Flylib.com
Essential CVS (Essentials)
Essential CVS (Essentials)
ISBN: 0596527039
EAN: 2147483647
Year: 2003
Pages: 152
Authors:
Jennifer Vesperman
BUY ON AMAZON
COVER
TOC
Dedication
Copyright
Preface
Structure of the Book
Conventions Used in This Book
Learning More About CVS
We d Like to Hear from You
Acknowledgments
Part I: Introduction
Chapter 1. What Is CVS?
1.1 What Is a Versioning System?
1.2 CVS in the Field
Chapter 2. CVS Quickstart Guide
2.1 Installing CVS
2.2 Building Your First Repository
2.3 Importing Projects
2.4 Accessing Remote Repositories
2.5 Checking Out Files
2.6 Committing Changes
2.7 Updating Sandboxes
2.8 Adding Files
2.9 Removing Files
2.10 Quick Tips for Success
Part II: Using CVS
Chapter 3. Basic Use of CVS
3.1 General Information
3.2 Sandboxes and Repositories
3.3 Committing Changes to the Repository
3.4 Checking File Status
3.5 Updating the Sandbox Files from the Repository
3.6 Adding Files to the Repository
3.7 Removing Files from the Repository
3.8 Moving Files or Directories
3.9 Releasing a Sandbox
3.10 Keywords
3.11 Binary Files and Wrappers
3.12 Specifying Default Command Options
Chapter 4. Tagging and Branching
4.1 Tagging
4.2 Stickiness
4.3 Branching
4.4 Branching Strategies
Chapter 5. Multiple Users
5.1 Using Simultaneous Development
5.2 Watching a File
5.3 Reserving Files
5.4 Comparing File Revisions
5.5 Displaying Recent Changes
5.6 Displaying File History
Part III: CVS Administration
Chapter 6. Repository Management
6.1 Creating a Repository
6.2 Deleting a Repository
6.3 Securing Your Projects
6.4 Repository Structure
6.5 CVSROOT Files
6.6 Server Environment Variables
6.7 Backing Up a Repository
6.8 Editing a Repository
6.9 Sandbox Structure
6.10 Client Environment Variables
6.11 Exit Status
Chapter 7. Project Management
7.1 Creating a Project
7.2 Distributing Files
7.3 Running Scripts
7.4 Interfacing with External Programs
7.5 Tools
7.6 Strategies and Practices
Chapter 8. Remote Repositories
8.1 Specifying Repository Paths
8.2 The local Access Method
8.3 The ext and server Access Methods
8.4 The fork Access Method
8.5 The gserver Access Method
8.6 The kserver Access Method
8.7 The pserver Access Method
8.8 Using inetd with gserver, kserver, and pserver
Chapter 9. Troubleshooting
9.1 General Troubleshooting Techniques
9.2 Connectivity Problems
9.3 Filename Problems
9.4 Line-Ending Problems
9.5 Permission Problems
9.6 Lock Files
Part IV: Reference
Chapter 10. Command Reference
10.1 CVS Command-Line Options
10.2 CVS Commands
Chapter 11. Miscellaneous Topics Reference
11.1 Administrative Files
11.2 CVSROOT Files
11.3 CVSROOT Variables
11.4 Dates
11.5 Environment Variables
11.6 Keywords and Keyword Modes
11.7 Pattern Matching
11.8 Repository Access Methods
Part V: Appendixes
cvs-APPendix A. Clients and Operating Systems
A.1 Multi-Operating-System Clients
A.2 Macintosh Clients
A.3 Unix and Linux Clients
A.4 Windows Clients
A.5 Integration Tools
cvs-APPendix B. Administrator s Tools
B.1 CVS Variants
B.2 Distribution Tools
B.3 Logging Tools
B.4 Metadata Tools
B.5 Convertors
B.6 Miscellaneous
CVS Quick Reference
CVS Options
Repository Access
Common CVS Tasks
Sandbox Commands
Synchronization Commands
File Commands
Branch Commands
Tag Commands
Colophon
Index
SYMBOL
cvs-APPendix A. Clients and Operating Systems
A
cvs-APPendix B. Administrator s Tools
B
TOC
CVS Quick Reference
C
D
E
F
G
H
I
J
K
SYMBOL
L
M
Dedication
N
O
P
R
S
T
U
V
W
Index
X
Y
Essential CVS (Essentials)
ISBN: 0596527039
EAN: 2147483647
Year: 2003
Pages: 152
Authors:
Jennifer Vesperman
BUY ON AMAZON
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
Object Description in Cryptography Using ASN.1
Distinguished Names and Certificates
Appendix B Algorithms Provided by the Bouncy Castle Provider
Appendix C Using the Bouncy Castle API for Elliptic Curve
Cisco CallManager Fundamentals (2nd Edition)
Cisco CallManager Architecture
Media Processing
Summary
Manageability Tools
Storage and Maintenance of CDR Data
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity I
IDS and IPS Architecture
IDS and IPS Internals
Cisco Secure IDS
The Future of Intrusion Detection and Prevention
802.11 Wireless Networks: The Definitive Guide, Second Edition
Why Wireless?
Frame Transmission and Association and Authentication States
Scanning
RF Propagation with 802.11
Ensuring Secrecy Through Encryption
Comparing, Designing, and Deploying VPNs
VPN Devices
Summary
Deploying MPLS Layer 3 VPNs
Review Questions
Review Questions
Digital Character Animation 3 (No. 3)
Finalizing Your Design
Surface Types
Conclusion
Acting and the Body
Conclusion
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies