Flylib.com
index_SYMBOL
Previous page
Table of content
Next page
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X]
$% automatic variable
$< automatic variable
$(OBJECTS) variable
$* automatic variables
$+ automatic variable
$? automatic variable
$@ automatic variable
$^ automatic variable
% (percent) character, pattern rules
+ (plus) command modifier
+= (append) operator
- (dash) command prefix
--always-make option
--print-data-base option, debugging and
? (question mark) wildcard
?= (conditional variable assignment operator)
?= operator, environment variables
@ command prefix, echo and
@ sign, performance and
^ (tilde) wildcard
{ } (curly braces) in variables
Previous page
Table of content
Next page
Managing Projects with GNU Make (Nutshell Handbooks)
ISBN: 0596006101
EAN: 2147483647
Year: 2003
Pages: 131
Authors:
Robert Mecklenburg
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Reverse Engineering and Importing to ORM
Conceptual Model Reports
Generating a Physical Database Schema
Editing Logical Models”Advanced Aspects
Change Propagation and Round Trip Engineering
CompTIA Project+ Study Guide: Exam PK0-003
Assessment Test
IT Project Management Overview
Other Planning Processes
Comprehensive Project Plan
Appendix B Standard IT Project Documents
Snort Cookbook
Debugging Snort Rules
Prioritizing Alerts
Thresholding Alerts
Recognizing HTTP Traffic on Unusual Ports
Snort as a Virus Detection Tool
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 2. Set Up Bluetooth on Windows XP
Hack 26. Find and Join Wireless Networks with AP Radar
Hack 30. Monitor Wireless Links in Linux with Wavemon
Hack 70. Pebble
Hack 97. Calculate the Link Budget
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Using the System.Management Namespace
Handling WMI Events
Instrumenting .NET Applications with WMI
WMI Providers
Comparing, Designing, and Deploying VPNs
Deploying Site-to-Site and Remote Access VPNs: A Comparison
Advantages and Disadvantages of IPsec Site-to-Site VPNs
Benefits and Drawbacks of L2TP Remote Access VPNs
Strengthening SSL Remote Access VPNs Security by Implementing Cisco Secure Desktop
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies