Flylib.com
Essential CVS (Essentials)
Essential CVS (Essentials)
ISBN: 0596527039
EAN: 2147483647
Year: 2003
Pages: 152
Authors:
Jennifer Vesperman
BUY ON AMAZON
COVER
TOC
Dedication
Copyright
Preface
Structure of the Book
Conventions Used in This Book
Learning More About CVS
We d Like to Hear from You
Acknowledgments
Part I: Introduction
Chapter 1. What Is CVS?
1.1 What Is a Versioning System?
1.2 CVS in the Field
Chapter 2. CVS Quickstart Guide
2.1 Installing CVS
2.2 Building Your First Repository
2.3 Importing Projects
2.4 Accessing Remote Repositories
2.5 Checking Out Files
2.6 Committing Changes
2.7 Updating Sandboxes
2.8 Adding Files
2.9 Removing Files
2.10 Quick Tips for Success
Part II: Using CVS
Chapter 3. Basic Use of CVS
3.1 General Information
3.2 Sandboxes and Repositories
3.3 Committing Changes to the Repository
3.4 Checking File Status
3.5 Updating the Sandbox Files from the Repository
3.6 Adding Files to the Repository
3.7 Removing Files from the Repository
3.8 Moving Files or Directories
3.9 Releasing a Sandbox
3.10 Keywords
3.11 Binary Files and Wrappers
3.12 Specifying Default Command Options
Chapter 4. Tagging and Branching
4.1 Tagging
4.2 Stickiness
4.3 Branching
4.4 Branching Strategies
Chapter 5. Multiple Users
5.1 Using Simultaneous Development
5.2 Watching a File
5.3 Reserving Files
5.4 Comparing File Revisions
5.5 Displaying Recent Changes
5.6 Displaying File History
Part III: CVS Administration
Chapter 6. Repository Management
6.1 Creating a Repository
6.2 Deleting a Repository
6.3 Securing Your Projects
6.4 Repository Structure
6.5 CVSROOT Files
6.6 Server Environment Variables
6.7 Backing Up a Repository
6.8 Editing a Repository
6.9 Sandbox Structure
6.10 Client Environment Variables
6.11 Exit Status
Chapter 7. Project Management
7.1 Creating a Project
7.2 Distributing Files
7.3 Running Scripts
7.4 Interfacing with External Programs
7.5 Tools
7.6 Strategies and Practices
Chapter 8. Remote Repositories
8.1 Specifying Repository Paths
8.2 The local Access Method
8.3 The ext and server Access Methods
8.4 The fork Access Method
8.5 The gserver Access Method
8.6 The kserver Access Method
8.7 The pserver Access Method
8.8 Using inetd with gserver, kserver, and pserver
Chapter 9. Troubleshooting
9.1 General Troubleshooting Techniques
9.2 Connectivity Problems
9.3 Filename Problems
9.4 Line-Ending Problems
9.5 Permission Problems
9.6 Lock Files
Part IV: Reference
Chapter 10. Command Reference
10.1 CVS Command-Line Options
10.2 CVS Commands
Chapter 11. Miscellaneous Topics Reference
11.1 Administrative Files
11.2 CVSROOT Files
11.3 CVSROOT Variables
11.4 Dates
11.5 Environment Variables
11.6 Keywords and Keyword Modes
11.7 Pattern Matching
11.8 Repository Access Methods
Part V: Appendixes
cvs-APPendix A. Clients and Operating Systems
A.1 Multi-Operating-System Clients
A.2 Macintosh Clients
A.3 Unix and Linux Clients
A.4 Windows Clients
A.5 Integration Tools
cvs-APPendix B. Administrator s Tools
B.1 CVS Variants
B.2 Distribution Tools
B.3 Logging Tools
B.4 Metadata Tools
B.5 Convertors
B.6 Miscellaneous
CVS Quick Reference
CVS Options
Repository Access
Common CVS Tasks
Sandbox Commands
Synchronization Commands
File Commands
Branch Commands
Tag Commands
Colophon
Index
SYMBOL
cvs-APPendix A. Clients and Operating Systems
A
cvs-APPendix B. Administrator s Tools
B
TOC
CVS Quick Reference
C
D
E
F
G
H
I
J
K
SYMBOL
L
M
Dedication
N
O
P
R
S
T
U
V
W
Index
X
Y
Essential CVS (Essentials)
ISBN: 0596527039
EAN: 2147483647
Year: 2003
Pages: 152
Authors:
Jennifer Vesperman
BUY ON AMAZON
Image Processing with LabVIEW and IMAQ Vision
Video Standards
Digital Imaging and Communication in Medicine (DICOM)
Image Processing
Image Analysis
Pixel Value Analysis
Java How to Program (6th Edition) (How to Program (Deitel))
What Is a Computer?
static Methods, static Fields and Class Math
Software Engineering with Inheritance
Wrap-Up
Wrap-Up
Data Structures and Algorithms in Java
Summary
Vocabulary
Trees
Terminology
B. Unified Modeling Language
Special Edition Using Crystal Reports 10
Using Top N with Cross-Tabs Reports
Differences with the Java Reporting Engine
Delivering Reports with the Windows Forms Viewer
Using Crystal Enterprise Notifications
Creating Enterprise Reporting Applications with Crystal Enterprise Part II
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Computers as Persuasive Social Actors
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
DNS & BIND Cookbook
Notifying a Slave Name Server Not in a Zones NS Records
Configuring a Name Server to Forward Queries to Another Name Server
Configuring an Authoritative-Only Name Server
Configuring a BIND Name Server to Accommodate a Slave Running the Microsoft DNS Server
Transferring a Zone Programmatically
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies