نتائج البحث - ((conditional OR conventional) OR convention) case transfer

بدائل البحث:

  • يعرض 1 - 15 نتائج من 15
تنقيح النتائج
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    International law and the use of force : cases and materials حسب O'Connell, Mary Ellen

    منشور في 2009
    جدول المحتويات: "…Tihomir Blaskic 654 (5) World's Political Will to Eradicate Evil is on Trial 659 (2) Steven Freeland Notes, Questions, and Problems 661 (4) Weapons 665 (76) Weapons of Mass Destruction 665 (41) Nuclear Weapons 665 (1) Legality of the Threat or Use of Nuclear Weapons 666 (18) Nuclear Non-Proliferation Treaty 684 (4) Biological Weapons 688 (1) The Shortcomings of Indeterminency in Arms Control Regimes: The Case of the Biological Weapons Convention 688 (7) Jack M. …"
    كتاب
  8. 8

    Structured techniques : the basis for CASE / حسب Martin, James

    منشور في 1988
    جدول المحتويات: "…Table of Boxes xxiii (2) Preface xxv PART I PHILOSOPHY 3 (34) 1 Why Structured Techniques and CASE? 3 (12) Objectives 3 (5) Evolution 8 (3) Mathematical Rigor 11 (1) CASE: Computer-Aided Systems Engineering 12 (1) Important Characteristics 13 (1) Loyalty to Old Techniques 13 (2) 2 Philosophies of Structured Techniques 15 (22) Introduction 15 (1) Basic Principles 15 (5) Basic Principles of Software Engineering 20 (3) The Data-Base Environment 23 (1) Automation of Analysis, Design, and Coding 24 (2) Graphics 26 (1) Provably Correct Constructs 26 (1) Management of Complexity 27 (1) Changing Computer Languages 28 (1) End-User Involvement 28 (2) User-Friendly Structured Techniques 30 (1) The Design Process 30 (7) PART II PROGRAMMING METHODOLOGIES 37 (72) 3 Structured Programming 37 (8) The Shift to Software 37 (1) Introduction of Structured Programming 38 (1) GO TO-less Programming 38 (1) Objectives 39 (1) Definitions 39 (6) 4 Structured Programs 45 (22) Properties of a Structured Program 45 (1) Limited Control Constructs 45 (3) Nested IF 48 (1) Case Statement 49 (1) Escape 50 (1) Highest-Level Control Constructs 50 (1) Standardized Module Format 51 (1) Hierarchical Organization 51 (1) Program Control Structure 52 (1) Program Paths 53 (1) Documentation 54 (5) Indentation 59 (1) Structured Coding Standards 59 (8) 5 Modular Programming and Control of Complexity 67 (16) Divide and Conquer 67 (1) Program Modules 67 (1) Black Box Model 68 (1) Modularization Schemes 68 (2) Module Size 70 (1) Complexity Metrics 70 (5) Module Relationships 75 (5) Program Shape 80 (3) 6 Programming by Stepwise Refinement 83 (8) Changing Programming from Craft to Science 83 (1) Stepwise Refinement 83 (1) Levels of Abstraction 84 (1) An Example of the Refinement Process 85 (6) 7 Top-Down, Bottom-Up, and Structured Programming 91 (12) Structured Programming Methodologies 91 (1) Top-Down Programming 91 (4) Bottom-Up Versus Top-Down Programming 95 (1) Bottom-Up Programming 96 (2) Choosing a Development Approach 98 (1) Combinations 99 (4) 8 Commentary on Structured Programming Methodologies 103 (6) The Problem of Programming in the Large 103 (1) Program Complexity 103 (1) The Absence of Rigor 104 (1) Recommendation 105 (4) PART III DIAGRAMMING TECHNIQUES 109 (290) 9 Diagrams and Clear Thinking 109 (14) Introduction 109 (1) Changing Methods 110 (1) Categories of Structured Diagrams 111 (1) End-User Involvement 111 (6) Program Documentation Tools 117 (1) Utility of Documentation 118 (2) Computer-Aided Diagramming 120 (1) Functions of Structured Diagrams 120 (3) 10 Forms of Structured Diagrams 123 (26) Introduction 123 (1) Forms of Tree Structure 123 (2) Inhibition of Change 125 (1) Left-to-Right Trees 126 (5) Sequence of Operations 131 (1) Mesh-Structured Diagrams 131 (2) COW Charts 133 (1) Nested Charts 134 (4) Data-Model Charts 138 (3) Root Nodes 141 (1) Find the Trees 142 (3) Computer Magic 145 (1) Symbols with Obvious Meaning 145 (3) Summary 148 (1) 11 Data Flow Diagrams 149 (16) Introduction 149 (1) Defining Data Flow 149 (1) Components of a DFD 149 (3) Leveling a DFD 152 (2) Process Specification and Data Dictionary 154 (1) Gane and Sarson Notation 155 (3) Use of Computer Graphics 158 (5) Commentary 163 (1) Data Layering 164 (1) 12 Three Species of Functional Decomposition 165 (16) Introduction 165 (1) Levels of Thoroughness in Functional Decomposition 165 (1) Species I Functional Decomposition: Corporate Model 166 (4) Species II Functional Decomposition 170 (6) Species III Functional Decomposition 176 (1) Commentary 177 (4) 13 Structure Charts 181 (10) Hierarchical Diagram 181 (1) Components of a Structure Chart 181 (2) Control Relationships 183 (1) Common Modules 183 (1) Library Modules 184 (1) Data Transfer 184 (2) Sequence, Selection, and Iteration 186 (2) Transaction Center 188 (1) Computer Graphics 188 (3) 14 HIPO Diagrams 191 (6) Introduction 191 (1) Diagram Components 192 (2) Analysis and Design Tools 194 (1) Commentary 194 (3) 15 Warnier-Orr Diagrams 197 (10) Introduction 197 (1) Representation of Data 197 (2) Representation of Program Structure 199 (2) Critique of Warnier-Orr Diagrams 201 (6) 16 Michael Jackson Diagrams 207 (12) Introduction 207 (1) Tree-Structure Diagrams 207 (2) Data-Structure Diagrams 209 (2) Program-Structure Diagrams 211 (1) System Network Diagram 212 (1) From Data to Programs 213 (1) Critique of Jackson Diagrams 214 (5) 17 Flowcharts 219 (8) Overview Versus Detailed Structure 219 (1) Flowcharts 220 (2) Flowchart Symbols 222 (1) Critique of Flowcharts 222 (5) 18 Structured English and Pseudocode 227 (12) Introduction 227 (1) Why Should English Be Structured? …"
    كتاب
  9. 9
  10. 10
  11. 11

    Sale of goods حسب Atiyah, P. S.

    منشور في 2005
    جدول المحتويات: "…Unascertained goods 332 (21) Risk and Frustration 353 (19) Risk and frustration distinguished 353 (1) Transfer of risk in non-consumer cases 353 (6) Transfer of risk in consumer cases 359 (1) Frustration 360 (5) Effects of frustration 365 (7) Transfer of Title by a Non-owner 372 (47) Nemo dat quod non habet 372 (3) Estoppel 375 (9) Sale by agent 384 (1) Section 2 of the Factors Act 1889 385 (7) Special powers of sale 392 (1) Sale in market overt 393 (1) Sale under a voidable title 393 (2) Seller in possession 395 (4) Buyer in possession 399 (11) Part III of the Hire-Purchase Act 1964 410 (3) Writs of execution 413 (1) Proposals for reform 413 (6) Part V EXPORT SALES Export Sales 419 (16) Ex-works or ex-store contracts 420 (1) F.o.b. contracts 420 (6) C.i.f. contracts 426 (7) Ex-ship contracts 433 (2) Export and Import Licences 435 (4) Whose duty? …"
    كتاب
  12. 12

    Economic valuation with stated preference techniques : a manual

    منشور في 2004
    جدول المحتويات: "…The foundations of economic valuation 13 (48) 1.1 The uses of economic valuation 13 (3) 1.2 The nature of economic valuation and economic efficiency 16 (2) 1.3 Economic valuation and other values 18 (2) 1.4 Economic valuation when there are no markets 20 (2) 1.5 Economic valuation and the demand curve 22 (2) 1.6 Willingness to pay and willingness to accept 24 (4) 1.7 Total economic value and aggregation 28 (10) 1.8 Stated preferences and public participation 38 (4) ANNEX 1.1 Benefits transfer and stated preference techniques 42 (10) ANNEX 1.2 Use of stated preference in UK environmental policy: the case of the aggregates levy 52 (3) ANNEX 1.3 Discounting 55 (6) 2. …"
    كتاب
  13. 13

    Tensions within the internal market : the functioning of the internal market and the development of horizontal and flanking policies / حسب Vries, Sybe Alexander de

    منشور في 2006
    جدول المحتويات: "…Acknowledgements Introduction The origin of this study: tensions within the internal market 3 (3) The purpose, central question and background of this study 6 (1) Horizontal and flanking policies and the internal market: defining and delimiting the topic 7 (8) Horizontal and flanking policies 8 (4) The internal market 12 (3) The relevant general principles of Community law 15 (9) The principle of proportionality 15 (2) The principle of Community loyalty 17 (1) The integration principle 18 (6) The plan 24 (3) The Application of the Free Movement Rules Introduction 27 (1) The material, personal and territorial scope of the free movement rules 27 (10) The material scope 28 (1) In general 28 (2) Horizontal and flanking activities 30 (3) The personal scope 33 (3) The territorial scope 36 (1) Conclusions 37 (1) The application of the free movement rules: the prohibitions 37 (12) The prohibition: towards market access 38 (1) Indistinctly applicable measures 38 (1) Towards a market access based test 39 (2) Selling arrangements 41 (3) Inherent restrictions 44 (2) Article 29 EC and the exportation of goods 46 (1) Tariff barriers 47 (1) Article 25 EC 47 (1) Article 90 EC 47 (1) Conclusions 48 (1) The application of the free movement rules: the exceptions 49 (50) The scope of the Treaty exceptions 49 (1) Overriding requirements of public interest 50 (1) Conditions for invoking the exceptions 51 (1) No harmonisation measure 52 (1) Non-economic interests 52 (3) Proportionality 55 (2) The protection of horizontal and flanking policy interests 57 (1) The protection of the environment 57 (1) The protection of health and life of humans, animals or plants: Article 30 EC 58 (1) The protection of the environment as overriding requirement of public interest 59 (1) The condition that environmental measures should apply without distinction 59 (3) The proportionality test: the assessment of environmental measures 62 (4) The protection of consumers 66 (1) The protection of health and safety of consumers 66 (1) The protection of consumers as overriding requirement of public interest 66 (2) The condition that consumer protection measures should apply without distinction 68 (2) The proportionality test: the assessment of consumer protection measures 70 (7) The protection of public health 77 (1) The protection of public health as Treaty exception 77 (1) The safeguarding of the financial stability of a health care system as overriding requirement of public interest 78 (1) (No) condition that health measures should apply without distinction 79 (2) The proportionality test: the assessment of public health measures 81 (4) The protection of culture 85 (1) The protection of national treasures possessing artistic, historic or archaeological value: Article 30 EC 85 (3) Culture and public policy: Article 46 EC 88 (1) Culture as overriding requirement of public interest 89 (1) (No) condition that cultural measures should apply without distinction 89 (4) The proportionality test: the assessment of cultural measures 93 (3) Conclusions 96 (3) The Application of the Competition Rules Introduction: the growing relevance of competition law 99 (2) In general: the material, personal and territorial scope of the competition rules 101 (14) The material scope 101 (3) The personal scope 104 (1) The concept of undertaking in general 104 (3) Horizontal and flanking activities 107 (6) The territorial scope 113 (2) Conclusions 115 (1) The application of the competition rules and the Member States 115 (66) Article 87 EC: the prohibition on state aids 115 (1) The grant of aid for horizontal and flanking policy reasons 116 (1) The scope of Article 87(1) EC: the concept of aid in relation to `normal undertakings' 117 (7) The scope of Article 87(1) EC: the concept of aid in relation to `public service undertakings' 124 (9) The distortion of competition and trade 133 (4) The exceptions: state aids that can be justified for horizontal and flanking policy reasons 137 (1) The scope of Articles 87(2) and 87(3) EC 137 (3) The environment 140 (4) Consumer protection 144 (1) Public health 145 (4) Culture 149 (4) Conclusions 153 (1) Article 86 EC: public undertakings and exclusive rights 153 (1) The scope of Article 86(1) EC: the concept of exclusive rights in relation to horizontal and flanking activities 154 (1) Exclusive rights and the competition rules: different approaches in the case law 155 (4) Article 86(2) EC: the justification for public service undertakings 159 (1) The scope of Article 86(2) EC in general 159 (6) The environment 165 (2) Consumer protection 167 (1) Public health 168 (1) Culture 169 (2) Conclusions 171 (1) Articles 3(1) sub g, 10 and 81 & 82 EC 172 (1) The useful effect doctrine 172 (5) Exceptions 177 (2) The relevance of the useful effect doctrine for national competition authorities 179 (2) Conclusions 181 (1) The application of the competition rules and undertakings 181 (66) Article 81 EC: the cartel prohibition 182 (1) Introduction 182 (1) Article 81(1) EC: the restriction of competition 183 (1) The object or effect to restrict competition 183 (3) Appreciability or De minimis 186 (3) The rule of reason 189 (2) Inherent restrictions 191 (7) Exemptions: restrictive practices that can be justified for horizontal and flanking policy reasons 198 (1) The scope of Article 81(3) EC 198 (5) The environment 203 (5) Consumer protection 208 (2) Public health 210 (4) Culture 214 (5) Conclusions 219 (2) Article 82: the prohibition on abuse of a dominant position 221 (1) The scope of Article 82 EC: abusive behaviour and horizontal and flanking policy considerations 221 (1) The abuse of a dominant position 222 (1) Dominance 223 (2) Abuse 225 (5) The objective justification 230 (1) Conclusions 231 (1) Merger Regulation 139/2004 232 (1) The scope of the Merger Regulation in relation to horizontal and flanking policies 232 (1) The appraisal of concentrations 233 (1) Dominance 234 (1) A significant impediment of competition 235 (5) Exceptions: legitimate public interests in Article 21(4) of the Merger Regulation 240 (2) Conclusions 242 (5) Harmonisation of Horizontal and Flanking Policies Introduction 247 (2) No `real' harmonisation of national legislation 249 (4) Harmonisation techniques 253 (7) Total harmonisation 253 (1) Minimum harmonisation 254 (5) The `New Approach' 259 (1) Harmonisation within the framework of the internal market 260 (37) Introduction 260 (1) Legal bases for harmonisation within the context of the Internal Market 261 (1) Article 95 EC 262 (1) Articles 47(2), 55 and 57 EC 262 (3) Article 308 EC 265 (2) Snus, Cigarettes and commercials: the potential and limits of harmonisation on the basis of internal market provisions 267 (7) Harmonisation of national horizontal and flanking policies on the basis of internal market legal bases 274 (1) Environmental policy and the internal market 274 (4) Consumer policy and the internal market 278 (6) Public health and the internal market 284 (1) Public health stricto sensu 285 (3) Health care 288 (2) Cultural policy and the internal market 290 (6) Conclusions 296 (1) Harmonisation beyond the internal market: specific legal bases 297 (14) Environmental policy as horizontal and flanking policy 298 (1) The legal basis for environmental policy 298 (1) An example of a harmonisation measure: the Transfer of Waste Regulation 299 (2) Consumer policy as horizontal and flanking policy 301 (1) The legal basis for consumer policy 301 (2) Measures adopted on the basis of Article 153 EC 303 (2) Public health policy as horizontal and flanking policy 305 (1) The legal basis for public health policy 305 (1) Measures adopted on the basis of Article 152 EC 306 (2) Cultural policy 308 (1) The legal basis for cultural policy 308 (1) Measures adopted on the basis of Article 151 EC 309 (2) Conclusions 311 (1) Harmonisation and free movement 311 (8) Towards a Synthesis Introduction 319 (1) Free movement 319 (6) Negative integration 320 (1) Prohibitive rules 320 (1) Exceptions 321 (1) Positive integration 322 (1) Harmonisation contributes to solving the problem of tension 322 (1) Minimum harmonisation 323 (1) Total harmonisation 324 (1) A wide margin of discretion of the community legislature to pursue horizontal and flanking policy interests 324 (1) Competition and the Member States 325 (3) Articles 86 and 87 EC 325 (1) The prohibitive rules 325 (1) Exceptions 326 (1) Community measures: no positive integration 327 (1) Competition and undertakings 328 (3) Articles 81, 82 EC and Merger Control 328 (1) The prohibitive rules 328 (1) Exceptions 329 (2) Community measures: no positive integration 331 (1) Coherence or convergence? …"
    كتاب
  14. 14

    Microeconomics حسب Pindyck, Robert S.

    منشور في 2009
    جدول المحتويات: "…15 (3) Corporate Decision Making: Ford's Sport Utility Vehicles 15 (2) Public Policy Design: Automobile Emission Standards for the Twenty-First Century 17 (1) Summary 18 (1) Questions for Review 18 (1) Exercises 18 (3) The Basics of Supply and Demand 21 (44) Supply and Demand 22 (3) The Supply Curve 22 (1) The Demand Curve 23 (2) The Market Mechanism 25 (1) Changes in Market Equilibrium 26 (8) Elasticities of Supply and Demand 34 (6) Point versus Arc Elasticities 37 (3) Short-Run versus Long-Run Elasticities 40 (9) Demand 40 (5) Supply 45 (4) Understanding and Predicting the Effects of Changing Market Conditions 49 (9) Effects of Government Intervention-Price Controls 58 (3) Summary 61 (1) Questions for Review 61 (1) Exercises 62 (3) Part Two Producers, Consumers, and Competitive Markets 65 (282) Consumer Behavior 67 (44) Consumer Behavior 67 (2) Consumer Preferences 69 (14) Market Baskets 69 (1) Some Basic Assumptions about Preferences 70 (1) Indifference Curves 70 (2) Indifference Maps 72 (2) The Shape of Indifference Curves 74 (1) The Marginal Rate of Substitution 75 (1) Perfect Substitutes and Perfect Complements 76 (7) Budget Constraints 83 (3) The Budget Line 83 (1) The Effects of Changes in Income and Prices 84 (2) Consumer choice 86 (6) Corner Solutions 90 (2) Revealed Preferences 92 (3) Marginal Utility and Consumer Choice 95 (5) Cost-of-Living Indexes 100 (6) Ideal Cost-of-Living Index 101 (1) Laspeyres Index 102 (1) Paasche Index 103 (1) Price Indexes in the United Statics: Chain Weighting 104 (2) Summary 106 (1) Questions for Review 106 (1) Exercises 107 (4) Individual and Market Demand 111 (48) Individual Demand 112 (8) Price Changes 112 (1) The Individual Demand Curve 113 (1) Income Changes 114 (1) Normal versus Inferior Goods 115 (1) Engel Curves 116 (3) Substitutes and Complements 119 (1) Income and Substitution Effects 120 (5) Substitution Effect 121 (1) Income Effect 121 (1) A Special Case: The Giffen Good 122 (3) Market Demand 125 (7) From Individual to Market Demand 125 (2) Elasticity of Demand 127 (5) Consumer Surplus 132 (4) Consumer Surplus and Demand 132 (4) Network Externalities 136 (4) The Bandwagon Effect 136 (1) The Snob Effect 137 (3) Empirical Estimation of Demand 140 (4) The Statistical Approach to Demand Estimation 140 (2) The Form of the Demand Relationship 142 (2) Interview and Experimental Approaches to Demand Determination 144 (1) Summary 144 (1) Questions for Review 145 (1) Exercises 146 (3) Demand Theory---A Mathematical Treatment 149 (8) Utility Maximization 149 (1) The Method of Lagrange Multipliers 150 (1) The Equal Marginal Principle 151 (1) Marginal Rate of Substitution 151 (1) Marginal Utility of Income 152 (1) An Example 152 (2) Duality in Consumer Theory 154 (1) Income and Substitution Effect 155 (2) Exercises 157 (2) Uncertainty and Consumer Behavior 159 (36) Describing Risk 160 (5) Probability 160 (1) Expected Value 161 (1) Variability 161 (2) Decision Making 163 (2) Preferences Toward Risk 165 (5) Different Preferences Toward Risk 167 (3) Reducing Risk 170 (6) Diversification 170 (2) Insurance 172 (2) The Value of Information 174 (2) The Demand for Risky Assets 176 (9) Assets 177 (1) Risky and Riskless Assets 177 (1) Asset Returns 178 (1) The Trade-Off Between Risk and Return 179 (1) The Investor's Choice Problem 180 (5) Behavioral Economics 185 (6) More Complex Preferences 186 (2) Rules of Thumb and Biases in Decision Making 188 (1) Probabilities and Uncertainty 189 (1) Summing Up 189 (2) Summary 191 (1) Questions for Review 191 (1) Exercises 191 (4) Production 195 (26) The Production Decisions of a Firm 195 (1) The Technology of Production 196 (2) The Production Function 197 (1) The Short Run versus the Long Run 197 (1) Production with One Variable Input (Labor) 198 (9) Average and Marginal Products 199 (1) The Slopes of the Product Curve 200 (1) The Average Product of Labor Curve 201 (1) The Marginal Product of Labor Curve 202 (1) The Law of Diminishing Marginal Returns 202 (3) labor Productivity 205 (2) Production with Two Variable Inputs 207 (8) Isoquants 207 (2) Input Flexibility 209 (1) Diminishing Marginal Returns 209 (1) Substitution Among Inputs 209 (2) Production Functions---Two Special Cases 211 (4) Returns to Scale 215 (3) Describing Returns to Scale 215 (3) Summary 218 (1) Questions for Review 218 (1) Exercises 219 (2) The Cost of Production 221 (50) Measuring Cost: Which Costs Matter? …"
    كتاب
  15. 15

    LINUX : the textbook / حسب Sarwar, Syed Mansoor

    منشور في 2002
    جدول المحتويات: "…44 (1) Various Ways to Change Your Shell 45 (3) Shell Start-up Files and Environment Variables 48 (1) Some Useful General-Purpose Commands 49 (7) Creating and Displaying Directories 49 (2) Displaying Files 51 (1) Printing Files 51 (1) Displaying a Calendar 51 (1) One-Way Real-Time Messaging 52 (1) Notification of and Permission for Electronic Communication 52 (1) Creating Pseudonyms for Commands 53 (3) Displaying System Up Time 56 (1) Shell Metacharacters 56 (5) Summary 58 (1) Problems 59 (2) Editing Text Files 61 (46) Introduction 62 (1) How to Do Short and Simple Edits by Using the pico Editor 63 (6) Creating the Text of an E-mail Message with the pico Text Editor 63 (1) How to Start, Save a File, and Exit 64 (2) General Keystroke Commands and Cursor Movement 66 (2) Cutting, Pasting, and Searching 68 (1) Obtaining More Control Using the vi Editor 69 (15) Shell Script File 70 (2) How to Start, Save a File, and Exit 72 (1) The Format of a vi Command and the Modes of Operation 73 (5) Cursor Movement and Editing Commands 78 (2) Yank and Put (Copy and Paste) and Substitute (Search and Replace) 80 (3) Setting the vi Environment 83 (1) Executing Shell Commands from Within vi 84 (1) Getting Maximum Control by Using the emacs Editor 84 (11) DOS Aliases 84 (2) How to Start, Save a File, and Exit 86 (1) Cursor Movement and Editing Commands 87 (1) Keyboard Macros 88 (3) Cut or Copy and Paste and Search and Replace 91 (4) How to do Graphical Editing by Using XEmacs 95 (5) Editing Data Files with XEmacs 95 (2) XEmacs Menus and Buttons 97 (1) How to Start, Save a File, and Exit 98 (2) Command Line Editing 100 (7) Summary 104 (1) Problems 104 (3) Electronic Mail 107 (52) Introduction 108 (3) How to Use the LINUX mail Command Effectively 111 (9) Sending and Reading E-mail with the LINUX mail Command 111 (1) Sending E-mail with the mail Command 112 (3) Reading E-mail with mail 115 (2) Saving Messages in Folders 117 (1) Replying to and Forwarding Messages and Including Attachments 118 (1) mail Aliases 119 (1) elm---A Full-Screen Display E-mail System 120 (11) Sending a Message in elm 121 (1) Sending E-mail with elm 121 (1) Reading E-mail in elm 121 (5) Forwarding and Replying to an E-mail message in elm 126 (3) Saving Messages in Folders 129 (1) elm Aliases 129 (2) pine---Another Full-Screen Display E-mail System Sending an E-mail Message by Using pine with an Attachment Created in vi 131 (3) Sending E-mail with pine 134 (2) Reading E-mail with pine 136 (1) Disposing of E-mail in Folders in pine 137 (2) Using the pine Address Book 139 (4) A Summary of pine Commands 143 (1) Graphical E-mail with Kmail 144 (15) Starting Out with Kmail 145 (2) Reading E-mail in Kmail 147 (3) Sending E-mail in Kmail 150 (2) Simple Filtering of E-mail into Folders 152 (2) Summary 154 (1) Problems 155 (4) Files and File System Structure 159 (38) Introduction 159 (1) The LINUX File Concept 160 (1) Types of Files 160 (3) Simple/Ordinary File 160 (1) Directory 161 (1) Link File 162 (1) Special File (Device) 162 (1) Named Pipe (FIFO) 163 (1) File System Structure 163 (7) File System Organization 163 (1) Home and Present Working Directories 164 (1) Pathnames: Absolute and Relative 164 (1) Some Standard Directories and Files 165 (5) Navigating the File Structure 170 (18) Determining the Absolute Pathname for Your Home Directory 171 (1) Browsing the File System 172 (4) Creating Files 176 (1) Creating and Removing Directories 176 (2) Manipulating the Directory Stack 178 (5) Determining File Attributes 183 (4) Determining the Type of a File's Contents 187 (1) File Representation and Storage in LINUX 188 (3) Standard Files and File Descriptors 191 (1) End of File (eof) Marker 192 (5) Summary 193 (1) Problems 194 (3) File Security 197 (22) Introduction 198 (1) Password-Based Protection 198 (1) Encryption-Based Protection 198 (2) Protection-Based on Access Permission 200 (1) Types of Users 200 (1) Types of File Operations/Access Permissions 200 (1) Determining and Changing File Access Privileges 201 (10) Determining File Access Privileges 202 (2) Changing File Access Privilages 204 (5) Default File Access Privileges 209 (2) Special Access Bits 211 (5) The Set-User-ID (SUID) Bit 211 (2) The Set-Group-ID (SGID) Bit 213 (1) The Sticky Bit 214 (2) File Permissions and Types 216 (3) Summary 216 (1) Problems 217 (2) Basic File Processing 219 (40) Introduction 220 (1) Viewing Contents of Text Files 220 (11) Viewing Complete Files 220 (3) Viewing Files One Page at a Time 223 (4) Viewing the Head or Tail of a File 227 (4) Copying, Moving, and Removing Files 231 (9) Copying Files 231 (3) Moving Files 234 (2) Removing/Deleting Files 236 (2) Determining File Size 238 (2) Appending to Files 240 (2) Combining Files 242 (2) Comparing Files 244 (5) Removing Repeated Lines 249 (2) Printing Files and Controlling Print Jobs 251 (8) LINUX Mechanism for Printing Files 251 (1) Printing Files 252 (2) Finding the Status of a Print Request 254 (1) Canceling Print Jobs 254 (2) Summary 256 (1) Problems 257 (2) Advanced File Processing 259 (42) Introduction 260 (1) Regular Expressions 260 (2) Compressing Files 262 (6) The gzip Command 263 (1) The gunzip Command 264 (1) The gzexe Command 265 (1) The zcat Command 266 (1) The zforce Command 267 (1) Sorting Files 268 (3) Searching for Commands and Files 271 (4) The find Command 272 (2) The where is Command 274 (1) The which Command 275 (1) Searching Files 275 (6) Cutting and Pasting 281 (5) Encoding and Decoding 286 (2) Command History 288 (13) Summary 297 (1) Problems 298 (3) File Sharing 301 (24) Introduction 302 (1) Duplicate Shared Files 302 (1) Common Login for Members of a Team 302 (1) Setting Appropriate Access Permissions on Shared Files 303 (1) Common Group for Members of a Team 303 (1) File Sharing via Links 303 (18) Hard Links 304 (8) Drawbacks of Hard Links 312 (2) Soft/Symbolic Links 314 (5) Types of Symbolic Links 319 (1) Pros and Cons of Symbolic Links 319 (2) Searching for Symbolic Links 321 (4) Summary 322 (1) Problems 323 (2) Redirection and Piping 325 (30) Introduction 326 (1) Standard Files 326 (1) Input Redirection 326 (2) Output Redirection 328 (2) Combining Input and Output Redirection 330 (1) I/O Redirection with File Descriptors 331 (1) Redirecting Standard Error 332 (1) Redirecting stdout and stderr in One Command 333 (2) Redirecting stdin, stdout, and stderr in One Command 335 (2) Redirecting Without Overwriting File Contents (Appending) 337 (2) LINUX pipes 339 (4) Redirection and Piping Combined 343 (2) Error Redirection in the TC Shell 345 (4) Recap of I/O and Error Redirection 349 (6) Summary 351 (1) Problems 352 (3) Processes 355 (46) Introduction 356 (1) Running Multiple Processes Simultaneously 356 (1) LINUX Process States 357 (1) Execution of Shell Commands 357 (5) Process Attributes 362 (11) Process and Job Control 373 (20) Foreground and Background Processes and Related Commands 373 (8) LINUX Daemons 381 (1) Sequential and Parallel Execution of Commands 382 (5) Abnormal Termination of Commands and Processes 387 (5) Conditional Command Execution 392 (1) Process Hierarchy in LINUX 393 (8) Summary 397 (1) Problems 398 (3) Networks and Internetworking 401 (48) Introduction 402 (1) Computer Networks and Internetworks 402 (1) The Reasons for Computer Networks and Internetworks 403 (1) Network Models 404 (2) The TCP/IP Protocol Suite 406 (8) TCP and UDP 406 (1) Routing of Application Data---The Internet Protocol (IP) 407 (2) Ipv4 Addresses in Dotted Decimal Notation 409 (1) Symbolic Names 410 (2) Translating Names to IP Addresses---The Domain Name System 412 (2) Internet Services and Protocols 414 (1) The Client-Server Software Model 415 (1) Application Software 416 (33) Displaying the Host Name 416 (1) Displaying List of Users Using Hosts on a Network 417 (2) Displaying the Status of Hosts on a Network 419 (1) Testing a Network Connection 420 (2) Displaying Information About Users 422 (3) Remote Login 425 (8) Remote Command Execution 433 (3) File Transfer 436 (3) Remote Copy 439 (3) Interactive Chat 442 (1) Tracing the Route from One Site to Another Site 443 (2) Summary 445 (1) Problems 445 (4) Introductory Bash Programming 449 (54) Introduction 450 (1) Running a Bash Script 450 (1) Shell Variables and Related Commands 451 (21) Controlling the Prompt 457 (1) Variable Declaration 457 (3) Reading and Writing Shell Variables 460 (4) Command Substitution 464 (1) Exporting Environment 465 (3) Resetting Variables 468 (1) Creating Read-Only User Defined Variables 469 (1) Reading from Standard Input 470 (2) Passing Arguments to Shell Scripts 472 (5) Comments and Program Headers 477 (1) Program Control Flow Commands 478 (25) The if-then-elif-else-fi Statement 478 (10) The for Statement 488 (2) The while Statement 490 (3) The until Statement 493 (1) The break and continue Commands 494 (1) The case Statement 495 (5) Summary 500 (1) Problems 501 (2) Advanced Bash Programming 503 (44) Introduction 504 (1) Numeric Data Processing 504 (10) Array Processing 514 (5) The Here Document 519 (4) Interrupt (Signal) Processing 523 (4) The exec Command and File I/O 527 (11) Execution of a Command without Creating a New Process 528 (2) File I/O via the exec Command 530 (8) Functions In Bash 538 (9) The Reasons for Functions 538 (1) Function Definition 539 (1) Function Invocation/Call 539 (1) Examples of Functions 539 (3) Debugging Shell Programs 542 (2) Summary 544 (1) Problems 545 (2) Introductory TC Shell Programming 547 (42) Introduction 548 (1) Running a TC Shell Script 548 (1) Shell Variables and Related Commands 549 (14) Reading and Writing Shell Variables 553 (2) Command Substitution 555 (1) Exporting Environment 556 (3) Resetting Variables 559 (1) Creating Read-Only User-Defined Variables 560 (1) Reading from Standard Input 561 (2) Passing Arguments to Shell Scripts 563 (4) Comments and Program Headers 567 (1) Program Control Commands 568 (21) The if-then-else-endif Statement 568 (9) The foreach Statement 577 (2) The while Statement 579 (2) The break, continue and goto Commands 581 (1) The switch Statement 582 (4) Summary 586 (1) Problems 586 (3) Advanced TC Shell Programming 589 (20) Introduction 590 (1) Numeric Data Processing 590 (2) Array Processing 592 (6) The Here Document 598 (2) Interrupt (Signal) Processing 600 (5) Debugging Shell Programs 605 (4) Summary 606 (1) Problems 607 (2) File System Backup 609 (16) Introduction 610 (1) Archiving and Restoring Files Via tar 610 (12) Archiving Files 611 (5) Restoring Archived Files 616 (4) Copying Directory Hierarchies 620 (2) Software Distributions in the tar Format 622 (3) Summary 623 (1) Problems 623 (2) LINUX Tools for Software Development 625 (98) Introduction 626 (1) Computer Programming Languages 626 (2) The Compilation Process 628 (1) The Software Engineering Life Cycle 628 (2) Program Generation Tools 630 (67) Generating C Source Files 631 (1) Indenting C Source Code 631 (3) Compiling C Programs 634 (5) Handling Module-Based C Software 639 (13) Creating, Modifying, and Extracting from Libraries/Archives 652 (8) Version Control 660 (37) Static Analysis Tools 697 (7) Profiling C Source Code 698 (6) Dynamic Analysis Tools 704 (19) Source Code Debugging 704 (13) Run-Time Performance 717 (2) Summary 719 (1) Problems 719 (4) Xfree 86 and the LINUX GUI 723 Introduction 724 The Basics of Xfree86 725 Comparisons and Advantages 725 The Key Components of Interactivity---Events and Requests 727 The Role of a Window Manager in the User Interface and fvwm 729 Customizing Xfree86 and fvwm 734 The GNOME Desktop Manager 742 Logging In and Out and the Appearance of the GNOME Desktop 743 The GNOME Panel 744 Customizing the Panel 747 GnoRPM Installation of New Packages 751 The Sawfish Window Manager 755 The GNOME Control Center 760 File Management with the GNOME File Manager 761 The KDE Desktop Manager 763 Logging In and Out 764 The KDE Panel 766 New Packages Installation 771 The K Window Manager 775 The KDE Control Center 778 File Management with kfm 780 Internet Resources 782 Summary 783 Problems 784 Appendix A: LINUX Installation A-1 Appendix B: Command Dictionary A-13 Glossary G-1 Index l-1…"
    كتاب