54 results (0,20736 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Linux with Operating System Concepts

Linux with Operating System Concepts

A True Textbook for an Introductory Course System Administration Course or a Combination Course Linux with Operating System Concepts Second Edition merges conceptual operating system (OS) and Unix/Linux topics into one cohesive textbook for undergraduate students. The book can be used for a one- or two-semester course on Linux or Unix. It is complete with review sections problems definitions concepts and relevant introductory material such as binary and Boolean logic OS kernels and the role of the CPU and memory hierarchy. Details for Introductory and Advanced Users The book covers Linux from both the user and system administrator positions. From a user perspective it emphasizes command-line interaction. From a system administrator perspective the text reinforces shell scripting with examples of administration scripts that support the automation of administrator tasks. Thorough Coverage of Concepts and Linux Commands The author incorporates OS concepts not found in most Linux/Unix textbooks including kernels file systems storage devices virtual memory and process management. He also introduces computer science topics such as computer networks and TCP/IP interpreters versus compilers file compression file system integrity through backups RAID and encryption technologies booting and the GNUs C compiler. New in this Edition The book has been updated to systemd Linux and the newer services like Cockpit NetworkManager firewalld and journald. This edition explores Linux beyond CentOS/Red Hat by adding detail on Debian distributions. Content across most topics has been updated and improved.

GBP 82.99
1

Operating System Design The Xinu Approach Second Edition

Operating System Design The Xinu Approach Second Edition

An Update of the Most Practical A-to-Z Operating System BookWidely lauded for avoiding the typical black box approach found in other operating system textbooks the first edition of this bestselling book taught readers how an operating system works and explained how to build it from the ground up. Continuing to follow a logical pattern for system design Operating System Design: The Xinu Approach Second Edition removes the mystery from operating system design and consolidates the body of material into a systematic discipline. It presents a hierarchical design paradigm that organizes major operating system components in an orderly understandable manner. The book guides readers through the construction of a conventional process-based operating system using practical straightforward primitives. It gives the implementation details of one set of primitives usually the most popular set. Once readers understand how primitives can be implemented on conventional hardware they can then easily implement alternative versions. The text begins with a bare machine and proceeds step-by-step through the design and implementation of Xinu which is a small elegant operating system that supports dynamic process creation dynamic memory allocation network communication local and remote file systems a shell and device-independent I/O functions. The Xinu code runs on many hardware platforms. This second edition has been completely rewritten to contrast operating systems for RISC and CISC processors. Encouraging hands-on experimentation the book provides updated code throughout and examples for two low-cost experimenter boards: BeagleBone Black from ARM and Galileo from Intel. | Operating System Design The Xinu Approach Second Edition

GBP 39.99
1

Raspberry Pi OS System Administration with systemd A Practical Approach

Decision Support System and Automated Negotiations

Raspberry Pi OS System Administration with systemd and Python A Practical Approach

Unity in Embedded System Design and Robotics A Step-by-Step Guide

Neutrices and External Numbers A Flexible Number System

Linux The Textbook Second Edition

Linux The Textbook Second Edition

Choosen by BookAuthority as one of BookAuthority's Best Linux Mint Books of All TimeLinux: The Textbook Second Edition provides comprehensive coverage of the contemporary use of the Linux operating system for every level of student or practitioner from beginners to advanced users. The text clearly illustrates system-specific commands and features using Debian-family Debian Ubuntu and Linux Mint and RHEL-family CentOS and stresses universal commands and features that are critical to all Linux distributions. The second edition of the book includes extensive updates and new chapters on system administration for desktop stand-alone PCs and server-class computers; API for system programming including thread programming with pthreads; virtualization methodologies; and an extensive tutorial on systemd service management. Brand new online content on the CRC Press website includes an instructor’s workbook test bank and In-Chapter exercise solutions as well as full downloadable chapters on Python Version 3. 5 programming ZFS TC shell programming advanced system programming and more. An author-hosted GitHub website also features updates further references and errata. Features New or updated coverage of file system sorting regular expressions directory and file searching file compression and encryption shell scripting system programming client-server–based network programming thread programming with pthreads and system administration Extensive in-text pedagogy including chapter objectives student projects and basic and advanced student exercises for every chapter Expansive electronic downloads offer advanced content on Python ZFS TC shell scripting advanced system programming internetworking with Linux TCP/IP and many more topics all featured on the CRC Press website Downloadable test bank work book and solutions available for instructors on the CRC Press website Author-maintained GitHub repository provides other resources such as live links to further references updates and errata | Linux The Textbook Second Edition

GBP 38.99
1

The New S Language

Security and Resilience of Cyber Physical Systems

Security and Resilience of Cyber Physical Systems

In this era of 5G digital communication the implementation of industry 4. 0 is the need of the hour. The main aim of this industrial revolution is to completely automate the industry for better productivity correct decision making and increased efficiency. All the concepts of industry 4. 0 can only be implemented with the help of Cyber Physical System aka CPS. This is a smart system in which complete mechanism is monitored and controlled by computer-based algorithms. Confidentiality Integrity and Availability are the three major concern for providing the add on security to any organization or a system. It has become a biggest challenge among the security professionals to secure these cyber physical systems. Hackers and bad guys are planning various kinds of attacks on daily basis on these systems. This book addresses the various security and privacy issues involved in the cyber physical system. There is need to explore the interdisciplinary analysis to ensure the resilience of these systems including different types of cyber threats to these systems. The book highlights the importance of security in preventing detecting characterizing and mitigating different types of cyber threats on CPS. The book offers a simple to understand various organized chapters related to the CPS and their security for graduate students faculty research scholars and industry professionals. The book offers comprehensive coverage of the most essential topics including: Cyber Physical Systems and Industrial Internet of Things (IIoT) Role of Internet of Things and their security issues in Cyber Physical Systems. Role of Big data analytic to develop real time solution for CPS. DDoS attacks and their solutions in CPS. Emulator Mininet for simulating CPS. Spark-based DDoS Classification System for Cyber-Physical Systems | Security and Resilience of Cyber Physical Systems

GBP 89.99
1

Embedded and Networking Systems Design Software and Implementation

Embedded and Networking Systems Design Software and Implementation

Embedded and Networking Systems: Design Software and Implementation explores issues related to the design and synthesis of high-performance embedded computer systems and networks. The emphasis is on the fundamental concepts and analytical techniques that are applicable to a range of embedded and networking applications rather than on specific embedded architectures software development or system-level integration. This system point of view guides designers in dealing with the trade-offs to optimize performance power cost and other system-level non-functional requirements. The book brings together contributions by researchers and experts from around the world offering a global view of the latest research and development in embedded and networking systems. Chapters highlight the evolution and trends in the field and supply a fundamental and analytical understanding of some underlying technologies. Topics include the co-design of embedded systems code optimization for a variety of applications power and performance trade-offs benchmarks for evaluating embedded systems and their components and mobile sensor network systems. The book also looks at novel applications such as mobile sensor systems and video networks. A comprehensive review of groundbreaking technology and applications this book is a timely resource for system designers researchers and students interested in the possibilities of embedded and networking systems. It gives readers a better understanding of an emerging technology evolution that is helping drive telecommunications into the next decade. | Embedded and Networking Systems Design Software and Implementation

GBP 77.99
1

Computer Systems Architecture

Computer Systems Architecture

Computer Systems Architecture provides IT professionals and students with the necessary understanding of computer hardware. It addresses the ongoing issues related to computer hardware and discusses the solutions supplied by the industry. The book describes trends in computing solutions that led to the current available infrastructures tracing the initial need for computers to recent concepts such as the Internet of Things. It covers computers’ data representation explains how computer architecture and its underlying meaning changed over the years and examines the implementations and performance enhancements of the central processing unit (CPU). It then discusses the organization hierarchy and performance considerations of computer memory as applied by the operating system and illustrates how cache memory significantly improves performance. The author proceeds to explore the bus system algorithms for ensuring data integrity input and output (I/O) components methods for performing I/O various aspects relevant to software engineering and nonvolatile storage devices such as hard drives and technologies for enhancing performance and reliability. He also describes virtualization and cloud computing and the emergence of software-based systems’ architectures. Accessible to software engineers and developers as well as students in IT disciplines this book enhances readers’ understanding of the hardware infrastructure used in software engineering projects. It enables readers to better optimize system usage by focusing on the principles used in hardware systems design and the methods for enhancing performance.

GBP 44.99
1

Formal Methods in Computer Science

Applications of Differential Transform to Real World Problems

Information Technology An Introduction for Today’s Digital World

GBP 74.99
1

Software Engineering Practice A Case Study Approach

Software Engineering Practice A Case Study Approach

This book is a broad discussion covering the entire software development lifecycle. It uses a comprehensive case study to address each topic and features the following: A description of the development by the fictional company Homeowner of the DigitalHome (DH) System a system with smart devices for controlling home lighting temperature humidity small appliance power and security A set of scenarios that provide a realistic framework for use of the DH System material Just-in-time training: each chapter includes mini tutorials introducing various software engineering topics that are discussed in that chapter and used in the case study A set of case study exercises that provide an opportunity to engage students in software development practice either individually or in a team environment. Offering a new approach to learning about software engineering theory and practice the text is specifically designed to: Support teaching software engineering using a comprehensive case study covering the complete software development lifecycle Offer opportunities for students to actively learn about and engage in software engineering practice Provide a realistic environment to study a wide array of software engineering topics including agile development Software Engineering Practice: A Case Study Approach supports a student-centered active learning style of teaching. The DH case study exercises provide a variety of opportunities for students to engage in realistic activities related to the theory and practice of software engineering. The text uses a fictitious team of software engineers to portray the nature of software engineering and to depict what actual engineers do when practicing software engineering. All the DH case study exercises can be used as team or group exercises in collaborative learning. Many of the exercises have specific goals related to team building and teaming skills. The text also can be used to support the professional development or certification of practicing software engineers. The case study exercises can be integrated with presentations in a workshop or short course for professionals. | Software Engineering Practice A Case Study Approach

GBP 66.99
1

A Kalman Filter Primer

GBP 59.99
1

Network Forensics Privacy and Security

Network Forensics Privacy and Security

This book primarily focuses on providing deep insight into the concepts of network security network forensics botnet forensics ethics and incident response in global perspectives. It also covers the dormant and contentious issues of the subject in most scientific and objective manner. Various case studies addressing contemporary network forensics issues are also included in this book to provide practical know – how of the subject. Network Forensics: A privacy & Security provides a significance knowledge of network forensics in different functions and spheres of the security. The book gives the complete knowledge of network security all kind of network attacks intention of an attacker identification of attack detection its analysis incident response ethical issues botnet and botnet forensics. This book also refer the recent trends that comes under network forensics. It provides in-depth insight to the dormant and latent issues of the acquisition and system live investigation too. Features: Follows an outcome-based learning approach. A systematic overview of the state-of-the-art in network security tools Digital forensics. Differentiation among network security computer forensics network forensics and botnet forensics. Discussion on various cybercrimes attacks and cyber terminologies. Discussion on network forensics process model. Network forensics tools and different techniques Network Forensics analysis through case studies. Discussion on evidence handling and incident response. System Investigations and the ethical issues on network forensics. This book serves as a reference book for post graduate and research investigators who need to study in cyber forensics. It can also be used as a textbook for a graduate level course in Electronics & Communication Computer Science and Computer Engineering. | Network Forensics Privacy and Security

GBP 130.00
1

Mathematical Modeling using Fuzzy Logic Applications to Sustainability

Mathematical Modeling using Fuzzy Logic Applications to Sustainability

Mathematical Modeling using Fuzzy Logic has been a dream project for the author. Fuzzy logic provides a unique method of approximate reasoning in an imperfect world. This text is a bridge to the principles of fuzzy logic through an application-focused approach to selected topics in engineering and management. The many examples point to the richer solutions obtained through fuzzy logic and to the possibilities of much wider applications.  There are relatively very few texts available at present in fuzzy logic applications. The style and content of this text is complementary to those already available. New areas of application like application of fuzzy logic in modeling of sustainability are presented in a graded approach in which the underlying concepts are first described. The text is broadly divided into two parts: the first treats processes materials and system applications related to fuzzy logic and the second delves into the modeling of sustainability with the help of fuzzy logic. This book offers comprehensive coverage of the most essential topics including: Treating processes materials system applications related to fuzzy logic Highlighting new areas of application of fuzzy logic Identifying possibilities of much wider applications of fuzzy logic Modeling of sustainability with the help of fuzzy logic The level enables a selection of the text to be made for the substance of undergraduate- graduate- and postgraduate-level courses. There is also sufficient volume and quality for the basis of a postgraduate course. A more restricted and judicious selection can provide the material for a professional short course and various university-level courses. | Mathematical Modeling using Fuzzy Logic Applications to Sustainability

GBP 105.00
1

An Introduction to Analysis

An Introduction to Analysis

The third edition of this widely popular textbook is authored by a master teacher. This book provides a mathematically rigorous introduction to analysis of real­valued functions of one variable. This intuitive student-friendly text is written in a manner that will help to ease the transition from primarily computational to primarily theoretical mathematics. The material is presented clearly and as intuitive as possible while maintaining mathematical integrity. The author supplies the ideas of the proof and leaves the write-up as an exercise. The text also states why a step in a proof is the reasonable thing to do and which techniques are recurrent. Examples while no substitute for a proof are a valuable tool in helping to develop intuition and are an important feature of this text. Examples can also provide a vivid reminder that what one hopes might be true is not always true. Features of the Third Edition: Begins with a discussion of the axioms of the real number system. The limit is introduced via sequences. Examples motivate what is to come highlight the need for hypothesis in a theorem and make abstract ideas more concrete. A new section on the Cantor set and the Cantor function. Additional material on connectedness. Exercises range in difficulty from the routine getting your feet wet types of problems to the moderately challenging problems. Topology of the real number system is developed to obtain the familiar properties of continuous functions. Some exercises are devoted to the construction of counterexamples. The author presents the material to make the subject understandable and perhaps exciting to those who are beginning their study of abstract mathematics. Table of Contents Preface Introduction The Real Number System Sequences of Real Numbers Topology of the Real Numbers Continuous Functions Differentiation Integration Series of Real Numbers Sequences and Series of Functions Fourier Series Bibliography Hints and Answers to Selected Exercises Index Biography James R. Kirkwood holds a Ph. D. from University of Virginia. He has authored fifteen published mathematics textbooks on various topics including calculus real analysis mathematical biology and mathematical physics. His original research was in mathematical physics and he co-authored the seminal paper in a topic now called Kirkwood-Thomas Theory in mathematical physics. During the summer he teaches real analysis to entering graduate students at the University of Virginia. He has been awarded several National Science Foundation grants. His texts Elementary Linear Algebra Linear Algebra and Markov Processes are also published by CRC Press. | An Introduction to Analysis

GBP 82.99
1

Trustworthy Cyber-Physical Systems Engineering

Trustworthy Cyber-Physical Systems Engineering

From the ForewordGetting CPS dependability right is essential to forming a solid foundation for a world that increasingly depends on such systems. This book represents the cutting edge of what we know about rigorous ways to ensure that our CPS designs are trustworthy. I recommend it to anyone who wants to get a deep look at these concepts that will form a cornerstone for future CPS designs. Phil Koopman Carnegie Mellon University Pittsburgh Pennsylvania USATrustworthy Cyber-Physical Systems Engineering provides practitioners and researchers with a comprehensive introduction to the area of trustworthy Cyber Physical Systems (CPS) engineering. Topics in this book cover questions such asWhat does having a trustworthy CPS actually mean for something as pervasive as a global-scale CPS?How does CPS trustworthiness map onto existing knowledge and where do we need to know more?How can we mathematically prove timeliness correctness and other essential properties for systems that may be adaptive and even self-healing?How can we better represent the physical reality underlying real-world numeric quantities in the computing system?How can we establish reason about and ensure trust between CPS components that are designed installed maintained and operated by different organizations and which may never have really been intended to work together? Featuring contributions from leading international experts the book contains sixteen self-contained chapters that analyze the challenges in developing trustworthy CPS and identify important issues in developing engineering methods for CPS. The book addresses various issues contributing to trustworthiness complemented by contributions on TCSP roadmapping taxonomy and standardization as well as experience in deploying advanced system engineering methods in industry. Specific approaches to ensuring trustworthiness namely proof and refinement are covered as well as engineering methods for dealing with hybrid aspects.

GBP 44.99
1

Introduction to Stochastic Level Crossing Techniques

Introduction to Stochastic Level Crossing Techniques

Introduction to Stochastic Level Crossing Techniques describes stochastic models and their analysis using the System Point Level Crossing method (abbreviated SPLC or LC). This involves deriving probability density functions (pdfs) or cumulative probability distribution functions (cdfs) of key random variables applying simple level-crossing limit theorems developed by the author. The pdfs and/or cdfs are used to specify operational characteristics about the stochastic model of interest. The chapters describe distinct stochastic models and associated key random variables in the models. For each model a figure of a typical sample path (realization i. e. tracing over time) of the key random variable is displayed. For each model an analytic (Volterra) integral equation for the stationary pdf of the key random variable is created−by inspection of the sample path using the simple LC limit theorems. This LC method bypasses a great deal of algebra usually required by other methods of analysis. The integral equations will be solved directly or computationally. This book is meant for students of mathematics management science engineering natural sciences and researchers who use applied probability. It will also be useful to technical workers in a range of professions. Key Features: A description of one representative stochastic model (e. g. a single-server M/G/1 queue; a multiple server M/M/c queue; an inventory system; etc. ) Construction of a typical sample path of the key random variable of interest (e. g. the virtual waiting time or workload in queues; the net on-hand inventory in inventory systems; etc. ) Statements of the simple LC theorems which connect the sample-path upcrossing and downcrossing rates across state-space levels to simple mathematical functions of the stationary pdf of the key random variable at those state-space levels Creation of (usually Volterra) integral equations for the stationary pdf of the key random variable by inspection of the sample path Direct analytic solution of the integral equations where feasible; or computational solutions of the integral equations Use of the derived stationary pdfs for obtaining operational characteristics of the model

GBP 120.00
1

Equivalence and Noninferiority Tests for Quality Manufacturing and Test Engineers

A Handbook of Statistical Analyses using R