Descargar Libros y Ebooks (PDF / EPUB)

La mejor selección de ebooks gratis en español

Busca tu ebook....

Hemos encontrado un total de 38 libros disponibles para descargar
Information, Communication and Computing Technology

Information, Communication and Computing Technology

Autor: Costin Badica , Panos Liatsis , Latika Kharb , Deepak Chahal

Número de Páginas: 306

This book constitutes the refereed proceedings of the 5th International Conference on Information, Communication and Computing Technology, ICICCT 2020, held in New Delhi, India*, in May 2020. The 24 full papers and one short paper presented in this volume were carefully reviewed and selected from 220 submissions. The papers are organized in topical sections on data communication & networking; advanced computing using machine learning. *The conference was held virutally due to the COVID-19 pandemic.

Security with Intelligent Computing and Big-data Services

Security with Intelligent Computing and Big-data Services

Autor: Ching-nung Yang , Sheng-lung Peng , Lakhmi C. Jain

Número de Páginas: 933

This book presents the proceedings of the 2018 International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2018). With the proliferation of security with intelligent computing and big-data services, the issues of information security, big data, intelligent computing, blockchain technology, and network security have attracted a growing number of researchers. Discussing topics in areas including blockchain technology and applications; multimedia security; information processing; network, cloud and IoT security; cryptography and cryptosystems; as well as learning and intelligent computing and information hiding, the book provides a platform for researchers, engineers, academics and industrial professionals from around the globe to present their work in security-related areas. It not only introduces novel and interesting ideas, but also stimulates discussions and inspires new ideas.

Database Security X

Database Security X

Autor: Pierangela Samarati , Ravi Sandhu

Número de Páginas: 308

The purpose of this book is to discuss, in depth, the current state of research and practice in database security, to enable readers to expand their knowledge. The book brings together contributions from experts in the field throughout the world. Database security is still a key topic in mist businesses and in the public sector, having implications for the whole of society.

Computational Methods and Data Engineering

Computational Methods and Data Engineering

Autor: Vijendra Singh , Vijayan K. Asari , Sanjay Kumar , R. B. Patel

Número de Páginas: 559

This book gathers selected high-quality research papers from the International Conference on Computational Methods and Data Engineering (ICMDE 2020), held at SRM University, Sonipat, Delhi-NCR, India. Focusing on cutting-edge technologies and the most dynamic areas of computational intelligence and data engineering, the respective contributions address topics including collective intelligence, intelligent transportation systems, fuzzy systems, data privacy and security, data mining, data warehousing, big data analytics, cloud computing, natural language processing, swarm intelligence, and speech processing.

Advanced Information Technology, Services and Systems

Advanced Information Technology, Services and Systems

Autor: Mostafa Ezziyyani , Mohamed Bahaj , Faddoul Khoukhi

Número de Páginas: 522

This book includes the proceedings of the International Conference on Advanced Information Technology, Services and Systems (AIT2S-17) held on April 14–15, 2017 in Tangier, Morocco. Presenting the latest research in the field, it stimulates debate, discusses new challenges and provides insights into the field in order to promote closer interaction and interdisciplinary collaboration between researchers and practitioners. Intended for researchers and practitioners in advanced information technology/management and networking, the book is also of interest to those in emergent fields such as data science and analytics, big data, Internet of Things, smart networked systems, artificial intelligence and expert systems, pattern recognition, and cloud computing.

Cloud Computing and Security

Cloud Computing and Security

Autor: Xingming Sun , Zhaoqing Pan , Elisa Bertino

Número de Páginas: 738

This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics.

Advances in Cryptology – CRYPTO 2017

Advances in Cryptology – CRYPTO 2017

Autor: Jonathan Katz , Hovav Shacham

Número de Páginas: 738

The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.

Web Reasoning and Rule Systems

Web Reasoning and Rule Systems

Autor: Pascal Hitzler , Thomas Lukasiewicz

Número de Páginas: 269

Annotation. This book constitutes the refereed proceedings of the 4th InternationalConference on Web Reasoning and Rule Systems, RR 2010, held inBrixen-Bressanone, Italy, in September 2010. The 9 revised full papers, 6 revised short papers, and 4 poster paperspresented together with 1 PhD paper, 2 system descriptions and 3 invitedpapers were carefully reviewed and selected from 41 submissions. Thepapers address all current topics in Web reasoning, Web-based knowledge, and rule systems such as representation techniques; rules andontologies; reasoning languages; efficiency and benchmarking, ; ontologylanguages; querying and optimization; reasoning with uncertainty, underinconsistency, and with constraints; rule languages and systems; ruleinterchange formats and markup languages; scalability; approximatereasoning; statistical methods and symbolic reasoning; as well assemantic Web services modeling and applications.

Financial Cryptography and Data Security

Financial Cryptography and Data Security

Autor: Gene Tsudik

Número de Páginas: 337

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial Cryptography and Data Security, FC 2008, held in Cozumel, Mexico, in January 2008. The 16 revised full papers and 9 revised short papers presented together with 5 poster papers, 2 panel reports, and 1 invited lecture were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections on attacks and counter measures, protocols, theory, hardware, chips and tags, signatures and encryption, as well as anonymity and e-cash.

Reasoning Web. Semantic Technologies for the Web of Data

Reasoning Web. Semantic Technologies for the Web of Data

Autor: Axel Polleres , Claudia D'amato , Marcelo Arenas , Siegfried Handschuh , Paula Kroner , Sascha Ossowski , Peter F. Patel-schneider

Número de Páginas: 544

The Semantic Web aims at enriching the existing Web with meta-data and processing methods so as to provide web-based systems with advanced capabilities, in particular with context awareness and decision support. The objective of this book is to provide a coherent introduction to semantic web methods and research issues with a particular emphasis on reasoning. The 7th reasoning web Summer School, held in August 2011, focused on the central topic of applications of reasoning for the emerging “Web of Data”. The 12 chapters in the present book provide excellent educational material as well as a number of references for further reading. The book not only addresses students working in the area, but also those seeking an entry point to various topics related to reasoning over Web data.

Project Register

Project Register

Autor: United States. Federal Water Pollution Control Administration

Número de Páginas: 316
Topics in Cryptology -- CT-RSA 2005

Topics in Cryptology -- CT-RSA 2005

Autor: Alfred John Menezes

Número de Páginas: 393

This book constitutes the refereed proceedings of the Cryptographers Track at the RSA Conference 2005, CT-RSA 2005, held in San Francisco, CA, USA in February 2005. The 23 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 74 submissions. The papers are organized in topical sections on cryptanalysis, public key encryption, signature schemes, design principles, password-based protocols, pairings, and efficient and secure implementations.

Seguridad en Unix y redes. Versión 2.1′

Seguridad en Unix y redes. Versión 2.1′

Autor: Antonio Villalón Huerta

Número de Páginas: 664

En julio del año 2000 se publicó, como adaptación del Proyecto Final de Carrera del autor, la primera versión de este trabajo. Como celebración del vigésimo aniversario se edita en formato papel “Seguridad en Unix y redes”, respetando al máximo la versión 2.1 del documento –apenas con cambios de formato, y no todos los necesarios– y confiando en que sea de interés, al menos, para los amantes del retrocomputing. Tal y como se indicaba en la versión 1.0, hace ya veinte años, este trabajo se publicó sin ánimo de lucro y así se va a mantener; se puede seguir descargando gratuitamente desde Internet. En el caso de la edición impresa, como este ejemplar que tienes en tus manos, el autor ha renunciado a cualquier tipo de remuneración por derechos de autor en favor de UNICEF.

MFDBS 89

MFDBS 89

Número de Páginas: 442

"This volume is a collection of the most important contributions presented at the second MFDBS conference held in Visegrád, Hungary, June 26-30, 1989. The papers selected from more than one hundred submissions, originating from 23 countries in 4 continents, can be roughly divided into the following sections: theoretical fundamentals of relational databases, logical foundations and databases, data modelling, database design, deductive databases, transaction management and security, concurrency control and distributed databases. The volume reflects the current state of knowledge and is a guide to further development in database theory."--Publisher's website.

Die Erfassung der langfristigen Absatzmöglichkeiten mit Hilfe des Lebenszyklus eines Produktes

Die Erfassung der langfristigen Absatzmöglichkeiten mit Hilfe des Lebenszyklus eines Produktes

Autor: Badi H. Baltagi

Número de Páginas: 396

The present book is a collection of panel data papers, both theoretical and applied. Theoretical topics include methodology papers on panel data probit models, treatment models, error component models with an ARMA process on the time specific effects, asymptotic tests for poolability and their bootstrapped versions, confidence intervals for a doubly heteroskedastic stochastic production frontiers, estimation of semiparametric dynamic panel data models and review of survey attrition and nonresponse in the European Community Household Panel. Applications include the impact of uncertainty on UK investment, a Tobin-q investment model using US firm data, technical change in the Japanese chemical industry, cost efficiency of Spanish banks, the problem of immigrant integration in Canada, an analysis of the dynamics of individual health in the UK, the relationship between inflation and growth among OECD and APEC countries, modeling corner solutions in the industrial energy demand in the pulp and paper sector in France, technical efficiency of cereal farms in England, employment-supported training in Canada, earnings trends across skill groups and industries in West Germany, employment...

Departments of Labor and Health, Education, and Welfare Appropriations for 1963, Hearing ... 87th Congress, 2d Session: Department of Health, Education, and Welfare

Departments of Labor and Health, Education, and Welfare Appropriations for 1963, Hearing ... 87th Congress, 2d Session: Department of Health, Education, and Welfare

Autor: United States. Congress. House. Appropriations

Número de Páginas: 2116
CCSP: Securing Cisco IOS Networks Study Guide

CCSP: Securing Cisco IOS Networks Study Guide

Autor: Todd Lammle , Carl Timm

Número de Páginas: 439

Here's the book you need to prepare for Exam 642-501, Securing Cisco IOS Networks (SECUR). This Study Guide provides: In-depth coverage of every SECUR exam objective Practical information on Cisco security solutions Hundreds of challenging practice questions, in the book and on the CD Leading-edge exam preparation software, including a testing engine, and electronic flashcards Authoritative coverage of all exam objectives, including: Basic Cisco Router Security Advanced AAA Security for Cisco Router Networks Cisco Router Threat Mitigation Cisco IOS Firewall CBAC Configuration Cisco IOS Firewall Authentication Proxy Configuration Cisco IOS Firewall IDS Configuration Building Basic IPSec Using Cisco Routers Building Advanced IPSec VPNs Using Cisco Routers and Certificate Authorities Configuring Cisco Remote Access IPSec VPNs Managing Enterprise VPN Routers Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

El español en El Barrio de Nueva York

El español en El Barrio de Nueva York

Autor: Heliodoro Javier Gutiérrez González

Número de Páginas: 468
Applied Cryptography in Computer and Communications

Applied Cryptography in Computer and Communications

Autor: Jingqiang Lin , Qiang Tang

Número de Páginas: 229

This book constitutes the refereed post-conference proceedings of the Second International Conference on Applied Cryptography in Computer and Communications, AC3 2022, held May 14-15, 2022 and due to COVID-19 pandemic virtually. The 12 revised full papers and 2 short papers were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: quantum-safe cryptographic solution; applied cryptography for IoT; authentication protocol; real-world applied cryptography; network attack and defense; security application.

Digital Twin, Blockchain, and Sensor Networks in the Healthy and Mobile City

Digital Twin, Blockchain, and Sensor Networks in the Healthy and Mobile City

Autor: Tuan Anh Nguyen

Número de Páginas: 618

In smart cities, information and communication technologies are integrated to exchange real-time data between citizens, governments, and organizations. Blockchain provides security for communication and transactions between multiple stakeholders. Digital twin refers to a simulation of physical products in a virtual space. This simulation fully utilizes the physical models, wireless sensor networks, and historical data of city operation to integrate big information (digital twin cities) under multidiscipline, multiphysical quantities, multiscale, and multiprobability.Digital Twin, Blockchain, and Sensor Networks in the Healthy and Mobile City explores how digital twins and blockchain can be used in smart cities. Part 1 deals with their promising applications for healthy cities. Part 2 covers other promising applications and current perspectives of blockchain and digital twins for future smart society and smart city mobility. Together with its companion volume, Digital Twin and Blockchain for Sensor Networks in Smart Cities, this book helps to understand the vast amount of data around the city to encourage happy, healthy, safe, and productive lives.• Describes the fundamentals of...

The Grammar of Thinking

The Grammar of Thinking

Autor: Daniela E. Casartelli , Silvio Cruschina , Pekka Posio , Stef Spronck

Número de Páginas: 274

Sentence (1) represents the phenomenon of reported thought, (2) that of reported speech: (1) Sasha thought: "This is fine" or Sasha thought that this would be fine (2) Sasha said: "This is fine" or Sasha said that this would be fine While sentences as in (1) have often been discussed in the context of those in (2) the former have rarely received specific attention. This has meant that much of the semantic and structural complexity, cross-linguistic variation, as well as the precise relation between (1) and (2) and related phenomena have remained unstudied. Addressing this gap, this volume represents the first collection of studies specifically dedicated to reported thought. It introduces a wide variety of cross-linguistic examples of the phenomenon and brings together authors from linguistic typology, corpus and interactional linguistics, and formal and functional theories of syntax to shed light on how talking about thoughts can become grammar in the languages of the world. The book should be of interest to linguists, philosophers of language, linguistic anthropologists and communication specialists seeking to understand topics at the boundary of stylistics and morphosyntax, as...

Some Fundamentals of Mathematics of Blockchain

Some Fundamentals of Mathematics of Blockchain

Autor: Julien Riposo

Número de Páginas: 155

This book provides a foundation for the mathematics of blockchain. It is inspired by a general analysis and synthesis of the current knowledge of blockchain technology and starts by laying a foundation for the mathematics of blockchain. The aim is for research in the area of blockchain to lead their study from the construction highlighted in this book. First, the basis of a blockchain is set: block, transaction contents, block header, Merkle tree, nonce, Proof-of-Work. Connections with elliptic curves and cryptographic signatures are made. Second, the book ties this with a Graph and Matrix Theories approach and models the peer-to-peer relationship through the Bitcoin Network. Third, it is proposed further modelling, notably around halving, optimal storing, or diffusion of information, which are consequences of the mathematical foundation. The notion of Entropy of Privacy and the Particles model are introduced. Finally, the mathematical statements therein are proven and essential reminders can be found before each section, so the content can be accessible from a graduate level.

Trusted Computing

Trusted Computing

Autor: Dengguo Feng

Número de Páginas: 314

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Information Computing and Applications

Information Computing and Applications

Autor: Baoxiang Liu , Maode Ma , Jincai Chang

Número de Páginas: 800

This book constitutes the refereed proceedings of the Third International Conference on Information Computing and Applications, ICICA 2012, held in Chengde, China, in September 2012. The 100 revised full papers were carefully reviewed and selected from 1089 submissions. The papers are organized in topical sections on internet computing and applications, multimedia networking and computing, intelligent computing and applications, computational statistics and applications, cloud and evolutionary computing, computer engineering and applications, knowledge management and applications, communication technology and applications.

Sicherheitsmanagement in TCP/IP-Netzen

Sicherheitsmanagement in TCP/IP-Netzen

Autor: Kai Martius

Número de Páginas: 241

Sicherheitsaspekte spielen bei der Nutzung des Internet als Plattform für E-Commerce eine entscheidende Rolle. Welche Sicherheitsprobleme sind heute mit welcher Technologie lösbar? Das Buch hilft, die dafür relevanten Entwicklungen und Produkte einordnen und bewerten zu können. Es werden sowohl die aktuell eingesetzten Protokolle und Dienste wie auch herkömmliche Firewallsysteme untersucht und bewertet. Darüberhinaus werden neue Entwicklungen der IETF, wie SSL, S-HTTP, Secure Shell, besonders aber IPSec und das zugehörige Key Management Protokoll IKE vorgestellt. Im letzten Teil des Buches wird aufbauend auf den vorhandenen Technologien ein universelles Key- und Policy-Management für komplexe Netzstrukturen entwickelt, mit dem z.B. erstmals sichere Paketfilter realisierbar sind. Alle Teile des Buches sind mit praxisnahen Beispielanwendungen hinterlegt, um dem Leser konkrete Lösungsvorschläge für häufig vorkommende Sicherheitsanforderungen aufzuzeigen.

Testing Software and Systems

Testing Software and Systems

Autor: Nina Yevtushenko , Ana Rosa Cavalli , Hüsnü Yenigün

Número de Páginas: 344

This book constitutes the refereed proceedings of the 29th IFIP WG 6.1 International Conference on Testing Software and Systems ICTSS 2017, held in St. Petersburg, Russia, in October 2017. The 18 full papers and 4 short papers presented were carefully reviewed and selected from 41 submissions. The topics of the volume cover model based testing; test derivation and monitoring; fault localization and system testing including real time systems.

e-Business and Telecommunication Networks

e-Business and Telecommunication Networks

Autor: João Ascenso , Luminita Vasiu , Carlos Belo , Mónica Saramago

Número de Páginas: 289

This book contains the best papers of the First International Conference on e-Business and Telecommunication Networks held in 2004. The book presents recent research on e-business and telecommunication networks. It includes analyses aspects of global communication information systems and services, and describes security and reliability problems and solutions in information systems and networks.

Public Key Cryptography -- PKC 2012

Public Key Cryptography -- PKC 2012

Autor: Marc Fischlin , Johannes Buchmann , Mark Manulis

Número de Páginas: 746

This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes.

SQL Server 2000 Database Design

SQL Server 2000 Database Design

Autor: Thomas Moore

Número de Páginas: 936

The complete solution to mastering the SQL Server 2000 exam, 70-229. Organized according to the actual exam objectives, this "Training Guide" features pedagogy that provides readers with the most effective learning tools in the marketplace with acclaimed Exam Gear software--enhancing readers' learning experience by providing them with test simulation, study cards, and flash cards.

Blockchain and Applications

Blockchain and Applications

Autor: Javier Prieto , Ashok Kumar Das , Stefano Ferretti , António Pinto , Juan Manuel Corchado

Número de Páginas: 193

This book gathers the refereed proceedings of the 1st International Congress on Blockchain and Applications 2019, BLOCKCHAIN’19, held in Ávila, Spain, in June 2019. Among the scientific community, blockchain and artificial intelligence are broadly considered to offer a promising combination that could transform the production and manufacturing industry, media, finance, insurance, e-government, etc. Nevertheless, there is no generally accepted approach, nor established best practices, for combining blockchain and artificial intelligence. The 21 papers presented here were carefully reviewed and selected from over 40 submissions. They highlight the latest advances in blockchain, artificial intelligence and their application domains, exploring innovative ideas, guidelines, theories, models, technologies, and tools, and identifying critical issues and challenges that researchers and practitioners will face in the near future. We wish to thank the sponsors: IEEE Systems Man and Cybernetics Society, Spain Section Chapter, and the IEEE Spain Section (Technical Co-Sponsor), IBM, Indra, Viewnext, Global Exchange, AEPIA, APPIA and AIR institute.

Computer Security - ESORICS 2008

Computer Security - ESORICS 2008

Autor: Sushil Jajodia

Número de Páginas: 613

These proceedings contain the papers selected for presentation at the 13th European Symposium on Research in Computer Security––ESORICS 2008––held October 6–8, 2008 in Torremolinos (Malaga), Spain, and hosted by the University of Malaga, C- puter Science Department. ESORICS has become the European research event in computer security. The symposium started in 1990 and has been organized on alternate years in different European countries. From 2002 it has taken place yearly. It attracts an international audience from both the academic and industrial communities. In response to the call for papers, 168 papers were submitted to the symposium. These papers were evaluated on the basis of their significance, novelty, and technical quality. Each paper was reviewed by at least three members of the Program Comm- tee. The Program Committee meeting was held electronically, holding intensive d- cussion over a period of two weeks. Finally, 37 papers were selected for presentation at the symposium, giving an acceptance rate of 22%.

Runtime Verification

Runtime Verification

Autor: Jyotirmoy Deshmukh , Dejan Ničković

Número de Páginas: 546

This book constitutes the refereed proceedings of the 20th International Conference on Runtime Verification, RV 2020, held in Los Angeles, CA, USA, in October 2020. The conference was held virtually due to the COVID-19 pandemic. The 14 regular papers and 2 short papers presented in this book were carefully reviewed and selected from 43 submissions. Also included are an invited paper, 5 tutorial papers, 6 tool papers, and a benchmark paper. The RV conference is concerned with all aspects of monitoring and analysis of hardware, software and more general system executions. The papers are organized in the following topical sections: runtime verification for autonomy; runtime verification for software; runtime verification with temporal logic specifications; stream-based monitoring; and runtime verification for cyber-physical systems.

E-Business and Telecommunications

E-Business and Telecommunications

Autor: Pierangela Samarati , Marten Van Sinderen , Sabrina De Capitani Di Vimercati , Fons Wijnhoven

Número de Páginas: 422

The present book includes extended and revised versions of a set of selected papers presented at the 18th International Joint Conference on e-Business and Telecommunications, ICETE 2021, held as an online web-based event (due to the COVID-19 pandemic) in July 2021. The 17 full papers included in this book were carefully reviewed and selected from 197 submissions. They were organized in topical sections as follows: e-Business and security and cryptography.

Digital Signatures

Digital Signatures

Autor: Jonathan Katz

Número de Páginas: 199

As a beginning graduate student, I recall being frustrated by a general lack of acces sible sources from which I could learn about (theoretical) cryptography. I remember wondering: why aren’t there more books presenting the basics of cryptography at an introductory level? Jumping ahead almost a decade later, as a faculty member my graduate students now ask me: what is the best resource for learning about (various topics in) cryptography? This monograph is intended to serve as an answer to these 1 questions — at least with regard to digital signature schemes. Given the above motivation, this book has been written with a beginninggraduate student in mind: a student who is potentially interested in doing research in the ?eld of cryptography, and who has taken an introductory course on the subject, but is not sure where to turn next. Though intended primarily for that audience, I hope that advanced graduate students and researchers will ?nd the book useful as well. In addition to covering various constructions of digital signature schemes in a uni?ed framework, this text also serves as a compendium of various “folklore” results that are, perhaps, not as well known as they...

Formal Aspects of Component Software

Formal Aspects of Component Software

Autor: Gwen Salaün , Anton Wijs

Número de Páginas: 182

This book constitutes the thoroughly revised selected papers from the 17th International Symposium, FACS 2021, which was hel virtually in October 2021. The 7 full papers and 1 short contribution were carefully reviewed and selected from 16 submissions and are presented in the volume together with 1 invited paper. FACS 2021 is concerned with how formal methods can be applied to component-based software and system development. The book is subdivided into two blocks: Modelling & Composition and Verification. Chapter "A Linear Parallel Algorithm to Compute Bisimulation and Relational Coarsest Partitions" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Essential System Administration

Essential System Administration

Autor: Æleen Frisch

Número de Páginas: 1179

Essential System Administration,3rd Edition is the definitive guide for Unix system administration, covering all the fundamental and essential tasks required to run such divergent Unix systems as AIX, FreeBSD, HP-UX, Linux, Solaris, Tru64 and more. Essential System Administration provides a clear, concise, practical guide to the real-world issues that anyone responsible for a Unix system faces daily.The new edition of this indispensable reference has been fully updated for all the latest operating systems. Even more importantly, it has been extensively revised and expanded to consider the current system administrative topics that administrators need most. Essential System Administration,3rd Edition covers: DHCP, USB devices, the latest automation tools, SNMP and network management, LDAP, PAM, and recent security tools and techniques.Essential System Administration is comprehensive. But what has made this book the guide system administrators turn to over and over again is not just the sheer volume of valuable information it provides, but the clear, useful way the information is presented. It discusses the underlying higher-level concepts, but it also provides the details of the...

Últimos libros y autores buscados