Flylib.com
index_V
Previous page
Table of content
Next page
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X]
validating source, book makefile
. VARIABLES variable
variables
$(OBJECTS)
+= (append) operator
ALL_TREES
assigning, speed
automatic 2nd
empty targets and
built-in rules
case-sensitivity
characters allowed
CLASSPATH, Java makefile
computed, assert function and
constants, user -customized
CPPFLAGS
CURDIR 2nd
debug-enter
debug-leave
development environment
EJBS
error messagess
expanding
curly braces and
exporting
functions, user-defined
grep command
introduction
macros and
MAKE_VERSION 2nd
MAKECMDGOALS 2nd
MAKEFILE_LIST 2nd
MAKEFLAGS, command environment and
MAKELEVEL
operators
?= (conditional variable assignment operator)
origins, origin function
parentheses and 2nd
passing, recursive make and
pattern-specific
periods, embedded
recursive, performance and
recursively expanded
shell function
simple, performance and
simply expanded
sources
target-specific
trailing spaces and
uses
.VARIABLE
VARIABLES
VPATH [See VPATH]
VARIABLES variable
VPATH
vpath
vpath directive
Previous page
Table of content
Next page
Managing Projects with GNU Make (Nutshell Handbooks)
ISBN: 0596006101
EAN: 2147483647
Year: 2003
Pages: 131
Authors:
Robert Mecklenburg
BUY ON AMAZON
Project Management JumpStart
Breaking Down the Project Activities
Developing the Project Plan
Controlling the Project Outcome
Closing the Books
Appendix C Sample Project Management Checklists
Lotus Notes and Domino 6 Development (2nd Edition)
Agent Properties via the Agent InfoBox
Overview of the Formula Language
Writing Java for Domino Applications
Data Connection Resources
The Role of the Domino Directory in Application Security
Image Processing with LabVIEW and IMAQ Vision
Introduction to IMAQ Vision Builder
NI Vision Builder for Automated Inspection
Image Distribution
Image Standards
Shape Matching
Snort Cookbook
Logging Packets That Snort Captures
Logging in Binary
Installing and Configuring Barnyard
Creating HTML Log Analysis Output
Working with Honeypots and Honeynets
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
Unauthorized Activity I
Unauthorized Activity II
Tcpdump
IDS and IPS Internals
The Oracle Hackers Handbook: Hacking and Defending Oracle
Triggers
Indirect Privilege Escalation
Defeating Virtual Private Databases
Attacking Oracle PL/SQL Web Applications
Accessing the Network
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies