Filter
(found 2275 products)
Book cover image
This book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018. The 32 revised full papers were carefully reviewed and selected from 145 submissions. They are organized in the following topical sections: attacks; ...
Research in Attacks, Intrusions, and Defenses: 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings
This book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018. The 32 revised full papers were carefully reviewed and selected from 145 submissions. They are organized in the following topical sections: attacks; intrusion detection and prevention; DDoS attacks; passwords, accounts, and users; machine learning for computer security; hardware-assisted security; software security; malware; IoT/CPS security; security measurements; and defenses.
https://magrudy-assets.storage.googleapis.com/9783030004699.jpg
115.490000 USD

Research in Attacks, Intrusions, and Defenses: 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings

Paperback / softback
Book cover image
Covering all the essential components of Unix/Linux, including process management, concurrent programming, timer and time service, file systems and network programming, this textbook emphasizes programming practice in the Unix/Linux environment. Systems Programming in Unix/Linux is intended as a textbook for systems programming courses in technically-oriented Computer Science/Engineering curricula that emphasize ...
Systems Programming in Unix/Linux
Covering all the essential components of Unix/Linux, including process management, concurrent programming, timer and time service, file systems and network programming, this textbook emphasizes programming practice in the Unix/Linux environment. Systems Programming in Unix/Linux is intended as a textbook for systems programming courses in technically-oriented Computer Science/Engineering curricula that emphasize both theory and programming practice. The book contains many detailed working example programs with complete source code. It is also suitable for self-study by advanced programmers and computer enthusiasts. Systems programming is an indispensable part of Computer Science/Engineering education. After taking an introductory programming course, this book is meant to further knowledge by detailing how dynamic data structures are used in practice, using programming exercises and programming projects on such topics as C structures, pointers, link lists and trees. This book provides a wide range of knowledge about computer systemsoftware and advanced programming skills, allowing readers to interface with operatingsystem kernel, make efficient use of system resources and develop application software.It also prepares readers with the needed background to pursue advanced studies inComputer Science/Engineering, such as operating systems, embedded systems, databasesystems, data mining, artificial intelligence, computer networks, network security,distributed and parallel computing.
https://magrudy-assets.storage.googleapis.com/9783319924281.jpg
94.490000 USD

Systems Programming in Unix/Linux

by K.C. Wang
Hardback
Book cover image
Linux: The Textbook, Second Edition provides comprehensive coverage of the contemporary use of the Linux operating system for every level of student or practitioner, from beginners to advanced users. The text clearly illustrates system-specific commands and features using Debian-family Debian, Ubuntu, and Linux Mint, and RHEL-family CentOS, and stresses universal ...
Linux: The Textbook, Second Edition
Linux: The Textbook, Second Edition provides comprehensive coverage of the contemporary use of the Linux operating system for every level of student or practitioner, from beginners to advanced users. The text clearly illustrates system-specific commands and features using Debian-family Debian, Ubuntu, and Linux Mint, and RHEL-family CentOS, and stresses universal commands and features that are critical to all Linux distributions. The second edition of the book includes extensive updates and new chapters on system administration for desktop, stand-alone PCs, and server-class computers; API for system programming, including thread programming with pthreads; virtualization methodologies; and an extensive tutorial on systemd service management. Brand new online content on the CRC Press website includes an instructor's workbook, test bank, and In-Chapter exercise solutions, as well as full downloadable chapters on Python Version 3.5 programming, ZFS, TC shell programming, advanced system programming, and more. An author-hosted GitHub website also features updates, further references, and errata. Features New or updated coverage of file system, sorting, regular expressions, directory and file searching, file compression and encryption, shell scripting, system programming, client-server-based network programming, thread programming with pthreads, and system administration Extensive in-text pedagogy, including chapter objectives, student projects, and basic and advanced student exercises for every chapter Expansive electronic downloads offer advanced content on Python, ZFS, TC shell scripting, advanced system programming, internetworking with Linux TCP/IP, and many more topics, all featured on the CRC Press website Downloadable test bank, work book, and solutions available for instructors on the CRC Press website Author-maintained GitHub repository provides other resources, such as live links to further references, updates, and errata
https://magrudy-assets.storage.googleapis.com/9781138710085.jpg
156.98 USD

Linux: The Textbook, Second Edition

by Robert M. Koretsky, Syed Mansoor Sarwar
Hardback
Book cover image
In this book, the interrupt handling models used by several operating systems are introduced and compared. We begin with an analysis of the classical interrupt management model used by Unix, followed by the schemes used by modern networked environments. We highlight the key challenges of each of these models and ...
Interrupt Handling Schemes in Operating Systems
In this book, the interrupt handling models used by several operating systems are introduced and compared. We begin with an analysis of the classical interrupt management model used by Unix, followed by the schemes used by modern networked environments. We highlight the key challenges of each of these models and how these have been solved by modern operating systems and the research community. Then we analyze the architectures used for general purpose and embedded real-time operating systems.
https://magrudy-assets.storage.googleapis.com/9783319944920.jpg
73.490000 USD

Interrupt Handling Schemes in Operating Systems

by Arnaldo Diaz-Ramirez, Luis Eduardo Leyva del Foyo, Pedro Mejia Alvarez
Paperback
Book cover image
This book constitutes the refereed proceedings of the 10th International Symposium on Search-Based Software Engineering, SSBSE 2018, held in Montpellier, France, in September 2018. The 12 full papers and 7 short papers presented together with 3 keynotes, 2 tutorials, and 1 anniversary paper were carefully reviewed and selected from 21 ...
Search-Based Software Engineering: 10th International Symposium, SSBSE 2018, Montpellier, France, September 8-9, 2018, Proceedings
This book constitutes the refereed proceedings of the 10th International Symposium on Search-Based Software Engineering, SSBSE 2018, held in Montpellier, France, in September 2018. The 12 full papers and 7 short papers presented together with 3 keynotes, 2 tutorials, and 1 anniversary paper were carefully reviewed and selected from 21 submissions. SSBSE welcomes not only applications from throughout the software engineering lifecycle but also a broad range of search methods ranging from exact Operational Research techniques to nature-inspired algorithms and simulated annealing. Chapter Deploying Search Based Software Engineering with Sapienz at Facebook is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
https://magrudy-assets.storage.googleapis.com/9783319992402.jpg
83.990000 USD

Search-Based Software Engineering: 10th International Symposium, SSBSE 2018, Montpellier, France, September 8-9, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 12th International Conference on Parallel Computational Technologies, PCT 2018, held in Rostov-on-Don, Russia, in April 2018.The 24 revised full papers presented were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on high performance architectures, tools and ...
Parallel Computational Technologies: 12th International Conference, PCT 2018, Rostov-on-Don, Russia, April 2-6, 2018, Revised Selected Papers
This book constitutes the refereed proceedings of the 12th International Conference on Parallel Computational Technologies, PCT 2018, held in Rostov-on-Don, Russia, in April 2018.The 24 revised full papers presented were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on high performance architectures, tools and technologies; parallel numerical algorithms; supercomputer simulation.
https://magrudy-assets.storage.googleapis.com/9783319996721.jpg
104.990000 USD

Parallel Computational Technologies: 12th International Conference, PCT 2018, Rostov-on-Don, Russia, April 2-6, 2018, Revised Selected Papers

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 12th Annual Conference on Advanced Computer Architecture, ACA 2018, held in Yingkou, China, in August 2018. The 17 revised full papers presented were carefully reviewed and selected from 80 submissions. The papers of this volume are organized in topical sections on: accelerators; ...
Advanced Computer Architecture: 12th Conference, ACA 2018, Yingkou, China, August 10-11, 2018, Proceedings
This book constitutes the refereed proceedings of the 12th Annual Conference on Advanced Computer Architecture, ACA 2018, held in Yingkou, China, in August 2018. The 17 revised full papers presented were carefully reviewed and selected from 80 submissions. The papers of this volume are organized in topical sections on: accelerators; new design explorations; towards efficient ML/AI; parallel computing system.
https://magrudy-assets.storage.googleapis.com/9789811324222.jpg
89.240000 USD

Advanced Computer Architecture: 12th Conference, ACA 2018, Yingkou, China, August 10-11, 2018, Proceedings

Paperback / softback
Book cover image
This, the 37th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains five revised selected regular papers. Topics covered include data security in clouds, privacy languages, probabilistic modelling in linked data integration, business intelligence based on multi-agent systems, collaborative filtering, and prediction accuracy.
Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVII
This, the 37th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains five revised selected regular papers. Topics covered include data security in clouds, privacy languages, probabilistic modelling in linked data integration, business intelligence based on multi-agent systems, collaborative filtering, and prediction accuracy.
https://magrudy-assets.storage.googleapis.com/9783662579312.jpg
62.990000 USD

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVII

Paperback / softback
Book cover image
Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way. Investigating Windows Systems will not address topics which have ...
Investigating Windows Systems
Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way. Investigating Windows Systems will not address topics which have been covered in other books, but will expect the reader to have some ability to discover the detailed usage of tools and to perform their own research. The focus of this volume is to provide a walk-through of the analysis process, with descriptions of the thought process and the analysis decisions made along the way. A must-have guide for those in the field of digital forensic analysis and incident response.
https://magrudy-assets.storage.googleapis.com/9780128114155.jpg
92.05 USD

Investigating Windows Systems

by Harlan Carvey
Paperback
Book cover image
Boundaries and Hulls of Euclidean Graphs: From Theory to Practice presents concepts and algorithms for finding convex, concave and polygon hulls of Euclidean graphs. It also includes some implementations, determining and comparing their complexities. Since the implementation is application-dependent, either centralized or distributed, some basic concepts of the centralized and ...
Boundaries and Hulls of Euclidean Graphs: From Theory to Practice
Boundaries and Hulls of Euclidean Graphs: From Theory to Practice presents concepts and algorithms for finding convex, concave and polygon hulls of Euclidean graphs. It also includes some implementations, determining and comparing their complexities. Since the implementation is application-dependent, either centralized or distributed, some basic concepts of the centralized and distributed versions are reviewed. Theoreticians will find a presentation of different algorithms together with an evaluation of their complexity and their utilities, as well as their field of application. Practitioners will find some practical and real-world situations in which the presented algorithms can be used.
https://magrudy-assets.storage.googleapis.com/9781138048911.jpg
104.950000 USD

Boundaries and Hulls of Euclidean Graphs: From Theory to Practice

by Reinhardt Euler, Madani Bezoui, Ahcene Bounceur
Hardback
Book cover image
Engineering mechanics is one of the fundamental branches of science that is important in the education of professional engineers of any major. Most of the basic engineering courses, such as mechanics of materials, fluid and gas mechanics, machine design, mechatronics, acoustics, vibrations, etc. are based on engineering mechanics courses. In ...
Analytical Performance Modeling for Computer Systems
Engineering mechanics is one of the fundamental branches of science that is important in the education of professional engineers of any major. Most of the basic engineering courses, such as mechanics of materials, fluid and gas mechanics, machine design, mechatronics, acoustics, vibrations, etc. are based on engineering mechanics courses. In order to absorb the materials of engineering mechanics, it is not enough to consume just theoretical laws and theorems-a student also must develop an ability to solve practical problems. Therefore, it is necessary to solve many problems independently. This book is a part of a four-book series designed to supplement the engineering mechanics courses. This series instructs and applies the principles required to solve practical engineering problems in the following branches of mechanics: statics, kinematics, dynamics, and advanced kinetics. Each book contains between 6 and 8 topics on its specific branch and each topic features 30 problems to be assigned as homework, tests, and/or midterm/final exams with the consent of the instructor. A solution of one similar sample problem from each topic is provided. This first book contains seven topics of statics, the branch of mechanics concerned with the analysis of forces acting on construction systems without an acceleration (a state of the static equilibrium). The book targets the undergraduate students of the sophomore/junior level majoring in science and engineering.
https://magrudy-assets.storage.googleapis.com/9781681733890.jpg
73.450000 USD

Analytical Performance Modeling for Computer Systems

by Y.C. Tay
Paperback / softback
Book cover image
This book constitutes the proceedings of the 10th International Conference on Internet and Distributed Computing Systems, IDCS 2017, held in Mana Island, Fiji, in December 2017. The 16 full papers presented were carefully reviewed and selected from 40 submissions. The papers focus on emerging models, paradigms, technologies and novel applications ...
Internet and Distributed Computing Systems: 10th International Conference, IDCS 2017, Mana Island, Fiji, December 11-13, 2017, Proceedings
This book constitutes the proceedings of the 10th International Conference on Internet and Distributed Computing Systems, IDCS 2017, held in Mana Island, Fiji, in December 2017. The 16 full papers presented were carefully reviewed and selected from 40 submissions. The papers focus on emerging models, paradigms, technologies and novel applications related to Internet-based distributed systems, including Internet of Things, cyber-physical systems, wireless sensor networks, next-generation collaborative systems, extreme-scale networked systems, and cloud-based big data systems.
https://magrudy-assets.storage.googleapis.com/9783319977942.jpg
62.990000 USD

Internet and Distributed Computing Systems: 10th International Conference, IDCS 2017, Mana Island, Fiji, December 11-13, 2017, Proceedings

Paperback / softback
Book cover image
Invent your own Python scripts to automate your infrastructure Key Features Make the most of Python libraries and modules to automate your infrastructure Leverage Python programming to automate server configurations and administration tasks Efficiently develop your Python skill set Book DescriptionHands-On Enterprise Automation with Python starts by covering the set ...
Hands-On Enterprise Automation with Python: Automate common administrative and security tasks with Python
Invent your own Python scripts to automate your infrastructure Key Features Make the most of Python libraries and modules to automate your infrastructure Leverage Python programming to automate server configurations and administration tasks Efficiently develop your Python skill set Book DescriptionHands-On Enterprise Automation with Python starts by covering the set up of a Python environment to perform automation tasks, as well as the modules, libraries, and tools you will be using. We'll explore examples of network automation tasks using simple Python programs and Ansible. Next, we will walk you through automating administration tasks with Python Fabric, where you will learn to perform server configuration and administration, along with system administration tasks such as user management, database management, and process management. As you progress through this book, you'll automate several testing services with Python scripts and perform automation tasks on virtual machines and cloud infrastructure with Python. In the concluding chapters, you will cover Python-based offensive security tools and learn how to automate your security tasks. By the end of this book, you will have mastered the skills of automating several system administration tasks with Python. What you will learn Understand common automation modules used in Python Develop Python scripts to manage network devices Automate common Linux administration tasks with Ansible and Fabric Managing Linux processes Administrate VMware, OpenStack, and AWS instances with Python Security automation and sharing code on GitHub Who this book is forHands-On Enterprise Automation with Python is for system administrators and DevOps engineers who are looking for an alternative to major automation frameworks such as Puppet and Chef. Basic programming knowledge with Python and Linux shell scripting is necessary.
https://magrudy-assets.storage.googleapis.com/9781788998512.jpg
41.990000 USD

Hands-On Enterprise Automation with Python: Automate common administrative and security tasks with Python

by Bassem Aly
Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 14th World Congress on Services, SERVICES 2018, held as part of the Services Conference Federation, SCF 2018, in Seattle, USA, in June 2018. The 10 full papers and 3 short papers presented were carefully reviewed and selected from 22 submissions. The papers ...
Services - SERVICES 2018: 14th World Congress, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings
This book constitutes the refereed proceedings of the 14th World Congress on Services, SERVICES 2018, held as part of the Services Conference Federation, SCF 2018, in Seattle, USA, in June 2018. The 10 full papers and 3 short papers presented were carefully reviewed and selected from 22 submissions. The papers cover topics in the field of software foundations and applications with a focus on novel approaches for engineering requirements, design and architectures, testing, maintenance and evolution, model-driven development, software processes, metrics, quality assurance and new software economics models, search-based software engineering, benefiting day-to-day services sectors and derived through experiences, with appreciation to scale, pragmatism, transparency, compliance and/or dependability.
https://magrudy-assets.storage.googleapis.com/9783319944715.jpg
62.990000 USD

Services - SERVICES 2018: 14th World Congress, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018. The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submissions. They deal with the ...
Cyber Security Cryptography and Machine Learning: Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings
This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018. The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in the scope.
https://magrudy-assets.storage.googleapis.com/9783319941462.jpg
73.490000 USD

Cyber Security Cryptography and Machine Learning: Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings

Paperback / softback
Book cover image
This book is a study guide for Huawei (HCNA) certification. It has been written to help readers understand the principles of network technologies. It covers topics including network fundamentals, Ethernet, various protocols such as those used in routing, and Huawei's own VRP operating system-all essential aspects of HCNA certification. Presenting ...
HCNA Networking Study Guide
This book is a study guide for Huawei (HCNA) certification. It has been written to help readers understand the principles of network technologies. It covers topics including network fundamentals, Ethernet, various protocols such as those used in routing, and Huawei's own VRP operating system-all essential aspects of HCNA certification. Presenting routing and switching basics in depth, it is a valuable resource for information and communications technology (ICT) practitioners, university students and network technology fans.
https://magrudy-assets.storage.googleapis.com/9789811093845.jpg
83.990000 USD

HCNA Networking Study Guide

Paperback / softback
Book cover image
This book constitutes the proceedings of the 15th International Conference on Integration of Artificial Intelligence and Operations Research Techniques in Constraint Programming for Combinatorial Optimization Problems, CPAIOR 2018, held in Delft, The Netherlands, in June 2018. The 47 full papers presented together with 3 abstracts of invited talks and 3 ...
Integration of Constraint Programming, Artificial Intelligence, and Operations Research: 15th International Conference, CPAIOR 2018, Delft, The Netherlands, June 26-29, 2018, Proceedings
This book constitutes the proceedings of the 15th International Conference on Integration of Artificial Intelligence and Operations Research Techniques in Constraint Programming for Combinatorial Optimization Problems, CPAIOR 2018, held in Delft, The Netherlands, in June 2018. The 47 full papers presented together with 3 abstracts of invited talks and 3 abstracts of fast-track journal papers were carefully reviewed and selected from 111 submissions. The conference brings together interested researchers from constraint programming, artificial intelligence, and operations research to present new techniques or applications in the intersection of these fields and provides an opportunity for researchers in one area to learn about techniques in the others, and to show how the integration of techniques from different fields can lead to interesting results on large and complex problems.
https://magrudy-assets.storage.googleapis.com/9783319930305.jpg
115.490000 USD

Integration of Constraint Programming, Artificial Intelligence, and Operations Research: 15th International Conference, CPAIOR 2018, Delft, The Netherlands, June 26-29, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2018, held in Saclay, France, in June 2018. The 17 revised full papers and 1 short paper included in this book were carefully reviewed and selected from 59 submissions. ...
Detection of Intrusions and Malware, and Vulnerability Assessment: 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings
This book constitutes the refereed proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2018, held in Saclay, France, in June 2018. The 17 revised full papers and 1 short paper included in this book were carefully reviewed and selected from 59 submissions. They present topics such as malware analysis; mobile and embedded security; attacks; detection and containment; web and browser security; and reverse engineering.
https://magrudy-assets.storage.googleapis.com/9783319934105.jpg
83.990000 USD

Detection of Intrusions and Malware, and Vulnerability Assessment: 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the thoroughly refereed proceedings of the 15th International Conference on Image Analysis and Recognition, ICIAR 2018, held in Povoa de Varzim, Portugal, in June 2018. The 91 full papers presented together with 15 short papers were carefully reviewed and selected from 179 submissions. The papers are organized ...
Image Analysis and Recognition: 15th International Conference, ICIAR 2018, Povoa de Varzim, Portugal, June 27-29, 2018, Proceedings
This book constitutes the thoroughly refereed proceedings of the 15th International Conference on Image Analysis and Recognition, ICIAR 2018, held in Povoa de Varzim, Portugal, in June 2018. The 91 full papers presented together with 15 short papers were carefully reviewed and selected from 179 submissions. The papers are organized in the following topical sections: Enhancement, Restoration and Reconstruction, Image Segmentation, Detection, Classication and Recognition, Indexing and Retrieval, Computer Vision, Activity Recognition, Traffic and Surveillance, Applications, Biomedical Image Analysis, Diagnosis and Screening of Ophthalmic Diseases, and Challenge on Breast Cancer Histology Images.
https://magrudy-assets.storage.googleapis.com/9783319929996.jpg
146.990000 USD

Image Analysis and Recognition: 15th International Conference, ICIAR 2018, Povoa de Varzim, Portugal, June 27-29, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the proceedings of the 18th IFIP International Conference on Distributed Applications and Interoperable Systems, DAIS 2018, held in Madrid, Spain, in June 2018. The 10 papers presented together with 2 short papers in this volume were carefully reviewed and selected from 33 submissions. The papers are organized ...
Distributed Applications and Interoperable Systems: 18th IFIP WG 6.1 International Conference, DAIS 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proc
This book constitutes the proceedings of the 18th IFIP International Conference on Distributed Applications and Interoperable Systems, DAIS 2018, held in Madrid, Spain, in June 2018. The 10 papers presented together with 2 short papers in this volume were carefully reviewed and selected from 33 submissions. The papers are organized in topical sections on application domains, including stream processing, video dissemination, storage, privacy protection, and large-scale orchestration.
https://magrudy-assets.storage.googleapis.com/9783319937663.jpg
62.990000 USD

Distributed Applications and Interoperable Systems: 18th IFIP WG 6.1 International Conference, DAIS 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proc

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 11th International Conference on Model Transformation, ICMT 2018, held as part of STAF 2018, in Toulouse, France, in June 2018. The 9 full papers were carefully reviewed and selected from 24 submissions. This book also presents 1 invited paper. The papers include ...
Theory and Practice of Model Transformation: 11th International Conference, ICMT 2018, Held as Part of STAF 2018, Toulouse, France, June 25-26, 2018, Proceedings
This book constitutes the refereed proceedings of the 11th International Conference on Model Transformation, ICMT 2018, held as part of STAF 2018, in Toulouse, France, in June 2018. The 9 full papers were carefully reviewed and selected from 24 submissions. This book also presents 1 invited paper. The papers include research, application, and tool demonstration papers presented in the context of four sessions on verification of model transformations, model transformation tools, transformation reuse and graph transformations.
https://magrudy-assets.storage.googleapis.com/9783319933160.jpg
62.990000 USD

Theory and Practice of Model Transformation: 11th International Conference, ICMT 2018, Held as Part of STAF 2018, Toulouse, France, June 25-26, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the proceedings of the 20th International Conference on Coordination Models and Languages, COORDINATION 2018, held in Madrid, Spain, in June 2018, as part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018. The 12 full papers included in this volume were carefully reviewed and ...
Coordination Models and Languages: 20th IFIP WG 6.1 International Conference, COORDINATION 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018. Proceedings
This book constitutes the proceedings of the 20th International Conference on Coordination Models and Languages, COORDINATION 2018, held in Madrid, Spain, in June 2018, as part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018. The 12 full papers included in this volume were carefully reviewed and selected from 26 submissions. The papers cover a wide range of topics and techniques related to system coordination, including: actor-based coordination, tuple- based coordination, agent-oriented techniques, constraints- based coordination, and finally coordination based on shared spaces.
https://magrudy-assets.storage.googleapis.com/9783319924076.jpg
73.490000 USD

Coordination Models and Languages: 20th IFIP WG 6.1 International Conference, COORDINATION 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018. Proceedings

Paperback / softback
Book cover image
Get up-to-date with the finer points of Ubuntu Server using this comprehensive guide Key Features A practical easy-to-understand book that will teach you how to deploy, maintain and troubleshoot Ubuntu Server Get well-versed with newly-added features in Ubuntu 18.04. Learn to manage cutting-edge technologies such as virtualization, containers, Nextcloud and ...
Mastering Ubuntu Server: Master the art of deploying, configuring, managing, and troubleshooting Ubuntu Server 18.04, 2nd Edition
Get up-to-date with the finer points of Ubuntu Server using this comprehensive guide Key Features A practical easy-to-understand book that will teach you how to deploy, maintain and troubleshoot Ubuntu Server Get well-versed with newly-added features in Ubuntu 18.04. Learn to manage cutting-edge technologies such as virtualization, containers, Nextcloud and more Book DescriptionUbuntu Server has taken the data centers by storm. Whether you're deploying Ubuntu for a large-scale project or for a small office, it is a stable, customizable, and powerful Linux distribution that leads the way with innovative and cutting-edge features. For both simple and complex server deployments, Ubuntu's flexible nature can be easily adapted to meet to the needs of your organization. With this book as your guide, you will learn all about Ubuntu Server, from initial deployment to creating production-ready resources for your network. The book begins with the concept of user management, group management, and filesystem permissions. Continuing into managing storage volumes, you will learn how to format storage devices, utilize logical volume management, and monitor disk usage. Later, you will learn how to virtualize hosts and applications, which will cover setting up KVM/QEMU, as well as containerization with both Docker and LXD. As the book continues, you will learn how to automate configuration with Ansible, as well as take a look at writing scripts. Lastly, you will explore best practices and troubleshooting techniques when working with Ubuntu Server that are applicable to real-world scenarios. By the end of the book, you will be an expert Ubuntu Server administrator who is well-versed in its advanced concepts. What you will learn Manage users, groups, and permissions Encrypt and decrypt disks with Linux Unified Key Setup (LUKS) Set up SSH for remote access, and connect it to other nodes Add, remove, and search for packages Use NFS and Samba to share directories with other users Get to know techniques for managing Apache and MariaDB Explore best practices and troubleshooting techniques Get familiar with scripting Automate server deployments with Ansible Who this book is forThis book is intended for readers with intermediate or advanced-beginner skills with Linux, who would like to learn all about setting up servers with Ubuntu Server. This book assumes that the reader knows the basics of Linux, such as editing configuration files and running basic commands.
https://magrudy-assets.storage.googleapis.com/9781788997560.jpg
47.240000 USD

Mastering Ubuntu Server: Master the art of deploying, configuring, managing, and troubleshooting Ubuntu Server 18.04, 2nd Edition

by Jay LaCroix
Paperback / softback
Book cover image
This book constitutes the proceedings of the 38th IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, FORTE 2018, held in Madrid, Spain, in June 2018, as part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018. The 10 full papers presented ...
Formal Techniques for Distributed Objects, Components, and Systems: 38th IFIP WG 6.1 International Conference, FORTE 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June
This book constitutes the proceedings of the 38th IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, FORTE 2018, held in Madrid, Spain, in June 2018, as part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018. The 10 full papers presented were carefully reviewed and selected from 28 submissions. The conference is dedicated to fundamental research on theory, models, tools, and applications for distributed systems.
https://magrudy-assets.storage.googleapis.com/9783319926117.jpg
62.990000 USD
Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 33rd International Conference, ISC High Performance 2018, held in Frankfurt, Germany, in June 2018. The 20 revised full papers presented in this book were carefully reviewed and selected from 81 submissions. The papers cover the following topics: Resource Management and Energy Efficiency; ...
High Performance Computing: 33rd International Conference, ISC High Performance 2018, Frankfurt, Germany, June 24-28, 2018, Proceedings
This book constitutes the refereed proceedings of the 33rd International Conference, ISC High Performance 2018, held in Frankfurt, Germany, in June 2018. The 20 revised full papers presented in this book were carefully reviewed and selected from 81 submissions. The papers cover the following topics: Resource Management and Energy Efficiency; Performance Analysis and Tools; Exascale Networks; Parallel Algorithms.
https://magrudy-assets.storage.googleapis.com/9783319920399.jpg
83.990000 USD

High Performance Computing: 33rd International Conference, ISC High Performance 2018, Frankfurt, Germany, June 24-28, 2018, Proceedings

Paperback / softback
Book cover image
Start building your very own mobile apps with this comprehensive introduction to Swift and object-oriented programming Key Features A complete beginner's guide to Swift programming language Understand core Swift programming concepts and techniques for creating popular iOS apps Start your journey toward building mobile app development with this practical guide ...
Learn Swift by Building Applications: Explore Swift programming through iOS app development
Start building your very own mobile apps with this comprehensive introduction to Swift and object-oriented programming Key Features A complete beginner's guide to Swift programming language Understand core Swift programming concepts and techniques for creating popular iOS apps Start your journey toward building mobile app development with this practical guide Book DescriptionSwift Language is now more powerful than ever; it has introduced new ways to solve old problems and has gone on to become one of the fastest growing popular languages. It is now a de-facto choice for iOS developers and it powers most of the newly released and popular apps. This practical guide will help you to begin your journey with Swift programming through learning how to build iOS apps. You will learn all about basic variables, if clauses, functions, loops, and other core concepts; then structures, classes, and inheritance will be discussed. Next, you'll dive into developing a weather app that consumes data from the internet and presents information to the user. The final project is more complex, involving creating an Instagram like app that integrates different external libraries. The app also uses CocoaPods as its package dependency manager, to give you a cutting-edge tool to add to your skillset. By the end of the book, you will have learned how to model real-world apps in Swift. What you will learn Become a pro at iOS development by creating simple-to-complex iOS mobile applications Master Playgrounds, a unique and intuitive approach to teaching Xcode Tackle the basics, including variables, if clauses, functions, loops and structures, classes, and inheritance Model real-world objects in Swift and have an in-depth understanding of the data structures used, along with OOP concepts and protocols Use CocoaPods, an open source Swift package manager to ease your everyday developer requirements Develop a wide range of apps, from a simple weather app to an Instagram-like social app Get ahead in the industry by learning how to use third-party libraries efficiently in your apps Who this book is forThis book is for beginners who are new to Swift or may have some preliminary knowledge of Objective-C. If you are interested in learning and mastering Swift in Apple's ecosystem, namely mobile development, then this book is for you.
https://magrudy-assets.storage.googleapis.com/9781786463920.jpg
41.990000 USD

Learn Swift by Building Applications: Explore Swift programming through iOS app development

by Emil Atanasov, Emil Atanasov
Paperback / softback
Book cover image
IOS 12, Tvos 12, and Watchos 5 for Users and Developers
https://magrudy-assets.storage.googleapis.com/9781724529336.jpg
13.640000 USD

IOS 12, Tvos 12, and Watchos 5 for Users and Developers

by Wayne Dixon
Paperback / softback
Book cover image
IOS 12, Tvos 12, and Watchos 5 for Users and Developers
https://magrudy-assets.storage.googleapis.com/9781724526458.jpg
41.990000 USD

IOS 12, Tvos 12, and Watchos 5 for Users and Developers

by Wayne Dixon
Paperback / softback
Book cover image
Principles of Operating Systems
https://magrudy-assets.storage.googleapis.com/9781724910318.jpg
31.450000 USD

Principles of Operating Systems

by Darrell Hajek
Paperback / softback
Book cover image
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic Web, social networks, and multi-agent systems. TCCI strives to cover new methodological, theoretical and practical aspects of CCI understood as the form of intelligence that ...
Transactions on Computational Collective Intelligence XXVIII
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic Web, social networks, and multi-agent systems. TCCI strives to cover new methodological, theoretical and practical aspects of CCI understood as the form of intelligence that emerges from the collaboration and competition of many individuals (artificial and/or natural). The application of multiple computational intelligence technologies, such as fuzzy systems, evolutionary computation, neural systems, consensus theory, etc., aims to support human and other collective intelligence and to create new forms of CCI in natural and/or artificial systems. This twenty-eight issue is a special issue with 11 selected papers from the International Conference on Agents and Artificial Intelligence, ICAART 2016 and 2017 editions.
https://magrudy-assets.storage.googleapis.com/9783319783000.jpg
102.900000 USD

Transactions on Computational Collective Intelligence XXVIII

Paperback / softback
Page 1 of 40