Flylib.com
UNIX Users Handbook (2nd Edition)
UNIX Users Handbook (2nd Edition)
ISBN: 0130654191
EAN: 2147483647
Year: 2001
Pages: 34
Authors:
Marty Poniatowski
,
Martin Poniatowski
BUY ON AMAZON
UNIX User s Handbook, Second Edition
Copyright
FOREWORD
PREFACE
UNIX Section
Programming Section
UNIX and Windows Interoperability Section
A Word about the UNIX Variants Used throughout This Book
Relevant URLs
Manual Pages Included in This Book
Conventions Used in the Book
Acknowledgments
Chapter 1. Getting Started - Login, Mail, Internet Access, UNIX Components
Introduction
Multi-User UNIX
Online Manual Pages
Electronic Mail
Accessing the Internet
UNIX Components
Chapter 2. UNIX File System Introduction- File System Layout, file and ls Commands
The Basics of UNIX
File Types
The file Command
The ls Command
File System Layout
Linux File System Layout
Manual Pages for Some Commands Used in Chapter 2
Chapter 3. Working with Files and Directories - Permissions, Commands, File Name Expansion, and Wild Cards
Introduction
Permissions
Absolute and Relative Path Names
File Name Expansion and Wild Cards
pwd and cd
chmod
cp
mv
mkdir
rm
rmdir
Using Commands
Manual Pages for Some Commands Used in Chapter 3
Chapter 4. Viewing Files - Redirection, cat, more, pg, head, and tail Commands
First Things First
Redirection
Viewing Files with cat, more, pg, head, and tail
Manual Pages for Some Commands Used in Chapter 4
Chapter 5. UNIX Tools - split, wc, sort, cmp, diff, comm, dircmp, cut, paste, join, and tr
Not All Commands on All UNIX Variants
split
wc
sort
cmp, diff, and comm
dircmp
cut
paste
tr
Manual Pages for Some Commands Used in Chapter 5
Chapter 6. Advanced UNIX Tools - Regular Expressions, sed, awk, and grep
Three Commands
Regular Expression Words-of-Caution
Expressions Are Strings and Wildcards
sed
awk
grep
Manual Pages for Some Commands Used in Chapter 6
Chapter 7. find Command
find Overview
Finding Files of a Specific Type
Find Empty Files and Directories
Finding Files By Name, Size, and Both Name and Size
Finding Files By Owner, Type, and Permissions
Finding Long Unaccessed Files and Running Commands on Found Files
find Summary
Manual Pages for find Command Used in Chapter 7
Chapter 8. The vi Editor
The vi Editor
Regular Expression Words-of-Caution
Expressions Are Strings and Wildcards
Modes and Notations
Starting a vi Session
Cursor Control Commands
Adding Text in vi
Deleting Text in vi
Changing Text in vi
Search and Replace in vi
Copying Text in vi
Undo and Repeat in vi
Save Text and Exit vi
Options in vi
Status in vi
Section Positioning and Placing Marks in Text
Joining Lines in vi
Cursor Placement and Adjusting the Screen
Shell Escape Commands
Macros and Abbreviations
Indenting Text
Shell Filters
Pattern Matching
Manual Pages for vi Command Used in Chapter 8
Chapter 9. Introduction to the Bash Shell
Different Shells
Introduction to Bash
Chapter 10. Introduction to the KornShell
Different Shells
Introduction to KornShell
Manual Pages of Some Commands Used in Chapter 10
Chapter 11. Introduction to the C Shell
Different Shells
Introduction to the C Shell
Manual Pages of Some Commands Used in Chapter 11
Chapter 12. Introduction to Shell Programming
Shell Programming
Steps to Create Shell Programs
ksh Programming
An HP-UX Logical Volume Manager Shell Program
C Shell Programming
Manual Pages for Some Commands Used in Chapter 12
Chapter 13. Introduction to System Administration
System Administration
Check Processes with ps
Killing a Process
Signals
System Startup and Shutdown Scripts
An Alternative Startup and Shutdown Method
System Shutdown
Users and Groups
Disk-Related Concepts
Viewing Mounted Filesystems and Swap
Determining Disk Usage
System Backup
Scheduling Cron Jobs
Networking
syslog and Log Files
dmesg
The Kernel
Device Files
Software Management
Printing
Manual Pages of Some Commands Used in Chapter 13
Chapter 14. Introduction to UNIX Performance Tools
Introduction
Standard UNIX Commands
Check Processes with ps
Killing a Process
Signals
More Advanced and Graphical Performance Tools
HP GlancePlusUX
HP VantagePoint Performance Agent and HP VantagePoint Performance AnalyzerUX
Manual Pages of Some Commands Used in Chapter 14
Chapter 15. Common Desktop Environment
Why a Graphical User Interface (GUI)?
CDE Basics
Customizing CDE
CDE - Advanced Topics
X, Motif, and CDE Configuration Files
The Sequence of Events When CDE Starts
CDE and Performance
Conclusion
Chapter 16. Networking
UNIX Networking
An Overview of IEEE802.3, TCPIP
Internet Protocol (IP) Addressing
Using Networking
ARPA Services (Communication among Systems w Different OS)
Berkeley Commands (Communication between UNIX Systems)
Host Name Mapping
Network File System (NFS)
Other Networking Commands and Setup
Manual Pages of Some Commands Used in Chapter 16
netstat
Chapter 17. Introduction to Software Development
Introduction
Understanding Computer Programs
Compiled vs. Interpreted Languages
Chapter 18. Programming Constructs
Introduction
Assignment Constructs
Mathematical Operators
Comparison Expressions
Loop Constructs
Choice Constructs
Nested if...then...else Statement
Chapter 19. Programming Design
Introduction
A Practical Example
The Next Step: Object-Oriented Method and Design
Procedural Paradigm
Object-Oriented Paradigm
Encapsulation
Inheritance
Polymorphism
How to Design for Object-Oriented Languages
Chapter 20. Development
Introduction
Development Life Cycle
SCCS - Source Code Control System
SCCS Commands
Manual Pages of Some Commands Used in Chapter 20
Chapter 21. Introduction to C and C
Introduction
C and C - The History
C and C - Compilers
C and C - Make Utility
C and C - Debugging
Manual Pages of Some Commands Used in Chapter 21
Chapter 22. C Programming Basics
Introduction
Format of a C Program
Good Programming Practices
Uppercase and Lowercase
C Language Nuts and Bolts
Arithmetic Expressions
Looping
Choice
Functions
Arrays
Strings
Structures
Pointers
More Data Types
Dynamic Memory Allocation
Chapter 23. C Programming Basics
Introduction
C Basics
Enhancements
New Features of C
Chapter 24. Internet Programming Basics
Introduction
Internet Basics
History
Client-Server Model of the Internet
Protocols
Web Browsers
Chapter 25. Java
Introduction
Architecture Independence
The Java Platform
Java vs. C and C
Java Environment
Comments
No Preprocessor
Constants
No Macros
No Include Files
Data Types
Integral Types
Reference Data Types
Modifiers
No Pointers
Null
No Structure or Unions
No Enumerated Types
No Typedef
Object Creation
Accessing Objects
Garbage Collection
Arrays
Strings
The for Loop
Exception and Exception Handling
Applets
Chapter 26. Perl: An Introduction
Practical Extraction and Reporting Language
Perl Options
Opening Input and Output Files, File Test Operators, and Escape Squences
Variables - Scalar and Array
Conditional Statements and Loops, Operators, and Autoincrement and Autodecrement
Arguments to Shell Programs
Search and Replace
List Operators
Subroutines
Chapter 27. The X Window System
X Window System Background
X Server Software
Chapter 28. Networking - UNIX and Windows Interoperability
NFS and X Windows
TCPIP Networking Background
NFS Background
Using Windows and UNIX Networking
File Transfer Protocol (FTP)
Other Connection Topics
Chapter 29. Advanced Server for UNIX
Windows Functionality on UNIX
Installing Advanced Server9000 on UNIX
Sharing a Printer
Sharing a File System
Chapter 30. The Windows Command Line: NET Commands,POSIX Utilities, and Others
Introduction for UNIX System Administrators
The Windows Command Line
NET Commands
wc
Additional Commands
Chapter 31. Services for UNIX (SFU)
Introduction to SFU
Using the Network File System (NFS) Functionality of SFU
Telnet Client
Telnet Server
UNIX Utilities
NFS Server
Password Synchronization
Chapter 32. Samba
Samba Overview
UNIX Users Handbook (2nd Edition)
ISBN: 0130654191
EAN: 2147483647
Year: 2001
Pages: 34
Authors:
Marty Poniatowski
,
Martin Poniatowski
BUY ON AMAZON
Absolute Beginner[ap]s Guide to Project Management
Essential Elements for any Successful Project
Building a Project Plan
Why Is the WBS Important?
"Managing Project Deliverables" Means What Exactly?
Options for Issue Log
Lotus Notes and Domino 6 Development (2nd Edition)
Real-World JavaScript Examples
Writing Java Servlets
How Does Domino Security Work?
Implementing Form-Level Security
Introducing Workflow
MySQL Cookbook
Selecting Tabular or Tab-Delimited Query Output Format
Sorting Expression Results
Selecting Only Groups with Certain Characteristics
Converting Subselects to Join Operations
Creating a Navigation Index from Database Content
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 4. Get the Birds-Eye View
Hack 30. Stay Out of Traffic Jams
Hack 32. Locate a Phone Number
Hack 36. Get Driving Directions for More Than Two Locations
Hack 43. Dont Believe Everything You Read on a Map
Programming Microsoft ASP.NET 3.5
Working with the Page
Real-World Data Access
ASP.NET Iterative Controls
Creating New ASP.NET Controls
Hosting ASP.NET Outside IIS
Sap Bw: a Step By Step Guide for Bw 2.0
Business Scenario and SAP BW
Creating InfoPackages to Load Characteristic Data
Operational Data Store (ODS)
Creating an R/3 Source System
Creating Views in R/3
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies