Literatura académica sobre el tema "UNIX"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "UNIX".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "UNIX"
Linhart, Zbynek. "TeX a UNIX." Zpravodaj Československého sdružení uživatelů TeXu 2, no. 3 (1992): 128–36. http://dx.doi.org/10.5300/1992-3/128.
Texto completoYule, G. S. "Unix licence." Electronics and Power 31, no. 8 (1985): 552. http://dx.doi.org/10.1049/ep.1985.0354.
Texto completoRosenblatt, Bill. "Unix RDBMS." ACM SIGMOD Record 23, no. 4 (1994): 91–103. http://dx.doi.org/10.1145/190627.190649.
Texto completoAnjard, Ronald P. "Unix Today." Industrial Management & Data Systems 93, no. 6 (1993): 23–27. http://dx.doi.org/10.1108/02635579310040933.
Texto completoConorich, Douglas G. "UNIX Passwords." Information Systems Security 7, no. 1 (1998): 1–9. http://dx.doi.org/10.1201/1086/43302.7.1.19980301/31024.4.
Texto completoHopper, K. "UNIX∗ standardisation." Computer Standards & Interfaces 6, no. 2 (1987): 177–80. http://dx.doi.org/10.1016/0920-5489(87)90055-9.
Texto completoShehu, Suleiman. "Unix security." Computers & Security 16, no. 6 (1997): 522. http://dx.doi.org/10.1016/s0167-4048(97)84682-2.
Texto completoKapilow, Sharon A., and Geoffrey A. Wilson. "Unix Security." EDPACS 17, no. 6 (1989): 1–16. http://dx.doi.org/10.1080/07366988909450575.
Texto completoŠerbedẑija, N. "Unix workshop." Information and Software Technology 32, no. 7 (1990): 510. http://dx.doi.org/10.1016/0950-5849(90)90170-v.
Texto completoWard, Jean Renard. "UNIX as an environment for non-UNIX software development." ACM SIGSOFT Software Engineering Notes 10, no. 3 (1985): 95–108. http://dx.doi.org/10.1145/1012483.1012494.
Texto completoTesis sobre el tema "UNIX"
Müller, Thomas, and Christoph Ziegler. "UNIX-Grundlagen." Universitätsbibliothek Chemnitz, 1999. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199900075.
Texto completoGutschmidt, Heino. "UNIX-Editoren -- Emacs." Universitätsbibliothek Chemnitz, 1998. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199800250.
Texto completoTrapp, Holger. "UNIX-Editoren -- Vim/Elvis." Universitätsbibliothek Chemnitz, 1998. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199800262.
Texto completoRichter, Frank. "UNIX-Editoren -- hvi/asWedit." Universitätsbibliothek Chemnitz, 1998. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199800277.
Texto completoSontag, Ralph. "BibTeX-Frontends unter Unix." Universitätsbibliothek Chemnitz, 2001. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200100134.
Texto completoBrown, Thomas L. "Security evaluation of Unix networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA273076.
Texto completoClauß, Matthias, and Andreas Heik. "Windows Systemadministration mit UNIX-Werkzeugen." Universitätsbibliothek Chemnitz, 2006. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200600689.
Texto completoHeik, Andreas, and Detlef Heine. "UNIX-Stammtisch: Pinguin auf Fotosafari." Universitätsbibliothek Chemnitz, 2009. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200901560.
Texto completoQuerido, Robert. "UNIX and Real-Time Telemetry." International Foundation for Telemetering, 1990. http://hdl.handle.net/10150/613799.
Texto completoMoreno, Jean-Michel. "Unix : une etude de cas." Paris 7, 1996. http://www.theses.fr/1996PA077248.
Texto completoLibros sobre el tema "UNIX"
Sarwar, Syed Mansoor, and Robert M. Koretsky. UNIX. Chapman and Hall/CRC, 2016. http://dx.doi.org/10.1201/9781315373201.
Texto completoGulbins, Jürgen. UNIX. Springer Berlin Heidelberg, 1988. http://dx.doi.org/10.1007/978-3-642-97109-9.
Texto completoNishinuma, Y., and R. Espesser. UNIX. Edited by J. A. Mariani. Macmillan Education UK, 1987. http://dx.doi.org/10.1007/978-1-349-09316-8.
Texto completoTaudes, Alfred, Jan-Armin Reepmeyer, and Frank Bensberg. UNIX. Physica-Verlag HD, 1993. http://dx.doi.org/10.1007/978-3-642-88566-2.
Texto completoChristian, Kaare. UNIX. Edited by Udo Peters. Vieweg+Teubner Verlag, 1988. http://dx.doi.org/10.1007/978-3-322-83685-4.
Texto completoGulbins, Jürgen. UNIX. Springer Berlin Heidelberg, 1985. http://dx.doi.org/10.1007/978-3-662-01101-0.
Texto completoHieronymus, Andreas. Unix. Vieweg+Teubner Verlag, 1993. http://dx.doi.org/10.1007/978-3-322-83994-7.
Texto completoCapítulos de libros sobre el tema "UNIX"
Hieronymus, Andreas. "Standardbibliothek." In Unix. Vieweg+Teubner Verlag, 1993. http://dx.doi.org/10.1007/978-3-322-83994-7_1.
Texto completoHieronymus, Andreas. "Das UNIX-Filesystem." In Unix. Vieweg+Teubner Verlag, 1993. http://dx.doi.org/10.1007/978-3-322-83994-7_2.
Texto completoHieronymus, Andreas. "Das Prozeßsystem." In Unix. Vieweg+Teubner Verlag, 1993. http://dx.doi.org/10.1007/978-3-322-83994-7_3.
Texto completoHieronymus, Andreas. "Speichermanagement." In Unix. Vieweg+Teubner Verlag, 1993. http://dx.doi.org/10.1007/978-3-322-83994-7_4.
Texto completoNishinuma, Y., and R. Espesser. "Starting off." In UNIX. Macmillan Education UK, 1987. http://dx.doi.org/10.1007/978-1-349-09316-8_1.
Texto completoNishinuma, Y., and R. Espesser. "Manipulating text files." In UNIX. Macmillan Education UK, 1987. http://dx.doi.org/10.1007/978-1-349-09316-8_10.
Texto completoNishinuma, Y., and R. Espesser. "Strings." In UNIX. Macmillan Education UK, 1987. http://dx.doi.org/10.1007/978-1-349-09316-8_11.
Texto completoNishinuma, Y., and R. Espesser. "Further into ex." In UNIX. Macmillan Education UK, 1987. http://dx.doi.org/10.1007/978-1-349-09316-8_12.
Texto completoNishinuma, Y., and R. Espesser. "More on editing." In UNIX. Macmillan Education UK, 1987. http://dx.doi.org/10.1007/978-1-349-09316-8_13.
Texto completoNishinuma, Y., and R. Espesser. "Properly your own." In UNIX. Macmillan Education UK, 1987. http://dx.doi.org/10.1007/978-1-349-09316-8_14.
Texto completoActas de conferencias sobre el tema "UNIX"
Jadidi, Mahya, and Jonathan Anderson. "Leash: A Transparent Capability-Based Sandboxing Supervisor for Unix." In 11th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013186700003899.
Texto completoBrown, P. J. "UNIX guide." In the ACM conference. ACM Press, 1992. http://dx.doi.org/10.1145/168466.168492.
Texto completoPereira, Jairo. "Hardening Unix Servers." In The Third International Conference on Forensic Computer Science. ABEAT, 2008. http://dx.doi.org/10.5769/c2008001.
Texto completoGreenberg, Michael, Konstantinos Kallas, and Nikos Vasilakis. "Unix shell programming." In HotOS '21: Workshop on Hot Topics in Operating Systems. ACM, 2021. http://dx.doi.org/10.1145/3458336.3465294.
Texto completoTaddei, Arnaud. "Common HEP UNIX Environment." In Proceedings of the International Conference. WORLD SCIENTIFIC, 1996. http://dx.doi.org/10.1142/9789814447188_0122.
Texto completoBishop, Matt. "Reflections on UNIX Vulnerabilities." In 2009 Annual Computer Security Applications Conference (ACSAC). IEEE, 2009. http://dx.doi.org/10.1109/acsac.2009.25.
Texto completoSemmes, Raphael T. "Secure UNIX* - UTX/32S." In IEEE Military Communications Conference MILCOM 1986. IEEE, 1986. http://dx.doi.org/10.1109/milcom.1986.4805755.
Texto completoFaden, Glenn. "RBAC in UNIX administration." In the fourth ACM workshop. ACM Press, 1999. http://dx.doi.org/10.1145/319171.319180.
Texto completoLOONEY, S., B. S. NILSSON, T. OEST, T. PETTERSSON, F. RANJARD, and J. P. THIBONNIER. "PARALLEL EVENT ANALYSIS UNDER UNIX." In Proceedings of the International Conference. WORLD SCIENTIFIC, 1996. http://dx.doi.org/10.1142/9789814447188_0040.
Texto completoDittmer, Mark S., and Mahesh V. Tripunitara. "The UNIX Process Identity Crisis." In CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2014. http://dx.doi.org/10.1145/2660267.2660333.
Texto completoInformes sobre el tema "UNIX"
Graham, S. L. Productivity Engineering in the UNIX Environment. UNIX Consultant. A progress Report. Defense Technical Information Center, 1985. http://dx.doi.org/10.21236/ada172673.
Texto completoSabrin, Howard. UNIX Speech Processing Development. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada332983.
Texto completoFeng-Berman, S. K. ACE program/UNIX user manual. Office of Scientific and Technical Information (OSTI), 1993. http://dx.doi.org/10.2172/6298543.
Texto completoFeng-Berman, S. K. ACE program/UNIX user manual. Office of Scientific and Technical Information (OSTI), 1993. http://dx.doi.org/10.2172/10165284.
Texto completoClemo, T. M., J. D. Miller, L. C. Hull, and S. O. Magnuson. FRAC-UNIX theory and user's manual. Office of Scientific and Technical Information (OSTI), 1990. http://dx.doi.org/10.2172/7151973.
Texto completoWilensky, Robert, James Mayfield, Anthony Albert, et al. UC (UNIX Consultant). A Progress Report. Defense Technical Information Center, 1987. http://dx.doi.org/10.21236/ada181389.
Texto completoWilensky, Robert, and S. L. Graham. The Berkeley UNIX (Trademark) Consultant Project. Defense Technical Information Center, 1987. http://dx.doi.org/10.21236/ada197291.
Texto completoDuggan, D. P. Administrative tools for UNIX system security. Office of Scientific and Technical Information (OSTI), 1989. http://dx.doi.org/10.2172/6137981.
Texto completoMorris J. T. UNIX UPGRADE FOR AGS CONTROLS WORKSTATIONS. Office of Scientific and Technical Information (OSTI), 1994. http://dx.doi.org/10.2172/1151309.
Texto completoWilson, Steven P. Ada/Ed Compiler, Version 1.10 (UNIX). Defense Technical Information Center, 1990. http://dx.doi.org/10.21236/ada218688.
Texto completo