top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Fast software encryption : 16th international workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009 ; revised selected papers / / Orr Dunkelman (ed.)
Fast software encryption : 16th international workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009 ; revised selected papers / / Orr Dunkelman (ed.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2009]
Descrizione fisica 1 online resource (425 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computers - Access control
ISBN 1-282-33190-6
9786612331909
3-642-03317-2
Classificazione DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Stream Ciphers -- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium -- An Efficient State Recovery Attack on X-FCSR-256 -- Key Collisions of the RC4 Stream Cipher -- Invited Talk -- Intel’s New AES Instructions for Enhanced Performance and Security -- Theory of Hash Functions -- Blockcipher-Based Hashing Revisited -- On the Security of Tandem-DM -- Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6 -- Hash Functions Analysis I -- Cryptanalysis of RadioGatún -- Preimage Attacks on Reduced Tiger and SHA-2 -- Cryptanalysis of the LAKE Hash Family -- Block Ciphers Analysis -- New Cryptanalysis of Block Ciphers with Low Algebraic Degree -- Algebraic Techniques in Differential Cryptanalysis -- Multidimensional Extension of Matsui’s Algorithm 2 -- Hash Functions Analysis II -- Meet-in-the-Middle Attacks on SHA-3 Candidates -- Practical Collisions for EnRUPT -- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl -- Block Ciphers -- Revisiting the IDEA Philosophy -- Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2) -- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher -- Theory of Symmetric Key -- Enhanced Target Collision Resistant Hash Functions Revisited -- Message Authentication Codes -- MAC Reforgeability -- New Distinguishing Attack on MAC Using Secret-Prefix Method -- Fast and Secure CBC-Type MAC Algorithms -- HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption.
Record Nr. UNISA-996465616303316
Berlin, Germany ; ; New York, New York : , : Springer, , [2009]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Fast software encryption : 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008 : revised selected papers / / Kaisa Nyberg (editor)
Fast software encryption : 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008 : revised selected papers / / Kaisa Nyberg (editor)
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer, , [2008]
Descrizione fisica 1 online resource (XI, 489 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computers - Access control
Data encryption (Computer science)
ISBN 3-540-71039-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto SHA Collisions -- Collisions for Step-Reduced SHA-256 -- Collisions on SHA-0 in One Hour -- New Hash Function Designs -- The Hash Function Family LAKE -- SWIFFT: A Modest Proposal for FFT Hashing -- Block Cipher Cryptanalysis (I) -- A Unified Approach to Related-Key Attacks -- Algebraic and Slide Attacks on KeeLoq -- A Meet-in-the-Middle Attack on 8-Round AES -- Implementation Aspects -- Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis -- SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags -- Differential Fault Analysis of Trivium -- Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation -- Hash Function Cryptanalysis (I) -- Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL -- Cryptanalysis of LASH -- A (Second) Preimage Attack on the GOST Hash Function -- Stream Cipher Cryptanalysis (I) -- Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator -- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 -- Efficient Reconstruction of RC4 Keys from Internal States -- Security Bounds -- An Improved Security Bound for HCTR -- How to Encrypt with a Malicious Random Number Generator -- A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier -- Entropy -- Post-Processing Functions for a Biased Physical Random Number Generator -- Entropy of the Internal State of an FCSR in Galois Representation -- Block Cipher Cryptanalysis (II) -- Bit-Pattern Based Integral Attack -- Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent -- Impossible Differential Cryptanalysis of CLEFIA -- Hash Function Cryptanalysis (II) -- MD4 is Not One-Way -- Improved Indifferentiability Security Analysis of chopMD Hash Function -- New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru -- Stream Cipher Cryptanalysis (II) -- On the Salsa20 Core Function -- New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba.
Record Nr. UNISA-996465933803316
Berlin, Heidelberg : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Fast software encryption : 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008 : revised selected papers / / Kaisa Nyberg (editor)
Fast software encryption : 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008 : revised selected papers / / Kaisa Nyberg (editor)
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer, , [2008]
Descrizione fisica 1 online resource (XI, 489 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computers - Access control
Data encryption (Computer science)
ISBN 3-540-71039-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto SHA Collisions -- Collisions for Step-Reduced SHA-256 -- Collisions on SHA-0 in One Hour -- New Hash Function Designs -- The Hash Function Family LAKE -- SWIFFT: A Modest Proposal for FFT Hashing -- Block Cipher Cryptanalysis (I) -- A Unified Approach to Related-Key Attacks -- Algebraic and Slide Attacks on KeeLoq -- A Meet-in-the-Middle Attack on 8-Round AES -- Implementation Aspects -- Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis -- SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags -- Differential Fault Analysis of Trivium -- Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation -- Hash Function Cryptanalysis (I) -- Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL -- Cryptanalysis of LASH -- A (Second) Preimage Attack on the GOST Hash Function -- Stream Cipher Cryptanalysis (I) -- Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator -- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 -- Efficient Reconstruction of RC4 Keys from Internal States -- Security Bounds -- An Improved Security Bound for HCTR -- How to Encrypt with a Malicious Random Number Generator -- A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier -- Entropy -- Post-Processing Functions for a Biased Physical Random Number Generator -- Entropy of the Internal State of an FCSR in Galois Representation -- Block Cipher Cryptanalysis (II) -- Bit-Pattern Based Integral Attack -- Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent -- Impossible Differential Cryptanalysis of CLEFIA -- Hash Function Cryptanalysis (II) -- MD4 is Not One-Way -- Improved Indifferentiability Security Analysis of chopMD Hash Function -- New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru -- Stream Cipher Cryptanalysis (II) -- On the Salsa20 Core Function -- New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba.
Record Nr. UNINA-9910484435003321
Berlin, Heidelberg : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Fast software encryption : 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, revised selected papers / / Alex Biryukov, editor
Fast software encryption : 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, revised selected papers / / Alex Biryukov, editor
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin ; ; Heidelberg : , : Springer-Verlag, , [2007]
Descrizione fisica 1 online resource (XI, 470 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computers - Access control
Data encryption (Computer science)
ISBN 3-540-74619-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hash Function Cryptanalysis and Design (I) -- Producing Collisions for Panama, Instantaneously -- Cryptanalysis of FORK-256 -- The Grindahl Hash Functions -- Stream Ciphers Cryptanalysis (I) -- Overtaking VEST -- Cryptanalysis of Achterbahn-128/80 -- Differential-Linear Attacks Against the Stream Cipher Phelix -- Theory -- How to Enrich the Message Space of a Cipher -- Security Analysis of Constructions Combining FIL Random Oracles -- Bad and Good Ways of Post-processing Biased Physical Random Numbers -- Fast Talks: Block Cipher Cryptanalysis -- Improved Slide Attacks -- A New Class of Weak Keys for Blowfish -- Fast Talks: Block Cipher Design -- The 128-Bit Blockcipher CLEFIA (Extended Abstract) -- New Lightweight DES Variants -- Block Cipher Cryptanalysis -- A New Attack on 6-Round IDEA -- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 -- An Analysis of XSL Applied to BES -- Stream Cipher Cryptanalysis (II) -- On the Security of IV Dependent Stream Ciphers -- Two General Attacks on Pomaranch-Like Keystream Generators -- Analysis of QUAD -- Cryptanalysis of Hash Functions (II) -- Message Freedom in MD4 and MD5 Collisions: Application to APOP -- New Message Difference for MD4 -- Algebraic Cryptanalysis of 58-Round SHA-1 -- Theory of Stream Ciphers -- Algebraic Immunity of S-Boxes and Augmented Functions -- Generalized Correlation Analysis of Vectorial Boolean Functions -- Side Channel Attacks -- An Analytical Model for Time-Driven Cache Attacks -- MACs and Small Block Ciphers -- Improving the Security of MACs Via Randomized Message Preprocessing -- New Bounds for PMAC, TMAC, and XCBC -- Perfect Block Ciphers with Small Blocks.
Record Nr. UNINA-9910483346803321
Berlin ; ; Heidelberg : , : Springer-Verlag, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Fast software encryption : 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, revised selected papers / / Alex Biryukov, editor
Fast software encryption : 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, revised selected papers / / Alex Biryukov, editor
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin ; ; Heidelberg : , : Springer-Verlag, , [2007]
Descrizione fisica 1 online resource (XI, 470 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computers - Access control
Data encryption (Computer science)
ISBN 3-540-74619-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hash Function Cryptanalysis and Design (I) -- Producing Collisions for Panama, Instantaneously -- Cryptanalysis of FORK-256 -- The Grindahl Hash Functions -- Stream Ciphers Cryptanalysis (I) -- Overtaking VEST -- Cryptanalysis of Achterbahn-128/80 -- Differential-Linear Attacks Against the Stream Cipher Phelix -- Theory -- How to Enrich the Message Space of a Cipher -- Security Analysis of Constructions Combining FIL Random Oracles -- Bad and Good Ways of Post-processing Biased Physical Random Numbers -- Fast Talks: Block Cipher Cryptanalysis -- Improved Slide Attacks -- A New Class of Weak Keys for Blowfish -- Fast Talks: Block Cipher Design -- The 128-Bit Blockcipher CLEFIA (Extended Abstract) -- New Lightweight DES Variants -- Block Cipher Cryptanalysis -- A New Attack on 6-Round IDEA -- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 -- An Analysis of XSL Applied to BES -- Stream Cipher Cryptanalysis (II) -- On the Security of IV Dependent Stream Ciphers -- Two General Attacks on Pomaranch-Like Keystream Generators -- Analysis of QUAD -- Cryptanalysis of Hash Functions (II) -- Message Freedom in MD4 and MD5 Collisions: Application to APOP -- New Message Difference for MD4 -- Algebraic Cryptanalysis of 58-Round SHA-1 -- Theory of Stream Ciphers -- Algebraic Immunity of S-Boxes and Augmented Functions -- Generalized Correlation Analysis of Vectorial Boolean Functions -- Side Channel Attacks -- An Analytical Model for Time-Driven Cache Attacks -- MACs and Small Block Ciphers -- Improving the Security of MACs Via Randomized Message Preprocessing -- New Bounds for PMAC, TMAC, and XCBC -- Perfect Block Ciphers with Small Blocks.
Record Nr. UNISA-996465945203316
Berlin ; ; Heidelberg : , : Springer-Verlag, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Fundamentals of cryptology : a professional reference and interactive tutorial / by Henk C. A. van Tilborg
Fundamentals of cryptology : a professional reference and interactive tutorial / by Henk C. A. van Tilborg
Autore Tilborg, Henk C. A. van
Pubbl/distr/stampa Boston ; Dordrecht ; London : Kluwer Academic Publishers, c2000
Descrizione fisica xiv, 490 p. : ill. ; 26 cm. + 1 computer laser optical disc (4 3/4 in.)
Disciplina 652.8
Collana The Kluwer international series in engineering and computer science ; SECS 528
Soggetto topico Computers - Access control
Cryptography
ISBN 0792386752
Classificazione AMS 94A60
QA76.9.A25.T52
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISALENTO-991000919749707536
Tilborg, Henk C. A. van  
Boston ; Dordrecht ; London : Kluwer Academic Publishers, c2000
Materiale a stampa
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
Git : mastering version control : learn everything you need to take full control of your workflow with Git with this curated Learning Path - dive in and transform the way you work : a course in three modules
Git : mastering version control : learn everything you need to take full control of your workflow with Git with this curated Learning Path - dive in and transform the way you work : a course in three modules
Autore Santacroce Ferdinando
Edizione [1st edition]
Pubbl/distr/stampa Birmingham, [England] : , : Packt, , 2016
Descrizione fisica 1 online resource (861 pages)
Disciplina 005.3
Soggetto topico Computers - Access control
ISBN 1-78712-279-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910151758803321
Santacroce Ferdinando  
Birmingham, [England] : , : Packt, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Git essentials : create, merge, and distribute code with Git, the most powerful and flexible versioning system available / / Ferdinando Santacroce
Git essentials : create, merge, and distribute code with Git, the most powerful and flexible versioning system available / / Ferdinando Santacroce
Autore Santacroce Ferdinando
Edizione [1st edition]
Pubbl/distr/stampa Birmingham, [England] : , : Packt Publishing, , 2015
Descrizione fisica 1 online resource (168 p.)
Disciplina 005.8
Collana Community Experience Distilled
Soggetto topico Computers - Access control
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; Foreword; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started with Git; Installing Git; Running our first Git command; Setting up a new repository; Adding a file; Commit the added file; Modify a committed file; Summary; Chapter 2: Git Fundamentals - Working Locally; Repository structure and file status life cycle; Working directory; File statuses; Staging area; Unstaging a file; The time metaphor; The past; The present; The future; Working with repositories; Unstaging a file; Viewing the history
Anatomy of a commitThe commit snapshot; The commit hash; Author, e-mail, and date; Commit messages; Committing a bunch of files; Ignoring some files and folders by default; Highlighting an important commit: Git tags; Taking another way - Git branching; Anatomy of branches; Looking at the current branches; Creating a new branch; Switching from branch to branch; Understanding what happens under the hood; Bird's eye view to branches; Typing is boring - Git aliases; Merging branches; Merge is not the end of the branch; Exercises; Exercise 2.1; Exercise 2.2; Deal with branches' modifications
Diffing branchesUsing a visual diff tool; Resolving merge conflicts; Edit collisions; Resolving a removed file conflict; Stashing; Summary; Chapter 3: Git Fundamentals - Working Remotely; Working with remotes; Setting up a new GitHub account; Cloning a repository; Uploading modifications to remotes; What do I send to the remote when I push?; Pushing a new branch to the remote; The origin; Tracking branches; Downloading remote changes; Checking for modifications and downloading them; Applying downloaded changes; Going backward: publish a local repository to GitHub
Adding a remote to a local repositoryPushing a local branch to a remote repository; Social coding - collaborate using GitHub; Forking a repository; Submitting pull requests; Creating a pull request; Summary; Chapter 4: Git Fundamentals - Niche Concepts, Configurations, and Commands; Dissecting the Git configuration; Configuration architecture; Configuration levels; Listing configurations; Editing configuration files manually; Setting up other environment configurations; Git aliases; Shortcuts to common commands; Creating commands; git unstage; git undo; git last; git difflast
Advanced aliases with external commandsRemoving an alias; Aliasing git command itself; Git references; Symbolic references; Ancestry references; First parent; Second parent; World-wise techniques; Changing the last commit message; Tracing changes in a file; Cherry picking; Tricks; Bare repositories; Converting a regular repository to a bare one; Backup repositories; Archiving the repository; Bundling the repository; Summary; Chapter 5: Obtaining the Most - Good Commits and Workflows; The art of committing; Building the right commit; Make only one change per commit
Include the whole change in one commit
Record Nr. UNINA-9910463849503321
Santacroce Ferdinando  
Birmingham, [England] : , : Packt Publishing, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Git essentials : create, merge, and distribute code with Git, the most powerful and flexible versioning system available / / Ferdinando Santacroce
Git essentials : create, merge, and distribute code with Git, the most powerful and flexible versioning system available / / Ferdinando Santacroce
Autore Santacroce Ferdinando
Edizione [1st edition]
Pubbl/distr/stampa Birmingham, [England] : , : Packt Publishing, , 2015
Descrizione fisica 1 online resource (168 p.)
Disciplina 005.8
Collana Community Experience Distilled
Soggetto topico Computers - Access control
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; Foreword; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started with Git; Installing Git; Running our first Git command; Setting up a new repository; Adding a file; Commit the added file; Modify a committed file; Summary; Chapter 2: Git Fundamentals - Working Locally; Repository structure and file status life cycle; Working directory; File statuses; Staging area; Unstaging a file; The time metaphor; The past; The present; The future; Working with repositories; Unstaging a file; Viewing the history
Anatomy of a commitThe commit snapshot; The commit hash; Author, e-mail, and date; Commit messages; Committing a bunch of files; Ignoring some files and folders by default; Highlighting an important commit: Git tags; Taking another way - Git branching; Anatomy of branches; Looking at the current branches; Creating a new branch; Switching from branch to branch; Understanding what happens under the hood; Bird's eye view to branches; Typing is boring - Git aliases; Merging branches; Merge is not the end of the branch; Exercises; Exercise 2.1; Exercise 2.2; Deal with branches' modifications
Diffing branchesUsing a visual diff tool; Resolving merge conflicts; Edit collisions; Resolving a removed file conflict; Stashing; Summary; Chapter 3: Git Fundamentals - Working Remotely; Working with remotes; Setting up a new GitHub account; Cloning a repository; Uploading modifications to remotes; What do I send to the remote when I push?; Pushing a new branch to the remote; The origin; Tracking branches; Downloading remote changes; Checking for modifications and downloading them; Applying downloaded changes; Going backward: publish a local repository to GitHub
Adding a remote to a local repositoryPushing a local branch to a remote repository; Social coding - collaborate using GitHub; Forking a repository; Submitting pull requests; Creating a pull request; Summary; Chapter 4: Git Fundamentals - Niche Concepts, Configurations, and Commands; Dissecting the Git configuration; Configuration architecture; Configuration levels; Listing configurations; Editing configuration files manually; Setting up other environment configurations; Git aliases; Shortcuts to common commands; Creating commands; git unstage; git undo; git last; git difflast
Advanced aliases with external commandsRemoving an alias; Aliasing git command itself; Git references; Symbolic references; Ancestry references; First parent; Second parent; World-wise techniques; Changing the last commit message; Tracing changes in a file; Cherry picking; Tricks; Bare repositories; Converting a regular repository to a bare one; Backup repositories; Archiving the repository; Bundling the repository; Summary; Chapter 5: Obtaining the Most - Good Commits and Workflows; The art of committing; Building the right commit; Make only one change per commit
Include the whole change in one commit
Record Nr. UNINA-9910788111003321
Santacroce Ferdinando  
Birmingham, [England] : , : Packt Publishing, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Git essentials : create, merge, and distribute code with Git, the most powerful and flexible versioning system available / / Ferdinando Santacroce
Git essentials : create, merge, and distribute code with Git, the most powerful and flexible versioning system available / / Ferdinando Santacroce
Autore Santacroce Ferdinando
Edizione [1st edition]
Pubbl/distr/stampa Birmingham, [England] : , : Packt Publishing, , 2015
Descrizione fisica 1 online resource (168 p.)
Disciplina 005.8
Collana Community Experience Distilled
Soggetto topico Computers - Access control
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; Foreword; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started with Git; Installing Git; Running our first Git command; Setting up a new repository; Adding a file; Commit the added file; Modify a committed file; Summary; Chapter 2: Git Fundamentals - Working Locally; Repository structure and file status life cycle; Working directory; File statuses; Staging area; Unstaging a file; The time metaphor; The past; The present; The future; Working with repositories; Unstaging a file; Viewing the history
Anatomy of a commitThe commit snapshot; The commit hash; Author, e-mail, and date; Commit messages; Committing a bunch of files; Ignoring some files and folders by default; Highlighting an important commit: Git tags; Taking another way - Git branching; Anatomy of branches; Looking at the current branches; Creating a new branch; Switching from branch to branch; Understanding what happens under the hood; Bird's eye view to branches; Typing is boring - Git aliases; Merging branches; Merge is not the end of the branch; Exercises; Exercise 2.1; Exercise 2.2; Deal with branches' modifications
Diffing branchesUsing a visual diff tool; Resolving merge conflicts; Edit collisions; Resolving a removed file conflict; Stashing; Summary; Chapter 3: Git Fundamentals - Working Remotely; Working with remotes; Setting up a new GitHub account; Cloning a repository; Uploading modifications to remotes; What do I send to the remote when I push?; Pushing a new branch to the remote; The origin; Tracking branches; Downloading remote changes; Checking for modifications and downloading them; Applying downloaded changes; Going backward: publish a local repository to GitHub
Adding a remote to a local repositoryPushing a local branch to a remote repository; Social coding - collaborate using GitHub; Forking a repository; Submitting pull requests; Creating a pull request; Summary; Chapter 4: Git Fundamentals - Niche Concepts, Configurations, and Commands; Dissecting the Git configuration; Configuration architecture; Configuration levels; Listing configurations; Editing configuration files manually; Setting up other environment configurations; Git aliases; Shortcuts to common commands; Creating commands; git unstage; git undo; git last; git difflast
Advanced aliases with external commandsRemoving an alias; Aliasing git command itself; Git references; Symbolic references; Ancestry references; First parent; Second parent; World-wise techniques; Changing the last commit message; Tracing changes in a file; Cherry picking; Tricks; Bare repositories; Converting a regular repository to a bare one; Backup repositories; Archiving the repository; Bundling the repository; Summary; Chapter 5: Obtaining the Most - Good Commits and Workflows; The art of committing; Building the right commit; Make only one change per commit
Include the whole change in one commit
Record Nr. UNINA-9910828487703321
Santacroce Ferdinando  
Birmingham, [England] : , : Packt Publishing, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui