The complexity of most real-time and embedded systems often exceeds that of other types of systems since, in addition to the usual spectrum of problems inherent in software, they need to deal with the complexities of the physical world.
As the number of processor cores and IP blocks integrated on a single chip is steadily growing, a systematic approach to design the communication infrastructure becomes necessary.
Replication Techniques in Distributed Systems organizes and surveys the spectrum of replication protocols and systems that achieve high availability by replicating entities in failure-prone distributed computing environments.
This book introduces the fundamental concepts and practical simulation te- niques for modeling different aspects of operating systems to study their g- eral behavior and their performance.
This book provides an overview of the X Window System focusing on characteristics that have significant impact on the development of both application programs and widgets.
This book covers the basic concepts and principles of operating systems, showing how to apply them to the design and implementation of complete operating systems for embedded and real-time systems.
Discover everything you want to know about web design in this easy to use guide, from the most essential tasks that you'll want to perform, to solving the most common problems you'll encounter.
Discover everything you want to know about building your first website in this easy-to-use guide; from the most essential tasks that you'll want to perform, to solving the most common problems you'll encounter.
This book explores the intersection of legal frameworks, healthcare innovation, and computational intelligence, shedding light on how emerging technologies like artificial intelligence (AI) and machine learning (ML) are reshaping the medical landscape.
This book explores the transformative potential of blockchain technology and shows how blockchain can promote equitable access to resources and bridge societal gaps.
Microsoft Windows 8 is designed to mesh users digital lives seamlessly-from desktop to phone to tablet-by utilizing a look and feel that give users a new Windows experience.
An introductory, tutorial style text covering the basics of UNIX and Linux for the complete beginner, this is a comprehensive and well written introduction to these operating systems.
Gain a firm practical understanding of how to secure your Linux system from intruders, malware attacks, and other cyber threatsPurchase of the print or Kindle book includes a free eBook in PDF format.
As computers become more and more integral to business and other organizational operations around the world, software design must increasingly meet the social demands of the workplace.
Distributed Computing by Mobile Entities is concerned with the study of the computational and complexity issues arising in systems of decentralized computational entities operating in a spatial universe Encompassing and modeling a large variety of application environments and systems, from robotic swarms to networks of mobile sensors, from software mobile agents in communication networks to crawlers and viruses on the web, the theoretical research in this area intersects distributed computing with the fields of computational geometry (especially for continuous spaces), control theory, graph theory and combinatorics (especially for discrete spaces).
Deploy functions efficiently using different cloud-based serverless offeringsKey FeaturesUnderstand the concept of Function-as-a-ServiceImplement Serverless solutions using AWS Lambda, Azure Functions and Google Cloud FunctionsPractical approach towards choosing the best tool for your serverless environmentBook DescriptionServerless applications and architectures are gaining momentum and are increasingly being used by companies of all sizes.
Best Practices, How-Tos, and Technical Deep Dives for Working VMware VI4/VI3 Pros Maximum vSphere is the comprehensive, up-to-the-minute, working reference for everyone who plans, implements, or administers VMware virtual infrastructure.
The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response.
Systems Performance, Second Edition, covers concepts, strategy, tools, and tuning for operating systems and applications, using Linux-based operating systems as the primary example.
Explore the world of systemd—yes, all lower-case, even at the beginning of a sentence— which is the modern replacement for init and SystemV init scripts.
This book builds on basic Python tutorials to explain various Python language features that aren't routinely covered: from reusable console scripts that play double duty as micro-services by leveraging entry points, to using asyncio efficiently to collate data from a large number of sources.
Building applications for Kubernetes is both a challenge and an opportunity-a challenge because the options and complexity to develop for Kubernetes are evolving rapidly, an opportunity because, if done right, your applications will go into production quicker, scale easier, and run smoother.
A comprehensive guide to securing your Linux system against cyberattacks and intrudersKey FeaturesDeliver a system that reduces the risk of being hackedExplore a variety of advanced Linux security techniques with the help of hands-on labsMaster the art of securing a Linux environment with this end-to-end practical guideBook DescriptionFrom creating networks and servers to automating the entire working environment, Linux has been extremely popular with system administrators for the last couple of decades.
Prepare for Microsoft Exam AZ-305 and help demonstrate your real-world expertise in designing cloud and hybrid solutions that run on Microsoft Azure, including identity, governance, monitoring, data storage, business continuity, and infrastructure.
Prepare for Microsoft Exam AZ-305 and help demonstrate your real-world expertise in designing cloud and hybrid solutions that run on Microsoft Azure, including identity, governance, monitoring, data storage, business continuity, and infrastructure.