Loading [MathJax]/extensions/mml2jax.js
Skip to main content
Library homepage
 

Text Color

Text Size

 

Margin Size

 

Font Type

Enable Dyslexic Font
Engineering LibreTexts

Search

  • Filter Results
  • Location
  • Classification
    • Article type
    • Author
    • Set as Cover Page of Book
    • License
    • Show TOC
    • Transcluded
    • OER program or Publisher
    • Autonumber Section Headings
    • License Version
    • Print CSS
  • Include attachments
Searching in
About 497 results
  • https://eng.libretexts.org/Courses/Delta_College/C___Programming_I_(McClanahan)/01%3A_Building_and_Running_C_Code/1.03%3A_Header_Files
    In the code example below we call the function testFoo(), which is is defined in the file foo-1. The preprocessor then actually passes the following code to the compiler to convert into an executable ...In the code example below we call the function testFoo(), which is is defined in the file foo-1. The preprocessor then actually passes the following code to the compiler to convert into an executable program. This is a simple example and there is a bit more detail that is left out of this example, but hopefully this calrifies what the preprocessor actually does with header files.
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Operating_Systems/Linux_-_The_Penguin_Marches_On_(McClanahan)/01%3A_Introduction_to_Linux/3.05%3A_Sources_of_Online_Linux_Documentation
    With respect to the C library, the primary focus is the GNU, C library (glibc), although, where known, documentation of variations on other C libraries available for Linux is also included. Another op...With respect to the C library, the primary focus is the GNU, C library (glibc), although, where known, documentation of variations on other C libraries available for Linux is also included. Another option would be: 1) go to the Distro Watch website 2) select the desired distro 3) scroll down - on the left side is a listing for the distros documentation page.
  • https://eng.libretexts.org/Courses/Delta_College/C___Programming_I_(McClanahan)/08%3A_Counting_Loops/8.02%3A_Range_-Based_Loops
    Parameters : range_declaration : a declaration of a named variable, whose type is the type of the element of the sequence represented by range_expression, or a reference to that type. we create a vari...Parameters : range_declaration : a declaration of a named variable, whose type is the type of the element of the sequence represented by range_expression, or a reference to that type. we create a variable countNum - each time through the loop this variable is set to the next value in the array - this is similar to the way Python can do a for loop.
  • https://eng.libretexts.org/Courses/Delta_College/C___Programming_I_(McClanahan)/05%3A_Common_Data_Types
    Best practices for choosing programming structures
  • https://eng.libretexts.org/Courses/Delta_College/C_-_Data_Structures/03%3A_Arrays
  • https://eng.libretexts.org/Courses/Delta_College/C_-_Data_Structures/11%3A_Hashing
  • https://eng.libretexts.org/Courses/Delta_College/Information_Security/06%3A_Compliance__Laws_and_Regulations/6.1%3A_Introduction
    Companies that operate internationally may particularly feel the complexity of these issues, as the laws regarding data, employee information, use of encryption, and similar commonplace activities may...Companies that operate internationally may particularly feel the complexity of these issues, as the laws regarding data, employee information, use of encryption, and similar commonplace activities may actually change from one part of the enterprise to the next based on where they are located or the national laws based on the origin of data we are storing.
  • https://eng.libretexts.org/Courses/Delta_College/Information_Security/01%3A_Information_Security_Defined/1.1_Information_Security/1.1.2_Information_Security_vs_Network_Security
    Network Security is the measures taken by any enterprise or organization to secure its computer network and data using both hardware and software systems. Figure \(\PageIndex{1}\): Information vs Cybe...Network Security is the measures taken by any enterprise or organization to secure its computer network and data using both hardware and software systems. Figure \(\PageIndex{1}\): Information vs Cyber vs Netwrok Security. ("3 Security" by pp_pankaj, Geeks for Geeks is licensed under CC BY-SA 4.0) "Difference between Network Security and Cyber Security" by pp_pankaj, Geeks for Geeks is licensed under CC BY-SA 4.0
  • https://eng.libretexts.org/Courses/Delta_College/C___Programming_I_(McClanahan)/04%3A_Data_and_Operators
  • https://eng.libretexts.org/Courses/Delta_College/Information_Security/03%3A_Authorize_and_Access_Control/3.3%3A_Access_Control_-_Models
    Access controls may be discretionary in ACL-based or capability-based access control systems. (In capability-based systems, there is usually no explicit concept of 'owner', but the creator of an objec...Access controls may be discretionary in ACL-based or capability-based access control systems. (In capability-based systems, there is usually no explicit concept of 'owner', but the creator of an object has a similar degree of control over its access policy.) In attribute-based access control (ABAC), access is granted not based on the rights of the subject associated with a user after authentication, but based on the attributes of the user.
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Operating_Systems/Linux_-_The_Penguin_Marches_On_(McClanahan)/01%3A_Introduction_to_Linux/3.04%3A_Additional_Linux_System_Help_Choices
    In addition to the man pages, you can read the Info pages about a command, using the info command. This command searches the NAME section of the man pages for the keyword the user enters. The output i...In addition to the man pages, you can read the Info pages about a command, using the info command. This command searches the NAME section of the man pages for the keyword the user enters. The output is the one line in the name section, but it also includes which section of the man pages is the command found in. The files and subdirectories contain a lot of additional documentation for libraries, system libraries and other software packages installed on the system.

Support Center

How can we help?