Flylib.com
Learning the bash Shell: Unix Shell Programming (In a Nutshell (OReilly))
Learning the bash Shell: Unix Shell Programming (In a Nutshell (OReilly))
ISBN: 0596009658
EAN: 2147483647
Year: 2005
Pages: 139
Authors:
Cameron Newham
BUY ON AMAZON
Learning the bash Shell, 3rd Edition
Table of Contents
Copyright
Preface
bash Versions
Summary of bash Features
Intended Audience
Code Examples
Chapter Summary
Conventions Used in This Handbook
We d Like to Hear from You
Using Code Examples
Safari Enabled
Acknowledgments for the First Edition
Acknowledgments for the Second Edition
Acknowledgments for the Third Edition
Chapter 1. bash Basics
1.1. What Is a Shell?
1.2. Scope of This Book
1.3. History of UNIX Shells
1.4. Getting bash
1.5. Interactive Shell Use
1.6. Files
1.7. Input and Output
1.8. Background Jobs
1.9. Special Characters and Quoting
1.10. Help
Chapter 2. Command-Line Editing
2.1. Enabling Command-Line Editing
2.2. The History List
2.3. emacs Editing Mode
2.4. vi Editing Mode
2.5. The fc Command
2.6. History Expansion
2.7. readline
2.8. Keyboard Habits
Chapter 3. Customizing Your Environment
3.1. The .bash_profile, .bash_logout, and .bashrc Files
3.2. Aliases
3.3. Options
3.4. Shell Variables
3.5. Customization and Subprocesses
3.6. Customization Hints
Chapter 4. Basic Shell Programming
4.1. Shell Scripts and Functions
4.2. Shell Variables
4.3. String Operators
4.4. Command Substitution
4.5. Advanced Examples: pushd and popd
Chapter 5. Flow Control
5.1. ifelse
5.2. for
5.3. case
5.4. select
5.5. while and until
Chapter 6. Command-Line Options and Typed Variables
6.1. Command-Line Options
6.2. Typed Variables
6.3. Integer Variables and Arithmetic
6.4. Arrays
Chapter 7. InputOutput and Command-Line Processing
7.1. IO Redirectors
7.2. String IO
7.3. Command-Line Processing
Chapter 8. Process Handling
8.1. Process IDs and Job Numbers
8.2. Job Control
8.3. Signals
8.4. trap
8.5. Coroutines
8.6. Subshells
8.7. Process Substitution
Chapter 9. Debugging Shell Programs
9.1. Basic Debugging Aids
9.2. A bash Debugger
Chapter 10. bash Administration
10.1. Installing bash as the Standard Shell
10.2. Environment Customization
10.3. System Security Features
Chapter 11. Shell Scripting
11.1. What s That Do?
11.2. Starting Up
11.3. Potential Problems
11.4. Don t Use bash
Chapter 12. bash for Your System
12.1. Obtaining bash
12.2. Unpacking the Archive
12.3. What s in the Archive
12.4. Who Do I Turn to?
Appendix A. Related Shells
A.1. The Bourne Shell
A.2. The IEEE 1003.2 POSIX Shell Standard
A.3. The Korn Shell
A.4. pdksh
A.5. zsh
A.6. Shell Clones and Unix-like Platforms
Appendix B. Reference Lists
B.1. Invocation
B.2. Prompt String Customizations
B.3. Built-In Commands and Reserved Words
B.4. Built-In Shell Variables
B.5. Test Operators
B.6. set Options
B.7. shopt Options
B.8. IO Redirection
B.9. emacs Mode Commands
B.10. vi Control Mode Commands
Appendix C. Loadable Built-Ins
Appendix D. Programmable Completion
Colophon
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_X
index_Y
index_Z
Learning the bash Shell: Unix Shell Programming (In a Nutshell (OReilly))
ISBN: 0596009658
EAN: 2147483647
Year: 2005
Pages: 139
Authors:
Cameron Newham
BUY ON AMAZON
Oracle Developer Forms Techniques
Timers and Displaying a Clock
Window Management in Forms
Taking Advantage of PL/SQL 2.x in Forms
Intelligence with Regard to Form Wizards
A Block Level Commit
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Summary
Administrator Password Policy
Blocking Commonly Exploited Area Codes
Authentication and Integrity
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Crash Course in the Internet Protocol Suite
Unauthorized Activity II
IDS and IPS Internals
Laws, Standards, and Organizations
The Future of Intrusion Detection and Prevention
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 90 Introduction
Article 250 Grounding and Bonding
Article 500 Hazardous (Classified) Locations, Classes I, II, and III, Divisions 1 and 2
Example No. D1(a) One-Family Dwelling
Example No. D4(a) Multifamily Dwelling
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Cisco ASA 5510 Model
Enabling Application Inspection Using the Modular Policy Framework
Failover and Redundancy
Adaptive Inspection Prevention Security Services Module Overview (AIP-SSM)
Configuration Management
File System Forensic Analysis
A Case Study Using dd
Sun Solaris Slices
Bibliography
NTFS Data Structures
Superblock
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies