No catches, no fine print just unadulterated book loving, with your favourite books saved to your own digital bookshelf.
New members get entered into our monthly draw to win £100 to spend in your local bookshop Plus lots lots more…Find out more
See below for a selection of the latest books from Storage media & peripherals category. Presented with a red border are the Storage media & peripherals books that have been lovingly read and reviewed by the experts at Lovereading. With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Storage media & peripherals books and those from many more genres to read that will keep you inspired and entertained. And it's all free!
An easy-to-follow guide for using Pro Tools HD 11 effectively.This book is ideal for anyone who already uses ProTools and wants to learn more, or is new to Pro Tools HD and wants to use it effectively in their own audio workstations.
Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This is a Packt Instant guide, which provides concise and clear recipes to create PLC programs using RSLogix 5000.The purpose of this book is to capture the core elements of PLC programming with RSLogix 5000 so that electricians, instrumentation techs, automation professionals, and students who are familiar with basic PLC programming techniques can come up to speed with a minimal investment of time and energy.
Das Buch bietet eine umfassende und aktuelle Darstellung der Konzepte und Techniken zur Implementierung von Datenbanksystemen. Ausgangspunkt ist ein hierarchisches Architekturmodell: Die Schichten dieses Modells ermoglichen es, den Systemaufbau, die Einordnung der bereitzustellenden Funktionen und ihr Zusammenspiel detailliert zu beschreiben. Es werden alle Aspekte der Datenabbildung mit den erforderlichen Algorithmen und Datenstrukturen behandelt, also vor allem Externspeicherabbildung, Realisierung von Speicherungsstrukturen und Zugriffspfaden sowie die Ableitung logischer Sichten. Neben der Datenabbildung, in deren Aufgaben sich Speicher-, Zugriffs- und Datensystem teilen, steht als zweiter Schwerpunkt des Buches das Transaktionskonzept und seine Erweiterungen. Dabei werden insbesondere alle Funktionen zur Synchronisation des Mehrbenutzerbetriebs und zur Wiederherstellung der Datenbank im Fehlerfall (Logging und Recovery) dargestellt.
Desktop or DIY 3D printers are devices you can either buy preassembled as a kit, or build from a collection of parts to design and print physical objects including replacement household parts, custom toys, and even art, science, or engineering projects. Maybe you have one, or maybe you're thinking about buying or building one. Practical 3D Printers takes you beyond how to build a 3D printer, to calibrating, customizing, and creating amazing models, including 3D printed text, a warship model, a robot platform, windup toys, and arcade-inspired alien invaders. You'll learn about the different types of personal 3D printers and how they work; from the MakerBot to the RepRap printers like the Huxley and Mendel, as well as the whiteAnt CNC featured in the Apress book Printing in Plastic. You'll discover how easy it is to find and design 3D models using web-based 3D modeling, and even how to create a 3D model from a 2D image. After learning the basics, this book will walk you through building multi-part models with a steampunk warship project, working with meshes to build your own action heroes, and creating an autonomous robot chassis. Finally, you'll find even more bonus projects to build, including wind-up walkers, faceted vases for the home, and a handful of useful upgrades to modify and improve your 3D printer.
Diese Ausgabe befasst sich mit der Sicherheit bei handelsublichen Festplatten, betrieben unter Windows. Leider meinen die meisten Nutzer, dass die Eingabe eines Windows-Passwortes ausreichend Schutz bietet, um seine Daten vor unerlaubten Zugriffen Anderer zu schutzen. In dieser Ausgabe werden wir Ihnen die Schwachstellen aufzeigen und eine wirkungsvolle Methode zeigen, Ihre Daten zu schtzen. Erfahren Sie, was eine "e;Brute-Force Attacke"e; ist und wie Sie diese sinnvoll abwehren. Inhalt:Einleitung1.1 Die Festplatte1.2 Warum ist das so einfach?1.3 Was fr Mglichkeiten gibt es?Windows "e;7/Vista/XP/2000"e; Festplatte verschlsseln2.1 Die Windows-Lsung2.2 Truecrypt, ein mchtiges Tool2.3 Truecrypt-Installation2.4 Beachten Sie den Passwort-Hinweis!2.5 Rettungsdatentrger erstellen3 FazitDie Entschlsselung4.1 Das beste Passwort hilft nicht4.2 Wie wird in der Praxis versucht, eine Festplatte zu entschlsseln?4.3 Ein Beispiel fr eine "e;Brute-Force"e; Attacke4.4 Profis bei der Arbeit4.5 Die Hintertr4.6 Was ist, wenn der Postbote dreimal klingelt?
'Now . . . in the Analytical Engine I had devised mechanical means equivalent to memory. ' For the past twenty-five years or so, scientists and engineers have been endeavouring to realize in new technologies the claim made by Charles Babbage in his memoirs over a century ago. The modern computer industry depends to a very large extent on the success of their efforts. In this book we discuss the wide variety of techniques which have been used and are being developed to meet the range of requirements for digital storage systems in computers and other applications. The book has been written as a guide for the designer of any system employing digital techniques, firstly to guide him in his choice of store for differing applications and, secondly, to give him an apprecia- tion of the problems which confront the engineer designing storage systems. Technology never stands still and developments in recent years have, of necessity, greatly increased the amount of material included in this second edition. The opportunity has also been taken to reorganize the contents and more emphasis has been given to those developments which have had, or which are likely to have, the greatest effect on computer development. Brief descriptions of obsolete or obsolescent systems have been retained, both as a warn- ing to designers of the problems likely to be encountered in develop- ment and to demonstrate how changes in technology can give a new impetus to old designs.
A major technological trend for large database systems has been the introduction of ever-larger mass storage systems. This allows computing centers and business data processing installations to maintain on line their program libraries, less frequently used data files, transaction logs and backup copies under unified system control. Tapes, disks and drums are classical examples of mass storage media. The more recent IBM 3851 Mass Storage Facility, part of the IBM 3850 Mass Storage System, represents a new direction in mass storage development, namely, it is two-dimensional. With the maturity of magnetic bubble technology, more sophisticated, massive, multi-trillion-bit storage systems are not far in the future. While large in capacity, mass storage systems have in general relatively long access times. Since record access probabilities are usually not uniform, various algorithms have been devised to position the records to decrease the average access time. The first two chapters of this book are devoted mainly to such algorithmic studies in linear and two-dimensional mass storage systems. In the third chapter, we view the bubble memory as more than a storage medium. In fact, we discuss different structures where routine operations, such as data rearrangement, sorting, searching, etc., can be done in the memory itself, freeing the CPU for more complicated tasks. The problems discussed in this book are combinatorial in nature.
Conventional on-chip communication design mostly use ad-hoc approaches that fail to meet the challenges posed by the next-generation MultiCore Systems on-chip (MCSoC) designs. These major challenges include wiring delay, predictability, diverse interconnection architectures, and power dissipation. A Network-on-Chip (NoC) paradigm is emerging as the solution for the problems of interconnecting dozens of cores into a single system on-chip. However, there are many problems associated with the design of such systems. These problems arise from non-scalable global wire delays, failure to achieve global synchronization, and difficulties associated with non-scalable bus-based functional interconnects. The book consists of three parts, with each part being subdivided into four chapters. The first part deals with design and methodology issues. The architectures used in conventional methods of MCSoCs design and custom multiprocessor architectures are not flexible enough to meet the requirements of different application domains and not scalable enough to meet different computation needs and different complexities of various applications. Several chapters of the first part will emphasize on the design techniques and methodologies. The second part covers the most critical part of MCSoCs design - the interconnections. One approach to addressing the design methodologies is to adopt the so-called reusability feature to boost design productivity. In the past years, the primitive design units evolved from transistors to gates, finite state machines, and processor cores. The network-on-chip paradigm offers this attractive property for the future and will be able to close the productivity gap. The last part of this book delves into MCSoCs validations and optimizations. A more qualitative approach of system validation is based on the use of formal techniques for hardware design. The main advantage of formal methods is the possibility to prove the validity of essential design requirements. As formal languages have a mathematical foundation, it is possible to formally extract and verify these desired properties of the complete abstract state space. Online testing techniques for identifying faults that can lead to system failure are also surveyed. Emphasis is given to analytical redundancy-based techniques that have been developed for fault detection and isolation in the automatic control area.