Flylib.com
Essential CVS (Essentials)
Essential CVS (Essentials)
ISBN: 0596527039
EAN: 2147483647
Year: 2003
Pages: 152
Authors:
Jennifer Vesperman
BUY ON AMAZON
COVER
TOC
Dedication
Copyright
Preface
Structure of the Book
Conventions Used in This Book
Learning More About CVS
We d Like to Hear from You
Acknowledgments
Part I: Introduction
Chapter 1. What Is CVS?
1.1 What Is a Versioning System?
1.2 CVS in the Field
Chapter 2. CVS Quickstart Guide
2.1 Installing CVS
2.2 Building Your First Repository
2.3 Importing Projects
2.4 Accessing Remote Repositories
2.5 Checking Out Files
2.6 Committing Changes
2.7 Updating Sandboxes
2.8 Adding Files
2.9 Removing Files
2.10 Quick Tips for Success
Part II: Using CVS
Chapter 3. Basic Use of CVS
3.1 General Information
3.2 Sandboxes and Repositories
3.3 Committing Changes to the Repository
3.4 Checking File Status
3.5 Updating the Sandbox Files from the Repository
3.6 Adding Files to the Repository
3.7 Removing Files from the Repository
3.8 Moving Files or Directories
3.9 Releasing a Sandbox
3.10 Keywords
3.11 Binary Files and Wrappers
3.12 Specifying Default Command Options
Chapter 4. Tagging and Branching
4.1 Tagging
4.2 Stickiness
4.3 Branching
4.4 Branching Strategies
Chapter 5. Multiple Users
5.1 Using Simultaneous Development
5.2 Watching a File
5.3 Reserving Files
5.4 Comparing File Revisions
5.5 Displaying Recent Changes
5.6 Displaying File History
Part III: CVS Administration
Chapter 6. Repository Management
6.1 Creating a Repository
6.2 Deleting a Repository
6.3 Securing Your Projects
6.4 Repository Structure
6.5 CVSROOT Files
6.6 Server Environment Variables
6.7 Backing Up a Repository
6.8 Editing a Repository
6.9 Sandbox Structure
6.10 Client Environment Variables
6.11 Exit Status
Chapter 7. Project Management
7.1 Creating a Project
7.2 Distributing Files
7.3 Running Scripts
7.4 Interfacing with External Programs
7.5 Tools
7.6 Strategies and Practices
Chapter 8. Remote Repositories
8.1 Specifying Repository Paths
8.2 The local Access Method
8.3 The ext and server Access Methods
8.4 The fork Access Method
8.5 The gserver Access Method
8.6 The kserver Access Method
8.7 The pserver Access Method
8.8 Using inetd with gserver, kserver, and pserver
Chapter 9. Troubleshooting
9.1 General Troubleshooting Techniques
9.2 Connectivity Problems
9.3 Filename Problems
9.4 Line-Ending Problems
9.5 Permission Problems
9.6 Lock Files
Part IV: Reference
Chapter 10. Command Reference
10.1 CVS Command-Line Options
10.2 CVS Commands
Chapter 11. Miscellaneous Topics Reference
11.1 Administrative Files
11.2 CVSROOT Files
11.3 CVSROOT Variables
11.4 Dates
11.5 Environment Variables
11.6 Keywords and Keyword Modes
11.7 Pattern Matching
11.8 Repository Access Methods
Part V: Appendixes
cvs-APPendix A. Clients and Operating Systems
A.1 Multi-Operating-System Clients
A.2 Macintosh Clients
A.3 Unix and Linux Clients
A.4 Windows Clients
A.5 Integration Tools
cvs-APPendix B. Administrator s Tools
B.1 CVS Variants
B.2 Distribution Tools
B.3 Logging Tools
B.4 Metadata Tools
B.5 Convertors
B.6 Miscellaneous
CVS Quick Reference
CVS Options
Repository Access
Common CVS Tasks
Sandbox Commands
Synchronization Commands
File Commands
Branch Commands
Tag Commands
Colophon
Index
SYMBOL
cvs-APPendix A. Clients and Operating Systems
A
cvs-APPendix B. Administrator s Tools
B
TOC
CVS Quick Reference
C
D
E
F
G
H
I
J
K
SYMBOL
L
M
Dedication
N
O
P
R
S
T
U
V
W
Index
X
Y
Essential CVS (Essentials)
ISBN: 0596527039
EAN: 2147483647
Year: 2003
Pages: 152
Authors:
Jennifer Vesperman
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Employ Iterative, Feature-Based Delivery
Encourage Exploration
Practice: Product Architecture
Phase: Speculate
The Scaling Challenge
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Planning for Risk Management
Identifying Project Scope Risk
Identifying Project Schedule Risk
Managing Project Risk
Closing Projects
Software Configuration Management
Configuration Verification and Audit
Configuration Change Management
Configuration Management and Software Engineering Standards Reference
Appendix U Acronyms and Glossary
Appendix W Physical Configuration Audit (PCA) Checklist
Image Processing with LabVIEW and IMAQ Vision
Introduction
Color Images
Image Distribution
Quantitative Analysis
Pattern Matching
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Social Actors
Credibility and Computers
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
802.11 Wireless Networks: The Definitive Guide, Second Edition
Overview of 802.11 Networks
IEEE 802 Network Technology Family Tree
1X on Wireless LANs
Preauthentication
General Structure of an 802.11 Interface
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies