C++ Language Tutorial
如果你看到这个文档,并且不知道这个网站的话,
本人推荐一下,其中的C++ reference 部分对标
准库的介绍很全面,索引也很方便。
Have fun!
/
These tutorials explain the C++ language from its basics up to the newest features of ANSI-C++, including basic concepts such as arrays or classes and advanced concepts such as polymorphism or templates. The tutorial is oriented in a practical way, with working example programs in all sections to start practicing each lesson right away.
windows cscope 及vim配置文件
windows 下的scope
解压后cscope.exe curses2.dll regex2.dll放在PATH路径下(可以直接放在C:\Windows\System32 下)。cscope_maps.vim放在Vim的安装目录下的Vim/vimfiles/plugin下就可以用了。
linux shell 命令 源代码
所有linux命令的源代码
cat
cp
date
df
dd
ls
.....
The UNIX- HATERS Handbook(UNIX痛恨者手册)
英文的 质量不错
Table of Contents
Foreword ................................................................................ xv
By Donald A. Norman
Preface ..................................................................................... xix
Things Are Going to Get a Lot Worse
Before Things Get Worse
Who We Are............................................................................... xxi
The UNIX-HATERS History ...................................................xxiii
Contributors and Acknowledgments........................................ xxix
Typographical Conventions .................................................... xxxii
The UNIX-HATERS Disclaimer ...........................................xxxiii
Anti-Foreword ............................................................... xxxv
By Dennis Ritchie
Part 1: User Friendly?............................................... 1
1 Unix .............................................................................................. 3
The World’s First Computer Virus
History of the Plague..................................................................... 4
Sex, Drugs, and Unix .................................................................... 9
Standardizing Unconformity....................................................... 10
Unix Myths ................................................................................. 14
ix
x
2 Welcome, New User! ..................................................17
Like Russian Roulette with Six Bullets Loaded
Cryptic Command Names ...........................................................18
Accidents Will Happen................................................................19
Consistently Inconsistent.............................................................26
Online Documentation ................................................................31
Error Messages and Error Checking, NOT! ................................31
The Unix Attitude........................................................................37
3 Documentation? ...............................................................43
What Documentation?
On-line Documentation ...............................................................44
This Is Internal Documentation? .................................................51
For Programmers, Not Users.......................................................54
Unix Without Words: A Course Proposal ...................................56
4 Mail..............................................................................................61
Don’t Talk to Me, I’m Not a Typewriter!
Sendmail: The Vietnam of Berkeley Unix ..................................62
Subject: Returned Mail: User Unknown .....................................67
From: <MAILER-DAEMON@berkeley.edu> ...........................74
Apple Computer’s Mail Disaster of 1991....................................85
5 Snoozenet ...............................................................................93
I Post, Therefore I Am
Netnews and Usenet: Anarchy Through Growth ........................93
Newsgroups .................................................................................96
Alt.massive.flamage ..................................................................100
This Information Highway Needs Information .........................100
rn, trn: You Get What You Pay for ............................................101
When in Doubt, Post .................................................................105
Seven Stages of Snoozenet........................................................106
xi
6 Terminal Insanity .......................................................... 111
Curses! Foiled Again!
Original Sin ............................................................................... 111
The Magic of Curses ................................................................. 114
7 The X-Windows Disaster ......................................123
How to Make a 50-MIPS Workstation Run Like a
4.77MHz IBM PC
X: The First Fully Modular Software Disaster..........................124
X Myths.....................................................................................127
X Graphics: Square Peg in a Round Hole .................................141
X: On the Road to Nowhere ......................................................142
Part 2: Programmer’s System? .................145
8 csh, pipes, and find ......................................................147
Power Tools for Power Fools
The Shell Game .........................................................................148
Shell Programming....................................................................155
Pipes ..........................................................................................161
Find............................................................................................166
9 Programming ....................................................................173
Hold Still, This Won’t Hurt a Bit
The Wonderful Unix Programming Environment .....................175
Programming in Plato’s Cave....................................................176
“It Can’t Be a Bug, My Makefile Depends on It!”....................186
If You Can’t Fix It, Restart It! ...................................................198
xii
10 C++ ............................................................................................203
The COBOL of the 90s
The Assembly Language of
Object-Oriented Programming ..................................................204
Syntax Syrup of Ipecac..............................................................208
Abstract What? ..........................................................................211
C++ Is to C as Lung Cancer Is to Lung .....................................214
The Evolution of a Programmer ................................................215
Part 3: Sysadmin’s Nightmare ...................219
11 System Administration ............................................221
Unix’s Hidden Cost
Keeping Unix Running and Tuned ............................................223
Disk Partitions and Backups......................................................227
Configuration Files....................................................................235
Maintaining Mail Services ........................................................239
Where Did I Go Wrong? ...........................................................241
12 Security ..................................................................................243
Oh, I’m Sorry, Sir, Go Ahead,
I Didn’t Realize You Were Root
The Oxymoronic World of Unix Security .................................243
Holes in the Armor ....................................................................244
The Worms Crawl In .................................................................257
13 The File System ..............................................................261
Sure It Corrupts Your Files,
But Look How Fast It Is!
What’s a File System? ...............................................................262
UFS: The Root of All Evil.........................................................265
xiii
14 NFS ............................................................................................283
Nightmare File System
Not Fully Serviceable................................................................284
No File Security.........................................................................287
Not File System Specific? (Not Quite)......................................292
Part 4: Et Cetera ...........................................................303
A Epilogue.................................................................................305
Enlightenment Through Unix
B Creators Admit C, Unix Were Hoax ...........307
FOR IMMEDIATE RELEASE
C The Rise of Worse Is Better ................................ 311
By Richard P. Gabriel
D Bibliography ......................................................................317
Just When You Thought You Were Out of the Woods...
Index .........................................................................................319