia)Table of Contents1 Einleitung.- 2 Das Unix-System.- 3 Erste Schritte in Unix.- 4 Konzepte und Begriffe.- 5 Kommandos Des Unix-Systems.- 6 Editoren.- 7 Die Shell Als BenutzeroberflÄChe.- 8 Das X Window System.- 9 Programmentwicklung Unter Unix.- 10 SystemanschlüSse Und C-Bibliotheksfunktionen.- 11 Systemverwaltung und Systempflege.- A Übersichten und Tabellen.- B Literaturverzeichnis.- Stichwortverzeichnis.
£44.99
Springer Fachmedien Wiesbaden PowerShell für die Windows-Administration: Ein
Book SynopsisDas Buch stellt die Windows PowerShell als vielseitiges Werkzeug für die Administration von Windows Server 2008 R2/2012/2012 R2 vor. Es beschreibt zunächst die Kernkonzepte wie Cmdlets, Pipeline und Objekte und stellt danach die PowerShell in der Praxis vor, wobei typische Einsatzszenarien bei der Windows Server-Administration im Mittelpunkt stehen.Table of ContentsInstallation, Überblick, der erste Start - Befehlseingabe - Cmdlets - Objekte und Pipeline - Laufwerke und Ablagen - Pipeline-Ausgaben formatieren und konvertieren - PowerShell-Skripte - PowerShell-Skriptbefehle - Funktionen - Fehlerbehandlung - WMI - Befehle und Skripte remote ausführen - Zugriff auf das Active Directory - Windows Server-Administration - Ein- und Ausgaben - Grafische Oberflächen - PowerShell-Workflows - Module - Die PowerShell und das .NET Framework - PowerShell-Spezialitäten - Deklaratives Konfigurationsmanagement
£34.19
Springer Fachmedien Wiesbaden Raspberry Pi – Das technische Handbuch:
Book SynopsisAufbau und Funktion des Raspberry Pi werden sachlich und praxisorientiert vorgestellt. Zunächst wird das System in Betrieb gesetzt, um damit eine Grundlage zu schaffen, auf die auch in Problemsituationen zurückgegriffen werden kann. Die Konfigurierung, Optimierung und Programmierung ist von besonderer Bedeutung, weil die gegenüber anderen Architekturen limitierten Ressourcen stets mit zu berücksichtigen sind. Die Schaltungstechnik der verschiedenen Raspberry Pi Boards (A, B, A+, B+, Compute Module) wird ausführlich behandelt. Der Schwerpunkt des Buches liegt auf der Hardware mit den Schnittstellen (LAN, WLAN, GPIO, seriell SPI, I2C, I2S, One-Wire), die für die Kommunikation und den Datenaustausch mit Sensoren und anderen Einheiten prädestiniert sind. Damit sind optimale und zudem kostengünstige Ergebnisse zu erzielen. Dies beinhaltet den Low Power-Betrieb, wie er insbesondere für akkubetriebene und somit für mobile Anwendungen essenziell ist.Die 3. Auflage wurde überarbeitet, erweitert und auf Raspberry Pi 4 aktualisiert.Table of ContentsEinführung: Entwicklung, Open Source, Modelle im Überblick - Schnellstart: Vorbereitung, anschließen und starten - Hardware: ARM-Architektur, Speicher, Ethernet, WLAN, Bluetooth - Konfigurierung und Optimierung: Setup, Netzwerke, Mobilfunk, Audio, Video - Software und Programmiergrundlagen: Firmware, Linux, Windows 10 IoTCore, Programmiersprachen - Hardware-Programmierung: GPIO, UART, SPI, I2C, I2S, One-Wire - Professioneller Einsatz: Low Power-Betrieb, USV, PoE, Compute Module
£32.99
Springer Fachmedien Wiesbaden Betriebssysteme: Grundlagen und Konzepte
Book SynopsisDer Autor präsentiert die Grundlagen und Konzepte der heutigen Betriebssysteme und behandelt die Gebiete Prozesse (Prozesszustände, Prozessscheduling, Prozesssynchronisation und Prozesskommunikation), Speicherverwaltung (virtueller Speicher, paging, swapping), Dateiverwaltung (Files, Ordner, Sicherheitsmechanismen), Ein-und Ausgabeverwaltung (Treiber, I/O-memory mapping, Systemfunktionen) sowie Netzwerke (Netzwerkschichten, Arbeitsverteilung, Schattenserver) und Sicherheitsmechanismen (Angriffsarten, root kits, Kerberos). Dabei werden sowohl Einprozessor- als auch Mehrprozessorsysteme betrachtet und die Konzepte an wichtigen existierenden Betriebssystemen wie Unix und Windows NT verdeutlicht.In der vorliegenden vierten Auflage wurden viele Erfahrungen aus der Lehrpraxis berücksichtigt. So wurden nicht nur die Entwicklungen in Windows NT und Unix, speziell Linux, aktualisiert, sondern auch einige Kapitel neu gegliedert und um das Thema „Sicherheit“ ergänzt. Weitere Aufgaben und Beispiele mit Musterlösungen runden das Werk ab. Alle Vorlesungsfolien, die Vorlesungsvideos sowie eine umfangreiche Klausursammlung mit Musterlösungen stehen auf den Webseiten des Autors zum Herunterladen bereit.Table of ContentsVorwort.- Übersicht.- Einleitung.- Prozesse.- Speicherverwaltung.- Dateiverwaltung.- Ein- und Ausgabeverwaltung.- Netzwerkdienste.- Sicherheit.- Benutzeroberflächen.- Musterlösungen.- Modellierung von Trashing.- Literatur.- Index.
