Browse Results

Showing 2,001 through 2,025 of 53,393 results

Versionskontrolle mit Subversion

by C. Michael Pilato Brian W. Fitzpatrick Ben Collins-Sussman

Ganz klar: Das Schöne am Open Source-Code ist natürlich der freie Zugriff auf ihn, doch gerade deshalb will die Code-Entwicklung besonders gut organisiert sein. Versionskontrollsysteme ermöglichen es jedem Projektmitglied, zunächst unabhängig zu arbeiten und seine Änderungen am Quellcode dann in ein Repository einzufügen, mit dem die unterschiedlichen Versionen überwacht und verwaltet werden. Intelligente Verwaltung mit Subversion Wer bei Software-Projekten bisher das bewährte CVS benutzt hat, dem steht mit Subversion eine stabilere und flexiblere Alternative zur Verfügung. Versionskontrolle mit Subversion, geschrieben von Mitgliedern des Subversion-Entwicklerteams, stellt dieses mächtige Open Source-Tool vor und beschreibt, wie Sie es fachgerecht installieren und konfigurieren. Die Autoren zeigen Ihnen, wie Sie durch die intelligente Verwaltung und Dokumentation mit Subversion Konflikte und Datenverlust vermeiden können. Für Programmierer und für Systemadministratoren Das Buch eignet sich für Leser mit ganz unterschiedlichem Hintergrundwissen: Sowohl Programmierer ohne Kenntnisse der Versionskontrolle als auch erfahrene Systemadministratoren kommen hier auf ihre Kosten. Und CVS-Kennern wird mit diesem Buch ein problemloser Wechsel zu Subversion ermöglicht.

Version Control with Subversion

by Ben Collins-Sussman C. Michael Pilato Brian W. Fitzpatrick

Written by members of the development team that maintains Subversion, this is the official guide and reference manual for the popular open source revision control technology. The new edition covers Subversion 1.5 with a complete introduction and guided tour of its capabilities, along with best practice recommendations.Version Control with Subversion is useful for people from a wide variety of backgrounds, from those with no previous version control experience to experienced system administrators. Subversion is the perfect tool to track individual changes when several people collaborate on documentation or, particularly, software development projects. As a more powerful and flexible successor to the CVS revision control system, Subversion makes life so much simpler, allowing each team member to work separately and then merge source code changes into a single repository that keeps a record of each separate version. Inside the updated edition Version Control with Subversion, you'll find: An introduction to Subversion and basic concepts behind version control A guided tour of the capabilities and structure of Subversion 1.5 Guidelines for installing and configuring Subversion to manage programming, documentation, or any other team-based project Detailed coverage of complex topics such as branching and repository administration Advanced features such as properties, externals, and access control A guide to best practices Complete Subversion reference and troubleshooting guide If you've never used version control, you'll find everything you need to get started. And if you're a seasoned CVS pro, this book will help you make a painless leap into Subversion.

Version Control with Git

by Jon Loeliger

Version Control with Git takes you step-by-step through ways to track, merge, and manage software projects, using this highly flexible, open source version control system. Git permits virtually an infinite variety of methods for development and collaboration. Created by Linus Torvalds to manage development of the Linux kernel, it's become the principal tool for distributed version control. But Git's flexibility also means that some users don't understand how to use it to their best advantage. Version Control with Git offers tutorials on the most effective ways to use it, as well as friendly yet rigorous advice to help you navigate Git's many functions. With this book, you will: Learn how to use Git in several real-world development environments Gain insight into Git's common-use cases, initial tasks, and basic functions Understand how to use Git for both centralized and distributed version control Use Git to manage patches, diffs, merges, and conflicts Acquire advanced techniques such as rebasing, hooks, and ways to handle submodules (subprojects) Learn how to use Git with Subversion Git has earned the respect of developers around the world. Find out how you can benefit from this amazing tool with Version Control with Git.

Version Control with Git

by Jon Loeliger Prem Kumar Ponuthorai

Track, branch, merge, and manage code revisions with Git, the free and open source distributed version control system. Through a series of step-by-step tutorials, this practical guide quickly takes you from Git fundamentals to advanced techniques, and provides friendly yet rigorous advice for navigating Git's many functions. You'll learn how to work with everything from small to very large projects with speed and efficiency.In this third edition, authors Prem Kumar Ponuthorai and Jon Loeliger break down Git concepts using a modular approach. You'll start with the basics and fundamental philosophy of Git, followed by intermediate commands to help you efficiently supplement your daily development workflow. Finally, you'll learn advanced Git commands and concepts to understand how Git works under the hood.Learn how to use Git for real-world development scenariosGain insight into Git's common use cases, initial tasks, and basic functionsUse the system for distributed version controlLearn how to manage merges, conflicts, patches, and diffsApply advanced techniques such as rebasing, hooks, and ways to handle submodules

Version Control with Git: Powerful tools and techniques for collaborative software development (Oreilly And Associate Ser.)

by Matthew Mccullough Jon Loeliger

<p>Get up to speed on Git for tracking, branching, merging, and managing code revisions. Through a series of step-by-step tutorials, this practical guide takes you quickly from Git fundamentals to advanced techniques, and provides friendly yet rigorous advice for navigating the many functions of this open source version control system.</p>

Verschlüsseln, Signieren, Angreifen: Eine kompakte Einführung in die Kryptografie

by Olaf Manz

Dieses Buch erläutert kompakt, ohne theoretischen Überbau und mit möglichst wenig mathematischem Formalismus die wesentlichen Konzepte bei der Verschlüsselung schützenswerter Nachrichten und Daten. Hierbei liegt der Fokus auf der Beschreibung der historisch und für die Praxis wichtigen Chiffrier-, Signatur- und Authentifikationsverfahren. Dabei wird sowohl auf symmetrische Verschlüsselungen als auch auf Public-Key-Chiffren eingegangen. Angesprochen werden jeweils auch die Strategien, mit deren Hilfe man Verschlüsselungen angreift und zu „knacken“ versucht. Besonderer Wert gelegt wird auf die Darstellung des praktischen Einsatzes von Chiffren, insbesondere im alltäglichen Umfeld. Das Buch eignet sich für Arbeitsgruppen an MINT-Schulen und die MINT-Lehrerfortbildung, für Einführungskurse an Hochschulen wie auch für interessierte Schüler und Erwachsene.

Versatile Routing and Services with BGP

by Colin Bookham

Design a robust BGP control plane within a secure, scalable network for smoother services A robust Border Gateway Protocol setup is vital to ensuring reliable connectivity, an essential capability for any organization. The Internet has become a necessary, always-on service in homes and businesses, and BGP is the protocol that keeps communication flowing. But BGP also has become crucial to delivery of intra-domain business services. But the network is only as reliable as BGP, so service enablement depends upon making BGP more stable, reliable, and service-rich. Alcatel-Lucent Service Router Operating System is engineered to bear the load of the most demanding networks. The system features support for Symmetric Multiprocessing and unprecedented depth of advanced routing features, all within a single OS that's supported across the entire Alcatel-Lucent IP/MPLS router portfolio. Versatile Routing and Services with BGP provides guidance toward implementation of BGP within SR-OS, and details the use and control of each feature. The book provides in-depth coverage of topics such as: BGP/MPLS IP-VPN, VPLS, VPWS Labeled Unicast IPv4, reconvergence, and multicast Security, graceful restart and error handling IPv6 PE (6PE) and IPv6 extensions to BGP/MPLS IP-VPN A look at forthcoming features such as Ethernet VPN Basic BGP competency is assumed, but the book is accessible even to those with zero familiarity with Alcatel-Lucent's SR-OS. It underscores the idea that BGP is more than just service enablement, and can also be used for infrastructure layer transport - but both layers must be solid, scalable, and able to quickly reconverge. Versatile Routing and Services with BGP demonstrates the creation of a robust BGP control plane within a, secure network, allowing the delivery of flawless, uninterrupted service.

Versatile Cybersecurity (Advances in Information Security #72)

by Radha Poovendran Gaurav Somani Mauro Conti

Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates. A large number of advanced security books focus on either cryptography or system security which covers both information and network security. However, there is hardly any books available for advanced-level students and research scholars in security research to systematically study how the major attacks are studied, modeled, planned and combated by the community. This book aims to fill this gap. This book provides focused content related to specific attacks or attack families. These dedicated discussions in the form of individual chapters covers the application or area specific aspects, while discussing the placement of defense solutions to combat the attacks. It includes eight high quality chapters from established security research groups worldwide, which address important attacks from theoretical (modeling) as well as practical aspects. Each chapter brings together comprehensive and structured information on an attack or an attack family. The authors present crisp detailing on the state of the art with quality illustration of defense mechanisms and open research problems. This book also covers various important attacks families such as insider threats, semantics social engineering attacks, distributed denial of service attacks, botnet based attacks, cyber physical malware based attacks, cross-vm attacks, and IoT covert channel attacks. This book will serve the interests of cyber security enthusiasts, undergraduates, post-graduates, researchers and professionals working in this field.

Vermittlung von BIM in der Hochschullehre: Positionspapier des Arbeitskreises BIM im Baubetrieb des Fachausschusses Baubetrieb und Bauwirtschaft (essentials)

by Habeb Astour Mario Hanusrichter Henriette Strotmann

In Bezug auf das Bauwesen lässt sich Building Information Modeling (BIM) als ein wichtiger Impulsgeber für den stattfindenden Digitalisierungsprozess benennen. Studierende der baurelevanten Fachdisziplinen müssen daher auf den sicheren Umgang mit dieser Methode vorbereitet werden.Das vorliegende Positionspapier definiert die wichtigsten Lehrinhalte zur Vermittlung von Kenntnissen, Fertigkeiten und Kompetenzen im Bereich BIM, die an den deutschen Fachhochschulen in den Baustudiengängen Berücksichtigung finden sollten. Neben den allgemeinen BIM-Lehrinhalten behandelt das Positionspapier insbesondere die Anforderungen an BIM im Fachgebiet Baubetrieb.

Verkaufspsychologie im Online-Marketing: Wie Sie Kunden magisch anziehen

by Christian Tembrink

Kaufentscheidungen im Internet laufen selten rational ab: Auch online steuern Emotionen und unterbewusste Prozesse unsere Entscheidungsfindung, und häufig können wir nicht genau sagen, warum wir etwas gekauft haben. Dieses Buch erklärt kompakt und auf den Punkt, wie Unternehmen verkaufspsychologische Techniken im digitalen Marketing für sich nutzen und gewinnbringend anwenden können. Denn wer die unbewussten Wahrnehmungsprozesse seiner Kunden im Kern trifft, kann auch mit knappen Ressourcen gute Resultate erzielen und Umsätze erheblich steigern.Lernen Sie, wie Sie Emotionen ansprechen, damit Ihre digitalen Besucher zu echten, zufriedenen Befürwortern Ihrer Marke und Produkte werden. Lassen Sie sich von einer Kombination aus wissenschaftlichen Grundlagen und praktischen Beispielen inspirieren, um auch Ihre Web-Inhalte durch psychologische Strategien aufzuwerten – alles mit dem klaren Ziel: die digitale Kontaktqualität und den Erlebniswert Ihrer Inhalte zu maximieren.

Verilog HDL Design Examples

by Joseph Cavanagh

<p>The Verilog language provides a means to model a digital system at many levels of abstraction from a logic gate to a complex digital system to a mainframe computer. The purpose of this book is to present the Verilog language together with a wide variety of examples, so that the reader can gain a firm foundation in the design of the digital system using Verilog HDL. <p>The Verilog projects include the design module, the test bench module, and the outputs obtained from the simulator that illustrate the complete functional operation of the design. Where applicable, a detailed review of the theory of the topic is presented together with the logic design principles—including: state diagrams, Karnaugh maps, equations, and the logic diagram. Numerous examples and homework problems are included throughout. The examples include logical operations, counters of different moduli, half adders, full adders, a carry lookahead adder, array multipliers, different types of Moore and Mealy machines, and arithmetic logic units (ALUs).</p>

Verilog HDL: Digital Design and Modeling

by Joseph Cavanagh

<p>Emphasizing the detailed design of various Verilog projects, Verilog HDL: Digital Design and Modeling offers students a firm foundation on the subject matter. The textbook presents the complete Verilog language by describing different modeling constructs supported by Verilog and by providing numerous design examples and problems in each chapter. Examples include counters of different moduli, half adders, full adders, a carry lookahead adder, array multipliers, different types of Moore and Mealy machines, and much more. <p>The text also contains information on synchronous and asynchronous sequential machines, including pulse-mode asynchronous sequential machines. In addition, it provides descriptions of the design module, the test bench module, the outputs obtained from the simulator, and the waveforms obtained from the simulator illustrating the complete functional operation of the design. Where applicable, a detailed review of the topic's theory is presented together with logic design principles, including state diagrams, Karnaugh maps, equations, and the logic diagram. Verilog HDL: Digital Design and Modeling is a comprehensive, self-contained, and inclusive textbook that carries all designs through to completion, preparing students to thoroughly understand this popular hardware description language.</p>

Verifying Cyber-Physical Systems: A Path to Safe Autonomy (Cyber Physical Systems Series)

by Sayan Mitra

A graduate-level textbook that presents a unified mathematical framework for modeling and analyzing cyber-physical systems, with a strong focus on verification.Verification aims to establish whether a system meets a set of requirements. For such cyber-physical systems as driverless cars, autonomous spacecraft, and air-traffic management systems, verification is key to building safe systems with high levels of assurance. This graduate-level textbook presents a unified mathematical framework for modeling and analyzing cyber-physical systems, with a strong focus on verification. It distills the ideas and algorithms that have emerged from more than three decades of research and have led to the creation of industrial-scale modeling and verification techniques for cyber-physical systems.The book discusses such computer science concepts as undecidability and abstractions, alongside concepts from control theory including multiple Lyapunov functions and barrier certificates, all within a unified mathematical language. It explains algorithms for reachability analysis, counter-example guided abstraction refinement, and data-driven verification, as well as the key data structures that enable their effective implementation. Other topics include invariants, deductive verification, progress analysis, sensitivity analysis, simulation relations, fairness, model checking, satisfiability modulo theories, temporal logics, compositional reasoning, convergence analysis, asynchronous processes, and verification of black-box systems.The book provides more than twenty examples of cyber-physical verification, ranging from conceptual models to advanced driving-assist systems. Each chapter offers exercise problems; supporting materials, including slides, simulation code, additional exercises, and solutions are available on the book's website.

Verified Software. Theories, Tools, and Experiments

by Sandrine Blazy Marsha Chechik

This volume constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Verified Software: Theories, Tools and Experiments, VSTTE 2016, held in July 2016 in Toronto, ON, Canada. The 8 full papers together with 4 short papers and 5 invited papers presented were carefully revised and selected 21 submissions. The goal of the VSTTE conference is to advance the state of the art through the interaction of theory development, tool evolution, and experimental validation.

Verified Software. Theories, Tools, and Experiments: 11th International Conference, VSTTE 2019, New York City, NY, USA, July 13–14, 2019, Revised Selected Papers (Lecture Notes in Computer Science #12031)

by Supratik Chakraborty Jorge A. Navas

This volume constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Verified Software: Theories, Tools, and Experiments, VSTTE 2019, held in New York City, NY, USA, in July 2019.The 9 full papers presented were carefully revised and selected from 17 submissions. The papers describe large-scale verification efforts that involve collaboration, theory unification, tool integration, and formalized domain knowledge as well as novel experiments and case studies evaluating verification techniques and technologies.

Verified Software. Theories, Tools and Experiments.: 14th International Conference, VSTTE 2022, Trento, Italy, October 17–18, 2022, Revised Selected Papers (Lecture Notes in Computer Science #13800)

by Akash Lal Stefano Tonetta

This book constitutes the refereed proceedings of the 14th International Conference on Verified Software. Theories, Tools and Experiments, VSTTE 2022 held in Trento, Italy, during October 17–18, 2022.The 9 papers presented in this volume were carefully reviewed and selected from 20 submissions. The papers describe software verification efforts that involve collaboration, theory unification, tool integration, and formalized domain knowledge as well as novel experiments and case studies evaluating verification techniques and technologies.

Verified Software. Theories, Tools, and Experiments: 10th International Conference, VSTTE 2018, Oxford, UK, July 18–19, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11294)

by Ruzica Piskac Philipp Rümmer

This volume constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Verified Software: Theories, Tools, and Experiments, VSTTE 2018, held in Oxford, UK, in July 2018.The 19 full papers presented were carefully revised and selected from 24 submissions. The papers describe large-scale verification efforts that involve collaboration, theory unification, tool integration, and formalized domain knowledge as well as novel experiments and case studies evaluating verification techniques and technologies.

Verified Software: Theories, Tools and Experiments

by Dimitra Giannakopoulou Daniel Kroening

This volume constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Verified Software: Theories, Tools and Experiments, VSTTE 2014, held in July 2014 at the Vienna Summer of Logic in Vienna, Austria, as an associated event of CAV 2014, the International Conference on Computer-Aided Verification. The 17 revised full papers presented were carefully revised and selected from 34 submissions. The papers are organized in topical sections such as analysis: understanding and explanation; verification frameworks and applications; hypervisors and dynamic data structures; certification; real time and security.

Verified Software: Theories, Tools, and Experiments

by Sanjit A. Seshia Arie Gurfinkel

This volume constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Verified Software: Theories, Tools and Experiments, VSTTE 2015, held in July 2015 in San Francisco, CA, USA. The 12 revised full papers presented were carefully revised and selected from 25 submissions. The goal of this conference is to advance the state of the art in the science and technology of software verification, through the interaction of theory development, tool evolution, and experimental validation and large-scale verification efforts that involve collaboration, theory unification, tool integration, and formalized domain knowledge.

Verified: How to Think Straight, Get Duped Less, and Make Better Decisions about What to Believe Online

by Mike Caulfield Sam Wineburg

An indispensable guide for telling fact from fiction on the internet—often in less than 30 seconds. The internet brings information to our fingertips almost instantly. The result is that we often jump to thinking too fast, without taking a few moments to verify the source before engaging with a claim or viral piece of media. Information literacy expert Mike Caulfield and educational researcher Sam Wineburg are here to enable us to take a moment for due diligence with this informative, approachable guide to the internet. With this illustrated tool kit, you will learn to identify red flags, get quick context, and make better use of common websites like Google and Wikipedia that can help and hinder in equal measure. This how-to guide will teach you how to use the web to verify the web, quickly and efficiently, including how to • Verify news stories and other events in as little as thirty seconds (seriously) • Determine if the article you’re citing is by a reputable scholar or a quack • Detect the slippery tactics scammers use to make their sites look credible • Decide in a minute if that shocking video is truly shocking • Deduce who’s behind a site—even when its ownership is cleverly disguised • Uncover if that feature story is actually a piece planted by a foreign government • Use Wikipedia wisely to gain a foothold on new topics and leads for digging deeper And so much more. Building on techniques like SIFT and lateral reading, Verified will help students and anyone else looking to get a handle on the internet’s endless flood of information through quick, practical, and accessible steps.

Verification, Model Checking, and Abstract Interpretation: 21st International Conference, VMCAI 2020, New Orleans, LA, USA, January 16–21, 2020, Proceedings (Lecture Notes in Computer Science #11990)

by Dirk Beyer Damien Zufferey

This book constitutes the proceedings of the 21st International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2020. The 21 papers presented in this volume were carefully reviewed from 44 submissions. VMCAI provides a forum for researchers from the communities of verification, model checking, and abstract Interpretation, facilitating interaction, cross-fertilization, and advancement of hybrid methods that combine these and related areas.

Verification, Model Checking, and Abstract Interpretation: 25th International Conference, VMCAI 2024, London, United Kingdom, January 15–16, 2024, Proceedings, Part I (Lecture Notes in Computer Science #14499)

by Rayna Dimitrova Ori Lahav Sebastian Wolff

The two-volume set LNCS 14499 and 14500 constitutes the proceedings of the 25th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2024, which took place in London, Ontario, Canada, in January 2024. The 30 full papers presented in the proceedings were carefully reviewed and selected from 74 submissions. They were organized in topical sections as follows:Part I: Abstract interpretation; infinite-state systems; model checking and synthesis; SAT, SMT, and automated reasoning; Part II: Concurrency; neural networks; probabilistic and quantum programs; program and system verification; runtime verification; security and privacy.

Verification, Model Checking, and Abstract Interpretation: 25th International Conference, VMCAI 2024, London, United Kingdom, January 15–16, 2024, Proceedings, Part II (Lecture Notes in Computer Science #14500)

by Rayna Dimitrova Ori Lahav Sebastian Wolff

The two-volume set LNCS 14499 and 14500 constitutes the proceedings of the 25th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2024, which took place in London, Ontario, Canada, in January 2024. The 30 full papers presented in the proceedings were carefully reviewed and selected from 74 submissions. They were organized in topical sections as follows:Part I: Abstract interpretation; infinite-state systems; model checking and synthesis; SAT, SMT, and automated reasoning; Part II: Concurrency; neural networks; probabilistic and quantum programs; program and system verification; runtime verification; security and privacy;

Verification, Model Checking, and Abstract Interpretation: 24th International Conference, VMCAI 2023, Boston, MA, USA, January 16–17, 2023, Proceedings (Lecture Notes in Computer Science #13881)

by Cezara Dragoi Michael Emmi Jingbo Wang

This book constitutes the proceedings of the 24th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2023, which took place in Boston, USA, in January 2023. The 17 full papers presented in this book were carefully reviewed and selected from 34 submissions. The contributions deal with program verification, model checking, abstract interpretation, program synthesis, static analysis, type systems, deductive methods, decision procedures, theorem proving, program certification, debugging techniques, program transformation, optimization, and hybrid and cyber-physical systems.

Verification, Model Checking, and Abstract Interpretation: 20th International Conference, VMCAI 2019, Cascais, Portugal, January 13–15, 2019, Proceedings (Lecture Notes in Computer Science #11388)

by Constantin Enea Ruzica Piskac

This book constitutes the refereed proceedings of the 20th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2019, held in Cascais, Portugal, in January 2019.The 27 full papers presented together with the abstracts of 3 invited keynote talks were carefully reviewed and selected from 62 submissions. VMCAI provides topics including: program verification, model checking, abstract interpretation, program synthesis, static analysis, type systems, deductive methods, program certification, decision procedures, theorem proving, program certification, debugging techniques, program transformation, optimization, and hybrid and cyber-physical systems.

Refine Search

Showing 2,001 through 2,025 of 53,393 results