Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 4: The GNU Compiler Toolchain
Table 4.1: Compilation Stages with Inputs and Outputs
Table 4.2: Warning Options Enabled in
-Wall
Table 4.3: Other Useful Warning Options Not Enabled in -Wall
Table 4.4: Optimization Settings and Descriptions
Table 4.5: Optimizations Available in
-O1
Table 4.6: Optimizations Available in -O2
Table 4.7: Optimizations Enabled in -O3 (Above -O2)
Table 4.8: Architectures (CPUs) Supported for x86
Chapter 6: Building and Using Libraries
Table 6.1: Important Options for the ar Utility
Chapter 7: Coverage Testing with GNU
gcov
Table 7.1:
gcov
Utility Options
Chapter 10: File Handling in GNU/Linux
Table 10.1: Simple File Access Modes
Table 10.2: Function
fseek/ lseek
whence Arguments
Table 10.3: Additional Flags for the
open
Function
Table 10.4: Mode Arguments for the
open
System Call
Chapter 11: Programming with Pipes
Table 11.1: API Functions for Pipe Programming
Chapter 12: Introduction to Sockets Programming
Table 12.1: Sockets Programming Element Hierarchy
Chapter 13: GNU/Linux Process Model
Table 13.1: Traditional Process and Related APIs
Table 13.2: Macro Functions to Evaluate wait Status
Table 13.3: Pid Arguments for
waitpid
Table 13.4: Extended Macro Functions for
waitpid
Table 13.5: GNU/Linux Signals That Default to Terminate
Table 13.6: GNU/Linux Signals That Default to Ignore
Table 13.7: GNU/Linux Signals That Default to Stop
Table 13.8: GNU/Linux Signals That Default to Core Dump
Table 13.9: Values of
pid
Argument for
kill
Function
Chapter 14: POSIX Threads (Pthreads) Programming
Table 14.1: Mutex Initializers
Chapter 15: IPC with Message Queues
Table 15.1: Message Queue API Functions and Uses
Table 15.2: Message Queue Permissions for the
msgget msgflag
Argument
Table 15.3: Message Queue Configuration and Defaults in
msgget
Table 15.4: Message Queue Parameters That May Be Updated
Table 15.5: Structure Updates after Successful
msgsnd
Completion
Table 15.6:
msgtyp
Arguments for
msgrcv
Table 15.7:
msgflg
Arguments for
msgrcv
Table 15.8: Structure Updates after Successful
msgsnd
Completion
Chapter 16: Synchronization with Semaphores
Table 16.1: Semaphore API Functions and Their Uses
Table 16.2: Semaphore Permissions for the
semget semflg
Argument
Table 16.3: Semaphore Internal Values
Table 16.4: Operations That Can Be Performed Using
semctl
Table 16.5: Semaphore Flag Options (
sembuf.sem_flg
)
Chapter 17: Shared Memory Programming
Table 17.1: Shared Memory API Functions and Uses
Table 17.2: Shared Memory Segment Permissions for
shmget msgflag
Argument
Table 17.3: Shared Memory Data Structure
init
on Creation
Table 17.4: Shared Memory Data Structure Writeable Elements
Chapter 18: Other Application Development Topics
Table 18.1: Elements and Meaning for
struct sysinfo
Table 18.2: Nonstandard Flags for mmap
Chapter 19: GNU/Linux Commands
Table 19.1: File Descriptors for Standard I/O Descriptors
Table 19.2: Range Specs for the
cut
Utility
Table 19.3: Type Modifiers Available to
find
(
-type
)
Chapter 20: Bourne-Again Shell (bash)
Table 20.1: Useful Environment Variables
Table 20.2: Integer Comparison Operators
Table 20.3: String Comparison Operators
Table 20.4: File Test Operators
Table 20.5: Special Sequences in Echoed Strings
Table 20.6: Other Options for the
read
Command
Chapter 22: Text Processing with
awk
Table 22.1: Awks Built-in Variables
Chapter 23: Parser Generation with
flex
and
bison
Table 23.1: Useful Scanner and Parser Functions and Variables
Chapter 24: Software Unit Testing Frameworks
Table 24.1: Test Functions Provided By Embunit
Chapter 25: Debugging with GDB
Table 25.1: Available Methods for Setting Breakpoints
Table 25.2: Methods for Stepping Through the Source
Chapter 26: Code Hardening
Table 26.1: Safe Replacements for C Library Functions
Previous page
Table of content
Next page
GNU/Linux Application Programming (Programming Series)
ISBN: 1584505680
EAN: 2147483647
Year: 2006
Pages: 203
Authors:
M. Tim Jones
BUY ON AMAZON
Beginning Cryptography with Java
Symmetric Key Cryptography
Certificate Revocation and Path Validation
CMS and S/MIME
Appendix A Solutions to Exercises
Appendix B Algorithms Provided by the Bouncy Castle Provider
The .NET Developers Guide to Directory Services Programming
A Brief History of Directory Services
Summary
Managing User Account Features
Authentication Using SDS.P
InvalidOperationException from DirectorySearcher
Documenting Software Architectures: Views and Beyond
P.5. Viewtypes and Styles
Elements, Relations, and Properties of the Module Viewtype
Publish-Subscribe Style
What to Document
Siemens Four Views
SQL Hacks
Hack 23. Second Tuesday of the Month
Hack 24. Multiply Across a Result Set
Hack 41. Copy Web Pages into a Table
Hack 49. Keep Track of Infrequently Changing Values
Hack 91. Export and Import Table Definitions
Web Systems Design and Online Consumer Behavior
Chapter V Consumer Complaint Behavior in the Online Environment
Chapter X Converting Browsers to Buyers: Key Considerations in Designing Business-to-Consumer Web Sites
Chapter XI User Satisfaction with Web Portals: An Empirical Study
Chapter XIII Shopping Agent Web Sites: A Comparative Shopping Environment
Chapter XVIII Web Systems Design, Litigation, and Online Consumer Behavior
Special Edition Using FileMaker 8
Relationships as Queries
Exploring the Calculation Dialog Box
Getting Started with Scripting
User-Level Internal Security
Managing Clients
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies