Chapter 5. Programming notes

Table of Contents

5.1. Security issues for module creation
5.1.1. Sufficient resources
5.1.2. Who´s who?
5.1.3. Using the conversation function
5.1.4. Authentication tokens
5.2. Use of syslog(3)
5.3. Modules that require system libraries
上一章 首页 下一章