![]() |
JUNOS Automation Cookbook
ISBN: 9781788290999 / Angielski / Miękka / 382 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Administer, configure, and monitor Junos OS in your organization
Administer, configure, and monitor Junos OS in your organization
|
cena:
211,44 |
![]() |
Reactive Programming with Swift 4
ISBN: 9781787120211 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. RxSwift belongs to a large family of Rx implementations in different programming languages that share almost identical syntax and semantics. Reactive approach will help you to write clean, cohesive, resilient, scalable, and maintainable code with highly configurable behavior.
RxSwift belongs to a large family of Rx implementations in different programming languages that share almost identical syntax and semantics. Reactive ...
|
cena:
211,44 |
![]() |
User's Guide
ISBN: 9783110375480 / Angielski / Miękka / 233 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. For all users who work with ISPF on z/OS MVS. The readers of this book will learn how to use the ISPF professionally in their daily work in z/OS to quickly reach optimal results: - Detailed description of TSO/ISPF logon processes For all users who work with ISPF on z/OS MVS. The readers of this book will learn how to use the ISPF professionally in their daily work in z/OS to... |
cena:
212,26 |
![]() |
Planung und Analyse eines idealen Rechtsinformationssystems
ISBN: 9783836660396 / Niemiecki / Miękka / 112 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Diese Arbeit setzt sich mit der Betrachtung verschiedener Rechtsinformationssysteme und dem Entwurf eines konkreten Rechtsinformationssystems auseinander. Dabei wird besonders auf die Planung und die Analyse, die in einem solchen Projekt stattfindet eingegangen, wobei jedoch vorher die wichtigsten technischen und juristischen Grundlagen aufbereitet werden. Rechtsinformationssysteme fallen thematisch von juristischer Seite her gesehen in das Gebiet der Rechtsinformatik. Rechtsinformatik kann man als die Wissenschaft der Anwendung von informatischen Methoden in rechtswissenschaftlichen...
Diese Arbeit setzt sich mit der Betrachtung verschiedener Rechtsinformationssysteme und dem Entwurf eines konkreten Rechtsinformationssystems auseinan...
|
cena:
214,70 |
![]() |
Memory Dump Analysis Anthology, Volume 14
ISBN: 9781912636143 / Angielski / Miękka / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
215,80 |
![]() |
Memory Dump Analysis Anthology, Volume 16
ISBN: 9781912636167 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
215,80 |
![]() |
ChEck iT!
ISBN: 9783639188554 / Niemiecki / Miękka / 116 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In den Neunzigern grundete der Verein Wiener Sozialprojekte ChEck iT ," eine sekundarpraventive Massnahme, welche vordergrundig aus einem mobilen Chemielabor besteht, das es ermoglicht, vor Ort Ecstasy-Tabletten sowie Speed auf etwaige Verunreinigungen zu testen. Eigenen Angaben zufolge ist eines der Ziele von ChEck iT , den Konsum und sowie Missbrauch von diversen Suchtmittel durch Jugendliche einzudammen. Es ist jedoch ausserst bedenklich, wie durch eine kosten- und konsequenzlose Analyse von Substanzen die unter das Suchtmittelgesetz fallen, Jugendliche vom Missbrauch dieser Substanzen...
In den Neunzigern grundete der Verein Wiener Sozialprojekte ChEck iT ," eine sekundarpraventive Massnahme, welche vordergrundig aus einem mobilen Chem...
|
cena:
219,18 |
![]() |
Achieving Self-Managed Deployment
ISBN: 9783639204872 / Angielski / Miękka / 92 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This dissertation presents algorithms and mechanisms that enable self-managed, scalable and efficient deployment of large-scale scientific and engineering applications in a highly dynamic and unpredictable distributed environment. Typically these applications are composed of a large number of distributed components and it is important to meet the computational power and network bandwidth requirements of those components and their interactions. However satisfying these requirements in a large-scale, shared, heterogeneous, and highly dynamic distributed environment is a significant challenge....
This dissertation presents algorithms and mechanisms that enable self-managed, scalable and efficient deployment of large-scale scientific and enginee...
|
cena:
219,18 |
![]() |
Reliable Data Management Framework for Flash Storage Systems
ISBN: 9783639232554 / Angielski / Miękka / 116 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Flash memory is hugely been using for small handheld to large enterprise applications due to its attractive features. However, flash hardware characteristics like erase-before-write and limited- erase-cycles are becoming big hurdle for researchers to provide reliable and performance oriented system softwares. The effective way to mitigate the impacts of flash drawbacks is to manage the data by its access patterns. But, as a side affect, such approach imposes the demand of high main memory space and lengthy time for initialization. This book provides the work toward reliable data ...
Flash memory is hugely been using for small handheld to large enterprise applications due to its attractive features. However, flash hardware chara...
|
cena:
219,18 |
![]() |
Policing Virtual Memory
ISBN: 9783639243949 / Angielski / Miękka / 68 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. To cater to the growing needs of computer applications, memory managers have to become smarter to minimize the cost of retrieving data from relatively much slower magnetic discs. Memory allocators determine which pages of virtual memory to store at various levels of memory hierarchy. This research paper utilizes the concept of reference locality to address the issue of page faults, describes how to measure page-level locality and presents the results of experiments on various allocator algorithms. Characteristics of allocator design are evaluated and directions for further research are...
To cater to the growing needs of computer applications, memory managers have to become smarter to minimize the cost of retrieving data from relatively...
|
cena:
219,18 |
![]() |
Audio-visuelle Navigation im Web
ISBN: 9783639275162 / Niemiecki / Miękka / 84 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Die Evolution der Eingabegerate fur Maschinen insb. Computer zeigt: Maus und Tastatur stellen nur einen vorlaufigen Status Quo in der Mensch-Maschine Kommunikation dar. Mit der Diplomarbeit Audio- visuelle Navigation im Web" und der daraus resultierenden Anwendung Because clicking is so 90s " soll diese Entwicklung besonders im Medium Web weiter vorangetrieben werden. Das Ziel ist, den Anwender wieder weg von Tastatur und Maus hin zur Navigation mit nativen Mustern wie Handbewegungen und Sprachlauten zu fuhren. Es ist klar, dass nicht alle bisherigen Navigations-Methoden eins zu eins...
Die Evolution der Eingabegerate fur Maschinen insb. Computer zeigt: Maus und Tastatur stellen nur einen vorlaufigen Status Quo in der Mensch-Maschine ...
|
cena:
219,18 |
![]() |
Cloud Computing and Virtualization
ISBN: 9783639347777 / Angielski / Miękka / 116 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book gives an overview of Cloud Computing and Virtualization. It discusses the issues in Computational Resource Allocation and does an extensive experiments to evaluate the performance of web servers hosted on virtual operating systems. As multiple operating systems run on a single physical server, and multiple servers are running in the data center all connected via high speed network links, at some point of time, one of the servers may be overloaded, while others may remain underutilized. This poses challenges related to distributing the load and to carry out the work perfectly by...
This book gives an overview of Cloud Computing and Virtualization. It discusses the issues in Computational Resource Allocation and does an extensive ...
|
cena:
219,18 |
![]() |
User defined system log process
ISBN: 9783639236279 / Angielski / Miękka / 64 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Operating system observability requires communications with the system log process by the application software. IPC stands for interprocess communication, which describe the different ways of message passing between different processes that are running on some operating systems. The histories of these messages or processes are used in the software testing process. This task is done by log file analyzer. Main objective of this thesis is to propose a methodology of the system log process which is used to make the log files of the different processes running for the different software. System...
Operating system observability requires communications with the system log process by the application software. IPC stands for interprocess communicat...
|
cena:
219,18 |
![]() |
Monitoring Complex Telecom Systems
ISBN: 9783838383224 / Angielski / Miękka / 72 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Monitoring and debugging for a real-time system is a complicated problem due to the lack of a set of advanced tools and adequate operating system capability. Software tools can cover the wide range of the software development life cycle from the requirement analysis phase to debugging and maintenance phases. However, the tools available for development of traditional PC software are not sufficient for development of real-time systems. Real-time software tools and effective kernel support are essential to facilitate the development of real-time software as this allows developers of real-time...
Monitoring and debugging for a real-time system is a complicated problem due to the lack of a set of advanced tools and adequate operating system capa...
|
cena:
219,18 |
![]() |
X86 Assembly
ISBN: 9783838335537 / Angielski / Miękka / 120 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book covers assembly language programming for the x86 family of microprocessors. The objective is to teach how to program in x86 assembly, as well as the history and basic architecture of x86 processor family. When referring to x86 we address the complete range of x86-based processors but keep in mind that x86-32 Assembly is commonly referred to as IA-32 (Intel Architecture, 32-bit) Assembly, a 32-bit extension of the original Intel x86 processor architecture. IA-32 has full backwards compatibility (16-bit). AMD64 or AMD 64-bit extension is called x86-64 and is backwards compatible with...
This book covers assembly language programming for the x86 family of microprocessors. The objective is to teach how to program in x86 assembly, as wel...
|
cena:
219,18 |
![]() |
Real-Time Task Scheduling Modeling Using Mixed-Integer Programming
ISBN: 9783838396484 / Angielski / Miękka / 80 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Priority-driven scheduling of real-time systems has attracted considerable research in the literature. The bulk of the research focuses on attempts to explore scheduling schemes that optimize a particular parameter without meticulous considerations related to the global system's behavior. This work is concerned with the implementation of mathematical programming models developed to substantiate the effectiveness of other models.
Priority-driven scheduling of real-time systems has attracted considerable research in the literature. The bulk of the research focuses on attempts to...
|
cena:
219,18 |
![]() |
Platform-Based Authorization Technologies
ISBN: 9783843363457 / Angielski / Miękka / 96 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computing platforms - such as Windows operating systems - traditionally support authorization to protect accesses to well-defined persistent objects, e.g., files. Operating system authorization is usually based on the model of Discretionary Access Control (DAC) and is realized via Access Control Lists (ACLs). These mechanisms do not satisfy the needs of applications that process resources at higher levels of abstraction than the operating system. Therefore, Microsoft introduced a new authorization framework - Authorization Manager (AzMan) - which is built on the Role-Based Access Control...
Computing platforms - such as Windows operating systems - traditionally support authorization to protect accesses to well-defined persistent objects, ...
|
cena:
219,18 |
![]() |
Real-Time Extensions to MINIX
ISBN: 9783843391375 / Angielski / Miękka / 68 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Real time system applications are increasing every day. Real-time systems span from microcontrollers in automobile engines to very complex applications, such as aircraft flight control or process control in manufacturing plants. Failure in meeting the tasks deadlines can lead to catastrophic consequences. Recently, there has been an interest in techniques for developing real-time applications on general- purpose operating systems (GPOSs), like UNIX, MINIX, LINUX etc. With this in view, this work aims at adding real time extensions to the MINIX (Mini-UNIX) system. This work...
Real time system applications are increasing every day. Real-time systems span from microcontrollers in automobile engines to very complex applicati...
|
cena:
219,18 |
![]() |
Towards Adaptive Hierarchical Scheduling
ISBN: 9783845408149 / Angielski / Miękka / 104 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Hierarchical scheduling provides predictable timing and temporal isolation; two properties desirable in real-time embedded systems. In hierarchically scheduled systems, subsystems should receive a sufficient amount of CPU resources in order to be able to guarantee timing constraints of its internal parts (tasks). In static systems, an exact amount of CPU resource can be allocated to a subsystem. However, in dynamic systems, where execution times of tasks vary considerably during run-time, it is desirable to give a dynamic portion of the CPU given the current load situation. In this thesis we...
Hierarchical scheduling provides predictable timing and temporal isolation; two properties desirable in real-time embedded systems. In hierarchically ...
|
cena:
219,18 |
![]() |
Analysis of Automated Rootkit Detection Methodologies
ISBN: 9783844384833 / Angielski / Miękka / 116 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The focus of this study was to identify, analyze, compare, and evaluate the effectiveness of rootkit detection methodologies. Specifically, two methodologies were studied in depth. The first is the heuristic of statically analyzing kernel module binaries, which attempts to determine whether or not a software modules behavior is malicious, prior to passing it to the operating system. The second methodology analyzed in this paper, the Strider Ghostbuster framework, compares what a computer system believes to be true (i.e., what modules are visible to the OS) to the absolute...
The focus of this study was to identify, analyze, compare, and evaluate the effectiveness of rootkit detection methodologies. Specifically, two me...
|
cena:
219,18 |