Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Robbins, Arnold  (9)
  • American Society for Training and Development
  • Garfinkel, Simson
  • Boston, MA :Safari,  (17)
  • Beijing ; : O'Reilly  (4)
  • Electronic books ; local  (17)
  • Zeitschriften zur Ethnologie
Datasource
Material
Language
Years
  • 1
    Language: English
    Pages: xviii, 714 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them. But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users. Still, many people believe there is an inherent tradeoff between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless. There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security & Usability is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computerinteraction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research. Security & Usability groups 34 essays into six parts: Realigning Usability and Security---with careful attention to user-centered design principles, security and usability can be synergistic. Authentication Mechanisms-- techniques for identifying and authenticating computer users. Secure Systems--how system software can deliver or destroy a secure user experience. Privacy and Anonymity Systems--methods for allowing people to control the release of personal information. Commercializing Usability: The Vendor Perspective--specific experiences of security and software vendors (e.g.,IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability. The ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly. | Boston, MA :Safari,
    Language: English
    Pages: xxii, 534 p. , ill. ; , 24 cm
    DDC: 005.43
    Keywords: Operating systems (Computers) ; Electronic books ; local
    Abstract: Shell scripting skills never go out of style. It's the shell that unlocks the real potential of Unix. Shell scripting is essential for Unix users and system administrators-a way to quickly harness and customize the full power of any Unix system. With shell scripts, you can combine the fundamental Unix text and file processing commands to crunch data and automate repetitive tasks. But beneath this simple promise lies a treacherous ocean of variations in Unix commands and standards. Classic Shell Scripting is written to help you reliably navigate these tricky waters.Writing shell scripts requires more than just a knowledge of the shell language, it also requires familiarity with the individual Unix programs: why each one is there, how to use them by themselves, and in combination with the other programs. The authors are intimately familiar with the tips and tricks that can be used to create excellent scripts, as well as the traps that can make your best effort a bad shell script. With Classic Shell Scripting you'll avoid hours of wasted effort. You'll learn not only write useful shell scripts, but how to do it properly and portably.The ability to program and customize the shell quickly, reliably, and portably to get the best out of any individual system is an important skill for anyone operating and maintaining Unix or Linux systems. Classic Shell Scripting gives you everything you need to master these essential skills.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 687 p. , ill. ; , 24 cm
    DDC: 005.4/4682
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "This is an excellent introduction to Linux programming. The topics are well chosen and lucidly presented. I learned things myself, especially about internationalization, and I've been at this for quite a while." -Chet Ramey, Coauthor and Maintainer of the Bash shell "This is a good introduction to Linux programming. Arnold's technique of showing how experienced programmers use the Linux programming interfaces is a nice touch, much more useful than the canned programming examples found in most books." -Ulrich Drepper, Project Lead, GNU C library "A gentle yet thorough introduction to the art of UNIX system programming, Linux Programming by Example uses code from a wide range of familiar programs to illustrate each concept it teaches. Readers will enjoy an interesting mix of in-depth API descriptions and portability guidelines, and will come away well prepared to begin reading and writing systems applications. Heartily recommended." -Jim Meyering, Coauthor and Maintainer of the GNU Core Utility Programs Learn Linux® programming, hands-on... from real source code This book teaches Linux programming in the most effective way possible: by showing and explaining well-written programs. Drawing from both V7 Unix® and current GNU source code, Arnold Robbins focuses on the fundamental system call APIs at the core of any significant program, presenting examples from programs that Linux/Unix users already use every day. Gradually, one step at a time, Robbins teaches both high-level principles and "under the hood" techniques. Along the way, he carefully addresses real-world issues like performance, portability, and robustness. Coverage includes: Memory management File I/O File metadata Processes Users and groups Sorting and searching Argument parsing Extended interfaces Signals Internationalization Debugging And more... Just learning to program? Switching from Windows®? Already developing with Linux but interested in exploring the system call interface further? No matter which, quickly and directly, this book will help you master the fundamentals needed to build serious Linux software. Companion Web Sites, authors.phptr.com/robbins and www.linux-by-example.com , include all code examples.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Alexandria, VA : ASTD Press | Boston, MA :Safari,
    Language: English
    Pages: x, 195 p. , ill. ; , 28 cm. +
    Keywords: Communication in organizations ; Problems, exercises, etc ; Conflict management ; Problems, exercises, etc ; Interpersonal communication ; Problems, exercises, etc ; Electronic books ; local
    Abstract: Communication Skills Training offers all the resources and tools needed to design effective communication skills training. Use this complete guide to design presentation, negotiation, conflict resolution, or assertiveness skills for group or work teams or design interpersonal communication training for an entire organization. The book includes a fully developed set of PowerPoint slides, handouts, learning activities, and facilitators guide for one-half, full, and two-day training programs.
    Note: CD-Rom includes 3 types of files: Adobe .pdf documents, Microsoft PowerPoint presentations, Microsoft PowerPoint files of overhead transparency masters. - Includes bibliographical references (p. 193-194)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Alexandria, VA : ASTD | Boston, MA :Safari,
    Language: English
    Pages: xi, 132 p. , ill. ; , 25 cm
    Keywords: Employee training personnel ; Employees ; Training of ; Electronic books ; local
    Abstract: Subject matter experts (SMEs) and occasional trainers are increasingly sharing the training burden in organizations. Yet these "instant trainers" often are not familiar with even the basic terminology or practices of the training profession. Trainer Basics is written specifically to answer three key questions these new trainers ask: What does a trainer do and why? How can I develop must-have skills quickly? How do I apply training knowledge today? New trainers will appreciate the informative quick learning "hits" hroughout the book, including helpful reminders called Think About This, cut-to-the-chase rules called Basic Rules, and additional key concept points called Noted. Every chapter ends with quick learning exercises called Getting It Done to reinforce key chapter information. Written in direct and understandable language by a veteran trainer, this book also offers professional trainers a much-needed tool to help train these new ranks of trainers. Just hand Training Basics to a new trainer and within a few hours the job of explaining the basics of instructional design, adult learning, needs analysis, evaluation, and presentation and facilitation skills is done.
    Note: Includes bibliographical references (p. 123-129)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Language: English
    Pages: xxix, 954 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.8
    Keywords: UNIX (Computer file) ; Computer security ; Internet ; Congresses ; Operating systems (Computers) ; Electronic books ; local
    Abstract: When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more. Practical Unix & Internet Security consists of six parts: Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security. Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security. Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming. Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing. Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security. Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research. Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today's threats.
    Note: Includes bibliographical references (p. 873-895) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxv, 620 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.4/469
    Keywords: Mac OS ; Cocoa (Application development environment) ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: Cocoa is an object-oriented development environment available in Apple's Mac OS X environment. Mac OS X, a unified operating system and graphical operating environment, is the fastest growing Unix variant on the market today. Hard-core Unix programmers, developers who cut their teeth on classic Mac operating systems, and developers who cherished NeXTSTEP, the decade-old system on which today's Cocoa is based -- all are flocking to Cocoa, and they need a lot more practical information than is currently available from Apple. There is a lot to learn. Building Cocoa Applications is an ideal book for serious developers who want to write programs for the Mac OS X using Cocoa. It's a no-nonsense, hands-on text that's filled with examples -- not only simple and self-contained examples of individual Cocoa features, but extended examples of complete applications with enough sophistication and complexity that readers can put them to immediate use in their own environments. Building Cocoa Applications takes a step-by-step approach to teaching developers how to build real graphics applications using Cocoa. By showing the basics of an application in one chapter and then layering additional functionality onto that application in subsequent chapters, the book keeps readers interested and motivated. Readers will see immediate results, and then go on to build onto what they've already achieved. The book is divided into four major parts: Part I introduces the Mac OS X graphical user interface (Aqua) from a developer's point of view, Cocoa developer tools (such as the Interface Builder, Project Builder, and gdb debugger), object-oriented concepts, the Objective-C language in which Cocoa is written, and the basics of Cocoa programming itself. Part II focuses on building the first complete application, Calculator, a simple four-function calculator. The chapters in this part of the book extend the application, piece by piece, by introducing such features as nibs, icons, delegation, resizing, events, and responders. Part III focuses on building an application called MathPaper, which is similar to a word processor but which instead solves mathematical expressions the user supplies. The chapters in this part of the book extend MathPaper by developing both the front and back ends using a variety of Cocoa classes and methods. They introduce Cocoa'sdocument-based architecture, tasks, pipes, Rich Text format, handling document files, and using Quartz to draw in windows. Pa...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 412 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.71262
    Keywords: UNIX (Computer file) ; KornShell (Computer program language) ; Electronic books ; local
    Abstract: The Korn shell is an interactive command and scripting language for accessing Unix® and other computer systems. As a complete and high-level programming language in itself, it's been a favorite since it was developed in the mid 1980s by David G. Korn at AT&T Bell Laboratories. Knowing how to use it is an essential skill for serious Unix users. Learning the Korn Shell shows you how to use the Korn shell as a user interface and as a programming environment.Writing applications is often easier and quicker with Korn than with other high-level languages. Because of this, the Korn shell is the most often used shell in commercial environments and among inexperienced users. There are two other widely used shells, the Bourne shell and the C shell. The Korn shell, or ksh , has the best features of both, plus many new features of its own. ksh can do much to enhance productivity and the quality of a user's work, both in interacting with the system, and in programming. The new version, ksh93 , has the functionality of other scripting languages such as awk, icon, Perl, rexx, and tcl. Learning the Korn Shell is the key to gaining control of the Korn shell and becoming adept at using it as an interactive command and scripting language. Prior programming experience is not required in order to understand the chapters on basic shell programming. Readers will learn how to write many applications more easily and quickly than with other high-level languages. In addition, readers will also learn about Unix utilities and the way the Unix operating system works in general. The authors maintain that you shouldn't have to be an internals expert to use and program the shell effectively.The second edition covers all the features of the current version of the Korn shell, including many new features not in earlier versions of ksh93, making it the most up-to-date reference available on the Korn shell. It compares the current version of the Korn shell to several other Bourne-compatible shells, including several Unix emulation environments for MS-DOS and Windows. In addition, it describes how to download and build ksh93 from source code.A solid offering for many years, this newly revised title inherits a long tradition of trust among computer professionals who want to learn or refine an essential skill.
    Note: "UNIX programming"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: vi, 46 p. ; , 18 cm
    Edition: 2nd ed.
    Keywords: Awk ; Sed (Computer file) ; UNIX (Computer file) ; Utilities (Computer programs) ; Electronic books ; local
    Abstract: For people who create and modify text files, sed and awk are power tools for editing. sed, awk, and regular expressions allow programmers and system administrators to automate editing tasks that need to be performed on one or more files, to simplify the task of performing the same edits on multiple files, and to write conversion programs.The sed & awk Pocket Reference is a companion volume to sed & awk, Second Edition, Unix in a Nutshell, Third Edition , and Effective awk Programming, Third Edition . This new edition has expanded coverage of gawk (GNU awk), and includes sections on: An overview of sed and awk?s command line syntax Alphabetical summaries of commands, including nawk and gawk Profiling with pgawk Coprocesses and sockets with gawk Internationalization with gawk A listing of resources for sed and awk users This small book is a handy reference guide to the information presented in the larger volumes. It presents a concise summary of regular expressions and pattern matching, and summaries of sed and awk.Arnold Robbins, an Atlanta native now happily living in Israel, is a professional programmer and technical author and coauthor of various O'Reilly Unix titles. He has been working with Unix systems since 1980, and currently maintains gawk and its documentation.
    Note: "Text processing with regular expressions"--Cover. - Includes bibliographical references (p. 46)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Cambridge, Mass. : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 756 p. , ill. ; , 24 cm
    Edition: 2nd ed. expanded & updated.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Web sites ; Security measures ; World Wide Web ; Security measures ; Electronic books ; local
    Abstract: Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Explorer and Netscape Navigator, and a wide range of current programs and products. In vast detail, the book covers: Web technology--The technological underpinnings of the modern Internet and the cryptographic foundations of e-commerce are discussed, along with SSL (the Secure Sockets Layer), the significance of the PKI (Public Key Infrastructure), and digital identification, including passwords, digital signatures, and biometrics. Web privacy and security for users--Learn the real risks to user privacy, including cookies, log files, identity theft, spam, web logs, and web bugs, and the most common risk, users' own willingness to provide e-commerce sites with personal information. Hostile mobile code in plug-ins, ActiveX controls, Java applets, and JavaScript, Flash, and Shockwave programs are also covered. Web server security--Administrators and service providers discover how to secure their systems and web services. Topics include CGI, PHP, SSL certificates, law enforcement issues, and more. Web content security--Zero in on web publishing issues for content providers, including intellectual property, copyright and trademark issues, P3P and privacy policies, digital payments, client-side digital signatures, code signing, pornography filtering and PICS, and other controls on web content. Nearly double the size of the first edition, this completely updated volume is destined to be the definitive reference on Web security risks and the techniques and technologies you can use to protect your privacy, your organization, your system, and your network.
    Note: Rev. ed. of: Web security & commerce. 1997. - Includes bibliographical references (p. 716-734) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 421 p. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.13/3
    Keywords: AWK (Computer program language) ; Electronic books ; local
    Abstract: Effective awk Programming, 3rd Edition, focuses entirely on awk, exploring it in the greatest depth of the three awk titles we carry. It's an excellent companion piece tothe more broadly focused second edition. This book providescomplete coverage of the gawk 3.1 language as well as themost up-to-date coverage of the POSIX standard for awk available anywhere. Author Arnold Robbins clearly distinguishesstandard awk features from GNU awk (gawk) -specific features, shines light into many of the"dark corners" of the language (areas to watch out for whenprogramming), and devotes two full chapters to example programs. Abrand new chapter is devoted to TCP/IP networking with gawk. Heincludes a summary of how the awk language evolved. The bookalso covers: Internationalization of gawk Interfacing to i18n at the awk level Two-way pipes TCP/IP networking via the two-way pipe interface The new PROCINFO array, which provides information aboutrunning gawk Profiling and pretty-printing awk programs In addition to covering the awk language, this book servesas the official "User's Guide" for the GNU implementation of awk ( gawk ), describing in an integrated fashion theextensions available to the System V Release 4 version of awk that are also available in gawk . As the official gawk User's Guide, this book will also be availableelectronically, and can be freely copied and distributed under theterms of the Free Software Foundation's Free Documentation License(FDL). A portion of the proceeds from sales of this book will go tothe Free Software Foundation to support further development of freeand open source software. The third edition of Effective awkProgramming is a GNU Manual and is published by O'Reilly &Associates under the Free Software Foundation's FreeDocumentation License (FDL). A portion of the proceeds fromthe sale of this book is donated to the Free Software Foundation tofurther development of GNU software. This book is also available inelectronic form; you have the freedom to modify this GNU Manual,like GNU software. Copies published by the Free Software Foundationraise funds for GNU development.
    Note: Includes indexes
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Beijing ; : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: iii, 45 p. ; , 18 cm
    Edition: 1st ed.
    Keywords: UNIX (Computer file) ; Utilities (Computer programs) ; Electronic books ; local
    Abstract: For people who create and modify text files, sed and awk are power tools for editing. sed, awk, and regular expressions allow programmers and system administrators to automate editing tasks that need to be performed on one or more files, to simplify the task of performing the same edits on multiple files, and to write conversion programs. The sed & awk Pocket Reference is a companion volume to sed & awk and Unix in a Nutshell. This small book is a handy reference guide to the information the larger volumes, presenting a concise summary of regular expressions and pattern matching, and summaries of sed and awk.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: vii, 312 p. , ill. ; , 24 cm
    DDC: 323.44/8/0973
    Keywords: Computer security ; United States ; Privacy, Right of ; United States ; Electronic books ; local
    Abstract: Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rights--still use Orwell's "Big Brother" language to discuss privacy issues. But the reality is that the age of a monolithic Big Brother is over. And yet the threats are perhaps even more likely to destroy the rights we've assumed were ours. Database Nation: The Death of Privacy in the 21st Century shows how, in these early years of the 21st century, advances in technology endanger our privacy in ways never before imagined. Direct marketers and retailers track our every purchase; surveillance cameras observe our movements; mobile phones will soon report our location to those who want to track us; government eavesdroppers listen in on private communications; misused medical records turn our bodies and our histories against us; and linked databases assemble detailed consumer profiles used to predict and influence our behavior. Privacy--the most basic of our civil rights--is in grave peril. Simson Garfinkel--journalist, entrepreneur, and international authority on computer security--has devoted his career to testing new technologies and warning about their implications. This newly revised update of the popular hardcover edition of Database Nation is his compelling account of how invasive technologies will affect our lives in the coming years. It's a timely, far-reaching, entertaining, and thought-provoking look at the serious threats to privacy facing us today. The book poses a disturbing question: how can we protect our basic rights to privacy, identity, and autonomy when technology is making invasion and control easier than ever before? Garfinkel's captivating blend of journalism, storytelling, and futurism is a call to arms. It will frighten, entertain, and ultimately convince us that we must take action now to protect our privacy and identity before it's too late.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: v, 66 p. ; , 18 cm
    DDC: 652.5/53
    Keywords: UNIX (Computer file) ; Vi ; Text editors (Computer programs) ; Electronic books ; local
    Abstract: For many users, working in the UNIX environment means using vi, a full-screen text editor available on most UNIX systems. Even those who know vi often make use of only a small number of its features.The vi Editor Pocket Reference is a companion volume to O'Reilly's updated sixth edition of Learning the vi Editor , a complete guide to text editing with vi . New topics in Learning the vi Editor include multi-screen editing and coverage of four vi clones: vim , elvis , nvi , and vile .This small book is a handy reference guide to the information in the larger volume, presenting movement and editing commands, the command-line options, and other elements of the vi editor in an easy-to-use tabular format.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xvii, 327 p. , ill. ; , 24 cm
    Edition: 6th ed.
    DDC: 652.5/53
    Keywords: UNIX (Computer file) ; Vi ; Text editors (Computer programs) ; Electronic books ; local
    Abstract: For many users, working in the Unix environment means using vi , a full-screen text editor available on most Unix systems. Even those who know vi often make use of only a small number of its features. Learning the vi Editor is a complete guide to text editing with vi . Topics new to the sixth edition include multiscreen editing and coverage of four vi clones: vim , elvis , nvi , and vile and their enhancements to vi , such as multi-window editing, GUI interfaces, extended regular expressions, and enhancements for programmers. A new appendix describes vi 's place in the Unix and Internet cultures. Quickly learn the basics of editing, cursor movement, and global search and replacement. Then take advantage of the more subtle power of vi . Extend your editing skills by learning to use ex , a powerful line editor, from within vi . For easy reference, the sixth edition also includes a command summary at the end of each appropriate chapter. Topics covered include: Basic editing Moving around in a hurry Beyond the basics Greater power with ex Global search and replacement Customizing vi and ex Command shortcuts Introduction to the vi clones' extensions The nvi , elvis , vim , and vile editors Quick reference to vi and ex commands vi and the Internet
    Note: "UNIX text processing"--Cover. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Sebastopol : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xx, 483 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic commerce ; Security measures ; Web sites ; Security measures ; World Wide Web ; Security measures ; Electronic books ; local
    Abstract: Attacks on government Web sites, break-ins at Internet service providers, electronic credit card fraud, invasion of personal privacy by merchants as well as hackers--is this what the World Wide Web is really all about? Web Security & Commerce cuts through the hype and the front page stories. It tells you what the real risks are and explains how you can minimize them. Whether you're a casual (but concerned) Web surfer or a system administrator responsible for the security of a critical Web server, this book will tell you what you need to know. Entertaining as well as illuminating, it looks behind the headlines at the technologies, risks, and benefits of the Web. Whatever browser or server you are using, you and your system will benefit from this book. Topics include: User safety--browser vulnerabilities (with an emphasis on Netscape Navigator and Microsoft Internet Explorer), privacy concerns, issues with Java, JavaScript, ActiveX, and plug-ins. Digital certificates--what they are, how they assure identity in a networked environment, how certification authorities and server certificates work, and what code signing all about. Cryptography--an overview of how encryption works on the Internet and how different algorithms and programs are being used today. Web server security--detailed technical information about SSL (Secure Socket Layer), TLS (Transport Layer Security), host security, server access methods, and secure CGI/API programming. Commerce and society--how digital payments work, what blocking software and censorship technology (e.g., PICS and RSACi) is about, and what civil and criminal issues you need to understand.
    Note: On cover: Risks, technologies, and strategies. - Includes bibliographical references (p. 450-470) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Sebastopol, [Calif.] : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 407 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    Series Statement: A Nutshell handbook
    Keywords: Awk ; Sed (Computer file) ; UNIX (Computer file) ; Utilities (Computer programs) ; Electronic books ; local
    Abstract: sed & awk describes two text processing programs that are mainstays of the UNIX programmer's toolbox. sed is a "stream editor" for editing streams of text that might be too large to edit as a single file, or that might be generated on the fly as part of a larger data processing step. The most common operation done with sed is substitution, replacing one block of text with another. awk is a complete programming language. Unlike many conventional languages, awk is "data driven" -- you specify what kind of data you are interested in and the operations to be performed when that data is found. awk does many things for you, including automatically opening and closing data files, reading records, breaking the records up into fields, and counting the records. While awk provides the features of most conventional programming languages, it also includes some unconventional features, such as extended regular expression matching and associative arrays. sed & awk describes both programs in detail and includes a chapter of example sed and awk scripts.This edition covers features of sed and awk that are mandated by the POSIX standard. This most notably affects awk , where POSIX standardized a new variable, CONVFMT, and new functions, toupper () and tolower (). The CONVFMT variable specifies the conversion format to use when converting numbers to strings ( awk used to use OFMT for this purpose). The toupper () and tolower () functions each take a (presumably mixed case) string argument and return a new version of the string with all letters translated to the corresponding case.In addition, this edition covers GNU sed , newly available since the first edition. It also updates the first edition coverage of Bell Labs nawk and GNU awk ( gawk ), covers mawk , an additional freely available implementation of awk , and briefly discusses three commercial versions of awk , MKS awk , Thompson Automation awk ( tawk ), and Videosoft (VSAwk).
    Note: "UNIX power tools"--Cover. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...