LEADER 02203oam 2200481Ka 450 001 9910260633603321 005 20190503073410.0 010 $a9780262255554$belectronic 010 $z9780262511414$bprint 035 $a(CKB)2670000000263541 035 $a(CaBNVSL)mat06267205 035 $a(IDAMS)0b000064818b417b 035 $a(IEEE)6267205 035 $a(OCoLC)827303966 035 $a(OCoLC-P)827303966 035 $a(MaCbMITP)1086 035 $a(PPN)258208856 035 $a(EXLCZ)992670000000263541 100 $a20130212d1986 uy 0 101 0 $aeng 135 $aur|n||||||||| 181 $2rdacontent 182 $2isbdmedia 183 $2rdacarrier 200 10$aActors $ea model of concurrent computation in distributed systems /$fGul A. Agha 210 $aCambridge, Mass. $cMIT Press$dİ1986 215 $a1 PDF (ix, 144 pages) 225 1 $aThe MIT Press series in artificial intelligence 311 $a0-262-25555-3 330 $aThe transition from sequential to parallel computation is an area of critical concern in today's computer technology, particularly in architecture, programming languages, systems, and artificial intelligence. This book addresses central issues in concurrency, and by producing both a syntactic definition and a denotational model of Hewitt's actor paradigm--a model of computation specifically aimed at constructing and analyzing distributed large-scale parallel systems--it substantially advances the understanding of parallel computation. ContentsIntroduction General Design Decisions Computation in ACTOR Systems A More Expressive Language A Model for ACTOR Systems Concurrency Issues Abstraction and Compositionality Conclusions 606 $aElectronic data processing$xDistributed processing 606 $aParallel processing (Electronic computers) 610 $aCOMPUTER SCIENCE/General 615 0$aElectronic data processing$xDistributed processing. 615 0$aParallel processing (Electronic computers) 676 $a004/.36 700 $aAgha$b Gul A$052060 801 0$bOCoLC-P 801 1$bOCoLC-P 906 $aBOOK 912 $a9910260633603321 996 $aActors$9335283 997 $aUNINA LEADER 06184nam 22008173u 450 001 9910962195803321 005 20251117090548.0 010 $a1-283-17720-X 010 $a9786613177209 010 $a1-118-11358-6 035 $a(CKB)2550000000040607 035 $a(EBL)693686 035 $a(OCoLC)747412540 035 $a(SSID)ssj0000541133 035 $a(PQKBManifestationID)11391003 035 $a(PQKBTitleCode)TC0000541133 035 $a(PQKBWorkID)10498608 035 $a(PQKB)10670831 035 $a(WaSeSS)Ind00025751 035 $a(MiAaPQ)EBC693686 035 $a(EXLCZ)992550000000040607 100 $a20130418d2011|||| u|| | 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity Administrator Street Smarts $eA Real World Guide to CompTIA Security+ Skills 205 $a3rd ed. 210 $aHoboken $cWiley$d2011 215 $a1 online resource (625 p.) 225 1 $aStreet smarts series 225 1 $aSybex serious skills 300 $aDescription based upon print version of record. 311 08$a1-118-06116-0 320 $aIncludes index. 327 $aCompTIA Discount Coupon; Security Administrator Street Smarts: A Real World Guide to CompTIA Security+TM Skills; Contents; Introduction; Phase 1: The Grunt Work of Security; Task 1.1: Performing an Initial Risk Assessment; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.2: Determining Which Security Policy Is Most Important; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.3: Establishing a User-Awareness Program; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.4: Reviewing a Physical-Security Checklist; Scenario; Scope of Task 327 $aProcedureCriteria for Completion; Task 1.5: Understanding the Value of Documents; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 2: Hardening Systems; Task 2.1: Managing Services; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.2: Managing Ports; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.3: Patching the Operating System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.4: Security Templates; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.5: Securing Autoruns; Scenario; Scope of Task 327 $aProcedureCriteria for Completion; Task 2.6: Securing Hardware Devices; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.7: Virtualization; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.8: Locking the Computer Using an Idle Time-out; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 3: Malicious Software; Task 3.1: Installing, Updating, and Running Antivirus Software; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.2: Using a Rootkit Checker; Scenario; Scope of Task; Procedure; Criteria for Completion 327 $aTask 3.3: AdwareScenario; Scope of Task; Procedure; Criteria for Completion; Task 3.4: Using a Spyware Checker; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.5: Malicious Software Removal Tool; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.6: McAfee Site Advisor; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.7: ARP Poisoning with Cain & Abel; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.8: Attacking Authentication with Firesheep; Scenario; Scope of Task; Procedure; Criteria for Completion 327 $aPhase 4: Secure StorageTask 4.1: The Encrypting File System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.2: EFS Data Recovery; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.3: Implementing Syskey; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.4: Converting FAT to NTFS; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.5: Implementing Disk Fault Tolerance with RAID; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.6: Backing Up Data; Scenario; Scope of Task; Procedure 327 $aCriteria for Completion 330 $aA step-by-step guide to the tasks involved in security administration If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience. In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide, 410 0$aSerious skills. 606 $aComputer networks --Security measures --Examinations --Study guides 606 $aComputer security --Examinations --Study guides 606 $aElectronic data processing personnel --Certification 606 $aElectronic data processing personnel$xCertification$vStudy guides 606 $aComputer security$xExaminations$vStudy guides 606 $aComputer networks$xExaminations$xSecurity measures 606 $aEngineering & Applied Sciences$2HILCC 606 $aComputer Science$2HILCC 615 4$aComputer networks --Security measures --Examinations --Study guides. 615 4$aComputer security --Examinations --Study guides. 615 4$aElectronic data processing personnel --Certification. 615 0$aElectronic data processing personnel$xCertification 615 0$aComputer security$xExaminations 615 0$aComputer networks$xExaminations$xSecurity measures. 615 7$aEngineering & Applied Sciences 615 7$aComputer Science 676 $a005.8 686 $aCOM055000$2bisacsh 700 $aMiller$b David R$01856645 701 $aGregg$b Michael$0884346 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910962195803321 996 $aSecurity Administrator Street Smarts$94456276 997 $aUNINA