Linux Journal最新文献

筛选
英文 中文
Detecting botnets 检测僵尸网络
Linux Journal Pub Date : 1900-01-01 DOI: 10.1201/b11298-25
Grzegorz Landecki
{"title":"Detecting botnets","authors":"Grzegorz Landecki","doi":"10.1201/b11298-25","DOIUrl":"https://doi.org/10.1201/b11298-25","url":null,"abstract":"","PeriodicalId":406501,"journal":{"name":"Linux Journal","volume":"8 Pt 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126272920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Review: Red Hat Linux 9 Bible 评论:红帽Linux 9圣经
Linux Journal Pub Date : 1900-01-01 DOI: 10.5555/959336.959354
ConleyFrank
{"title":"Review: Red Hat Linux 9 Bible","authors":"ConleyFrank","doi":"10.5555/959336.959354","DOIUrl":"https://doi.org/10.5555/959336.959354","url":null,"abstract":"","PeriodicalId":406501,"journal":{"name":"Linux Journal","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134201918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interview with Eric Raymond 埃里克·雷蒙德访谈
Linux Journal Pub Date : 1900-01-01 DOI: 10.5555/1344189.1344194
MoodyGlyn
{"title":"Interview with Eric Raymond","authors":"MoodyGlyn","doi":"10.5555/1344189.1344194","DOIUrl":"https://doi.org/10.5555/1344189.1344194","url":null,"abstract":"","PeriodicalId":406501,"journal":{"name":"Linux Journal","volume":"2020 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134144451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Archiving data with snapshots in LVM2 在LVM2中使用快照进行数据归档
Linux Journal Pub Date : 1900-01-01 DOI: 10.5555/1924401.1924405
KoutoupisPetros
{"title":"Archiving data with snapshots in LVM2","authors":"KoutoupisPetros","doi":"10.5555/1924401.1924405","DOIUrl":"https://doi.org/10.5555/1924401.1924405","url":null,"abstract":"","PeriodicalId":406501,"journal":{"name":"Linux Journal","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116023662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Invention Is the Mother of Necessity 发明是需要之母
Linux Journal Pub Date : 1900-01-01 DOI: 10.1038/scientificamerican07191873-32b
D. Searls
{"title":"Invention Is the Mother of Necessity","authors":"D. Searls","doi":"10.1038/scientificamerican07191873-32b","DOIUrl":"https://doi.org/10.1038/scientificamerican07191873-32b","url":null,"abstract":"","PeriodicalId":406501,"journal":{"name":"Linux Journal","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128341409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Transform Methods and Image Compression 变换方法和图像压缩
Linux Journal Pub Date : 1900-01-01 DOI: 10.1201/9781420035278.ch10
D. Hankerson, G. Harris
{"title":"Transform Methods and Image Compression","authors":"D. Hankerson, G. Harris","doi":"10.1201/9781420035278.ch10","DOIUrl":"https://doi.org/10.1201/9781420035278.ch10","url":null,"abstract":"","PeriodicalId":406501,"journal":{"name":"Linux Journal","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116220812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Paranoid penguin: Practical threat analysis and risk management 偏执企鹅:实用的威胁分析和风险管理
Linux Journal Pub Date : 1900-01-01 DOI: 10.5555/512788.512797
Mick Bauer
{"title":"Paranoid penguin: Practical threat analysis and risk management","authors":"Mick Bauer","doi":"10.5555/512788.512797","DOIUrl":"https://doi.org/10.5555/512788.512797","url":null,"abstract":"","PeriodicalId":406501,"journal":{"name":"Linux Journal","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124436189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Quantum cryptography 量子密码
Linux Journal Pub Date : 1900-01-01 DOI: 10.1142/9789812773883_0015
Subhendu Bera
{"title":"Quantum cryptography","authors":"Subhendu Bera","doi":"10.1142/9789812773883_0015","DOIUrl":"https://doi.org/10.1142/9789812773883_0015","url":null,"abstract":"","PeriodicalId":406501,"journal":{"name":"Linux Journal","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121163738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Capital in a Multi-level World: Getting Support in Personal Communities 多层次世界中的网络资本:在个人社区中获得支持
Linux Journal Pub Date : 1900-01-01 DOI: 10.4324/9781315129457-10
B. Wellman, K. Frank
{"title":"Network Capital in a Multi-level World: Getting Support in Personal Communities","authors":"B. Wellman, K. Frank","doi":"10.4324/9781315129457-10","DOIUrl":"https://doi.org/10.4324/9781315129457-10","url":null,"abstract":"Multi-level analysis provides a new approach to studying the sources of network capital by integrating analyses of individuals, interpersonal ties and the personal networks in which they are embedded. Using this approach aids theory and substantive analysis. Toronto data show that while tie characteristics are key predictors of supportive behavior, networks facilitate the supportive behavior of ties and individuals. For example, parents and children are more supportive in networks with high percentages of parents and children. Individual agency, dyadic duets, and network properties all make network capital available for social support. Acknowledgments We are grateful to earlier collaborators in East York personal community research for the foundation laid for this study, to the Rockefeller Foundation for providing Wellman with a month’s stay to complete this work at the magnificent Bellagio (Italy) Center for Study and Conferences, and to the University of Toronto’s Centre for Urban and Community Studies for its thirty years of being an eminently supportive research base. The contributions of Milena Gulia, Catherine Kaukinen, Stephanie Potter and Scot Wortley have been especially important for our work here, as have been the comments of Dean Behrens, Bonnie Erickson, Vicente Espinoza, Nan Lin, Uwe Matzat, Pamela Popielarz, Ray Reagans, Fleur Thomese, Charles Tilly, Beverly Wellman, and the members of the “Socnet” electronic mail discussion list. Earlier versions of this paper were presented to the Duke University Social Networks and Social Capital Conference (1998), the American Sociological Association (1999, 2000) and the International Sunbelt Social Network Conference (1999, 2000). Our research has been supported by grants to Barry Wellman from the Bell Canada University Laboratories and the Social Science and Humanities Research Council of Canada. This chapter is dedicated to Natalie Sherban and Joan Harvey, founding stalwarts of East York’s Neighbourhood Information Centre, who have demonstrated or thirty years that an organization can provide social capital and foster supportive networks. 1Network capital is a form of “social capital”. Social capital is a sprawling term, ranging from an individualistic framework that emphasizes the advantages that individuals can gain through their personal networks to a collective perspective that emphasizes the advantages of volunteerism to a community (Coleman 1988; Paxton 1999; Putnam 2000; Lin 2001). For further discussions of social support, see Erickson, Radkewycz and Nosanchuk 1988; Gottlieb and Selby 1990; Kadushin 1981; Lin, Dean and Ensel 1986; Wellman 1999. Two other means of obtaining resources, less prevalent in industrialized countries, are self-provisioning (Pahl 1984) and coercive appropriation (such as robbery, theft, and extortion (Dickens 1839; Pileggi 1985; Turnbull 1972). 2We ignore here personal characteristics, such as intelligence, health and attractiveness. 1 Network Capital in a M","PeriodicalId":406501,"journal":{"name":"Linux Journal","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128145050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 377
Compiling Java with GCJ 用GCJ编译Java
Linux Journal Pub Date : 1900-01-01 DOI: 10.5555/603771.603775
BothnerPer
{"title":"Compiling Java with GCJ","authors":"BothnerPer","doi":"10.5555/603771.603775","DOIUrl":"https://doi.org/10.5555/603771.603775","url":null,"abstract":"With the latest GCC, you can forget everything you ever knew about Java and bytecodes, and really compile it.","PeriodicalId":406501,"journal":{"name":"Linux Journal","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117219188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信