O'Reilly logo

Linux Application Development, Second Edition by Erik W. Troan, Michael K. Johnson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Glossary

advisory locking

Locking that is not enforced: All processes that manipulate the locked files must explicitly check for the existence of locks. (276)

anonymous mapping

A mapping of memory that is not associated with an inode in a file system, limited to private use within a process. (269)

ar

The archiving utility used most often to create libraries. (79)

basic regular expression (BRE)

The type of string-matching expression used by the grep utility. (557)

big-endian

Multibyte values stored with the most significant byte in the lowest memory address or first byte transmitted, followed by the remainder of the bytes in order of significance. (430)

blocked signals

Signals that a process is not prepared to accept. Usually, signals are blocked for a short ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required