Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2000-2004  (13)
  • 1990-1994  (3)
  • Sebastopol, CA : O'Reilly & Associates
  • Electronic books ; local  (16)
  • UNIX (Computer file)  (3)
Datasource
Material
Language
Years
Year
  • 1
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xiii, 303 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.7/2
    Keywords: JavaServer pages ; Apache Tomcat (Computer file) ; Servlets ; Computer programs ; Web site design ; Web site development ; Electronic books ; local
    Abstract: Jakarta Tomcat is not only the most commonly used open source servlet engine today, it's become the de facto standard by which other servlet engines are measured. Powerful and flexible, it can be used as a stand-alone web server or in conjunction with another server, like Apache or IIS, to run servlets or JSPs. But mastery of Tomcat is not easy: because it's as complex as it is complete. Tomcat: The Definitive Guide answers vexing questions that users, administrators, and developers alike have been asking. This concise guide provides much needed information to help harness Tomcat's power and wealth of features. Tomcat: The Definitive Guide offers something for everyone who uses Tomcat. System and network administrators will find detailed instructions on installation, configuration, and maintenance. For users, it supplies insightful information on how to deploy Tomcat. And seasoned enterprise Java developers will have a complete reference to setting up, running, and using this powerful softwareThe book begins with an introduction to the Tomcat server and includes an overview of the three types of server configurations: stand-alone, in-process, and out-of-process. The authors show how directories are laid out, cover the initial setup, and describe how to set the environment variables and modify the configuration files, concluding with common errors, problems, and solutions. In subsequent chapters, they cover: The server.xml configuration file Java Security manager Authentication schemes and Tomcat users The Secure Socket Layer (SSL) Tomcat JDBC Realms Installing servlets and Java Server Pages Integrating Tomcat with Apache Advanced Tomcat configuration and much more. Tomcat: The Definitive Guide covers all major platforms, including Windows, Solaris, Linux, and Mac OS X, contains details on Tomcat configuration files, and has a quick-start guide to get developers up and running with Java servlets and JavaServer Pages. If you've struggled with this powerful yet demanding technology in the past, this book will provide the answers you need.
    Note: "Covers Tomcat 4"--Cover. - "Tomcat is a Java servlet container and web server from the Jakarta project of the Apache Software Foundation ..."--P. vii. - "Vital information for Tomcat programmers & administrators"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xviii, 339 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 572.8/0285/536
    Keywords: BLAST (Computer file) ; Amino acid sequence ; Databases ; Biology ; Data processing ; Database searching ; Nucleotide sequence ; Databases ; Electronic books ; local
    Abstract: Sequence similarity is a powerful tool for discovering biological function. Just as the ancient Greeks used comparative anatomy to understand the human body and linguists used the Rosetta stone to decipher Egyptian hieroglyphs, today we can use comparative sequence analysis to understand genomes. BLAST (Basic Local Alignment Search Tool), is a sophisticated software package for rapid searching of nucleotide and protein databases. It is one of the most important software packages used in sequence analysis and bioinformatics. Most users of BLAST, however, seldom move beyond the program's default parameters, and never take advantage of its full power. BLAST is the only book completely devoted to this popular suite of tools. It offers biologists, computational biology students, and bioinformatics professionals a clear understanding of BLAST as well as the science it supports. This book shows you how to move beyond the default parameters, get specific answers using BLAST, and how to interpret your results. The book also contains tutorial and reference sections covering NCBI-BLAST and WU-BLAST, background material to help you understand the statistics behind BLAST, Perl scripts to help you prepare your data and analyze your results, and a wealth of tips and tricks for configuring BLAST to meet your own research needs. Some of the topics covered include: BLAST basics and the NCBI web interface How to select appropriate search parameters BLAST programs: BLASTN, BLASTP, BLASTX, TBLASTN, TBLASTX, PHI-BLAST, and PSI BLAST Detailed BLAST references, including NCBI-BLAST and WU-BLAST Understanding biological sequences Sequence similarity, homology, scoring matrices, scores, and evolution Sequence Alignment Calculating BLAST statistics Industrial-strength BLAST, including developing applications with Perl and BLAST BLAST is the only comprehensive reference with detailed, accurate information on optimizing BLAST searches for high-throughput sequence analysis. This is a book that any biologist should own.
    Note: "An essential guide to the Basic Local Alignment Search Tool"--Cover. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates
    ISBN: 9780596000523 , 0596000529
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Parallel Title: Erscheint auch als
    Keywords: Netscape Mozilla ; Internet programming ; Web sites ; Design ; Source code (Computer science) ; Electronic books ; local
    Abstract: Mozilla is not just a Web browser. Mozilla is also a framework for building cross-platform applications using standards such as CSS (Cascading Style Sheets), XML languages such as XUL (XML-based User-interface Language), XBL (eXtensible Binding Language), and RDF (Resource Description Framework), as well as Gecko, Mozilla's rendering engine, and other technologies. The Mozilla development framework also makes use of programming languages such as JavaScript, C++, C, Python, and IDL (Interface Definition Language), plus framework technologies such as XPConnect and XPCOM, Mozilla's component model. In addition to Netscape's Mozilla-based browsers (Netscape 6.x and 7.x), the Mozilla framework has been used to create other browsers such as Galeon and Chimera, and chat clients such as ChatZilla and JabberZilla. Developers have also used Mozilla to create development tools, browser enhancements, and games, as well as many other types of add-ons and applications. This book explains how applications are created with Mozilla and provides step-by-step information about how you can create your own programs using Mozilla's powerful cross-platform development framework. This book also includes examples of many different types of existing applications to demonstrate some of the possibilities of Mozilla development.
    Note: "Using XUL, JavaScript, and CSS"--Cover. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xvii, 725 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    Keywords: UNIX (Computer file) ; TCP/IP (Computer network protocol) ; Electronic books ; local
    Abstract: This complete guide to setting up and running a TCP/IP network is essential for network administrators, and invaluable for users of home systems that access the Internet. The book starts with the fundamentals -- what protocols do and how they work, how addresses and routing are used to move data through the network, how to set up your network connection -- and then covers, in detail, everything you need to know to exchange information via the Internet.Included are discussions on advanced routing protocols (RIPv2, OSPF, and BGP) and the gated software package that implements them, a tutorial on configuring important network services -- including DNS, Apache, sendmail, Samba, PPP, and DHCP -- as well as expanded chapters on troubleshooting and security. TCP/IP Network Administration is also a command and syntax reference for important packages such as gated, pppd, named, dhcpd, and sendmail.With coverage that includes Linux, Solaris, BSD, and System V TCP/IP implementations, the third edition contains: Overview of TCP/IP Delivering the data Network services Getting startedM Basic configuration Configuring the interface Configuring routing Configuring DNS Configuring network servers Configuring sendmail Configuring Apache Network security Troubleshooting Appendices include dip , ppd , and chat reference, a gated reference, a dhcpd reference, and a sendmail reference This new edition includes ways of configuring Samba to provide file and print sharing on networks that integrate Unix and Windows, and a new chapter is dedicated to the important task of configuring the Apache web server. Coverage of network security now includes details on OpenSSH, stunnel, gpg, iptables, and the access control mechanism in xinetd. Plus, the book offers updated information about DNS, including details on BIND 8 and BIND 9, the role of classless IP addressing and network prefixes, and the changing role of registrars.Without a doubt, TCP/IP Network Administration, 3rd Edition is a must-have for all network administrators and anyone who deals with a network that transmits data over the Internet.
    Note: "Covers Linux, Solaris, BSD, and System V TCP/IP implementations"--P. [4] of cover. - "Help for UNIX System administrators"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xiii, 244 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.2/76
    Keywords: Internet programming ; Object-oriented programming (Computer science) ; Simple Object Access Protocol (Computer network protocol) ; XML (Document markup language) ; Electronic books ; local
    Abstract: The web services architecture provides a new way to think about and implement application-to-application integration and interoperability that makes the development platform irrelevant. Two applications, regardless of operating system, programming language, or any other technical implementation detail, communicate using XML messages over open Internet protocols such as HTTP or SMTP. The Simple Open Access Protocol (SOAP) is a specification that details how to encode that information and has become the messaging protocol of choice for Web services. Programming Web Services with SOAP is a detailed guide to using SOAP and other leading web services standards--WSDL (Web Service Description Language), and UDDI (Universal Description, Discovery, and Integration protocol). You'll learn the concepts of the web services architecture and get practical advice on building and deploying web services in the enterprise. This authoritative book decodes the standards, explaining the concepts and implementation in a clear, concise style. You'll also learn about the major toolkits for building and deploying web services. Examples in Java, Perl, C#, and Visual Basic illustrate the principles. Significant applications developed using Java and Perl on the Apache Tomcat web platform address real issues such as security, debugging, and interoperability. Covered topic areas include: The Web Services Architecture SOAP envelopes, headers, and encodings WSDL and UDDI Writing web services with Apache SOAP and Java Writing web services with Perl's SOAP::Lite Peer-to-peer (P2P) web services Enterprise issues such as authentication, security, and identity Up-and-coming standards projects for web services Programming Web Services with SOAP provides you with all the information on the standards, protocols, and toolkits you'll need to integrate information services with SOAP. You'll find a solid core of information that will help you develop individual Web services or discover new ways to integrate core business processes across an enterprise.
    Note: Includes index. - SOAP, Simple Object Access Protocol
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: vi, 102 p. , ill. ; , 18 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; SQL (Computer program language) ; Electronic books ; local
    Abstract: One of the most important challenges faced by Oracle database administrators and Oracle developers is the need to tune SQL statements so that they execute efficiently. Poorly tuned SQL statements are one of the leading causes of substandard database performance and poor response time. SQL statements that perform poorly result in frustration for users, and can even prevent a company from serving its customers in a timely manner. In this book, Mark Gurry shares his in-depth knowledge of Oracle's SQL statement optimizers. Mark's knowledge is the result of many hard-fought tuning battles during his many years of providing Oracle tuning services to clients. Mark provides insights into the workings of the rule-based optimizer that go well beyond what the rules tell you. Mark also provides solutions to many common problems that occur with both the rule-based and cost-based optimizers. In addition to the specific problem/solution scenarios for the optimizers, Mark provides a number of handy SQL tuning tips. He discusses the various optimizer hints, telling you when they can be used to good effect. Finally, Mark discusses the use of the DBMS_STATS package to manage database statistics, and the use of outlines to specify execution plans for SQL statements in third-party applications that you can't otherwise modify.
    Note: "Covers Oracle9i"--Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xiv, 205 p. , ill. ; , 24 cm
    DDC: 004.5
    Keywords: Computer storage devices ; Storage area networks (Computer networks) ; Electronic books ; local
    Abstract: Data is the lifeblood of modern business, and modern data centers have extremely demanding requirements for size, speed, and reliability. Storage Area Networks (SANs) and Network Attached Storage (NAS) allow organizations to manage and back up huge file systems quickly, thereby keeping their lifeblood flowing. W. Curtis Preston's insightful book takes you through the ins and outs of building and managing large data centers using SANs and NAS. As a network administrator you're aware that multi-terabyte data stores are common and petabyte data stores are starting to appear. Given this much data, how do you ensure that it is available all the time, that access times and throughput are reasonable, and that the data can be backed up and restored in a timely manner? SANs and NAS provide solutions that help you work through these problems, with special attention to the difficulty of backing up huge data stores. This book explains the similarities and differences of SANs and NAS to help you determine which, or both, of these complementing technologies are appropriate for your network. Using SANs, for instance, is a way to share multiple devices (tape drives and disk drives) for storage, while NAS is a means for centrally storing files so they can be shared. Preston exams each technology with a vendor neutral approach, starting with the building blocks of a SAN and how they can be assembled for effective storage solutions. He covers day-to-day management and backup and recovery for both SANs and NAS in detail. Whether you're a seasoned storage administrator or a network administrator charged with taking on this role, you'll find all the information you need to make informed architecture and data management decisions. The book fans out to explore technologies such as RAID and other forms of monitoring that will help complement your data center. With an eye on the future, other technologies that might affect the architecture and management of the data center are explored. This is sure to be an essential volume in any network administrator's or storage administrator's library.
    Note: "Help for storage administrators"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xvii, 953 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.75/8
    Keywords: ColdFusion ; Database design ; Web databases ; Electronic books ; local
    Abstract: ColdFusion is a powerful platform for creating and deploying dynamic web applications. Developers like ColdFusion because its simple, tag-based language makes it easy to handle simple tasks, like processing form data and querying databases. ColdFusion is easy to learn, yet powerful enough to deliver highly scalable, robust applications. Programming ColdFusion covers everything you need to know to create effective web applications with ColdFusion and includes numerous examples that you can use for your own applications. The book starts with ColdFusion basics and quickly progresses to topics like sharing application data, accessing databases, and maintaining state information. It also provides chapters on advanced database techniques, working with the Verity search engine, and interacting with other data sources, including LDAP directories, email servers, and other web servers. Finally, the book explores more advanced topics, such as creating custom tags, sharing data with WDDX, and calling external objects.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xviii, 490 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.7/13
    Keywords: UNIX (Computer file) ; Computer networks ; Network File System (Computer network protocol) ; Electronic books ; local
    Abstract: A modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991. But however widespread networks have become, managing a network and getting it to perform well can still be a problem. Managing NFS and NIS, in a new edition based on Solaris 8, is a guide to two tools that are absolutely essential to distributed computing environments: the Network Filesystem (NFS) and the Network Information System (formerly called the "yellow pages" or YP).The Network Filesystem, developed by Sun Microsystems, is fundamental to most Unix networks. It lets systems ranging from PCs and Unix workstations to large mainframes access each other's files transparently, and is the standard method for sharing files between different computer systems.As popular as NFS is, it's a "black box" for most users and administrators. Updated for NFS Version 3, Managing NFS and NIS offers detailed access to what's inside, including: How to plan, set up, and debug an NFS network Using the NFS automounter Diskless workstations PC/NFS A new transport protocol for NFS (TCP/IP) New security options (IPSec and Kerberos V5) Diagnostic tools and utilities NFS client and server tuning NFS isn't really complete without its companion, NIS, a distributed database service for managing the most important administrative files, such as the passwd file and the hosts file. NIS centralizes administration of commonly replicated files, allowing a single change to the database rather than requiring changes on every system on the network.If you are managing a network of Unix systems, or are thinking of setting up a Unix network, you can't afford to overlook this book.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xviii, 522 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8/4
    Keywords: Computer security ; Computer viruses ; Electronic books ; local
    Abstract: Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved the experts wrong, attacking Windows computers when recipients did nothing more than open an email. Today, writing programs is easier than ever, and so is writing malicious code. The idea that someone could write malicious code and spread it to 60 million computers in a matter of hours is no longer a fantasy. The good news is that there are effective ways to thwart Windows malicious code attacks, and author Roger Grimes maps them out in Malicious Mobile Code: Virus Protection for Windows. His opening chapter on the history of malicious code and the multi-million dollar anti-virus industry sets the stage for a comprehensive rundown on today's viruses and the nuts and bolts of protecting a system from them. He ranges through the best ways to configure Windows for maximum protection, what a DOS virus can and can't do, what today's biggest threats are, and other important and frequently surprising information. For example, how many people know that joining a chat discussion can turn one's entire computer system into an open book? Malicious Mobile Code delivers the strategies, tips, and tricks to secure a system against attack. It covers: The current state of the malicious code writing and cracker community How malicious code works, what types there are, and what it can and cannot do Common anti-virus defenses, including anti-virus software How malicious code affects the various Windows operating systems, and how to recognize, remove, and prevent it Macro viruses affecting MS Word, MS Excel, and VBScript Java applets and ActiveX controls Enterprise-wide malicious code protection Hoaxes The future of malicious mobile code and how to combat such code These days, when it comes to protecting both home computers and company networks against malicious code, the stakes are higher than ever. Malicious Mobile Code is the essential guide for securing a system from catastrophic loss.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: x, 260 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Cisco IOS ; Computer networks ; Access control ; Computer networks ; Security measures ; Electronic books ; local
    Abstract: Cisco routers are used widely both on the Internet and in corporate intranets. At the same time, the Cisco Internet Operating System (IOS) has grown to be very large and complex, and Cisco documentation fills several volumes. Cisco IOS Access Lists focuses on a critical aspect of the Cisco IOS--access lists. Access lists are central to the task of securing routers and networks, and administrators cannot implement access control policies or traffic routing policies without them. Access lists are used to specify both the targets of network policies and the policies themselves. They specify packet filtering for firewalls all over the Internet. Cisco IOS Access Lists covers three critical areas: Intranets. The book serves as an introduction and a reference for network engineers implementing routing policies within intranet networking. Firewalls. The book is a supplement and companion reference to books such as Brent Chapman's Building Internet Firewalls. Packet filtering is an integral part of many firewall architectures, and Cisco IOS Access Lists describes common packet filtering tasks and provides a "bag of tricks" for firewall implementers. The Internet. This book is also a guide to the complicated world of route maps. Route maps are an arcane BGP construct necessary to make high level routing work on the Internet. Cisco IOS Access Lists differs from other Cisco router titles in that it focuses on practical instructions for setting router access policies. The details of interfaces and routing protocol settings are not discussed.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xvii, 685 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.26/8
    Keywords: Microsoft Visual BASIC ; BASIC (Computer program language) ; Electronic books ; local
    Abstract: Subclassing & Hooking with Visual Basic offersdevelopers a unique way to customize Windows behavior. Windows is amessage-based system. Every action you request creates one or moremessages to carry out the action. These messages are passed betweenobjects and carry with them information that gives the recipientmore detail on how to interpret and act upon the message. WithSubclassing and the Windows hooking mechanism ("hooks"), you canmanipulate, modify, or even discard messages bound for otherobjects within the operating system, in the process changing theway the system behaves. What kinds of results can you achieve usingthe power of subclassing and hooking? Here are just a few of thepossibilities: Determine when a window is being activated ordeactivated and respond to this change. Display descriptions of menu items as the mousemoves across them. Disallow a user to move or resize a window. Determine where the mouse cursor is and respondaccordingly. Determine when the display resolution has beenchanged. Monitor the system for a low system resourcecondition. Modify or disallow keystrokes sent to a window or acontrol. Create an automated testing application. Determine when an application is idle. Along with this power comes responsibility; Windows is veryunforgiving if subclassing and hooking are used incorrectly. Subclassing & Hooking with Visual Basic demonstrates thevarious techniques for intercepting messages bound for one or morewindows or controls: the intercepted message can be left in itsoriginal state or modified; afterwards, the message can be sent toits original destination or discarded. For both VB 6 and VB.NETdevelopers, Subclassing & Hooking with Visual Basic opens up a wealth of possibilities that ordinarily would becompletely unavailable, or at least not easy to implement.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xv, 300 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 004.5/3
    Keywords: Browsers (Computer programs) ; Cache memory ; Software configuration management ; World Wide Web ; Electronic books ; local
    Abstract: On the World Wide Web, speed and efficiency are vital. Users have little patience for slow web pages, while network administrators want to make the most of their available bandwidth. A properly designed web cache reduces network traffic and improves access times to popular web sites--a boon to network administrators and web users alike. Web Caching hands you all the technical information you need to design, deploy, and operate an effective web caching service. It starts with the basics of how web caching works, from the HTTP headers that govern cachability to cache validation and replacement algorithms. Topics covered in this book include: Designing an effective cache solution Configuring web browsers to use a cache Setting up a collection of caches that can talk to each other Configuring an interception cache or proxy Monitoring and fine-tuning the performance of a cache Configuring web servers to cooperate with web caches Benchmarking cache products The book also covers the important political aspects of web caching, including privacy, intellectual property, and security issues. Internet service providers, large corporations, or educational institutions--in short, any network that provides connectivity to a wide variety of users--can reap enormous benefit from running a well-tuned web caching service. Web Caching shows you how to do it right.
    Note: Includes bibliographical references (p. 288-290) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates
    ISBN: 9781565920514 , 1565920511
    Language: English
    Pages: 1 online resource (1 volume)
    Keywords: TeX (Computer file) ; Computerized typesetting ; Mathematics printing ; Computer programs ; Electronic books ; Electronic books ; local
    Abstract: TeX is a powerful tool for creating professional quality typeset text and is unsurpassed at typesetting mathematical equations, scientific text, and multiple languages. Many books describe how you use TeX to construct sentences, paragraphs, and chapters. Until now, no book has described all the software that actually lets you build, run, and use TeX to best advantage on your platform. Because creating a TeX document requires the use of many tools, this lack of information is a serious problem for TeX users. TeX is increasing in popularity, and the need for information is becoming more critical. Many technical journals now request that articles be submitted in TeX. TeX is also playing an increasing role in the Standard Generalized Markup Language (SGML) environment. TeX's portability and flexibility -- not to mention the fact that it is free -- are also making it the typesetting tool of choice for interchange between hardware and software platforms and for international exchange. Yet, despite this growing interest in TeX, TeX users everywhere are having to "reinvent the wheel" by wrestling with TeX's many tools and files on their own. Making TeX Work guides you through the maze of tools available in the overall TeX system. Beyond the core TeX program there are myriad drivers, macro packages, previewers, printing programs, online documentation facilities, graphics programs, and more. This book describes them all. It covers: How to assemble the software you need to build and install TeX on all common platforms: UNIX, DOS, Macintosh, and VMS. How to get TeX and its associated tools from public domain and commercial sources (a complete buyer's guide). How to select and use the tools that let you incorporate graphics into your documents and create bibliographies, indices, and other complex document elements. How to install and use fonts to best advantage, including PostScript and TrueType fonts and LaTeX's New Font Selection Scheme (NFSS)
    Note: "A Nutshell handbook"--Cover. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed January 30, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: xxii, 338 p. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.4/3
    Keywords: UNIX (Computer file) ; KornShell (Computer program language) ; Programming Languages ; Software ; Electronic books ; local
    Abstract: This Nutshell Handbook(R) is a thorough introduction to the Korn shell, both as a user interface and as a programming language.The Korn shell, like the C and Bourne shells, is a program that interprets UNIX commands. It has many features that aren't found in other shells, including command history (the ability to recall and edit previous commands). The Korn shell is also faster; several of its features allow you to write programs that execute more quickly than their Bourne or C shell equivalents.This book provides a clear and concise explanation of the Korn shell's features. It explains ksh string operations, co-processes, signals and signal handling, and one of the worst "dark corners" of shell programming: command-line interpretation. It does this by introducing simple real-life examples and then adding options and complexity in later chapters, illustrating the way real-world script development generally proceeds. An additional (and unique) programming aid, a Korn shell debugger ( kshdb ), is also included. Learning the Korn Shell is an ideal resource for many UNIX users and programmers, including software developers who want to "prototype" their designs, system administrators who want to write tools for their own use, and even novices who just want to use some of ksh's more advanced interactive features.
    Note: "UNIX programming"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    ISBN: 9780937175149 , 0937175145
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Third edition, revised to reflect release 4.
    Series Statement: Definitive guides to the X Window System volume 3
    Keywords: X Window System (Computer system) ; Electronic books ; Electronic books ; local
    Abstract: The X Window System User's Guide orients the new user to window system concepts and provides detailed tutorials for many client programs, including the xterm terminal emulator and window managers. Building on this basic knowledge, later chapters explain how to customize the X environment and provide sample configurations. This popular manual is available in two editions, one for users of the MIT software, one for users of Motif. The Standard Edition uses the twm manager in most examples and illustrations. Revised and updated for X11 Release 5. Contents include: Starting the system and opening windows. Using the xterm terminal emulator and window managers. Most standard release clients, including programs for graphics, printing, font manipulation, window/display information, removing windows, as well as several "desktop" utilities. Customizing the window manager, keyboard, display, and certain basic features of any client program. Using and customizing the mwm window manager, for those using the OSF/Motif graphical user interface. System administration tasks, including managing fonts, starting X automatically, and using the display manager, xdm , to run X on a single or multiple display.
    Note: "Revised to reflect release 4"--Copyright page. - Includes index. - Description based on online resource; title from title page (Safari, viewed January 23, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...