Index: U - e-Reading Library
start page | rating of books | rating of authors | reviews | copyrights
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: U
- UCD-SNMP library: 10.3.1. Using SNMP from Perl
- UID (see user ID)
- Universal Naming Convention (UNC): 2.2.2. Microsoft Windows NT/2000
- Unix
- account creation/deletion, programs for: 3.3.2.1. Unix account creation and deletion routines
- communicating with Microsoft SQL Server: 7.1. Interacting with an SQL Server from Perl
- directories, hidden: 10.2.1. Local Signs of Peril
- disk quotas on: 2.5. Manipulating Disk Quotas
- file operations on, tracking: 4.4.2. Tracking Operations in Unix
- filesystems: 2.2.1. Unix
- /proc: 4.3.3. Using the /proc Filesystem
- querying usage on: 2.6. Querying Filesystem Usage
- traversing/walking: 2.3. Walking or Traversing the Filesystem
- group ID (GID): 3.1.1. The Classic Unix Password File
- host files: 5.1. Host Files
- generating: 5.1.1. Generating Host Files
- parsing: 5.1. Host Files
- source control systems: 5.1.4. Incorporating a Source Code Control System
- installing modules on: 1.5.1. Installing Modules on Unix
- 1.5.1. Installing Modules on Unix
- log files
- analyzing: 9.5. Log Analysis
- wtmp: 9.2. Binary Log Files
- network operations on, tracking: 4.4.2. Tracking Operations in Unix
- password file: 3.1.1. The Classic Unix Password File
- passwords: 3.3.2.1. Unix account creation and deletion routines
- privileges on, dropping: 1.6.2. Drop Your Privileges as Soon as Possible
- process control: 4.3. Unix Process Control
- process table, module for interface to: 4.3.4. Using the Proc::ProcessTable Module
- processes, listing: 4.3. Unix Process Control
- shells: 3.1.1. The Classic Unix Password File
- user identity: 3.1. Unix User Identity
- unpack() function (Perl): 9.2.1. Using unpack( )
- Unsolicited Commercial Email (UCE) (see spam)
- UPDATE command (SQL): D.4. Changing Table Information
- USE statement (SQL): D.1. Creating /Deleting Databases and Tables
- user accounts
- adding/removing: 3.3. Building an Account System to Manage Users
- API calls for: 3.3.2.2. Windows NT/2000 account creation and deletion routines
- modules for: 3.3.2.2. Windows NT/2000 account creation and deletion routines
- logins, security and: 10.2.2. Finding Problematic Patterns
- managing
- with ADSI: 6.5.8. Working with Users via ADSI
- process scripts for: 3.3.3. The Process Scripts
- user ID (UID)
- Unix: 3.1.1. The Classic Unix Password File
- Windows NT/2000: 3.2.2. NT/2000 User ID Numbers
- user input, security of: 1.6.3. Be Careful When Reading Data
- User Security Model (USM): E. The Twenty-Minute SNMP Tutorial
- users
- identity of: 3. User Accounts
- Unix: 3.1. Unix User Identity
- Windows NT/2000: 3.2.1. NT/2000 User Identity Storage and Access
- rights of, Windows NT/2000: 3.2.5. NT/2000 User Rights
- USM (User Security Model): E. The Twenty-Minute SNMP Tutorial
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2001
O'Reilly & Associates, Inc.
All Rights Reserved.