Journal articles on the topic 'UNIX'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'UNIX.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Linhart, Zbynek. "TeX a UNIX." Zpravodaj Československého sdružení uživatelů TeXu 2, no. 3 (1992): 128–36. http://dx.doi.org/10.5300/1992-3/128.
Full textYule, G. S. "Unix licence." Electronics and Power 31, no. 8 (1985): 552. http://dx.doi.org/10.1049/ep.1985.0354.
Full textRosenblatt, Bill. "Unix RDBMS." ACM SIGMOD Record 23, no. 4 (1994): 91–103. http://dx.doi.org/10.1145/190627.190649.
Full textAnjard, Ronald P. "Unix Today." Industrial Management & Data Systems 93, no. 6 (1993): 23–27. http://dx.doi.org/10.1108/02635579310040933.
Full textConorich, Douglas G. "UNIX Passwords." Information Systems Security 7, no. 1 (1998): 1–9. http://dx.doi.org/10.1201/1086/43302.7.1.19980301/31024.4.
Full textHopper, K. "UNIX∗ standardisation." Computer Standards & Interfaces 6, no. 2 (1987): 177–80. http://dx.doi.org/10.1016/0920-5489(87)90055-9.
Full textShehu, Suleiman. "Unix security." Computers & Security 16, no. 6 (1997): 522. http://dx.doi.org/10.1016/s0167-4048(97)84682-2.
Full textKapilow, Sharon A., and Geoffrey A. Wilson. "Unix Security." EDPACS 17, no. 6 (1989): 1–16. http://dx.doi.org/10.1080/07366988909450575.
Full textŠerbedẑija, N. "Unix workshop." Information and Software Technology 32, no. 7 (1990): 510. http://dx.doi.org/10.1016/0950-5849(90)90170-v.
Full textWard, Jean Renard. "UNIX as an environment for non-UNIX software development." ACM SIGSOFT Software Engineering Notes 10, no. 3 (1985): 95–108. http://dx.doi.org/10.1145/1012483.1012494.
Full textDettmer, Roger. "The Unix story." Electronics and Power 31, no. 5 (1985): 384. http://dx.doi.org/10.1049/ep.1985.0235.
Full textMontanon, Ramon. "Managing Unix Security." EDPACS 26, no. 11 (1999): 15–17. http://dx.doi.org/10.1201/1079/43239.26.11.19990501/30208.5.
Full textCataldo, Renato. "What Is UNIX?" American Pharmacy 33, no. 3 (1993): 31–32. http://dx.doi.org/10.1016/s0160-3450(15)30829-1.
Full textDery, Mark. "The female Unix." Angelaki 4, no. 2 (1999): 149–51. http://dx.doi.org/10.1080/09697259908572043.
Full textStevens, W. Richard, and Thomas Narten. "Unix network programming." ACM SIGCOMM Computer Communication Review 20, no. 2 (1990): 8–9. http://dx.doi.org/10.1145/378570.378600.
Full textMellander, Jim. "Unix Filesystem Security." Information Security Technical Report 7, no. 1 (2002): 11–25. http://dx.doi.org/10.1016/s1363-4127(02)00103-6.
Full textMcNamarra, Roy. "Unix network security." Information Security Technical Report 2, no. 3 (1997): 66–79. http://dx.doi.org/10.1016/s1363-4127(97)89712-9.
Full textMiller, CDF. "The Unix environment." Data Processing 27, no. 3 (1985): 50. http://dx.doi.org/10.1016/0011-684x(85)90317-x.
Full textHighland, Harold Joseph. "Practical unix security." Computers & Security 11, no. 2 (1992): 134–39. http://dx.doi.org/10.1016/0167-4048(92)90038-s.
Full textWhiddett, Dick. "Unix system programming." Microprocessors and Microsystems 12, no. 6 (1988): 359. http://dx.doi.org/10.1016/0141-9331(88)90198-6.
Full textCarson, M. "OMITMAP for UNIX." Journal of Applied Crystallography 25, no. 2 (1992): 327–28. http://dx.doi.org/10.1107/s0021889891012815.
Full textHoward, Andrew. "UNIX all round." Computerised Manufacturing 1988, no. 1 (1988): 33. http://dx.doi.org/10.1049/cm.1988.0014.
Full textLeler, W. "Linda meets Unix." Computer 23, no. 2 (1990): 43–54. http://dx.doi.org/10.1109/2.44903.
Full textKhalidi, YA. "Life with Unix." Information and Software Technology 32, no. 8 (1990): 573. http://dx.doi.org/10.1016/0950-5849(90)90155-k.
Full textWilliams, Derek H. "Unix in manufacturing." Computer Integrated Manufacturing Systems 1, no. 1 (1988): 48–52. http://dx.doi.org/10.1016/0951-5240(88)90010-9.
Full textWiegandt, Dietrich. "UNIX and HEP." Computer Physics Communications 57, no. 1-3 (1989): 134–39. http://dx.doi.org/10.1016/0010-4655(89)90202-6.
Full textPerez-Turiel, J., J. C. Fraile, and J. R. Peran. "UNI-Telway Bus Management in a Unix Environment." IFAC Proceedings Volumes 25, no. 6 (1992): 507–10. http://dx.doi.org/10.1016/s1474-6670(17)50957-x.
Full textPerlman, Gary, and Frederick L. Horan. "UNIX∣STAT 5.2: Data Analysis Programs for MS-DOS and UNIX." American Statistician 40, no. 3 (1986): 229. http://dx.doi.org/10.2307/2684546.
Full textGOMI, Tsutomu. "Picture Archiving and Communication System(PACS) Construction by Means of Personal Computer UNIX(PC-UNIX) System." Japanese Journal of Radiological Technology 55, no. 1 (1999): 50–53. http://dx.doi.org/10.6009/jjrt.kj00003110430.
Full textCarrington, David A. "Profiling under ELXSI UNIX." Software: Practice and Experience 16, no. 9 (1986): 865–73. http://dx.doi.org/10.1002/j.1097-024x.1986.tb00015.x.
Full textRitchie, D. "KEN, UNIX AND GAMES." ICGA Journal 24, no. 2 (2001): 67–70. http://dx.doi.org/10.3233/icg-2001-24202.
Full textGriesmer, Steve. "Innovative Computing with UNIX." Journal of Information Systems Management 4, no. 4 (1987): 8–19. http://dx.doi.org/10.1080/07399018708962870.
Full textKing, John Leslie. "The Economics of UNIX." Journal of Information Systems Management 7, no. 1 (1990): 80–86. http://dx.doi.org/10.1080/07399019008968334.
Full textSpinellis, D. "Working with Unix Tools." IEEE Software 22, no. 6 (2005): 9–11. http://dx.doi.org/10.1109/ms.2005.170.
Full textConorich, Douglas G. "Trusted UNIX Host Security." Information Systems Security 4, no. 1 (1995): 37–43. http://dx.doi.org/10.1080/10658989509342489.
Full textHorn, Wm Dennis. "Network collaboration with UNIX." Technical Communication Quarterly 2, no. 4 (1993): 413–29. http://dx.doi.org/10.1080/10572259309364550.
Full textCOHEN, GREGG ALAN. "UNIX: The Minimal Manual." American Journal of Psychiatry 147, no. 10 (1990): 1374. http://dx.doi.org/10.1176/ajp.147.10.1374.
Full textVogt, Carsten. "Visualizing UNIX synchronization operations." ACM SIGOPS Operating Systems Review 31, no. 3 (1997): 52–64. http://dx.doi.org/10.1145/270555.270562.
Full textSekey, A. "Introducing the UNIX system." Proceedings of the IEEE 73, no. 11 (1985): 1692. http://dx.doi.org/10.1109/proc.1985.13356.
Full textLutz, M. "The unix programming environment." Proceedings of the IEEE 74, no. 4 (1986): 621. http://dx.doi.org/10.1109/proc.1986.13521.
Full textDalton, C. I., T. H. Choo, and A. P. Norman. "Design of Secure Unix." Information Security Technical Report 7, no. 1 (2002): 37–56. http://dx.doi.org/10.1016/s1363-4127(02)00105-x.
Full textSeeger, Martin. "Praxis der UNIX-Systemprotokollierung." Datenschutz und Datensicherheit - DuD 30, no. 5 (2006): 285–87. http://dx.doi.org/10.1007/s11623-006-0085-6.
Full textSchäffler, Georg. "Connecting PEACE to UNIX." Parallel Computing 7, no. 3 (1988): 335–39. http://dx.doi.org/10.1016/0167-8191(88)90052-x.
Full textNievergelt, J. "The UNIX programming environment." Computer Compacts 3, no. 3-4 (1985): 109. http://dx.doi.org/10.1016/0167-7136(85)90058-7.
Full textMiller, C. D. F. "Making use of Unix." Data Processing 27, no. 10 (1985): 39. http://dx.doi.org/10.1016/0011-684x(85)90033-4.
Full textHolt, Andrew D. "The Unix Programming Environment." Data Processing 27, no. 3 (1985): 51. http://dx.doi.org/10.1016/0011-684x(85)90320-x.
Full textArmitage, Richard, David Hutchison, and Stephen J. Muir. "Electronic mail and Unix." Data Processing 28, no. 9 (1986): 461–69. http://dx.doi.org/10.1016/0011-684x(86)90313-8.
Full textAmes, W. F., and C. Brezinski. "UNIX for the impatient." Mathematics and Computers in Simulation 34, no. 2 (1992): 191. http://dx.doi.org/10.1016/0378-4754(92)90071-n.
Full textHighland, Esther H. "Unix system security issues." Computers & Security 7, no. 4 (1988): 424. http://dx.doi.org/10.1016/0167-4048(88)90592-5.
Full textLancaster, David. "Mannesmann move to UNIX." Computerised Manufacturing 1988, no. 2 (1988): 18. http://dx.doi.org/10.1049/cm.1988.0025.
Full text