Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Sistema UNIX")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 636

  • Page / 26
Export

Selection :

  • and

Introduction to LINUXPIETROSEMOLI, E.ICTP - URSI - ITU/BDT workshop on the use of radio for digital communications in developing countries. 1997, pp 1-30, 2VolConference Paper

Système d'exploitation Unix = Unix operating systemSOULEMA, Philippe.Techniques de l'ingénieur. Informatique. 1997, Vol HB1, Num H1528, pp H1528.1-H1528.23, issn 0245-9612Article

Rule-based programming in the UNIX systemVESONDER, G. T.AT&T technical journal. 1988, Vol 67, Num 1, pp 69-80, issn 8756-2324Article

Linux sur PC-Pentium (guide pratique d'installation)Léon, Louis; Rougeau, Patrick.Le micro bulletin thématique. 1997, isbn 2-9510137-1-X, 141 p., isbn 2-9510137-1-XBook

Unix sur Power MAC: au point mort = Unix on Power MAC: at dead pointLEON, L.Micro bulletin. 1995, Num 58, pp 101-102, issn 0761-2907Article

Making a secure office systemMOORE, B.ICL technical journal. 1991, Vol 7, Num 4, pp 801-815, issn 0142-1557Article

Wie einheitlich ist UNIX? = Quelle est l'uniformité d'UNIX? = How uniform is UNIX?KUTSCHA, S.Automatisierungstechnische Praxis. 1988, Vol 30, Num 4, pp 172-176, issn 0178-2320Article

Detecting masquerades in intrusion detection based on unpopular commandsSCHONLAU, Matthias; THEUS, Martin.Information processing letters. 2000, Vol 76, Num 1-2, pp 33-38, issn 0020-0190Article

An open or shut case : Some issues surrounding MicroSoft's NT in juxtaposition to Unix-based client-server computingNORGROVE, G.Information management & technology. 1996, Vol 29, Num 5, pp 215-216, issn 1356-0395Article

Coalition formation in standard-setting alliancesAXELROD, R; MITCHELL, W; THOMAS, R. E et al.Management science. 1995, Vol 41, Num 9, pp 1493-1508, issn 0025-1909Article

RISC : evaluation and selectionMALLACH, E. G.The Journal of information systems management. 1991, Vol 8, Num 2, pp 8-16, issn 0739-9014, 9 p.Article

Error Sensitivity of the Linux Kernel Executing on PowerPC G4 and Pentium 4 ProcessorsWEINING GU; KALBARCZYK, Zbigniew; IYER, Ravishankar K et al.International Conference on Dependable Systems and Networks. 2004, pp 887-896, isbn 0-7695-2052-9, 1Vol, 10 p.Conference Paper

A hardware counters based tool for system monitoringFERRETO, Tiago C; DEROSE, Luiz; DE ROSE, César A. F et al.Lecture notes in computer science. 2003, pp 7-16, issn 0302-9743, isbn 3-540-40788-X, 10 p.Conference Paper

Pseudonymizing Unix log filesFLEGEL, Ulrich.Lecture notes in computer science. 2002, pp 162-179, issn 0302-9743, isbn 3-540-44309-6, 18 p.Conference Paper

64 bit OberonDOTZEL, G; GOEBEL, H.SIGPLAN notices. 1998, Vol 33, Num 2, pp 56-58, issn 0362-1340Article

L'installation de Linux sur un portable Dell Latitude CP = Linux installation on Dell Latitude CP portableMAUNY, M.Micro bulletin. 1998, Num 73, pp 33-36, issn 0761-2907Article

Entwicklung and Anwendung UNIX-kompatibler Betriebssysteme = Development and utilisation of UNIX compatible operating systemsCLAUSS, M; FISCHER, G.Wissenschaftliche Zeitschrift der Technischen Universität Karl-Marx-Stadt/Chemnitz. 1990, Vol 32, Num 3, pp 350-361Article

Tracking Your Changes : A Language-Independent Approach : Mining Software ArchivesCANFORA, Garardo; CERULO, Luigi; DI PENTA, Massimiliano et al.IEEE software. 2009, Vol 26, Num 1, pp 50-57, issn 0740-7459, 8 p.Article

Rootkit modeling and experiments under LinuxLACOMBE, Erie; RAYNAL, Frédéric; NICOMETTE, Vincent et al.Journal in computer virology. 2008, Vol 4, Num 2, pp 137-157, issn 1772-9890, 21 p.Conference Paper

A critique of the GNU hurd multi-server operating system : Secure small-kernel systemsWALFIELD, Neal H; BRINKMANN, Marcus.Operating systems review. 2007, Vol 41, Num 4, pp 30-39, issn 0163-5980, 10 p.Article

A hot-failover state machine for gateway services and its application to a linux firewallROELLE, Harald.Lecture notes in computer science. 2002, pp 181-194, issn 0302-9743, isbn 3-540-00080-1, 14 p.Conference Paper

Le Fortran sur Alpha/Linux = The Fortran on the Alpha/LinuxLEON, L; ROUGEAU, P.Micro bulletin. 1998, Num 72, pp 14-19, issn 0761-2907Article

CSPL : An Ada95-like, Unix-based process environmentCHEN, J.-Y. J.IEEE transactions on software engineering. 1997, Vol 23, Num 3, pp 171-184, issn 0098-5589Article

Fine grained object protection in UNIXLOW, M. R; CHRISTIANSON, B.Operating systems review. 1993, Vol 27, Num 1, pp 33-50, issn 0163-5980Article

Philips unveil their ECHO system. A look at a new and innovative case-handling systemDIXON, R.Information management & technology. 1992, Vol 25, Num 2, pp 75-77, issn 1356-0395Article

  • Page / 26