This book constitutes thoroughly revised and selected papers from the 5th International Conference on Model-Driven Engineering and Software Development, MODELSWARD 2017, held in Porto, Portugal, in February 2017.
Das Buch vermittelt in kompakter und leicht verständlicher Form wichtige Grundkonzepte, Verfahren und Algorithmen, die in modernen Betriebssystemen eingesetzt werden.
Der Autor präsentiert die Grundlagen und Konzepte der heutigen Betriebssysteme und behandelt die Gebiete Prozesse (Prozesszustände, Prozessscheduling, Prozesssynchronisation und Prozesskommunikation), Speicherverwaltung (virtueller Speicher, paging, swapping), Dateiverwaltung (Files, Ordner, Sicherheitsmechanismen), Ein-und Ausgabeverwaltung (Treiber, I/O-memory mapping, Systemfunktionen) sowie Netzwerke (Netzwerkschichten, Arbeitsverteilung, Schattenserver) und Sicherheitsmechanismen (Angriffsarten, root kits, Kerberos).
This illustrative compendium analyzes the load balancing problem in distributed stream processing systems and explores a set of high-performance real-time processing scheme based on key-based balancing strategy, join-matrix model and fault tolerance mechanisms.
This comprehensive study guide delivers 100% coverage of every topic on the challenging CompTIA Linux+ examGet complete coverage of all the objectives included on CompTIA Linux+ exam XK0-005 from this up-to-date resource.
This comprehensive study guide delivers 100% coverage of every topic on the challenging CompTIA Linux+ examGet complete coverage of all the objectives included on CompTIA Linux+ exam XK0-005 from this up-to-date resource.
Review topics ranging from Intel x64 assembly language instructions and writing programs in assembly language, to pointers, live debugging, and static binary analysis of compiled C and C++ code.
Gain insights into the different challenges that can be solved using Go, with a focus on containers, Linux, security, networking, user interfaces and other relevant cloud based topics.
Windows Server 2008 R2 Unleashed is the most comprehensive and realistic guide to planning, design, prototyping, implementation, migration, administration, and support.
Get to grips with Microsoft's enterprise defense suite and its capabilities, deployments, incident response, and defense against cyber threats Purchase of the print or Kindle book includes a free PDF ebookKey FeaturesHelp in understanding Microsoft 365 Defender and how it is crucial for security operationsImplementation of the proactive security defense capabilities of Microsoft Defender for Endpoint, Identity,Office 365, and Cloud Apps so that attacks can be stopped before they startA guide to hunting and responding to threats using M365D s extended detection and response capabilitiesBook DescriptionThis book will help you get up and running with Microsoft 365 Defender and help you use the whole suite effectively.
Get to grips with Microsoft's enterprise defense suite and its capabilities, deployments, incident response, and defense against cyber threats Purchase of the print or Kindle book includes a free PDF ebookKey FeaturesHelp in understanding Microsoft 365 Defender and how it is crucial for security operationsImplementation of the proactive security defense capabilities of Microsoft Defender for Endpoint, Identity,Office 365, and Cloud Apps so that attacks can be stopped before they startA guide to hunting and responding to threats using M365D s extended detection and response capabilitiesBook DescriptionThis book will help you get up and running with Microsoft 365 Defender and help you use the whole suite effectively.
Create simple to advanced shell scripts and enhance your system functionality with effective recipesKey FeaturesAutomate tedious and repetitive tasksCreate several novel applications ranging from a simple IRC logger to a Web ScraperManage your system efficiently by becoming a seasoned Bash userBook DescriptionIn Linux, one of the most commonly used and most powerful tools is the Bash shell.
This book constitutes the refereed proceedings of the 4th International Conference on Tools and Methods for Program Analysis, TMPA 2017, Moscow, Russia, March 3-4, 2017.
Blockchain and distributed-ledger technologies enable new modes of communication, synchronization, and transfer of value with a broad impact on Internet of Things (IoT), Data Science, society, industry, commerce, and government.
This book constitutes the refereed proceedings of the 10th International Symposium on Search-Based Software Engineering, SSBSE 2018, held in Montpellier, France, in September 2018.
This book constitutes revised selected papers from 10 workshops that were held as the ISC High Performance 2017 conference in Frankfurt, Germany, in June 2017.
This book constitutes the refereed proceedings of the 21st International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2019, held in Pisa, Italy, in October 2019.
This book constitutes revised selected papers from the 10th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2019, held in Darmstadt, Germany, in April 2019.
This book constitutes extended, revised and selected papers from the 9th International Conference on Cloud Computing and Services Science, CLOSER 2019, held in Heraklion, Greece, in May 2019.
Make the most out of your investment in Office 365 apps and services with this Microsoft Office cookbookKey FeaturesLearn how to manage and secure the entire Office 365 stack in addition to specific servicesDelve into newer and frequently shifting areas such as Power Platform, Microsoft Teams, and Microsoft Search administrationDiscover carefully selected techniques that cover a range of administrative tasks of varying difficulty levelsBook DescriptionOrganizations across the world have switched to Office 365 to boost workplace productivity.