Flylib.com
Index_G
Previous page
Table of content
Next page
G
gateway, 89, 93 “94, 103
gcc
, 160.
See also
C compiler;
cc
gdb
, 176 “177
GECOS, 69
getty
, 55, 71
Ghostscript, 146 “147, 255 “256, 262 “265
gpm
, 34, 232
graphics cards, 318 “319, 325
grep
, 7, 148
group ID (GID), 68 “69.
See also
/etc/group
groups, 22, 70 “71.
See also
/etc/group
GRUB.
See
boot loaders, GRUB
gunzip
, 25, 27
.gz
, 25, 27, 184
gzip
, 25, 27
Previous page
Table of content
Next page
How Linux Works: What Every Superuser Should Know
ISBN: 1593270356
EAN: 2147483647
Year: 2004
Pages: 189
Authors:
Brian Ward
BUY ON AMAZON
Documenting Software Architectures: Views and Beyond
P.3. Interfaces
Peer-to-Peer Style
Summary Checklist
Where to Document Behavior
Mapping Between Views
Network Security Architectures
Applied Knowledge Questions
What Is a Security Policy?
Network Security Technologies
Appliance-Based Network Services
Introduction
Competency-Based Human Resource Management
Competency-Based Employee Training
Competency-Based Employee Rewards
The Transformation to Competency-Based HR Management
Appendix A Frequently Asked Questions About Competency-Based HR Management
Appendix C Examples of Life-Career Assessment Exercises
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Product History
Summary
Monitoring and Troubleshooting the Security Contexts
Advanced Features and Configuration
Accessing the IPS Device Management Console from ASDM
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Querying WMI
Handling WMI Events
Instrumenting .NET Applications with WMI
WMI Security
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Strings and Regular Expressions
Objects, Interfaces, and Patterns
Multithreading
ASP.NET Web Applications
Web Services
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies