Artículos de revistas sobre el tema "UNIX"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "UNIX".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Linhart, Zbynek. "TeX a UNIX." Zpravodaj Československého sdružení uživatelů TeXu 2, no. 3 (1992): 128–36. http://dx.doi.org/10.5300/1992-3/128.
Texto completoYule, G. S. "Unix licence." Electronics and Power 31, no. 8 (1985): 552. http://dx.doi.org/10.1049/ep.1985.0354.
Texto completoRosenblatt, Bill. "Unix RDBMS." ACM SIGMOD Record 23, no. 4 (1994): 91–103. http://dx.doi.org/10.1145/190627.190649.
Texto completoAnjard, Ronald P. "Unix Today." Industrial Management & Data Systems 93, no. 6 (1993): 23–27. http://dx.doi.org/10.1108/02635579310040933.
Texto completoConorich, Douglas G. "UNIX Passwords." Information Systems Security 7, no. 1 (1998): 1–9. http://dx.doi.org/10.1201/1086/43302.7.1.19980301/31024.4.
Texto completoHopper, K. "UNIX∗ standardisation." Computer Standards & Interfaces 6, no. 2 (1987): 177–80. http://dx.doi.org/10.1016/0920-5489(87)90055-9.
Texto completoShehu, Suleiman. "Unix security." Computers & Security 16, no. 6 (1997): 522. http://dx.doi.org/10.1016/s0167-4048(97)84682-2.
Texto completoKapilow, Sharon A., and Geoffrey A. Wilson. "Unix Security." EDPACS 17, no. 6 (1989): 1–16. http://dx.doi.org/10.1080/07366988909450575.
Texto completoŠerbedẑija, N. "Unix workshop." Information and Software Technology 32, no. 7 (1990): 510. http://dx.doi.org/10.1016/0950-5849(90)90170-v.
Texto completoWard, Jean Renard. "UNIX as an environment for non-UNIX software development." ACM SIGSOFT Software Engineering Notes 10, no. 3 (1985): 95–108. http://dx.doi.org/10.1145/1012483.1012494.
Texto completoDettmer, Roger. "The Unix story." Electronics and Power 31, no. 5 (1985): 384. http://dx.doi.org/10.1049/ep.1985.0235.
Texto completoMontanon, Ramon. "Managing Unix Security." EDPACS 26, no. 11 (1999): 15–17. http://dx.doi.org/10.1201/1079/43239.26.11.19990501/30208.5.
Texto completoCataldo, Renato. "What Is UNIX?" American Pharmacy 33, no. 3 (1993): 31–32. http://dx.doi.org/10.1016/s0160-3450(15)30829-1.
Texto completoDery, Mark. "The female Unix." Angelaki 4, no. 2 (1999): 149–51. http://dx.doi.org/10.1080/09697259908572043.
Texto completoStevens, W. Richard, and Thomas Narten. "Unix network programming." ACM SIGCOMM Computer Communication Review 20, no. 2 (1990): 8–9. http://dx.doi.org/10.1145/378570.378600.
Texto completoMellander, Jim. "Unix Filesystem Security." Information Security Technical Report 7, no. 1 (2002): 11–25. http://dx.doi.org/10.1016/s1363-4127(02)00103-6.
Texto completoMcNamarra, Roy. "Unix network security." Information Security Technical Report 2, no. 3 (1997): 66–79. http://dx.doi.org/10.1016/s1363-4127(97)89712-9.
Texto completoMiller, CDF. "The Unix environment." Data Processing 27, no. 3 (1985): 50. http://dx.doi.org/10.1016/0011-684x(85)90317-x.
Texto completoHighland, Harold Joseph. "Practical unix security." Computers & Security 11, no. 2 (1992): 134–39. http://dx.doi.org/10.1016/0167-4048(92)90038-s.
Texto completoWhiddett, Dick. "Unix system programming." Microprocessors and Microsystems 12, no. 6 (1988): 359. http://dx.doi.org/10.1016/0141-9331(88)90198-6.
Texto completoCarson, M. "OMITMAP for UNIX." Journal of Applied Crystallography 25, no. 2 (1992): 327–28. http://dx.doi.org/10.1107/s0021889891012815.
Texto completoHoward, Andrew. "UNIX all round." Computerised Manufacturing 1988, no. 1 (1988): 33. http://dx.doi.org/10.1049/cm.1988.0014.
Texto completoLeler, W. "Linda meets Unix." Computer 23, no. 2 (1990): 43–54. http://dx.doi.org/10.1109/2.44903.
Texto completoKhalidi, YA. "Life with Unix." Information and Software Technology 32, no. 8 (1990): 573. http://dx.doi.org/10.1016/0950-5849(90)90155-k.
Texto completoWilliams, Derek H. "Unix in manufacturing." Computer Integrated Manufacturing Systems 1, no. 1 (1988): 48–52. http://dx.doi.org/10.1016/0951-5240(88)90010-9.
Texto completoWiegandt, Dietrich. "UNIX and HEP." Computer Physics Communications 57, no. 1-3 (1989): 134–39. http://dx.doi.org/10.1016/0010-4655(89)90202-6.
Texto completoPerez-Turiel, J., J. C. Fraile, and J. R. Peran. "UNI-Telway Bus Management in a Unix Environment." IFAC Proceedings Volumes 25, no. 6 (1992): 507–10. http://dx.doi.org/10.1016/s1474-6670(17)50957-x.
Texto completoPerlman, Gary, and Frederick L. Horan. "UNIX∣STAT 5.2: Data Analysis Programs for MS-DOS and UNIX." American Statistician 40, no. 3 (1986): 229. http://dx.doi.org/10.2307/2684546.
Texto completoGOMI, Tsutomu. "Picture Archiving and Communication System(PACS) Construction by Means of Personal Computer UNIX(PC-UNIX) System." Japanese Journal of Radiological Technology 55, no. 1 (1999): 50–53. http://dx.doi.org/10.6009/jjrt.kj00003110430.
Texto completoCarrington, David A. "Profiling under ELXSI UNIX." Software: Practice and Experience 16, no. 9 (1986): 865–73. http://dx.doi.org/10.1002/j.1097-024x.1986.tb00015.x.
Texto completoRitchie, D. "KEN, UNIX AND GAMES." ICGA Journal 24, no. 2 (2001): 67–70. http://dx.doi.org/10.3233/icg-2001-24202.
Texto completoGriesmer, Steve. "Innovative Computing with UNIX." Journal of Information Systems Management 4, no. 4 (1987): 8–19. http://dx.doi.org/10.1080/07399018708962870.
Texto completoKing, John Leslie. "The Economics of UNIX." Journal of Information Systems Management 7, no. 1 (1990): 80–86. http://dx.doi.org/10.1080/07399019008968334.
Texto completoSpinellis, D. "Working with Unix Tools." IEEE Software 22, no. 6 (2005): 9–11. http://dx.doi.org/10.1109/ms.2005.170.
Texto completoConorich, Douglas G. "Trusted UNIX Host Security." Information Systems Security 4, no. 1 (1995): 37–43. http://dx.doi.org/10.1080/10658989509342489.
Texto completoHorn, Wm Dennis. "Network collaboration with UNIX." Technical Communication Quarterly 2, no. 4 (1993): 413–29. http://dx.doi.org/10.1080/10572259309364550.
Texto completoCOHEN, GREGG ALAN. "UNIX: The Minimal Manual." American Journal of Psychiatry 147, no. 10 (1990): 1374. http://dx.doi.org/10.1176/ajp.147.10.1374.
Texto completoVogt, Carsten. "Visualizing UNIX synchronization operations." ACM SIGOPS Operating Systems Review 31, no. 3 (1997): 52–64. http://dx.doi.org/10.1145/270555.270562.
Texto completoSekey, A. "Introducing the UNIX system." Proceedings of the IEEE 73, no. 11 (1985): 1692. http://dx.doi.org/10.1109/proc.1985.13356.
Texto completoLutz, M. "The unix programming environment." Proceedings of the IEEE 74, no. 4 (1986): 621. http://dx.doi.org/10.1109/proc.1986.13521.
Texto completoDalton, C. I., T. H. Choo, and A. P. Norman. "Design of Secure Unix." Information Security Technical Report 7, no. 1 (2002): 37–56. http://dx.doi.org/10.1016/s1363-4127(02)00105-x.
Texto completoSeeger, Martin. "Praxis der UNIX-Systemprotokollierung." Datenschutz und Datensicherheit - DuD 30, no. 5 (2006): 285–87. http://dx.doi.org/10.1007/s11623-006-0085-6.
Texto completoSchäffler, Georg. "Connecting PEACE to UNIX." Parallel Computing 7, no. 3 (1988): 335–39. http://dx.doi.org/10.1016/0167-8191(88)90052-x.
Texto completoNievergelt, J. "The UNIX programming environment." Computer Compacts 3, no. 3-4 (1985): 109. http://dx.doi.org/10.1016/0167-7136(85)90058-7.
Texto completoMiller, C. D. F. "Making use of Unix." Data Processing 27, no. 10 (1985): 39. http://dx.doi.org/10.1016/0011-684x(85)90033-4.
Texto completoHolt, Andrew D. "The Unix Programming Environment." Data Processing 27, no. 3 (1985): 51. http://dx.doi.org/10.1016/0011-684x(85)90320-x.
Texto completoArmitage, Richard, David Hutchison, and Stephen J. Muir. "Electronic mail and Unix." Data Processing 28, no. 9 (1986): 461–69. http://dx.doi.org/10.1016/0011-684x(86)90313-8.
Texto completoAmes, W. F., and C. Brezinski. "UNIX for the impatient." Mathematics and Computers in Simulation 34, no. 2 (1992): 191. http://dx.doi.org/10.1016/0378-4754(92)90071-n.
Texto completoHighland, Esther H. "Unix system security issues." Computers & Security 7, no. 4 (1988): 424. http://dx.doi.org/10.1016/0167-4048(88)90592-5.
Texto completoLancaster, David. "Mannesmann move to UNIX." Computerised Manufacturing 1988, no. 2 (1988): 18. http://dx.doi.org/10.1049/cm.1988.0025.
Texto completo