C POSIX library

Results: 373



#Item
261Classified Information Procedures Act / Bilateral copyright agreements of the United States / C POSIX library / POSIX / Stat

C:\LRC\T52.TXT UNITED STATES CODE EDITORIAL RECLASSIFICATION TABLE TITLE 52 — VOTING AND ELECTIONS This table provides information about changes in classifications to the U.S. Code made in the course

Add to Reading List

Source URL: law2.house.gov

Language: English
262Programming language theory / C POSIX library / National Minimum Dataset / Data validation / C / Open / ALGOL 68 / Computing / Procedural programming languages / Software engineering

DOC Document

Add to Reading List

Source URL: www.health.govt.nz

Language: English - Date: 2014-11-26 16:21:26
263Classified Information Procedures Act / Bilateral copyright agreements of the United States / C POSIX library / POSIX / Stat

C:\LRC\T52.TXT UNITED STATES CODE EDITORIAL RECLASSIFICATION TABLE TITLE 52 — VOTING AND ELECTIONS This table provides information about changes in classifications to the U.S. Code made in the course

Add to Reading List

Source URL: uscode.house.gov.

Language: English
264C POSIX library / Mkdir / Application programming interfaces / Unix / POSIX / Folder / Thread / Maritime Safety and Security Team / Stat / Computing / Software / System software

Bringsel, File System Benchmarking and Load Simulation in HPC Technical Environments. IEEE MSST Conference[removed]

Add to Reading List

Source URL: storageconference.us

Language: English - Date: 2014-06-07 16:50:45
265C POSIX library / Threads / POSIX / Monitor / Inter-process communication / Virtual file system / Asynchronous I/O / Scheduling / Kill / Computing / Concurrent computing / Computer programming

CONTENTS IN DETAIL PREFA CE xxxi 1

Add to Reading List

Source URL: www.nostarch.com

Language: English - Date: 2012-02-08 15:24:20
266Software bugs / C programming language / Computer errors / C POSIX library / C++ / Sizeof / Buffer overflow / Circular buffer / Printf format string / Computing / Computer programming / Software engineering

0x300 EXPLOITATION Program exploitation is a staple of hacking. As demonstrated in the previous chapter, a program is made up of a complex set of rules following a certain execution flow that ultimately tells the compute

Add to Reading List

Source URL: www.tinker.tv

Language: English - Date: 2012-02-08 15:24:21
267C POSIX library / Message queue / Abstract data types / Write / File descriptor / Semaphore / Pipeline / Queue / Standard streams / Unix / Computing / Inter-process communication

The definitive guide to Linux and UNIX system programming ® f Read

Add to Reading List

Source URL: www.nostarch.com

Language: English - Date: 2012-02-08 15:24:20
268Computing / Software / Open / File descriptor / Write / Inotify / Dirent.h / Ioctl / Inode / C POSIX library / Unix / System software

The definitive guide to Linux and UNIX system programming ® f Read

Add to Reading List

Source URL: www.nostarch.com

Language: English - Date: 2012-02-08 15:24:20
269System software / Software / Fork / Child process / Parent process / System call / SIGCHLD / Exit / File descriptor / Process / Computing / C POSIX library

The definitive guide to Linux and UNIX system programming ® f Read

Add to Reading List

Source URL: www.nostarch.com

Language: English - Date: 2012-02-08 15:24:20
270System software / Hooking / Write / Rootkit / Stat / Read / Ioctl / Struct / System call / Computing / C POSIX library / Software

2 HOOKING We’ll start our discussion of kernel-mode rootkits with call hooking, or simply hooking, which is arguably the most popular

Add to Reading List

Source URL: www.nostarch.com

Language: English - Date: 2012-02-08 15:24:21
UPDATE