This document is the official user manual for Symantec's THINK C 5.0, a powerful integrated development environment (IDE) designed for the Macintosh platform.
It serves as a comprehensive guide for developers, covering essential aspects of using THINK C for Macintosh application development, from initial setup to advanced programming techniques.
This manual is an essential resource for programmers aiming to develop software for the Macintosh using the C programming language, enabling them to effectively utilize the full capabilities of the THINK C development environment.
![]() |
Symantec Protection for SharePoint Servers 6.1.0 Implementation Guide This guide details the installation, configuration, and management of Symantec Protection for SharePoint Servers 6.1.0, designed to secure Microsoft SharePoint 2013, 2016, and 2019 environments against malware and active content threats. |
![]() |
Symantec Endpoint Protection Installation and Administration Guide Comprehensive guide for installing and administering Symantec Endpoint Protection (SEP), covering setup, client deployment, policy management, threat prevention, and reporting. |
![]() |
Symantec™ ESM Agent for IBM AS/400 Installation Guide Detailed installation guide for Symantec ESM Agent version 6.5 on IBM AS/400 systems. Covers system requirements, pre-installation checks, installation procedures, and agent registration with the ESM manager. |
![]() |
Symantec Endpoint Protection インストールおよび管理者ガイド このドキュメントは、Symantec Endpoint Protection (SEP) 14.3 RU2 のインストール、設定、および管理に関する包括的なガイドです。Windows、Mac、Linux クライアントの導入、セキュリティポリシーの管理、ファイアウォール保護、侵入防止、ウイルス対策、およびレポート機能について詳しく説明しています。 |
![]() |
Veritas Storage Foundation Cluster File System High Availability Administrator's Guide for Solaris 6.0 Administrator's guide for Veritas Storage Foundation Cluster File System High Availability (SFCFSHA) 6.0 on Solaris. Covers installation, configuration, management, and technical support for high-availability storage solutions. |
![]() |
Secure Web Gateway Content Analysis Policy Best Practices Improvement This document provides best practices for configuring Symantec's Secure Web Gateway (SWG) solution, including ProxySG, Advanced Secure Gateway, and SWG virtual appliances, for content scanning with Content Analysis. It details a risk-based content scanning model, policy templates, and customization options to optimize security and performance. |
![]() |
Ransomware 2017: An Internet Security Threat Report by Symantec An in-depth analysis of ransomware threats in 2017, detailing major outbreaks like WannaCry and Petya, their impact on businesses, methods of spread, and essential protection strategies. Includes data on infection trends, ransom demands, and a comprehensive list of ransomware families. |