Flylib.com
UNIX: The Complete Reference, Second Edition (Complete Reference Series)
UNIX: The Complete Reference, Second Edition (Complete Reference Series)
ISBN: 0072263369
EAN: 2147483647
Year: 2006
Pages: 316
Authors:
Kenneth Rosen
,
Douglas Host
,
Rachel Klee
,
Richard Rosinski
BUY ON AMAZON
Table of Contents
Back Cover
UNIX-The Complete Reference, Second Edition
Introduction
About This Book
How to Use This Book
Part I: Basic
Chapter 1: Background
What Is UNIX?
Why Is UNIX Important?
The Structure of the UNIX Operating System
Applications
The UNIX Philosophy
The Birth of the UNIX System
GNU and Linux
UNIX Standards
Widely Used UNIX Variants
A UNIX System Timeline
UNIX Contributors
The UNIX System and Microsoft Windows NT Versions
The Future of UNIX
Choosing a UNIX Variant
Summary
How to Find Out More
Chapter 2: Getting Started
Starting Out
Logging In
Entering Commands
Getting Started with Electronic Mail
Logging Out
Summary
How to Find Out More
Chapter 3: Working with Files and Directories
Directories
The Hierarchical File Structure
UNIX System File Types
Common Commands for Files and Directories
Searching for Files
More About Listing Files
Permissions
Viewing Long Files
Printing Files
Summary
How to Find Out More
Chapter 4: The Command Shell
Running the Shell
Using Wildcards
Standard Input and Output
Running Commands in the Background
Job Control
Configuring the Shell
Shell Variables
Command Aliases
Command History
Command-Line Editing
Command Substitution
Filename Completion
Removing Special Meanings in Command Lines
Summary
How to Find Out More
Chapter 5: Text Editing
Editing with vi
Editing with emacs
Editing with vim
Editing with pico
Summary
How to Find Out More
Chapter 6: The GNOME Desktop
The Evolution of the GNOME Desktop
Summary
How to Find Out More
Chapter 7: The CDE and KDE Desktops
The Evolution of the CDE and KDE Desktops
The CDE Desktop
The KDE Desktop
Summary
How to Find Out More
Part II: User Networking
Chapter 8: Electronic Mail
Command-Line Mail Programs
Screen-Oriented Mail Programs
Graphical Interfaces for E-Mail
Tools for Managing E-Mail
Summary
How to Find Out More
Chapter 9: Networking with TCPIP
Basic Networking Concepts
The Internet Protocol Family
How TCPIP Works
UNIX Commands for TCPIP Networking
The DARPA Commands, Including ftp and telnet
The Secure Shell (ssh)
PPP and PPPoE
Summary
How to Find Out More
Chapter 10: The Internet
Accessing the Internet
The Usenet
Internet Mailing Lists
Internet Relay Chat
Instant Messaging (IM)
The World Wide Web
Web Browsers
Summary
How to Find Out More
Part III: System Administration
Chapter 11: Processes and Scheduling
Processes
Process Scheduling
Process Priorities
Signals and Semaphores
Real-Time Processes
Summary
How to Find Out More
Chapter 12: System Security
Security Is Relative
User and Group IDs
Access Control Lists
Role-Based Access Control
Password Files
File Encryption
Pretty Good Privacy (PGP)
GNU Privacy Guard (GPG)
Console Locking
Logging Off Safely
Trojan Horses
Viruses and Worms
Security Guidelines for Users
The Restricted Shell (rsh)
Levels of Operating System Security
Summary
How to Find Out More
Chapter 13: Basic System Administration
Administrative Concepts
Setup Procedures
Maintenance Tasks
Security Tips for System Administrators
Summary
How to Find Out More
Chapter 14: Advanced System Administration
Managing System Services
Summary
How to Find Out More
Part IV: Network Administration
Chapter 15: Clients and Servers
Mid-Range Power: The Evolution of ClientServer Computing
Principles of ClientServer Architecture
File Sharing
Summary
How to Find Out More
Chapter 16: The Apache Web Server
The History and Popularity of Apache
Apache Installation
Apache Configuration
Apache Log Files
Summary
How to Find Out More
Chapter 17: Network Administration
TCPIP Administration
DNS (Domain Name Service) Administration
sendmail Mail Administration
NIS (Network Information Service Plus) Administration
NFS (Network File System) Administration
Firewalls, Proxy Servers, and Web Security
Summary
How to Find Out More
Chapter 18: Using UNIX and Windows Together
Moving to UNIX If You Are a Windows User
Networking UNIX and Windows Machines
Terminal Emulation
Running Windows Applications and Tools on UNIX Machines
Sharing Files and Applications Across UNIX and Windows Machines
Running UNIX Applications on DOSWindows Machines
Running UNIX and Windows Together on the Same Machine
A Simple Solution for Sharing UNIX and Windows Environments
Summary
How to Find Out More
Part V: Tools and Programming
Chapter 19: Filters and Utilities
Finding Patterns in Files
Compressing and Packaging Files
Counting Lines, Words, and File Size
Working with Columns and Fields
Sorting the Contents of Files
Comparing Files
Examining File Contents
Editing and Formatting Files
Saving Output
Working with Dates and Times
Performing Mathematical Calculations
Summary
How to Find Out More
Chapter 20: Shell Scripting
The Shell Language vs. Other Programming Languages
A Sample Shell Script
Other Ways to Execute Scripts
Putting Comments in Shell Scripts
Working with Variables
Using Command-Line Arguments
Arithmetic Operations
Conditional Execution
Writing Loops
Shell Input and Output
Creating Functions
Further Scripting Techniques
Debugging Shell Programs
Summary
How to Find Out More
Chapter 21: awk and sed
Versions of awk
How awk Works
Specifying Patterns
Specifying Actions
Input and Output
sed
Summary
How to Find Out More
Chapter 22: Perl
Running Perl Scripts
Perl Syntax
Scalar Variables
Arrays and Lists
Hashes
Control Structures
Defining Your Own Procedures
File I0
Regular Expressions
Perl Modules
Using Perl for CGI Scripting
Troubleshooting
Summary
How to Find Out More
Chapter 23: Python
Running Python Commands
Python Syntax
Variables
Control Structures
Defining Your Own Functions
Input and Output
Interacting with the UNIX System
Regular Expressions
Creating Simple Classes
Exceptions
Troubleshooting
Summary
How to Find Out More
24: C and C Programming Tools
Obtaining CC Development Tools
The gcc Compiler
Makefiles
The gdb Debugger
Source Control with cvs
Manual Pages
Other Development Tools
Summary
How to Find Out More
Chapter 25: An Overview of Java
Bytecode and the Java Virtual Machine (JVM)
Applications and Applets
The Java Development Kit (JDK)
A Simple Java Application
The Eclipse IDE
The Java Language
A Simple Java Applet
The Abstract Window Toolkit (AWT)
Multithreaded Programming
Summary
How to Find Out More
Part VI: Enterprise Solutions
Chapter 26: UNIX Applications and Databases
Open-Source Software
About Specific Packages Mentioned
Horizontal Applications
Summary
How to Find Out More
Chapter 27: Web Development under UNIX
History of the Web and Web Standards
HTML Syntax Basics
JavaScript and the Document Object Model
Cascading Style Sheets
Server-Side Web Applications
Web Authoring Software
Summary
How to Find Out More
Appendix-How to Use the Man (Manual) Pages
Using the Manual Pages
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
List of Figures
List of Tables
UNIX: The Complete Reference, Second Edition (Complete Reference Series)
ISBN: 0072263369
EAN: 2147483647
Year: 2006
Pages: 316
Authors:
Kenneth Rosen
,
Douglas Host
,
Rachel Klee
,
Richard Rosinski
BUY ON AMAZON
CompTIA Project+ Study Guide: Exam PK0-003
Assessment Test
Schedule Planning
Cost Planning
Project Execution
Project Control
Introducing Microsoft Office InfoPath 2003 (Bpg-Other)
Understanding Form Technologies
Adding Basic Controls and Lists
Connecting Forms to Databases
Introducing InfoPath Form Template Projects
Writing Advanced Event Handlers
A Practitioners Guide to Software Test Design
Equivalence Class Testing
State-Transition Testing
Scripted Testing
Defect Taxonomies
Section V - Some Final Thoughts
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Crash Course in the Internet Protocol Suite
Unauthorized Activity I
Unauthorized Activity II
Cisco Secure IDS
Data Correlation
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Common characteristics of contemporary SOA
Classifying service model logic
Service-Oriented Design (Part I: Introduction)
Considerations for positioning core SOA standards
WS-Coordination overview
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 7. Inside Google Maps URLs
Hack 19. Map Local Weather Conditions
Hack 39. Track Your Every Move with Google Earth
Hack 42. Get More out of What You Read
Hack 61. Use the Right Developers Key Automatically
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies