Browse Results

Showing 53,651 through 53,675 of 60,208 results

Squarespace 6 For Dummies

by Kris Black

Build your own blog, website, or portfolio with SquarespaceSquarespace lets you create visually rich web pages with any configuration of text, images, or blocks you wish, just by dragging and dropping. Even if you've been using earlier versions of Squarespace, the features in version 6 will amaze you - and bring you straight to this must-have guide for practical information! If you're a do-it-yourself website builder, get up to speed fast on all the next-generation Squarespace tools, including cool new features for mobile sites, SEO, social networks, and more. Brings you up to speed on Squarespace 6 and its revolutionary LayoutEngine tool for building visually-rich web pagesDeciphers the very latest features for page-building in today's markets, including mobile, social media, and using SEODelves into using auto-publish for social networks, using built-in mobile websites, syncing with social networks, gathering real-time statistics, managing your site from your smartphone or mobile device, and much moreCovers the essentials, such as using templates, drag-and-drop image uploads, image-editing with Aviary, and using Page Builder to create, share, and reblog contentBuild awesome, professional websites for your business in no time with Squarespace 6 For Dummies.

Squarespace For Dummies

by Josh Kill Kris Black

Discover how to build your own blog, website, or portfolio with Squarespace! Squarespace is a fast-growing all-in-one solution for creating and maintaining a blog, website, or portfolio that allows you to drag and drop various site elements and manage your finished product on the free Squarespace iPhone application. In this fun and friendly 224-page ebook, Squarespace For Dummies helps you discover the variety of modules to choose from, including blogs, maps, social network integration, HTML code blocks, photo galleries, and more. Packed with valuable information on how to maximize your website and the visitor experience, this guide offers tips for installing widgets, adding new widgets from third parties, and customization instructions. The author explains how Squarespace offers you the ability to use real-time visitor analytics, page rank tracking, and more. Examines the possibilities and potential of Squarespace, a publishing platform for building and maintaining a website Zeroes in on the various modules that you can choose from, including blogs, social network integration, photo galleries, and more Includes advice for getting the most out of your Squarespace website Squarespace For Dummies will get you started building your own website in no time!

Squeaky Clean Topology in Blender: Create accurate deformations and optimized geometry for characters and hard surface models

by Michael Steppig

A comprehensive introduction to 3D modeling, from the fundamental ideas of topology to in-depth examples that will help you take your projects to the next levelKey FeaturesOvercome complex topology problems while working through projectsLearn to topologize quad-based and non-quad-based meshes with step-by-step examplesOptimize your models by reducing the triangle count to improve performanceBook DescriptionThis book is an introduction to modeling and an in-depth look at topology in Blender, written by a Blender topology specialist with years of experience with the software. As you progress through its chapters, you'll conquer the basics of quad-based topology using triangles and Ngons, and learn best practices and things to avoid while modeling and retopologizing. The pages are full of illustrations and examples with in-depth explanations that showcase each step in an easy-to-follow format. Squeaky Clean Topology in Blender starts by introducing you to the user interface and navigation. It then goes through an overview of the modeling techniques and hotkeys that will be necessary to understand the examples. With the modeling basics out of the way, the next stop on our journey is topology. Working through projects like a character and a sci-fi blaster, the book will illustrate and work through complex topology problems, and present solutions to those problems. These examples focus on deforming character models, non-deforming hard surface models, and optimizing these models by reducing the triangle count. By the end of this book, you will be able to identify the general flow of a shape's topology, identify and solve issues in your topology, and come out with a model ready for UV unwrapping, materials, and rigging.What you will learnIdentify the general flow of a model's topology, and what might cause issuesUnderstand the topology of a character, and the joints that they make upHandle non-quad based topologyLay out your meshes for UV seamsExplore and use hotkeys to get things done fasterOptimize models for a reduced triangle countWho this book is forThis book is for character modelers, sculptors, poly modelers, and hard surface modelers. Whether you're looking for an introduction to modeling, optimizing high poly or sculpted models, or just a deeper dive into the subject of topology, this book will walk you through the topology workflow from beginning to end.

Squid: The Definitive Guide

by Duane Wessels

Squid is the most popular Web caching software in use today, and it works on a variety of platforms including Linux, FreeBSD, and Windows. Squid improves network performance by reducing the amount of bandwidth used when surfing the Web. It makes web pages load faster and can even reduce the load on your web server. By caching and reusing popular web content, Squid allows you to get by with smaller network connections. It also protects the host on your internal network by acting as a firewall and proxying your internal web traffic. You can use Squid to collect statistics about the traffic on your network, prevent users from visiting inappropriate web sites at work or school, ensure that only authorized users can surf the Internet, and enhance your privacy by filtering sensitive information from web requests. Companies, schools, libraries, and organizations that use web-caching proxies can look forward to a multitude of benefits.Written by Duane Wessels, the creator of Squid, Squid: The Definitive Guide will help you configure and tune Squid for your particular situation. Newcomers to Squid will learn how to download, compile, and install code. Seasoned users of Squid will be interested in the later chapters, which tackle advanced topics such as high-performance storage options, rewriting requests, HTTP server acceleration, monitoring, debugging, and troubleshooting Squid.Topics covered include:Compiling and installing SquidRunning SquidUsing Squid's sophisticated access controlsTuning disk storage for optimal performanceConfiguring your operating system for HTTP interceptionForwarding Requests to other web cachesUsing redirectors to rewrite user requestsMonitoring Squid with the cache manager and SNMPUsing Squid to accelerate and protect HTTP serversManaging bandwidth consumption with Delay Pools

Squid Proxy Server 3.1: Beginner's Guide

by Kulbir Saini

Part of Packt's Beginner's Guide Series, this book has lots of screenshots and step-by-step instructions to help you get to grips with the techniques as quickly as possible. Each chapter is dedicated to a different aspect of the Squid proxy server, so you will have a thorough understanding of how everything works and how it is connected by the end of the book. If you are a Linux or Unix system administrator and you want to enhance the performance of your network or you are a web developer and want to enhance the performance of your website, this book is for you. You are expected to have some basic knowledge of networking concepts, but may not have used caching systems or proxy servers before now.

SR Microsoft® Office Excel® 2010: 084576s3

by Element K

Microsoft® Office Excel® 2010: 084576s3 helps you possess some basic computer skills and are comfortable with using a computer to perform basic tasks. You may have used a calculator and paper to record data and per¬form calculations, and now want to migrate to using a computer application to store and process data in an electronic format. In this course, you will use Microsoft® Office Excel® 2010 to create spreadsheets that you can use to perform these tasks.

SR Microsoft® Office Word 2010: Level 1

by Element K

In this course, you will examine the basic concepts of creating a document, editing a document and enhancing a document and its contents by using the Microsoft® Office Word 2010 application.

SRE with Java Microservices: Patterns For Reliable Microservices In The Enterprise

by Jonathan Schneider

In a microservices architecture, the whole is indeed greater than the sum of its parts. But in practice, individual microservices can inadvertently impact others and alter the end user experience. Effective microservices architectures require standardization on an organizational level with the help of a platform engineering team.This practical book provides a series of progressive steps that platform engineers can apply technically and organizationally to achieve highly resilient Java applications. Author Jonathan Schneider covers many effective SRE practices from companies leading the way in microservices adoption. You’ll examine several patterns discovered through much trial and error in recent years, complete with Java code examples.Chapters are organized according to specific patterns, including:Application metrics: Monitoring for availability with MicrometerDebugging with observability: Logging and distributed tracing; failure injection testingCharting and alerting: Building effective charts; KPIs for Java microservicesSafe multicloud delivery: Spinnaker, deployment strategies, and automated canary analysisSource code observability: Dependency management, API utilization, and end-to-end asset inventoryTraffic management: Concurrency of systems; platform, gateway, and client-side load balancing

SRv6 Network Programming: Ushering in a New Era of IP Networks (Data Communication Series)

by Cheng Li Zhenbin Li Zhibo Hu

SRv6 Network Programming, beginning with the challenges for Internet Protocol version 6 (IPv6) network development, describes the background, roadmap design, and implementation of Segment Routing over IPv6 (SRv6), as well as the application of this technology in traditional and emerging services. The book begins with the development of IP technologies by focusing on the problems encountered during MPLS and IPv6 network development, giving readers insights into the problems tackled by SRv6 and the value of SRv6. It then goes on to explain SRv6 fundamentals, including SRv6 packet header design, the packet forwarding process, protocol extensions such as Interior Gateway Protocol (IGP), Border Gateway Protocol (BGP), and Path Computation Element Protocol (PCEP) extensions, and how SRv6 supports existing traffic engineering (TE), virtual private networks (VPN), and reliability requirements. Next, SRv6 network deployment is introduced, covering the evolution paths from existing networks to SRv6 networks, SRv6 network deployment processes, involved O&M technologies, and emerging 5G and cloud services supported by SRv6. Bit Index Explicit Replication IPv6 encapsulation (BIERv6), an SRv6 multicast technology, is then introduced as an important supplement to SRv6 unicast technology. The book concludes with a summary of the current status of the SRv6 industry and provides an outlook for new SRv6-based technologies. SRv6 Network Programming: Ushering in a New Era of IP Networks collects the research results of Huawei SRv6 experts and reflects the latest development direction of SRv6. With rich, clear, practical, and easy-to-understand content, the volume is intended for network planning engineers, technical support engineers and network administrators who need a grasp of the most cutting-edge IP network technology. It is also intended for communications network researchers in scientific research institutions and universities. Authors: Zhenbin Li is the Chief Protocol Expert of Huawei and member of the IETF IAB, responsible for IP protocol research and standards promotion at Huawei. Zhibo Hu is a Senior Huawei Expert in SR and IGP, responsible for SR and IGP planning and innovation. Cheng Li is a Huawei Senior Pre-research Engineer and IP standards representative, responsible for Huawei's SRv6 research and standardization.

SSA-based Compiler Design

by Fabrice Rastello Florent Bouchez Tichadou

This book provides readers with a single-source reference to static-single assignment(SSA)-based compiler design. It is the first (and up to now only) book that coversin a deep and comprehensive way how an optimizing compiler can be designed usingthe SSA form. After introducing vanilla SSA and its main properties, the authorsdescribe several compiler analyses and optimizations under this form. They illustratehow compiler design can be made simpler and more efficient, thanks to the SSA form.This book also serves as a valuable text/reference for lecturers, making the teaching ofcompilers simpler and more effective. Coverage also includes advanced topics, such ascode generation, aliasing, predication and more, making this book a valuable referencefor advanced students and practicing engineers.

SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide

by George Murphy

Fully updated Study Guide for the SSCP This guide prepares you for the SSCP, Systems Security Certified Practitioner certification examination by focusing on the Common Body of Knowledge (CBK) as determined by ISC2 in seven high level topics. This Sybex Study Guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world practice, access to the Sybex online interactive learning environment and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book you also get access to Sybex's superior online interactive learning environment that includes: 125 question practice exam to help you identify where you need to study more. Get more than 90 percent of the answers correct, you're ready to take the certification exam. More than 100 Electronic Flashcards to reinforce your learning and give you last minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Appendix of charts, tables, typical applications, and programs Coverage of all of the exam topics in the book means you'll be ready for: Access Controls Security Operations and Administration Risk Identification, Monitoring and Analysis Incident Response and Recovery Cryptography Network and Communications Security Systems and Application Security

SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide

by Alex Tatistcheff Todd Lammle John Gay

Up the ante on your Sourcefire IPS exam prep Securing Cisco Networks with Sourcefire IPS Study Guide, Exam 500-285 provides 100% coverage of the Securing Cisco Networks with Sourcefire IPS exam objectives. With clear and concise information regarding crucial security topics, this comprehensive guide includes practical examples and insights drawn from real-world experience, exam highlights, and end of chapter reviews. Learn key exam topics and powerful features of the Cisco Sourcefire System, including FireSIGHT technology, in-depth event analysis, IPS tuning and configuration, and snort rules language. Gain access to Sybex's superior online learning environment that includes practice questions, flashcards, and interactive glossary of terms. Use and configure next-generation Sourcefire technology, including application control, firewall, and routing and switching capabilities Understand how to accurately tune your systems to improve performance and network intelligence while leveraging powerful tools for more efficient event analysis Complete hands-on labs to reinforce key concepts and prepare you for the practical applications portion of the examination Access Sybex's online interactive learning environment and test bank, which includes an assessment test, chapter tests, bonus practice exam questions, electronic flashcards, and a searchable glossary Securing Cisco Networks with Sourcefire IPS Study Guide, Exam 500-285 provides you with the information you need to prepare for the Sourcefire IPS examination.

SSH, The Secure Shell: The Definitive Guide

by Daniel J. Barrett Richard Silverman

SSH (Secure Shell) is a popular, robust, TCP/IP-based product for network security and privacy, supporting strong encryption and authentication. This book covers Unix, Windows, and Macintosh implementations of SSH. It shows both system administrators and end users how to install, maintain, and troubleshoot SSH; configure servers and clients in simple and complex ways; apply SSH to practical problems; and protect other TCP applications through forwarding (tunneling).

SSH, The Secure Shell: The Definitive Guide

by Daniel J. Barrett Richard E. Silverman Robert G. Byrnes

Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution.How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration.Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks.No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.

SSH, the Secure Shell, 2nd Edition

by Daniel J. Barrett Robert G. Byrnes Richard Silverman

Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively. Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide . This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution. How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration. Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks. No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.

SSL VPN: Understanding, evaluating and planning secure, web-based remote access

by Joseph Steinberg

The book blends technically rigorous descriptions with a friendly approach based on practical examples and scenarios. The authors write in clear, informal language and make extensive use of diagrams and images. The book begins with an overview of SSL VPN?s purpose, and the technical and business trends that are making it popular today. It then looks at how SSL VPNs work and how they fit into existing network plans. The effect of SSL VPN on the wider business environment is then considered, before looking at how SSL VPN technology is likely to develop in the future. This book aimed at IT network professionals and managers who are currently evaluating SSL VPN technologies. It requires a broad understanding of networking concepts, but does not require specific and detailed technical knowledge of protocols or vendor implementations.

Stability Analysis and Controller Design of Local Model Networks

by Christian Mayr

This book treats various methods for stability analysis and controller design of local model networks (LMNs). LMNs have proved to be a powerful tool in nonlinear dynamic system identification. Their system architecture is more suitable for controller design compared to alternative approximation methods. The main advantage is that linear controller design methods can be, at least locally, applied and combined with nonlinear optimization to calibrate stable state feedback as well as PID controller. The calibration of stable state-feedback controllers is based on the closed loop stability analysis methods. Here, global LMIs (Linear Matrix Inequalities) can be derived and numerically solved. For LMN based nonlinear PID controllers deriving global LMIs is not possible. Thus, two approaches are treated in this book. The first approach works iteratively to get LMIs in each iteration step. The second approach uses a genetic algorithm to determine the PID controller parameters where for each individual the stability is checked. It allows simultaneous enhancement of (competing) optimization criteria.

Stability and Control of Large-Scale Dynamical Systems: A Vector Dissipative Systems Approach (Princeton Series in Applied Mathematics #41)

by Wassim M. Haddad Sergey G. Nersesov

Modern complex large-scale dynamical systems exist in virtually every aspect of science and engineering, and are associated with a wide variety of physical, technological, environmental, and social phenomena, including aerospace, power, communications, and network systems, to name just a few. This book develops a general stability analysis and control design framework for nonlinear large-scale interconnected dynamical systems, and presents the most complete treatment on vector Lyapunov function methods, vector dissipativity theory, and decentralized control architectures. Large-scale dynamical systems are strongly interconnected and consist of interacting subsystems exchanging matter, energy, or information with the environment. The sheer size, or dimensionality, of these systems necessitates decentralized analysis and control system synthesis methods for their analysis and design. Written in a theorem-proof format with examples to illustrate new concepts, this book addresses continuous-time, discrete-time, and hybrid large-scale systems. It develops finite-time stability and finite-time decentralized stabilization, thermodynamic modeling, maximum entropy control, and energy-based decentralized control. This book will interest applied mathematicians, dynamical systems theorists, control theorists, and engineers, and anyone seeking a fundamental and comprehensive understanding of large-scale interconnected dynamical systems and control.

Stability and Control Processes: Proceedings of the 4th International Conference Dedicated to the Memory of Professor Vladimir Zubov (Lecture Notes in Control and Information Sciences - Proceedings)

by Nikolay Smirnov Anna Golovkina

The proceedings of the 4th Stability and Control Processes Conference are focused on modern applied mathematics, stability theory, and control processes. The conference was held in recognition of the 90th birthday of Professor Vladimir Ivanovich Zubov (1930–2000).This selection of papers reflects the wide-ranging nature of V. I. Zubov’s work, which included contributions to the development of the qualitative theory of differential equations, the theory of rigid body motion, optimal control theory, and the theory of electromagnetic fields. It helps to advance many aspects of the theory of control systems, including questions of motion stability, nonlinear oscillations in control systems, navigation and reliability of control devices, vibration theory, and quantization of orbits. The disparate applications covered by the book – in mechanical systems, game theory, solid-state physics, socio-economic systems and medical and biological systems, control automata and navigation – are developments from Professor Zubov’s in-depth studies on the theory of stability of motion, the theory of automatic control and the theory of the motions of optimal processes. Stability and Control Processes presents research continuing the legacy of V. I. Zubov and updates it with sections focused on intelligence-based control. These proceedings will be of interest to academics, professionals working in industry and researchers alike.

Stability and Stable Oscillations in Discrete Time Systems

by null Aristide Halanay null Vladimir Rasvan

The expertise of a professional mathmatician and a theoretical engineer provides a fresh perspective of stability and stable oscillations. The current state of affairs in stability theory, absolute stability of control systems, and stable oscillations of both periodic and almost periodic discrete systems is presented, including many applications in

Stability and Synchronization Control of Stochastic Neural Networks

by Wuneng Zhou Jun Yang Liuwei Zhou Dongbing Tong

This book reports on the latest findings in the study of Stochastic Neural Networks (SNN). The book collects the novel model of the disturbance driven by Levy process, the research method of M-matrix, and the adaptive control method of the SNN in the context of stability and synchronization control. The book will be of interest to university researchers, graduate students in control science and engineering and neural networks who wish to learn the core principles, methods, algorithms and applications of SNN.

Stabilization and Control of Fractional Order Systems: A Sliding Mode Approach

by Bijnan Bandyopadhyay Shyam Kamal

In the last two decades fractional differential equations have been used more frequently in physics, signal processing, fluid mechanics, viscoelasticity, mathematical biology, electro chemistry and many others. It opens a new and more realistic way to capture memory dependent phenomena and irregularities inside the systems by using more sophisticated mathematical analysis. This monograph is based on the authors' work on stabilization and control design for continuous and discrete fractional order systems. The initial two chapters and some parts of the third chapter are written in tutorial fashion, presenting all the basic concepts of fractional order system and a brief overview of sliding mode control of fractional order systems. The other parts contain deal with robust finite time stability of fractional order systems, integral sliding mode control of fractional order systems, co-operative control of multi-agent systems modeled as fractional differential equation, robust stabilization of discrete fractional order systems, high performance control using soft variable structure control and contraction analysis by integer and fractional order infinitesimal variations.

Stabilization, Safety, and Security of Distributed Systems

by Borzoo Bonakdarpour Franck Petit

This book constitutes the refereed proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2009, held in Lyon, France, in November 2009. The 49 revised full papers and 14 brief announcements presented together with three invited talks were carefully reviewed and selected from 126 submissions. The papers address all safety and security-related aspects of self-stabilizing systems in various areas. The most topics related to self-* systems. The special topics were alternative systems and models, autonomic computational science, cloud computing, embedded systems, fault-tolerance in distributed systems / dependability, formal methods in distributed systems, grid computing, mobility and dynamic networks, multicore computing, peer-to-peer systems, self-organizing systems, sensor networks, stabilization, and system safety and security.

Stabilization, Safety, and Security of Distributed Systems: 22nd International Symposium, SSS 2020, Austin, TX, USA, November 18–21, 2020, Proceedings (Lecture Notes in Computer Science #12514)

by Stéphane Devismes Neeraj Mittal

This book constitutes the refereed proceedings of the 22nd International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2020, held in Austin, TX, USA, in November 2020.The 16 full papers, 7 short and 2 invited papers presented were carefully reviewed and selected from 44 submissions. The papers deal with the design and development of distributed systems with a focus on systems that are able to provide guarantees on their structure, performance, and/or security in the face of an adverse operational environment.

Stabilization, Safety, and Security of Distributed Systems: 24th International Symposium, SSS 2022, Clermont-Ferrand, France, November 15–17, 2022, Proceedings (Lecture Notes in Computer Science #13751)

by Stéphane Devismes Franck Petit Karine Altisen Giuseppe Antonio Di Luna Antonio Fernandez Anta

This book constitutes the proceedings of 24th International Symposium, SSS 2022, which took place in Clermont-Ferrand, France, in November 2022.The 17 regular papers together with 4 invited papers and 7 brief announcements, included in this volume were carefully reviewed and selected from 58 submissions. The SSS 2022 focus on systems built such that they are able to provide on their own guarantees on their structure, performance, and/or security in the face of an adverse environment. The Symposium presents three tracks reflecting major trends related to the conference: (i) Self-stabilizing Systems: Theory and Practice, (ii) Concurrent and Distributed Computing: Foundations, Faulttolerance, and Security, and (iii) Dynamic, Mobile, and Nature-Inspired Computing.

Refine Search

Showing 53,651 through 53,675 of 60,208 results