£42.74
Data Science Raspberry Pi 3: A Practical Beginner's Guide To
Book Synopsis
£16.19
Data Science Raspberry Pi 3: A Practical Beginner's Guide To
Book Synopsis
£21.24
BPB Publications Problems and Solutions of Operating Systems
Book Synopsis
£4.86
Ediciones Daz de Santos, S.A. Introducción rápida a Matlab y Simulink para
Book Synopsis
£17.19
BPB Publications Linux Server Cookbook: Get Hands-on Recipes to
Book SynopsisThe book will then guide you through new technologies related to automation, containers, and continuous integration/delivery pipelines. Lastly, it will help you explore concepts such as Infrastructure as Code and Infrastructure as a Service and the usage of Linux on Public and Private clouds in detail with multiple examples.
£28.49
BPB Publications Source Code Exploration with Memcached: A
Book Synopsis
£29.92
World Scientific Publishing Co Pte Ltd Chaos, Complexity And Transport - Proceedings Of
Book SynopsisThe main goal is to offer readers a panorama of recent progress in nonlinear physics, complexity and transport with attractive chapters readable by a broad audience. It allows readers to gain an insight into these active fields of research and notably promotes the interdisciplinary studies from mathematics to experimental physics. To reach this aim, the book collects a selection of contributions to the CCT11 conference (Marseille, 23 - 27 May 2011).Table of ContentsPart A Classical Hamiltonian Dynamics: Resonant Interaction of Charges Particles with Electromagnetic Waves (A A Vasiliev, A V Artemyev, A I Neishtadt, D L Vainchtein and L M Zelenyi); Superrelativistic Charged Particles Acceleration by Electromagnetic Waves: Self-Consistent Model (A V Artemyev, L M Zelenyi and V L Krasovsky); Control of Atomic Transport Using Autoresonance (D V Makarov, M Yu Uleysky and S V Prants); Lagrangian Tools to Monitor Chaotic Transport and Mixing in the Ocean (S V Prants, M V Budyansky and M Yu Uleysky); Stochastic Treatment of Finite-N Fluctuations in the Approach Towards Equilibrium for Mean Field Models (W Ettoumi and M-C Firpo); Anomalous Transport and Phase Space Structures (B Meziani, O Ourrad and X Leoncini); Part B Nonlinear and Quantum Physics: Nonlinear Kinetic Modeling of Stimulated Raman Scattering (D Benisti); Occurrence of Mixed-Mode Oscillations in a Dusty Plasma (M Mikikian, H Tawidian and T Lecas); Pattern Formation by Electrostatic Self-Organization of Membrane Proteins (G Boedec, M Jaeger, F Homble and M Leonetti); Quasiperiodic and Intermittent Stochastic Motions in Penetrative Convection (I N Sibgatullin and D V Kuznetsova); Spiral Pattern Formation in a Simple Two-Phase Flow System (H N Yoshikawa, C Mathis, P Maissa and G Rousseaux); Spin Dependent Transport in an Electron Gas with Magnetic Disorder (T Van Den Berg and A D Verga); The Study of Quantum Chaos Through Entanglement Dynamics (L Y Chew); Part C Probablistic and Signal Processing Approaches: Stochastic Solutions of Nonlinear Pde's: Mckean Versus Superprocesses (R Vilela Mendes); Detection and Characterization of Levy Flights in Chaotic Advection Phenomena (B Ricaud, F Briolle and X Leoncini); On the Long Range Correlation in Fbm-Based Signals with Mixed Statistics (A Scipioni and P Rischette); Feynman - Kac Equation for Convection-Dispersion with Mobile and Immobile Walkers (C Choquet and M C Neel); Part D Complex Systems: Propagation of Information on Undirected Dependency Graphs for Road Traffic Inference (C Furtlehner, Y Han, J-M Lasgouttes, V Martin and F Moutarde); Markov Chain Analysis of Musical Dice Games (D Volchenkov and J R Dawin); Unraveling the Tangles of Language Evolution (F Petroni, M Serva and D Volchenkov).
£90.00
Independently Published LPI Linux Essentials 010-160 Questions & Dumps:
Book Synopsis
£10.54