To see the other types of publications on this topic, follow the link: UNIX.

Journal articles on the topic 'UNIX'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'UNIX.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Linhart, Zbynek. "TeX a UNIX." Zpravodaj Československého sdružení uživatelů TeXu 2, no. 3 (1992): 128–36. http://dx.doi.org/10.5300/1992-3/128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yule, G. S. "Unix licence." Electronics and Power 31, no. 8 (1985): 552. http://dx.doi.org/10.1049/ep.1985.0354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rosenblatt, Bill. "Unix RDBMS." ACM SIGMOD Record 23, no. 4 (1994): 91–103. http://dx.doi.org/10.1145/190627.190649.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Anjard, Ronald P. "Unix Today." Industrial Management & Data Systems 93, no. 6 (1993): 23–27. http://dx.doi.org/10.1108/02635579310040933.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Conorich, Douglas G. "UNIX Passwords." Information Systems Security 7, no. 1 (1998): 1–9. http://dx.doi.org/10.1201/1086/43302.7.1.19980301/31024.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hopper, K. "UNIX∗ standardisation." Computer Standards & Interfaces 6, no. 2 (1987): 177–80. http://dx.doi.org/10.1016/0920-5489(87)90055-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shehu, Suleiman. "Unix security." Computers & Security 16, no. 6 (1997): 522. http://dx.doi.org/10.1016/s0167-4048(97)84682-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kapilow, Sharon A., and Geoffrey A. Wilson. "Unix Security." EDPACS 17, no. 6 (1989): 1–16. http://dx.doi.org/10.1080/07366988909450575.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Šerbedẑija, N. "Unix workshop." Information and Software Technology 32, no. 7 (1990): 510. http://dx.doi.org/10.1016/0950-5849(90)90170-v.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ward, Jean Renard. "UNIX as an environment for non-UNIX software development." ACM SIGSOFT Software Engineering Notes 10, no. 3 (1985): 95–108. http://dx.doi.org/10.1145/1012483.1012494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Dettmer, Roger. "The Unix story." Electronics and Power 31, no. 5 (1985): 384. http://dx.doi.org/10.1049/ep.1985.0235.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Montanon, Ramon. "Managing Unix Security." EDPACS 26, no. 11 (1999): 15–17. http://dx.doi.org/10.1201/1079/43239.26.11.19990501/30208.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Cataldo, Renato. "What Is UNIX?" American Pharmacy 33, no. 3 (1993): 31–32. http://dx.doi.org/10.1016/s0160-3450(15)30829-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Dery, Mark. "The female Unix." Angelaki 4, no. 2 (1999): 149–51. http://dx.doi.org/10.1080/09697259908572043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Stevens, W. Richard, and Thomas Narten. "Unix network programming." ACM SIGCOMM Computer Communication Review 20, no. 2 (1990): 8–9. http://dx.doi.org/10.1145/378570.378600.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Mellander, Jim. "Unix Filesystem Security." Information Security Technical Report 7, no. 1 (2002): 11–25. http://dx.doi.org/10.1016/s1363-4127(02)00103-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

McNamarra, Roy. "Unix network security." Information Security Technical Report 2, no. 3 (1997): 66–79. http://dx.doi.org/10.1016/s1363-4127(97)89712-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Miller, CDF. "The Unix environment." Data Processing 27, no. 3 (1985): 50. http://dx.doi.org/10.1016/0011-684x(85)90317-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Highland, Harold Joseph. "Practical unix security." Computers & Security 11, no. 2 (1992): 134–39. http://dx.doi.org/10.1016/0167-4048(92)90038-s.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Whiddett, Dick. "Unix system programming." Microprocessors and Microsystems 12, no. 6 (1988): 359. http://dx.doi.org/10.1016/0141-9331(88)90198-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Carson, M. "OMITMAP for UNIX." Journal of Applied Crystallography 25, no. 2 (1992): 327–28. http://dx.doi.org/10.1107/s0021889891012815.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Howard, Andrew. "UNIX all round." Computerised Manufacturing 1988, no. 1 (1988): 33. http://dx.doi.org/10.1049/cm.1988.0014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Leler, W. "Linda meets Unix." Computer 23, no. 2 (1990): 43–54. http://dx.doi.org/10.1109/2.44903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Khalidi, YA. "Life with Unix." Information and Software Technology 32, no. 8 (1990): 573. http://dx.doi.org/10.1016/0950-5849(90)90155-k.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Williams, Derek H. "Unix in manufacturing." Computer Integrated Manufacturing Systems 1, no. 1 (1988): 48–52. http://dx.doi.org/10.1016/0951-5240(88)90010-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Wiegandt, Dietrich. "UNIX and HEP." Computer Physics Communications 57, no. 1-3 (1989): 134–39. http://dx.doi.org/10.1016/0010-4655(89)90202-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Perez-Turiel, J., J. C. Fraile, and J. R. Peran. "UNI-Telway Bus Management in a Unix Environment." IFAC Proceedings Volumes 25, no. 6 (1992): 507–10. http://dx.doi.org/10.1016/s1474-6670(17)50957-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Perlman, Gary, and Frederick L. Horan. "UNIX∣STAT 5.2: Data Analysis Programs for MS-DOS and UNIX." American Statistician 40, no. 3 (1986): 229. http://dx.doi.org/10.2307/2684546.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

GOMI, Tsutomu. "Picture Archiving and Communication System(PACS) Construction by Means of Personal Computer UNIX(PC-UNIX) System." Japanese Journal of Radiological Technology 55, no. 1 (1999): 50–53. http://dx.doi.org/10.6009/jjrt.kj00003110430.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Carrington, David A. "Profiling under ELXSI UNIX." Software: Practice and Experience 16, no. 9 (1986): 865–73. http://dx.doi.org/10.1002/j.1097-024x.1986.tb00015.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Ritchie, D. "KEN, UNIX AND GAMES." ICGA Journal 24, no. 2 (2001): 67–70. http://dx.doi.org/10.3233/icg-2001-24202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Griesmer, Steve. "Innovative Computing with UNIX." Journal of Information Systems Management 4, no. 4 (1987): 8–19. http://dx.doi.org/10.1080/07399018708962870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

King, John Leslie. "The Economics of UNIX." Journal of Information Systems Management 7, no. 1 (1990): 80–86. http://dx.doi.org/10.1080/07399019008968334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Spinellis, D. "Working with Unix Tools." IEEE Software 22, no. 6 (2005): 9–11. http://dx.doi.org/10.1109/ms.2005.170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Conorich, Douglas G. "Trusted UNIX Host Security." Information Systems Security 4, no. 1 (1995): 37–43. http://dx.doi.org/10.1080/10658989509342489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Horn, Wm Dennis. "Network collaboration with UNIX." Technical Communication Quarterly 2, no. 4 (1993): 413–29. http://dx.doi.org/10.1080/10572259309364550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

COHEN, GREGG ALAN. "UNIX: The Minimal Manual." American Journal of Psychiatry 147, no. 10 (1990): 1374. http://dx.doi.org/10.1176/ajp.147.10.1374.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Vogt, Carsten. "Visualizing UNIX synchronization operations." ACM SIGOPS Operating Systems Review 31, no. 3 (1997): 52–64. http://dx.doi.org/10.1145/270555.270562.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Sekey, A. "Introducing the UNIX system." Proceedings of the IEEE 73, no. 11 (1985): 1692. http://dx.doi.org/10.1109/proc.1985.13356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Lutz, M. "The unix programming environment." Proceedings of the IEEE 74, no. 4 (1986): 621. http://dx.doi.org/10.1109/proc.1986.13521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Dalton, C. I., T. H. Choo, and A. P. Norman. "Design of Secure Unix." Information Security Technical Report 7, no. 1 (2002): 37–56. http://dx.doi.org/10.1016/s1363-4127(02)00105-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Seeger, Martin. "Praxis der UNIX-Systemprotokollierung." Datenschutz und Datensicherheit - DuD 30, no. 5 (2006): 285–87. http://dx.doi.org/10.1007/s11623-006-0085-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Schäffler, Georg. "Connecting PEACE to UNIX." Parallel Computing 7, no. 3 (1988): 335–39. http://dx.doi.org/10.1016/0167-8191(88)90052-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Nievergelt, J. "The UNIX programming environment." Computer Compacts 3, no. 3-4 (1985): 109. http://dx.doi.org/10.1016/0167-7136(85)90058-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Miller, C. D. F. "Making use of Unix." Data Processing 27, no. 10 (1985): 39. http://dx.doi.org/10.1016/0011-684x(85)90033-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Holt, Andrew D. "The Unix Programming Environment." Data Processing 27, no. 3 (1985): 51. http://dx.doi.org/10.1016/0011-684x(85)90320-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Armitage, Richard, David Hutchison, and Stephen J. Muir. "Electronic mail and Unix." Data Processing 28, no. 9 (1986): 461–69. http://dx.doi.org/10.1016/0011-684x(86)90313-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Ames, W. F., and C. Brezinski. "UNIX for the impatient." Mathematics and Computers in Simulation 34, no. 2 (1992): 191. http://dx.doi.org/10.1016/0378-4754(92)90071-n.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Highland, Esther H. "Unix system security issues." Computers & Security 7, no. 4 (1988): 424. http://dx.doi.org/10.1016/0167-4048(88)90592-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Lancaster, David. "Mannesmann move to UNIX." Computerised Manufacturing 1988, no. 2 (1988): 18. http://dx.doi.org/10.1049/cm.1988.0025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!