Flylib.com
index_F
Previous page
Table of content
Next page
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X]
fatal error messages
file descriptors
file management
source tree layout
--file option
filenames
built-in functions and
functions
addprefix
addsuffix
basename
dir
join
notdir
suffix
wildcard function
patterns [See pattern rules]
suffixes, functions
timestamps and
files
variable definition and
wildcards
files array, command line limits and
filesystems layout, binary trees and
filter function
filter-out function
find command, module definition
findstring function
firstword function
flow control functions
assert 2nd
error
foreach
if
foreach function
foreach loop
free software model development
functions
add-manifest
addprefix
addsuffix
assert
basename
build-classpath
built-in
patterns as arguments
string functions
syntax
calling, wildcards and
compile-bean
counter
defslot
dir
ejb-rule
error
eval
filter
filter-out
findstring
firstword
flow control 2nd
foreach
generated-source
hooks
if
join
library, declarations
make-library
miscellaneous 2nd
notdir
origin
parameters, passing to
patsubst
remote-file
search and replace, strings
shell
sort
source-to-object
space-to-question
string functions
strip
strip, whitespace removal
subst
suffix
user -defined
advanced
Linux kernel makefile
parameters and
variables
warning
whitespace manipulation
wildcard
wildcard-spaces
wordlist
words
Previous page
Table of content
Next page
Managing Projects with GNU Make (Nutshell Handbooks)
ISBN: 0596006101
EAN: 2147483647
Year: 2003
Pages: 131
Authors:
Robert Mecklenburg
BUY ON AMAZON
Beginning Cryptography with Java
The JCA and the JCE
Symmetric Key Cryptography
Certificate Revocation and Path Validation
Key and Certificate Management Using Keystores
Appendix C Using the Bouncy Castle API for Elliptic Curve
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.1 Install OpenSSH to Replace the Remote Access Protocols with Encrypted Versions
Step 4.3 How to Generate a Key Pair Using OpenSSH
Step 5.1 General Troubleshooting
Conclusion
Appendix - Sample sshd_config File
Snort Cookbook
Uninstalling Snort from Windows
Installing Snort on Mac OS X
Upgrading Snort on Linux
Countermeasures from Rules
Analyzing and Graphing Logs
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Monitoring Network Access Control
OSPF
Deployment Scenarios
Advanced Cisco IPSec VPN Features
Failover
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Trim-Out Installation
Computer Network Hardware
Designing and Installing a Computer Network
Designing and Installing Distributed Video Systems
HVAC Controls
DNS & BIND Cookbook
Configuring DNS to Let Clients Find the Closest Server
Configuring DNS So a Mail Server and the Email It Sends Pass Anti-Spam Tests
Controlling Multiple named Processes with rndc
Setting Up a Backup Primary Master Name Server
Configuring a Name Server to Accommodate a Slave Running BIND 4
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies