Resultados da pesquisa - read data model
Sugestões de Tópicos dentro de sua pesquisa.
Sugestões de Tópicos dentro de sua pesquisa.
- Industrial efficiency 2
- Mental efficiency 2
- Bridges (Computer networks) 1
- Business enterprises--Computer networks 1
- Business logistics 1
- Computer network protocols 1
- Computer networks 1
- Computer programming 1
- Computer systems 1
- Computers 1
- Database management 1
- Electronic commerce 1
- Electronic digital computers 1
- Information Systems Congresses 1
- Interactive computer systems 1
- Internet service providers 1
- Local area networks (Computer networks) 1
- Mathematics- General 1
- Operating systems (Computers) 1
- Relational databases 1
- Routers (Computer networks) 1
- Software engineering 1
- Telecommunication 1
- UNIX (Computer file) 1
- User interfaces (Computer systems) 1
Pesquisas alternativas:
- read »
-
1
-
2
Computer networks
Publicado em 2003Sumário: “...Network Software. Reference Models. Example Networks. Network Standardization. ...”
Livro -
3
Database concepts /
Publicado em 2003Sumário: “...16 (6) Functions of an Application Program 17 (1) Functions of a DBMS 18 (1) Definition and Components of a Database 19 (2) Desktop Versus Organizational Database Systems 21 (1) How to Build a Database System 22 (2) Building a Data Model 22 (1) Creating a Database Design 23 (1) Implementing a Database 24 (1) Summary 24 (2) Review Questions 26 (1) Exercises 27 (1) Garden Glory Project Questions 28 (1) James River Jewelry Project Questions 28 (2) The Relational Model 30 (24) Chapter Objectives 30 (1) Relations 31 (2) A Sample Relation and Two Nonrelations 31 (1) A Note on Terminology 32 (1) Types of Keys 33 (8) Composite Keys 34 (1) Primary and Candidate Keys 34 (1) Foreign Keys and Referential Integrity 34 (4) Surrogate Keys 38 (3) Functional Dependencies and Normalization 41 (6) Functional Dependencies 41 (1) Primary and Candidate Keys Revisited 42 (1) Normalization 43 (1) Relational Design Principles 44 (1) Normalization Examples 44 (3) The Problem of Null Values 47 (1) Summary 48 (1) Review Questions 49 (1) Exercises 50 (1) Garden Glory Project Questions 51 (1) James River Jewelry Project Questions 52 (2) Structured Query Language 54 (31) Chapter Objectives 54 (1) A Sample Database 55 (2) SQL for Data Definition 57 (4) Defining Primary Keys with the ALTER TABLE Statement 59 (1) Defining Foreign Keys with the ALTER TABLE Statement 59 (1) Submitting SQL to the DBMS 59 (1) DROP Statements 60 (1) SQL for Relational Query 61 (14) Reading Specified Columns from a Single Table 62 (1) Reading Specified Rows from a Single Table 62 (2) Reading Specified Columns and Specified Rows from a Single Table 64 (1) Ranges, Wildcards, and Nulls in WHERE Clauses 65 (1) Sorting the Results 66 (1) SQL Built-In Functions 67 (2) Built-In Functions and Groupings 69 (1) Querying Multiple Tables with Subqueries 70 (1) Querying Multiple Tables with Joins 71 (3) Outer Joins 74 (1) SQL for Relational Data Modification 75 (3) Inserting Data 75 (1) Modifying Data 76 (1) Deleting Data 77 (1) Summary 78 (1) Review Questions 79 (2) Exercises 81 (1) Garden Glory Project Questions 81 (1) James River Jewelry Project Questions 82 (3) PART 2 DATABASE DESIGN AND MANAGEMENT 85 (80) Data Modeling and the Entity-Relationship Model 86 (24) Chapter Objectives 86 (1) The Requirements Stage 87 (1) The Entity-Relationship Data Model 88 (6) Entities 88 (1) Attributes 89 (1) Identifiers 89 (1) Relationships 90 (1) Three Types of Binary Relationships 90 (1) Recursive Relationships 91 (1) Entity-Relationship Diagrams 92 (1) Weak Entities 92 (2) Unified Modeling Language Entity-Relationship Diagrams 94 (2) UML Entities and Relationships 94 (1) UML Representation of Weak Entities 95 (1) An Example 96 (10) Heather Sweeney Designs 96 (1) The Seminar Customer List 97 (1) The Customer Form Letter 98 (3) The Sales Invoice 101 (2) Attribute Specifications 103 (1) Business Rules 103 (1) Validating the Data Model 104 (2) Summary 106 (1) Review Questions 107 (1) Exercises 108 (1) Garden Glory Project Questions 108 (1) James River Jewelry Project Questions 109 (1) Database Design 110 (25) Chapter Objectives 110 (1) Representing Entities with the Relational Model 111 (6) Normalization, Second Verse 112 (1) Normal Forms 113 (1) Domain/Key Normal Form 113 (1) Using Normalization Criteria 114 (1) Denormalization 115 (1) Representing Weak Entities 115 (2) Representing Relationships 117 (10) Representing One-to-One Relationships 117 (2) Questionable One-to-One Relationships 119 (1) Representing One-to-Many Relationships 119 (2) Representing Many-to-Many Relationships 121 (2) Representing Recursive Relationships 123 (4) Database Design at Heather Sweeney Designs 127 (4) Weak Entities 128 (1) Relationships 128 (1) Enforcing Referential Integrity 129 (2) Summary 131 (1) Review Questions 131 (2) Exercises 133 (1) Garden Glory Project Questions 133 (1) James River Jewelry Project Questions 134 (1) Database Administration 135 (30) Chapter Objectives 135 (1) The Database Processing Environment 136 (4) Queries, Forms, and Reports 136 (1) Internet Application Processing 137 (1) Client/Server and Traditional Application Processing 138 (1) Stored Procedures and Triggers 138 (1) The Need for Control, Security and Reliability 139 (1) Concurrency Control 140 (10) The Need for Atomic Transactions 140 (1) Concurrent Transaction Processing 141 (2) The Lost Update Problem 143 (1) Concurrency Problems: Dirty Reads, Inconsistent Reads, Phantom Reads 143 (1) Resource Locking 144 (1) Lock Terminology 144 (1) Serializable Transactions 145 (1) Deadlock 145 (1) Optimistic Versus Pessimistic Locking 146 (1) Declaring Lock Characteristics 147 (1) Consistent Transactions 148 (1) Transaction Isolation Level 149 (1) Database Security 150 (3) Processing Rights and Responsibilities 150 (1) DBMS Security 151 (1) Application Security 152 (1) Database Backup and Recovery 153 (4) Recovery via Reprocessing 153 (1) Recovery via Rollback and Rollforward 154 (3) Additional DBA Responsibilities 157 (1) Summary 158 (1) Review Questions 159 (2) Exercises 161 (1) Garden Glory Project Questions 162 (1) James River Jewelry Project Questions 163 (2) Appendix Database Processing with Microsoft Access 165 (40) Appendix Objectives 165 (1) Database Schema for Carbon River Construction 166 (2) Carbon River Schema Data Structure Diagram 167 (1) Column Design 167 (1) Creating Tables and Relationships Using Access 168 (7) Creating Tables 170 (1) Creating Relationships 171 (4) Creating Queries and SQL Statements 175 (6) Creating Simple Queries with the Graphical Tool 175 (5) Action Queries 180 (1) Creating Access Data Entry Forms 181 (9) Creating a Simple Form 181 (2) Using Default Values and Combo Boxes with Forms 183 (5) Looking Up Nonkey Data 188 (2) Creating Access Reports 190 (7) Banded Report Writers 190 (2) Computations in Reports 192 (1) Parameterized Reports 193 (4) Summary 197 (1) Review Questions 198 (2) Exercises 200 (1) Garden Glory Project Questions 201 (1) James River Jewelry Project Questions 202 (3) Glossary 205 (9) Index 214...”
Livro -
4
Software engineering : a programming approach /
Publicado em 2000Sumário: “...17 (1) Summary 18 (3) Exercises 19 (1) Answers to self test questions 20 (1) Further reading 20 (1) Process models 21 (24) Introduction 21 (1) The components of software development 22 (2) Validation and verification 24 (1) The waterfall model 25 (3) Prototyping 28 (8) Formal methods -- the transform model 36 (1) The spiral model 37 (3) Discussion 40 (1) Summary 41 (4) Exercises 41 (1) Answers to self test questions 42 (1) Further reading 42 (3) Part B Requirements engineering Requirements analysis 45 (10) Introduction 45 (1) The notion of a requirement 46 (1) The process of eliciting requirements 47 (2) The requirements specification 49 (3) Summary 52 (3) Exercises 53 (1) Further reading 54 (1) Formal specification 55 (16) Introduction 55 (2) Formal specification in Z: an example 57 (7) The role of formal specification 64 (1) Summary 65 (6) Exercises 66 (1) Answers to self test questions 67 (1) Further reading 67 (4) Part C Design Structured programming 71 (14) Introduction 71 (1) Arguments against goto 72 (4) Arguments in favor of goto 76 (1) Selecting control structures 77 (2) What is structured programming? ...”
Livro -
5
Computer systems : a programmer's perspective beta version /
Publicado em 2003Sumário: “...It Pays to Understand How Compilation Systems Work. Processors Read and Interpret Instructions Stored in Memory. ...”
Livro -
6
E-business and e-commerce management : strategy, implementation, and practice
Publicado em 2007Sumário: “...486 (2) Objectives of knowledge management 488 (1) Implementing knowledge management 488 (2) Technologies for implementing knowledge management 490 (2) Risk management 492 (2) Case Study 10.2 Sharing knowledge at the BBC using Internet technologies 493 (1) Summary 494 (1) Exercises 494 (2) References 496 (1) Further reading 497 (1) Web links 497 (2) Analysis and design 499 (71) Learning outcomes / Management issues 499 (1) Links to other chapters 499 (1) Introduction 500 (1) Analysis for e-business 501 (1) Workflow management 501 (1) Process modelling 502 (9) Process mapping 503 (1) Task analysis and task decomposition 503 (2) Process dependencies 505 (6) Validating a new process model 511 (1) Data modelling 511 (2) Design for e-business 513 (2) Architectural design of e-business systems 513 (2) Focus on user-centred site design 515 (25) Use-case analysis 516 (6) Designing the information architecture 522 (5) Customer orientation 527 (2) Elements of site design 529 (6) Web accessibility 535 (3) Case Study 11.1 dabs.com refines its web store 538 (2) Focus on security design for e-business 540 (25) Managing computer viruses 542 (4) Controlling information service usage 546 (1) Monitoring of electronic communications 546 (5) E-mail management 551 (6) Hacking 557 (2) `Phishing' 559 (1) Denial-of-service attacks 560 (1) Secure e-commerce transactions 560 (1) Approaches to developing secure systems 561 (1) Current approaches to e-commerce security 562 (2) Reassuring the customer 564 (1) Case Study 11.2 Building an e-business fortress 564 (1) Summary 565 (1) Exercises 566 (1) References 567 (1) Further reading 568 (1) Web links 569 (1) Implementation and maintenance 570 (61) Learning outcomes / Management issues 570 (1) Links to other chapters 570 (1) Introduction 571 (1) Alternatives for acquiring e-business systems 572 (2) Development of web-based content and services 574 (1) Creating static web content 574 (1) Focus on HTML 575 (11) Focus on developing dynamic web content 586 (10) JavaScript 587 (3) VBScript 590 (1) Perl 591 (1) Active server pages (ASPs) 591 (1) .NET 591 (1) Common Gateway Interface (CGI) 591 (1) Other standards for dynamic content 592 (1) Tools for web-site development and testing 593 (3) Testing 596 (1) The testing process 596 (1) Testing environments 597 (1) Changeover 597 (2) Database creation and data migration 598 (1) Deployment planning 599 (1) Content management and maintenance 599 (6) Frequency and scope of content updating 599 (2) Maintenance process and responsibilities 601 (4) Focus on measuring and improving performance of e-business systems 605 (22) Principles of performance management and improvement 606 (1) Stage 1: Creating a performance management system 607 (2) Stage 2: Defining the performance metrics framework 609 (3) Stage 3: Tools and techniques for collecting metrics and summarizing results 612 (7) Budgeting 619 (3) Case Study 12.1 Learning from Amazon's culture of metrics 622 (5) Summary 627 (1) Exercises 628 (1) References 629 (1) Further reading 630 (1) Web links 630 (1) Glossary 631 (18) Index 649...”
Livro -
7
-
8
-
9
Proactive purchasing in the supply chain : the key to world-class procurement /
Publicado em 2012Sumário: “...Multiple Sourcing Share of Supplier's Capacity Local, National, and International Sourcing Manufacturer or Distributor "Green" Supply Management Minority- and Women-Owned Business Enterprises Ethical Considerations Reciprocity Consortium Purchasing and Group Buying Disaster Plans Summary Appendix Illustrative Plant Survey Financial Statement Analysis Planning a Facility Visit Endnotes Suggested Reading Chapter 14 Global Supply Management Global Management Perspective Future of Global Supply Management Stages to Global Supply Management Reasons for Global Sourcing Potential Problems Questions Before Going Global Supply Channels Global Trade Intermediaries International Procurement Offices Direct Suppliers Eliminating Intermediaries Identifying Direct Suppliers Qualifying Direct Suppliers Preparing for Direct Relations The Initial Meeting Currency and Payment Issues Exchange Rates Payments Letters of Credit Countertrade Countertrade's Advantages Countertrade's Disadvantages Supply Management's Role Creative Countertrade Political and Economic Alliances European Union North American Free Trade Agreement MERCOSUR Association of Southeast Asian Nations Asia-Pacific Economic Cooperation Summary Appendix Currency Risk Hedging Endnotes Suggested Reading Chapter 15 Total Cost of Ownership Three Components of Total Cost Acquisition Costs Ownership Costs Post-Ownership Costs TCO, Net Present Value (NPV) Analysis, and Estimated Costs The Importance of Total Cost of Ownership in Supply Management Service Providers Retail Manufacturing Supply Chains/Supply Networks Summary Appendix: Supply Management in Action Endnotes Suggested Reading Chapter 16 Price and Cost Analysis Introduction General Economic Considerations Conditions of Competition Variable-Margin Pricing Product Differentiation Six Categories of Cost Regulation by Competition Price Analysis Competitive Price Proposals Regulated, Catalog, and Market Prices Internet/e-Commerce II Historical Prices Supply and Demand Factors Independent Cost Estimates Cost Analysis Cost Analysis Defined Capabilities of Management Efficiency of Labor Amount and Quality of Subcontracting Plant Capacity Sources of Cost Data Potential Suppliers Supply Partners Cost Models Direct Costs Direct Labor Direct Materials Tooling Costs Learning Curves Cumulative Curve and the Unit Curve Target Cost Estimation Indirect Costs Engineering Overhead Material Overhead Manufacturing Overhead General and Administrative Selling Recovering Indirect Costs Activity-Based Costing Target Costing Profit Resisting Arbitrary Price Increases Summary Appendix A: Application of Learning Curves Appendix B: Discounts Endnotes Suggested Reading Chapter 17 Methods of Compensation Introduction to Compensation Arrangements Observation Contract Cost Risk Appraisal Technical Risk Contract Schedule Risk General Types of Contract Compensation Arrangements Fixed Price Contracts Incentive Contracts Cost-Reimbursement Contracts Specific Types of Compensation Arrangements Firm Fixed Price Contracts Fixed Price with Economic Price Adjustment Contracts Fixed Price Redetermination Contracts Incentive Arrangements Fixed Price Incentive Fee Cost Plus Incentive Fee Arrangements Cost Plus Fixed Fee Arrangements Cost Plus Award Fee (CPAF) Cost without Fee Cost Sharing Time and Materials Letter Contracts and Letters of Intent Considerations When Selecting the Method of Compensation Summary Endnotes Suggested Reading Chapter 18 Negotiations Introduction Objectives of Negotiation Quality Fair and Reasonable Price On-Time Performance Control Cooperation Supplier Relationship Management When to Negotiate Supply Management's Role in Negotiation The Supply Management Professional Acting Alone The Supply Management Professional as the Negotiating Team Leader The Negotiation Process Preparation Establishing Objectives Identify the Desired Type of Relationship Five Powerful Preparation Activities The BATNA The Agenda "Murder Boards" and Mock Negotiations Crib Sheets Draft Agreements Face-to-Face Discussions Fact Finding Recess Narrowing the Differences Hard Bargaining Techniques Universally Applicable Techniques Transactional Techniques Collaborative and Alliance Negotiating Techniques The Debriefing: An Incredible Learning Opportunity Documentation Online Negotiation Advantages to Online Negotiation An Example of a Successful Application of Negotiating Online Drawbacks to Online Negotiation Negotiating for Price Price Analysis Negotiation Cost Analysis Negotiation Characteristics of a Successful Negotiator Summary Endnotes Suggested Reading Chapter 19 Contract Formation and Legal Issues Litigation Prevention Dispute Resolution Negotiation Mediation Litigation Arbitration Courts Development of Commercial Law Electronic Contract Considerations: Cyber Law Attempts to Revise the UCC Basic Legal Considerations Status of an Agent The Purchase Contract Letters of Intent Special Legal Considerations Inspection Rights Rights of Rejection Title and Risk of Loss Warranties Evergreen Contracts Order Cancellation and Breach of Contract JIT Contracts Honest Mistakes Patent Infringement Restraint of Trade Laws International Considerations Contracts for the International Sale of Goods Foreign Corrupt Practices Act Summary Endnotes Suggested Reading Chapter 20 Contract and Relationship Management Need for Better Contract Management Preaward Conference: The Stage Has Been Set Monitoring and Controlling Project Progress Operations Progress Reports Gantt Charts CPM and PERT Closed-Loop MRP Systems Monitoring and Controlling Total Supplier Performance Supplier Performance Evaluation Motivation Punishment Rewards Assistance Transformational Training Quality Audits and Supply System Reviews Problem Solving Collaboration Managing the Relationship Summary Appendix A: Supplier Reporting Requirements for Unique Major Projects Appendix B: How Critical Path Scheduling Works Appendix C: Supplier Questionnaire Endnotes Suggested Reading Chapter 21 Ethics and Social Responsibility Ethics in the Supply Management Context Professional Supply Management Ethics Principles and Standards of Ethical Supply Management Conduct National and International Supply Management Conduct Important Areas Requiring Amplification Avoid Sharp Practices Competitive Bidding Negotiation Samples Treating Salespeople with Respect Substandard Materials and Services Gifts and Gratuities Management Responsibilities Written Standards Ethics Training and Education Departmental Environment Miscellaneous Factors Dealing with Gray Areas The Four Way Test Social Responsibilities Summary Endnotes Suggested Reading Chapter 22 Implementing World-Class Purchasing in the Supply Chain Designing an Effective Purchasing/Supply Management Department The Purchasing Planning Function Defining Planning Four Phases of Planning The Organizing Function The Five Basic Steps to Organizing Basic Concepts of Organizing Organizing for Supply Chain Management The Staffing Function The Directing Function Leadership Leadership and the Purchasing Profession The Controlling Function Evaluating the Purchasing/Supply Management Department The Annual Report Risk Management New Focus on Risk Management Appendix A: The Institute for Supply Management Awards for Excellence in Supply Management Appendix B: From Reactive to Proactive Procurement: A Case Study Appendix C: Raytheon Supply Base Optimization, April Appendix D: At Rolls-Royce North America, an Organizational Shift Is the Driving Force Behind an Innovative New Journey to Engage Its Supply Chain Endnotes Suggested Reading Epilogue The Future of Supply Management Index...”
Livro -
10
Interconnections : bridges, routers, switches, and internetworking protocols /
Publicado em 2000Sumário: “...Preface xi Roadmap to the Book xii Acknowledgments xii Essential Networking Concepts 1 (18) Layers 1 (6) Service Models 7 (2) Important Properties of a Network 9 (3) Reliable Data Transfer Protocols 12 (7) Data Link Layer Issues 19 (26) Generic LANs 19 (3) IEEE 802 LANs 22 (1) Names, Addresses, Routes 23 (2) LAN Addresses 25 (2) Multicast versus Unicast Addresses 27 (1) The Broadcast Address 28 (1) Multiplexing Field 29 (3) Bit Order 32 (2) Logical Link Control 34 (1) Issues in 802.3 35 (3) Issues in 802.5 38 (2) Packet Bursts 40 (1) Reasons for Bridges 40 (1) Point-to-Point Links 41 (4) Transparent Bridges 45 (50) The No-Frills Bridge 45 (2) The Learning Bridge 47 (11) Spanning Tree Algorithm 58 (5) Spanning Tree Algorithm Refinements 63 (14) Bridge Message Formats 77 (2) Other Bridge Issues 79 (8) Remote Bridges 87 (8) Source Routing Bridges 95 (32) Pure Source Routing 96 (8) SR-TB Bridges 104 (4) SRT Bridges 108 (1) End-system Algorithms 109 (7) Source Routing versus Transparent Bridging 116 (3) Ideas for Improving Source Route Bridging 119 (8) Hubs, Switches, Virtual LANs, and Fast Ethernet 127 (18) Hubs 127 (5) Faster LANs 132 (2) Virtual LANs (VLANs) 134 (11) Network Interface: Service Models 145 (8) What Is the Network Layer? ...”
Livro -
11
LINUX : the textbook /
Publicado em 2002Sumário: “...44 (1) Various Ways to Change Your Shell 45 (3) Shell Start-up Files and Environment Variables 48 (1) Some Useful General-Purpose Commands 49 (7) Creating and Displaying Directories 49 (2) Displaying Files 51 (1) Printing Files 51 (1) Displaying a Calendar 51 (1) One-Way Real-Time Messaging 52 (1) Notification of and Permission for Electronic Communication 52 (1) Creating Pseudonyms for Commands 53 (3) Displaying System Up Time 56 (1) Shell Metacharacters 56 (5) Summary 58 (1) Problems 59 (2) Editing Text Files 61 (46) Introduction 62 (1) How to Do Short and Simple Edits by Using the pico Editor 63 (6) Creating the Text of an E-mail Message with the pico Text Editor 63 (1) How to Start, Save a File, and Exit 64 (2) General Keystroke Commands and Cursor Movement 66 (2) Cutting, Pasting, and Searching 68 (1) Obtaining More Control Using the vi Editor 69 (15) Shell Script File 70 (2) How to Start, Save a File, and Exit 72 (1) The Format of a vi Command and the Modes of Operation 73 (5) Cursor Movement and Editing Commands 78 (2) Yank and Put (Copy and Paste) and Substitute (Search and Replace) 80 (3) Setting the vi Environment 83 (1) Executing Shell Commands from Within vi 84 (1) Getting Maximum Control by Using the emacs Editor 84 (11) DOS Aliases 84 (2) How to Start, Save a File, and Exit 86 (1) Cursor Movement and Editing Commands 87 (1) Keyboard Macros 88 (3) Cut or Copy and Paste and Search and Replace 91 (4) How to do Graphical Editing by Using XEmacs 95 (5) Editing Data Files with XEmacs 95 (2) XEmacs Menus and Buttons 97 (1) How to Start, Save a File, and Exit 98 (2) Command Line Editing 100 (7) Summary 104 (1) Problems 104 (3) Electronic Mail 107 (52) Introduction 108 (3) How to Use the LINUX mail Command Effectively 111 (9) Sending and Reading E-mail with the LINUX mail Command 111 (1) Sending E-mail with the mail Command 112 (3) Reading E-mail with mail 115 (2) Saving Messages in Folders 117 (1) Replying to and Forwarding Messages and Including Attachments 118 (1) mail Aliases 119 (1) elm---A Full-Screen Display E-mail System 120 (11) Sending a Message in elm 121 (1) Sending E-mail with elm 121 (1) Reading E-mail in elm 121 (5) Forwarding and Replying to an E-mail message in elm 126 (3) Saving Messages in Folders 129 (1) elm Aliases 129 (2) pine---Another Full-Screen Display E-mail System Sending an E-mail Message by Using pine with an Attachment Created in vi 131 (3) Sending E-mail with pine 134 (2) Reading E-mail with pine 136 (1) Disposing of E-mail in Folders in pine 137 (2) Using the pine Address Book 139 (4) A Summary of pine Commands 143 (1) Graphical E-mail with Kmail 144 (15) Starting Out with Kmail 145 (2) Reading E-mail in Kmail 147 (3) Sending E-mail in Kmail 150 (2) Simple Filtering of E-mail into Folders 152 (2) Summary 154 (1) Problems 155 (4) Files and File System Structure 159 (38) Introduction 159 (1) The LINUX File Concept 160 (1) Types of Files 160 (3) Simple/Ordinary File 160 (1) Directory 161 (1) Link File 162 (1) Special File (Device) 162 (1) Named Pipe (FIFO) 163 (1) File System Structure 163 (7) File System Organization 163 (1) Home and Present Working Directories 164 (1) Pathnames: Absolute and Relative 164 (1) Some Standard Directories and Files 165 (5) Navigating the File Structure 170 (18) Determining the Absolute Pathname for Your Home Directory 171 (1) Browsing the File System 172 (4) Creating Files 176 (1) Creating and Removing Directories 176 (2) Manipulating the Directory Stack 178 (5) Determining File Attributes 183 (4) Determining the Type of a File's Contents 187 (1) File Representation and Storage in LINUX 188 (3) Standard Files and File Descriptors 191 (1) End of File (eof) Marker 192 (5) Summary 193 (1) Problems 194 (3) File Security 197 (22) Introduction 198 (1) Password-Based Protection 198 (1) Encryption-Based Protection 198 (2) Protection-Based on Access Permission 200 (1) Types of Users 200 (1) Types of File Operations/Access Permissions 200 (1) Determining and Changing File Access Privileges 201 (10) Determining File Access Privileges 202 (2) Changing File Access Privilages 204 (5) Default File Access Privileges 209 (2) Special Access Bits 211 (5) The Set-User-ID (SUID) Bit 211 (2) The Set-Group-ID (SGID) Bit 213 (1) The Sticky Bit 214 (2) File Permissions and Types 216 (3) Summary 216 (1) Problems 217 (2) Basic File Processing 219 (40) Introduction 220 (1) Viewing Contents of Text Files 220 (11) Viewing Complete Files 220 (3) Viewing Files One Page at a Time 223 (4) Viewing the Head or Tail of a File 227 (4) Copying, Moving, and Removing Files 231 (9) Copying Files 231 (3) Moving Files 234 (2) Removing/Deleting Files 236 (2) Determining File Size 238 (2) Appending to Files 240 (2) Combining Files 242 (2) Comparing Files 244 (5) Removing Repeated Lines 249 (2) Printing Files and Controlling Print Jobs 251 (8) LINUX Mechanism for Printing Files 251 (1) Printing Files 252 (2) Finding the Status of a Print Request 254 (1) Canceling Print Jobs 254 (2) Summary 256 (1) Problems 257 (2) Advanced File Processing 259 (42) Introduction 260 (1) Regular Expressions 260 (2) Compressing Files 262 (6) The gzip Command 263 (1) The gunzip Command 264 (1) The gzexe Command 265 (1) The zcat Command 266 (1) The zforce Command 267 (1) Sorting Files 268 (3) Searching for Commands and Files 271 (4) The find Command 272 (2) The where is Command 274 (1) The which Command 275 (1) Searching Files 275 (6) Cutting and Pasting 281 (5) Encoding and Decoding 286 (2) Command History 288 (13) Summary 297 (1) Problems 298 (3) File Sharing 301 (24) Introduction 302 (1) Duplicate Shared Files 302 (1) Common Login for Members of a Team 302 (1) Setting Appropriate Access Permissions on Shared Files 303 (1) Common Group for Members of a Team 303 (1) File Sharing via Links 303 (18) Hard Links 304 (8) Drawbacks of Hard Links 312 (2) Soft/Symbolic Links 314 (5) Types of Symbolic Links 319 (1) Pros and Cons of Symbolic Links 319 (2) Searching for Symbolic Links 321 (4) Summary 322 (1) Problems 323 (2) Redirection and Piping 325 (30) Introduction 326 (1) Standard Files 326 (1) Input Redirection 326 (2) Output Redirection 328 (2) Combining Input and Output Redirection 330 (1) I/O Redirection with File Descriptors 331 (1) Redirecting Standard Error 332 (1) Redirecting stdout and stderr in One Command 333 (2) Redirecting stdin, stdout, and stderr in One Command 335 (2) Redirecting Without Overwriting File Contents (Appending) 337 (2) LINUX pipes 339 (4) Redirection and Piping Combined 343 (2) Error Redirection in the TC Shell 345 (4) Recap of I/O and Error Redirection 349 (6) Summary 351 (1) Problems 352 (3) Processes 355 (46) Introduction 356 (1) Running Multiple Processes Simultaneously 356 (1) LINUX Process States 357 (1) Execution of Shell Commands 357 (5) Process Attributes 362 (11) Process and Job Control 373 (20) Foreground and Background Processes and Related Commands 373 (8) LINUX Daemons 381 (1) Sequential and Parallel Execution of Commands 382 (5) Abnormal Termination of Commands and Processes 387 (5) Conditional Command Execution 392 (1) Process Hierarchy in LINUX 393 (8) Summary 397 (1) Problems 398 (3) Networks and Internetworking 401 (48) Introduction 402 (1) Computer Networks and Internetworks 402 (1) The Reasons for Computer Networks and Internetworks 403 (1) Network Models 404 (2) The TCP/IP Protocol Suite 406 (8) TCP and UDP 406 (1) Routing of Application Data---The Internet Protocol (IP) 407 (2) Ipv4 Addresses in Dotted Decimal Notation 409 (1) Symbolic Names 410 (2) Translating Names to IP Addresses---The Domain Name System 412 (2) Internet Services and Protocols 414 (1) The Client-Server Software Model 415 (1) Application Software 416 (33) Displaying the Host Name 416 (1) Displaying List of Users Using Hosts on a Network 417 (2) Displaying the Status of Hosts on a Network 419 (1) Testing a Network Connection 420 (2) Displaying Information About Users 422 (3) Remote Login 425 (8) Remote Command Execution 433 (3) File Transfer 436 (3) Remote Copy 439 (3) Interactive Chat 442 (1) Tracing the Route from One Site to Another Site 443 (2) Summary 445 (1) Problems 445 (4) Introductory Bash Programming 449 (54) Introduction 450 (1) Running a Bash Script 450 (1) Shell Variables and Related Commands 451 (21) Controlling the Prompt 457 (1) Variable Declaration 457 (3) Reading and Writing Shell Variables 460 (4) Command Substitution 464 (1) Exporting Environment 465 (3) Resetting Variables 468 (1) Creating Read-Only User Defined Variables 469 (1) Reading from Standard Input 470 (2) Passing Arguments to Shell Scripts 472 (5) Comments and Program Headers 477 (1) Program Control Flow Commands 478 (25) The if-then-elif-else-fi Statement 478 (10) The for Statement 488 (2) The while Statement 490 (3) The until Statement 493 (1) The break and continue Commands 494 (1) The case Statement 495 (5) Summary 500 (1) Problems 501 (2) Advanced Bash Programming 503 (44) Introduction 504 (1) Numeric Data Processing 504 (10) Array Processing 514 (5) The Here Document 519 (4) Interrupt (Signal) Processing 523 (4) The exec Command and File I/O 527 (11) Execution of a Command without Creating a New Process 528 (2) File I/O via the exec Command 530 (8) Functions In Bash 538 (9) The Reasons for Functions 538 (1) Function Definition 539 (1) Function Invocation/Call 539 (1) Examples of Functions 539 (3) Debugging Shell Programs 542 (2) Summary 544 (1) Problems 545 (2) Introductory TC Shell Programming 547 (42) Introduction 548 (1) Running a TC Shell Script 548 (1) Shell Variables and Related Commands 549 (14) Reading and Writing Shell Variables 553 (2) Command Substitution 555 (1) Exporting Environment 556 (3) Resetting Variables 559 (1) Creating Read-Only User-Defined Variables 560 (1) Reading from Standard Input 561 (2) Passing Arguments to Shell Scripts 563 (4) Comments and Program Headers 567 (1) Program Control Commands 568 (21) The if-then-else-endif Statement 568 (9) The foreach Statement 577 (2) The while Statement 579 (2) The break, continue and goto Commands 581 (1) The switch Statement 582 (4) Summary 586 (1) Problems 586 (3) Advanced TC Shell Programming 589 (20) Introduction 590 (1) Numeric Data Processing 590 (2) Array Processing 592 (6) The Here Document 598 (2) Interrupt (Signal) Processing 600 (5) Debugging Shell Programs 605 (4) Summary 606 (1) Problems 607 (2) File System Backup 609 (16) Introduction 610 (1) Archiving and Restoring Files Via tar 610 (12) Archiving Files 611 (5) Restoring Archived Files 616 (4) Copying Directory Hierarchies 620 (2) Software Distributions in the tar Format 622 (3) Summary 623 (1) Problems 623 (2) LINUX Tools for Software Development 625 (98) Introduction 626 (1) Computer Programming Languages 626 (2) The Compilation Process 628 (1) The Software Engineering Life Cycle 628 (2) Program Generation Tools 630 (67) Generating C Source Files 631 (1) Indenting C Source Code 631 (3) Compiling C Programs 634 (5) Handling Module-Based C Software 639 (13) Creating, Modifying, and Extracting from Libraries/Archives 652 (8) Version Control 660 (37) Static Analysis Tools 697 (7) Profiling C Source Code 698 (6) Dynamic Analysis Tools 704 (19) Source Code Debugging 704 (13) Run-Time Performance 717 (2) Summary 719 (1) Problems 719 (4) Xfree 86 and the LINUX GUI 723 Introduction 724 The Basics of Xfree86 725 Comparisons and Advantages 725 The Key Components of Interactivity---Events and Requests 727 The Role of a Window Manager in the User Interface and fvwm 729 Customizing Xfree86 and fvwm 734 The GNOME Desktop Manager 742 Logging In and Out and the Appearance of the GNOME Desktop 743 The GNOME Panel 744 Customizing the Panel 747 GnoRPM Installation of New Packages 751 The Sawfish Window Manager 755 The GNOME Control Center 760 File Management with the GNOME File Manager 761 The KDE Desktop Manager 763 Logging In and Out 764 The KDE Panel 766 New Packages Installation 771 The K Window Manager 775 The KDE Control Center 778 File Management with kfm 780 Internet Resources 782 Summary 783 Problems 784 Appendix A: LINUX Installation A-1 Appendix B: Command Dictionary A-13 Glossary G-1 Index l-1...”
Livro