Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Linux 670
- Operating systems (Computers) 488
- Engineering & Applied Sciences 305
- Development 289
- Application software 263
- Computer Science 263
- Computer networks 249
- Security measures 188
- Computer security 182
- Open source software 167
- Examinations 132
- Cloud computing 128
- Python (Computer program language) 113
- Certification 111
- Computer programming 111
- Management 109
- Penetration testing (Computer security) 100
- Virtual computer systems 100
- Database management 98
- Computer software 97
- Electronic data processing personnel 93
- Computer programs 88
- Programming 88
- Client/server computing 84
- UNIX (Computer file) 82
- Linux (Sistema operativo de ordenadores) 72
- Web site development 65
- Information technology 64
- LINUX 64
- Sistemas operativos 62
-
2161por Rodríguez de Sepúlveda Maillo, David“…Las respuestas a los diferentes test se podrán encontrar recopiladas al final de la obra.Durante todo el proceso de redacción se ha tenido en cuenta a los sistemas operativos Microsoft Windows y GNU/Linux centrándonos en las distribuciones Ubuntu y Fedora por su amplia presencia entre los usuarios de este sistema operativo, así como la compatibilidad de los programas planteados en ambos sistemas operativos…”
Publicado 2015
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
2162Publicado 2022“…The book also offers: Discussions of the extension of .NET to non-Microsoft platforms like OSX and Linux Explanations of the newest features in C#9, including support for record types, and enhanced support for tuples, pattern matching, and nullable reference types Integrating .NET applications with Microsoft Azure services such as Azure App Configuration, Azure Key Vault, Azure Functions, the Azure Active Directory, and others Downloadable code examples from wrox.com and github.com with online updates for C# 10 and .NET 6 Perfect for programmers with a background in C#, Visual Basic, Java, or C/C++, Professional C# and .NET: 2021 Edition will also earn a place in the libraries of software architects seeking an up-to-date and fulsome treatment of the latest C# and .NET releases…”
Libro electrónico -
2163por Galkin, DmitryTabla de Contenidos: “….) -- Virtualization -- The cloud -- Evolution of the cloud and cloud-native -- Containers and container orchestration -- Monolithic versus microservices applications -- Kubernetes and its origins -- Summary -- Questions -- Chapter 2: Overview of CNCF and Kubernetes Certifications -- OSS and open standards -- Open standards -- Linux and CNCF -- CNCF -- CNCF community and governance -- Cloud roles and personas -- Kubernetes certification path -- Summary -- Questions -- Part 2: Performing Container Orchestration -- Chapter 3: Getting Started with Containers -- Technical requirements -- Introducing Docker -- Exploring container technology -- Installing Docker and running containers -- Building container images -- Summary -- Questions -- Further reading -- Chapter 4: Exploring Container Runtimes, Interfaces, and Service Meshes -- Container runtimes -- Container networking -- Container storage -- Container security -- Introducing service meshes -- Summary -- Questions -- Further reading -- Part 3: Learning Kubernetes Fundamentals -- Chapter 5: Orchestrating Containers with Kubernetes -- Kubernetes architecture -- The Kubernetes API -- K8s - the Swiss Army knife of container orchestration -- Installing and exploring K8s with minikube -- Summary -- Questions -- Further reading -- Chapter 6: Deploying and Scaling Applications with Kubernetes -- Deployments, ReplicaSets, and DaemonSets -- Running stateful workloads -- Application configuration and service discovery -- Ensuring applications are alive and healthy -- Summary -- Questions -- Further reading -- Chapter 7: Application Placement and Debugging with Kubernetes -- Scheduling in Kubernetes…”
Publicado 2023
Libro electrónico -
2164por Robbins, Arnold“… It's simple: you need to know how to work with the bash shell if you want to get to the heart of Mac OS X, Linux, and other Unix systems. Updated for the most recent version of bash, this concise little book puts all of the essential information about bash at your fingertips. …”
Publicado 2010
Libro electrónico -
2165Publicado 2007“…Sharing files with other platforms, such as Novell Netware, Unix and Linux, Macintosh and other Windows flavors. No longer will the Macs in a network be segregated from the Windows users. …”
Libro electrónico -
2166Publicado 2023“…Modern X86 Assembly Language Programming, Third Edition includes source code for both Windows and Linux. The source code elucidates current x86-64 assembly language programming practices, run-time calling conventions, and the latest generation of software development tools. …”
Libro electrónico -
2167Publicado 2021Tabla de Contenidos: “…. -- 1.3.5 FUNCIONES DE LOS SISTEMAS OPERATIVOS -- 1.3.6 DISTINTOS SISTEMAS OPERATIVOS -- 1.3.6.1 LA FAMILIA MICROSOFT WINDOWS -- 1.3.6.2 LA FAMILIA GNU/LINUX -- 1.3.6.3 DISTRIBUCIONES LINUX -- 1.4 SUITES OFIMÁTICAS -- 1.4.1 LA SUITE MICROSOFT OFFICE -- 1.4.1.1 WORD -- 1.4.1.2 EXCEL -- 1.4.1.3 POWERPOINT -- 1.4.2 LA SUITE OPENOFFICE -- 1.4.2.1 WRITER -- 1.4.2.2 CALC -- 1.4.2.3 IMPRESS -- 1.4.2.4 MATH -- 1.5 LENGUAJES DE PROGRAMACIÓN -- 1.5.1 CLASIFICACIÓN DE LOS LENGUAJES DE PROGRAMACIÓN -- 1.5.1.1 LENGUAJES DE BAJO NIVEL -- 1.5.1.2 LENGUAJES DE MEDIO NIVEL -- 1.5.1.3 LENGUAJES DE ALTO NIVEL -- 1.5.1.4 LENGUAJES COMPILADOS -- 1.5.1.5 LENGUAJES INTERPRETADOS -- 1.5.2 EJEMPLOS DE LENGUAJES DE PROGRAMACIÓN -- 1.6 COMO USAR EL CD DE PUPPYLINUX 2.7183 NOP -- 1.6.1 PUPPYLINUX -- 1.6.2 CÓMO TRABAJAR CON EL CD DE PUPPYLINUX -- 1.6.3 APLICACIONES DISPONIBLES EN EL LIVECD -- 1.7 BIBLIOGRAFÍA -- UNIDAD 2: INTRODUCCIÓN A LA PROGRAMACIÓN - PARTE I -- 2.1 EL LENGUAJE DE PROGRAMACIÓN GNUOCTAVE -- 2.2 INTRODUCCIÓN AL USO DE GNUOCTAVE -- 2.2.1 ENTORNO INTERACTIVO DE TRABAJO -- 2.2.2 CONSTANTES Y VARIABLES -- 2.2.3 OPERACIONES ARITMÉTICAS…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2168Publicado 2017Tabla de Contenidos: “…Academia -- 5.2 The Communication Gap -- 5.3 Community Driven Open Development -- 5.4 Lesson Learned -- 6 Conclusion -- References -- Assessing Code Authorship: The Case of the Linux Kernel -- 1 Introduction -- 2 Study Design -- 2.1 Author Identification -- 2.2 Linux Kernel Architectural Decomposition -- 2.3 Data Collection -- 3 Results -- 4 Threats to Validity -- 5 Related Work -- 6 Conclusion -- References -- Project Management, Development and Evaluation -- Release Early, Release Often and Release on Time. …”
Libro electrónico -
2169Publicado 2018Tabla de Contenidos: “…-- Types of AWK -- When and where to use AWK -- Getting started with AWK -- Installation on Linux -- Using the package manager -- Compiling from the source code -- Workflow of AWK -- Action and pattern structure of AWK -- Example data file -- Pattern-only statements -- Action-only statements -- Printing each input line/record -- Using the BEGIN and END blocks construct -- The BEGIN block -- The body block -- The END block -- Patterns -- Actions -- Running AWK programs -- AWK as a Unix command line -- AWK as a filter (reading input from the Terminal) -- Running AWK programs from the source file -- AWK programs as executable script files -- Extending the AWK command line on multiple lines -- Comments in AWK -- Shell quotes with AWK -- Data files used as examples in this book -- Some simple examples with default usage -- Multiple rules with AWK -- Using standard input with names in AWK -- AWK standard options -- Standard command-line options -- The -F option - field separator -- The -f option (read source file) -- The -v option (assigning variables) -- GAWK-only options -- The --dump-variables option (AWK global variables) -- The --profile option (profiling) -- The --sandbox option -- The -i option (including other files in your program) -- Include other files in the GAWK program (using @include) -- The -V option -- Summary -- Chapter 2: Working with Regular Expressions -- Introduction to regular expressions -- What is a regular expression? …”
Libro electrónico -
2170Publicado 2017Tabla de Contenidos: “…Creating the SoapMessage Class to Define Sent Data -- Implementing a Class for Message Parts -- Defining Port Operations with the SoapPortType Class -- Implementing a Class for Port Operations -- Defining Protocols Used in SOAP Bindings -- Compiling a List of Operation Child Nodes -- Finding the SOAP Services on Ports -- Automatically Fuzzing the SOAP Endpoint for SQL Injection Vulnerabilities -- Fuzzing Individual SOAP Services -- Fuzzing the HTTP POST SOAP Port -- Fuzzing the SOAP XML Port -- Running the Fuzzer -- Conclusion -- Chapter 4: Writing Connect-Back, Binding, and Metasploit Payloads -- Creating a Connect-Back Payload -- The Network Stream -- Running the Command -- Running the Payload -- Binding a Payload -- Accepting Data, Running Commands, and Returning Output -- Executing Commands from the Stream -- Using UDP to Attack a Network -- The Code for the Target's Machine -- The Attacker's Code -- Running x86 and x86-64 Metasploit Payloads from C# -- Setting Up Metasploit -- Generating Payloads -- Executing Native Windows Payloads as Unmanaged Code -- Executing Native Linux Payloads -- Conclusion -- Chapter 5: Automating Nessus -- REST and the Nessus API -- The NessusSession Class -- Making the HTTP Requests -- Logging Out and Cleaning Up -- Testing the NessusSession Class -- The NessusManager Class -- Performing a Nessus Scan -- Conclusion -- Chapter 6: Automating Nexpose -- Installing Nexpose -- Activation and Testing -- Some Nexpose Parlance -- The NexposeSession Class -- The ExecuteCommand() Method -- Logging Out and Disposing of Our Session -- Finding the API Version -- Driving the Nexpose API -- The NexposeManager Class -- Automating a Vulnerability Scan -- Creating a Site with Assets -- Starting a Scan -- Creating a PDF Site Report and Deleting the Site -- Putting It All Together -- Starting the Scan…”
Libro electrónico -
2171Publicado 2017Tabla de Contenidos: “…Setting up a main function with command line argument -- Accepting command line arguments -- Moment of zen -- Docstrings -- Comments -- Shebang -- Executable Python programs on Linux and Mac -- Executable Python programs on Windows -- Summary -- Chapter 4: Built-in types and the object model -- The nature of Python object references -- Reassigning a reference -- Assigning one reference to another -- Exploring value vs. identity with id() -- Testing for equality of identity with is -- Mutating without mutating -- References to mutable objects -- Equality of value (equivalence) versus equality of identity -- Argument passing semantics - pass by object-reference -- Modifying external objects in a function -- Binding new objects in a function -- Argument passing is reference binding -- Python return semantics -- Function arguments in detail -- Default parameter values -- Keyword arguments -- When are default arguments evaluated? …”
Libro electrónico -
2172Publicado 2023Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Chromebook -- Chapter 1 Choosing and Setting Up Your Chromebook -- Checking Under the Hood of the Chromebook -- The software -- The hardware -- Choosing a Chromebook -- Setting Up Your Chromebook -- Turning on your device -- Selecting a language -- Connecting to the internet -- Agreeing to the Terms of Service -- Adult or child user -- Logging In for the First Time -- Logging in using an existing Google Account -- Creating a new Google Account -- Using Chromebook as a guest -- Transitioning to a Chromebook from Mac, Linux, or Windows -- Where to Go Next -- Chapter 2 Working with the Chromebook Desktop -- Accessing the Chromebook Shelf -- Using the Launcher: Chromebook's Start Button -- Navigating the Launcher -- Organizing Launcher Icons -- Setting Up App Shortcuts -- Pinning app shortcuts to your shelf -- Removing app shortcuts from your shelf -- Getting the Scoop in the Status Area -- Taking Charge of Window Controls -- Multitasking with Multiple Windows -- Setting Up a Printer -- Direct connect printing -- Wi-Fi printing -- Chapter 3 Surveying the Chrome Browser -- Navigating the Chrome Browser -- Sizing the Chrome window -- Working with tabs -- Using the Omnibox and the navigation buttons -- Saving your place with the bookmark bar -- Customizing and Controlling Chrome -- Managing bookmarks -- Managing your history and downloads -- Erasing your browsing history -- Going incognito -- Changing Search Engine Providers -- Using Other Browsers -- Chapter 4 Getting Your Hands on the Keyboard and Touchpad -- The Chromebook Keyboard at a Glance -- Using Shortcut Key Combinations -- Configuring Keyboard Settings…”
Libro electrónico -
2173Publicado 2023Tabla de Contenidos: “…-- The Moby project -- Docker products -- Docker Desktop -- Docker Hub -- Docker Enterprise Edition -- Container architecture -- Summary -- Further reading -- Questions -- Answers -- Chapter 2: Setting Up a Working Environment -- Technical requirements -- The Linux command shell -- PowerShell for Windows -- Installing and using a package manager -- Installing Homebrew on macOS -- Installing Chocolatey on Windows -- Installing Git and cloning the code repository -- Choosing and installing a code editor -- Installing VS Code on macOS -- Installing VS Code on Windows -- Installing VS Code on Linux -- Installing VS Code extensions -- Installing Docker Desktop on macOS or Windows -- Testing Docker Engine -- Testing Docker Desktop -- Installing Docker Toolbox -- Enabling Kubernetes on Docker Desktop -- Installing minikube -- Installing minikube on Linux, macOS, and Windows -- Testing minikube and kubectl -- Working with a multi-node minikube cluster -- Installing Kind -- Testing Kind -- Summary -- Further reading -- Questions -- Answers -- Part 2:Containerization Fundamentals -- Chapter 3: Mastering Containers -- Technical requirements -- Running the first container -- Starting, stopping, and removing containers -- Running a random trivia question container -- Listing containers -- Stopping and starting containers -- Removing containers -- Inspecting containers -- Exec into a running container -- Attaching to a running container -- Retrieving container logs -- Logging drivers -- Using a container-specific logging driver…”
Libro electrónico -
2174Publicado 2002Tabla de Contenidos: “…Software support -- 7.1 Operating system support -- 7.2 z/OS and OS/390 -- 7.3 z/VM and VM/ESA -- 7.4 Linux -- 7.5 VSE/ESA -- 7.6 TPF -- 7.7 64-bit addressing OS considerations -- 7.8 Migration considerations -- 7.8.1 Software and hardware requirements -- 7.8.2 Considerations after concurrent upgrades -- 7.9 Workload License Charges -- Appendix A. …”
Libro electrónico -
2175Publicado 2017Tabla de Contenidos: “…Approach for automatic security updates installation -- Developing a process to update servers regularly -- Knowledge base -- Challenges on a larger scale -- Partitioning and LUKS -- Partitioning schemes -- A separate partition for /boot -- A separate partition for /tmp -- A separate partition for /home -- Conclusion -- LUKS -- Introduction to LUKS -- Solution -- Conclusion -- Access control list -- Use case -- Introduction to Access Control List -- Set ACL -- Show ACL -- Special permissions in Linux -- SUID -- Use case for SUID -- Understanding the permission associated with ping -- Setting a SUID bit for files -- Removing the SUID bit for files -- SETGID -- Associating the SGID for files -- SELinux -- Introduction to SELinux -- Permission sets in SELinux -- SELinux modes -- Confinement of Linux users to SELinux users -- Process confinement -- Conclusion -- Hardening system services and applications -- Hardening services -- Guide for hardening SSH -- Enable multi-factor authentication -- Associated configuration -- Changing the SSH default port -- Associate configuration -- Disabling the root login -- Associated configuration -- Conclusion -- Pluggable authentication modules -- Team Screen application -- File Sharing Application -- Understanding PAM -- The architecture of PAM -- The PAM configuration -- The PAM command structure -- Implementation scenario -- Forcing strong passwords -- Log all user commands -- Conclusion -- System auditing with auditd -- Introduction to auditd -- Use case 1 - tracking activity of important files -- Use case -- Solution -- First field -- Use case 2 - monitoring system calls -- Introduction to system calls -- Use case -- Solution -- Conclusion -- Conclusion -- Central identity server -- Use Case 1 -- Use case 2 -- The architecture of IPA -- Client-server architecture -- User access management…”
Libro electrónico -
2176Publicado 2020Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Chromebook -- Chapter 1 Choosing and Set ting Up Your Chromebook -- Checking Under the Hood of the Chromebook -- The software -- The hardware -- Choosing a Chromebook -- Setting Up Your Chromebook -- Turning on your device -- Selecting a language -- Connecting to the Internet -- Agreeing to the Terms of Service -- Logging In for the First Time -- Logging in using an existing Google Account -- Creating a new Google Account -- Using Chromebook as a guest -- Transitioning to a Chromebook from Mac, Linux, or Windows -- Where to Go Next -- Chapter 2 Working with the Chromebook Desktop -- Accessing the Chromebook Shelf -- Using the Launcher: Chromebook's Start Button -- Navigating the Launcher -- Organizing Launcher Icons -- Setting Up App Shortcuts -- Pinning app shortcuts to your shelf -- Removing app shortcuts from your shelf -- Getting the Scoop in the Status Area -- Taking Charge of Window Controls -- Multitasking with Multiple Windows -- Setting Up a Printer -- Direct connect printing -- Wi-Fi printing -- Cloud printing -- Chapter 3 Sur veying the Chrome Browser -- Navigating the Chrome Browser -- Sizing the Chrome window -- Working with tabs -- Using the Omnibox and the navigation buttons -- Saving your place with the bookmark bar -- Customizing and Controlling Chrome -- Managing bookmarks -- Managing your history and downloads -- Erasing your browsing history -- Going incognito -- Changing Search Engine Providers -- Using Other Browsers -- Chapter 4 Getting Your Hands on the Keyboard and Touchpad -- The Chromebook Keyboard at a Glance -- Using Shortcut Key Combinations -- Configuring Keyboard Settings…”
Libro electrónico -
2177Publicado 2023Tabla de Contenidos: “…Pinning your favorite Cloud PC to the Windows taskbar -- Connection settings -- Dark mode support -- Installing from the Microsoft Store -- Deploying the Windows 365 app using Microsoft Intune -- Exploring Windows 365 Boot -- Diving into Windows 365 Switch -- Using the Windows 365 web client -- Location -- Keyboard shortcuts -- Connection details -- Transferring files to and from a Cloud PC -- Collecting user logs -- Dark mode -- Performing user actions on Windows 365 Cloud PC -- Knowing about alternate clients -- Microsoft Remote Desktop client -- Approved Linux thin clients -- Connecting from a company website or application -- Step 1 - getting the user's Cloud PCs -- Step 2 - launching the connection -- The Windows client -- Meeting endpoint requirements -- Windows -- Web browsers -- macOS and iOS -- Android -- Linux -- Delivering a premium experience -- Implementing protocol enhancements -- RDP Shortpath -- Enhancing the end user network -- Microsoft Teams -- Utilizing graphics enhancements -- RDP profiles -- Setting frame rates -- Multimedia redirection -- Summary -- Questions -- Further reading -- Chapter 6: Securing Cloud PCs -- Configuring Conditional Access - MFA -- Configuring a CA policy to enforce MFA -- Configuring the CA policy with FIDO authentication -- Compliance policies -- Creating a compliance policy -- eDiscovery mode -- Creating an Azure storage account and assigning permissions -- Placing a Cloud PC under review -- Removing a Cloud PC under review -- How to become a local administrator of your Cloud PC -- Configuring the local admin setting -- Windows Local Administrator Password Solution -- Enabling the built-in administrator -- Screen capture protection -- Watermarking -- RDP device redirection -- Microsoft Defender for Endpoint -- Enabling Defender for Endpoint in Intune -- Security baselines -- Summary -- Questions…”
Libro electrónico -
2178por Molina Robles, FranciscoTabla de Contenidos: “…Planificación y administración de redes -- Página legal -- Índice -- Capítulo 1 -- 1.1Sistemas de numeración -- 1.2 Introducción a la comunicación -- Capítulo 2 -- 2.1Introducción -- 2.2 Ejemplos de arquitecturas -- 2.3 Ejemplos de redes de transmisiónde datos -- Capítulo 3 -- 3.1 Características de las señales -- 3.2 Tipos de transmisión -- 3.3 Tipos de cableado -- 3.4 Ruido y capacidad de transmisiónde un medio -- 3.5 Comprobación del cableado -- Capítulo 4 -- 4.1 Elementos básicos deinterconexión -- 4.2Interconexión de redes distintas -- 4.3 Otros dispositivos de interconexión de -- 4.4 Comparación entre los dispositivosde interconexión -- 4.5 I nstalación de dispositivos de interconexión -- Capítulo 5 -- 5.1 Direccionamiento a nivel de enlacede datos -- 5.2Direccionamiento -- 5.3 Direccionamiento a nivel detransporte -- 5.4 Direccionamiento a nivel deaplicación -- 5.5 Coordinación entre los distintosniveles -- Capítulo 6 -- 6.1Introducción -- 6.2 Co nfiguración de red en MicrosoftWindows -- 6.3 Configuración de reden Linux -- Capítulo 7 -- 7.1Introducción -- 7.2 Boson NetSim -- 7.3 Packet Tracer -- 7.4 Kiva NS -- 7.5 GNS3 -- Capítulo 8 -- 8.1 Introducción -- 8.2 Co nfiguración de un concentrador de cableado -- 8.3 Configuración -- 8.4 Configuración de un punto de acceso inalámbrico -- Capítulo 9 -- 9.1 ntroducción -- 9.2 Modos de trabajo -- 9.3 Configuración -- 9.4 Listas de control -- 9.5 Configuración del encaminamiento -- Capítulo 10 -- 10.1 Características de lo protocolos -- 10.2 T ipos de protocolos deencaminamiento -- 10.4 Máscaras de red de longitud variable -- 10.5 Encaminamiento RIP -- 10.6 Encaminamiento -- 10.7 Encaminamiento -- Capítulo 11 -- 11.1 Tecnologías -- 11.2 Direccionamiento -- 11.3 Asignación dinámica dedirecciones -- Capítulo 12 -- 12.1 Herramientas de monitorización de red…”
Publicado 2015
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2179Publicado 2015Tabla de Contenidos: “…""Cover""; ""Copyright""; ""Credits""; ""About the Author""; ""About the Reviewers""; ""www.PacktPub.com""; ""Table of Contents""; ""Preface""; ""Chapter 1: The Anatomy of an Android App""; ""The Android platform""; ""Versions of Android""; ""The Linux kernel""; ""Native libraries""; ""The Android runtime""; ""The application framework""; ""The application layer""; ""The building blocks of the Android application""; ""The Android packages (.apk)""; ""The application manifest""; ""Activities""; ""The life cycle of an activity""; ""The events of an activity""; ""Fragments""…”
Libro electrónico -
2180por Shepard, MichaelTabla de Contenidos: “…""The pipeline as an assembly line""""This isn't your DOS or Linux pipeline""; ""Objects at your disposal""; ""Dealing with pipeline data""; ""The Sort-Object cmdlet""; ""The Where-Object cmdlet""; ""The Select-Object cmdlet""; ""Limiting the number of objects returned""; ""Limiting the properties of objects returned""; ""Retrieving the values of a single property""; ""The Measure-Object cmdlet""; ""The Group-Object cmdlet""; ""Putting them together""; ""Summary""; ""For further reading""; ""Chapter 5: Formatting Output""; ""When does formatting occur?""…”
Publicado 2015
Libro electrónico