Permissions

Results: 1263



#Item
341LaTeX / Manuscript / TeX / Computer file / Copy editing / Word processor / Proofreading / Email / Filesystem permissions / Computing / Publishing / Writing

Book Production Guide: Cambridge University Press New York Updated September 2010

Add to Reading List

Source URL: authornet.cambridge.org

Language: English - Date: 2010-09-23 15:49:47
342Web applications / Email / Cross-platform software / PostgreSQL / CPanel / Password / Filesystem permissions / Web hosting / Keychain / Software / Computing / World Wide Web

CPanel User Guide DOCUMENTATION VERSION: 1.2 Table of contents 1 What is CPanel?

Add to Reading List

Source URL: support.lypha.com

Language: English - Date: 2004-05-21 14:16:41
343

PERMISSIONS LIST Title: Author: In-house Editor: 1. Unit/ex. Fig.no: 2.

Add to Reading List

Source URL: authornet.cambridge.org

- Date: 2006-03-20 14:50:29
    344System call / Ptrace / Mach / Gcov / README / Tar / Filesystem permissions / Configure script / Mmap / Software / Computing / System software

    My gcov Version 2 8 DecemberEpita systems/security laboratory 2014 <>

    Add to Reading List

    Source URL: ctf.lse.epita.fr

    Language: English - Date: 2014-12-16 18:36:47
    345Rm / Mv / Ln / Ls / Monitor / Open / Fraction / Computing / Filesystem permissions / Find

    Fractional Permissions without the Fractions Stefan Heule K. Rustan M. Leino ETH Zurich

    Add to Reading List

    Source URL: stefanheule.com

    Language: English - Date: 2014-09-10 01:53:47
    346Filesystem permissions / Computer security / Internet privacy / Social networking service / Facebook features / Rm / Umask / Chmod / Computing / Security / Access control

    Cognitive disconnect: Understanding Facebook Connect login permissions WORKING DRAFT Nicky Robinson Joseph Bonneau

    Add to Reading List

    Source URL: jbonneau.com

    Language: English - Date: 2014-06-09 19:21:34
    347Filesystem permissions / Ls / Microsoft Windows / Unix / Access control / SetACL / Chmod / Computing / Software / System software

    Class Notes: February 16, 2006 Topic: A Case Study in UI Design and Evaluation for Computer Security Lecturer: Rob Reeder Scribe: Colleen Koranda Improving user-interface dependability through mitigation of human error

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    Language: English - Date: 2006-02-16 14:23:54
    348Computer programming / Control flow / Postcondition / Filesystem permissions / Eval / Precondition / Rm / Constructor / Computing / Software engineering / Logic in computer science

    Abstract Read Permissions: Fractional Permissions without the Fractions Stefan Heule1 , K. Rustan M. Leino2 , Peter Müller1 , and Alexander J. Summers1 1

    Add to Reading List

    Source URL: stefanheule.com

    Language: English - Date: 2014-09-10 01:53:47
    349C POSIX library / Unix / POSIX / Filesystem permissions / Stat / Perl / Open / Access control list / Passwd / Software / Computing / System software

    Perl versiondocumentation - filetest NAME filetest - Perl pragma to control the filetest permission operators SYNOPSIS

    Add to Reading List

    Source URL: perldoc.perl.org

    Language: English - Date: 2014-10-03 15:20:37
    350

    PERMISSIONS LIST Title: Author: In-house Editor: 1. Unit/ex. Fig.no: 2.

    Add to Reading List

    Source URL: authornet.cambridge.org

    - Date: 2006-03-20 14:50:29
      UPDATE