Flylib.com
List of Tables
Previous page
Table of content
Chapter 2: Getting Started
Table 2–1: Command Summary
Chapter 3: Working with Files and Directories
Table 3–1: Common File Extensions
Table 3–2: Command Summary
Chapter 4: The Command Shell
Table 4–1: Shell Redirection Operators
Table 4–2: Job Control Commands
Table 4–3: Assigning Variables and Aliases
Table 4–4: History Substitution
Table 4–5: Command-Line Editing Commands
Table 4–6: The Common Shells
Chapter 5: Text Editing
Table 5–1: Moving Around by Lines or Characters in vi
Table 5–2: Moving Across a Section of Text in vi
Table 5–3: Examples of the delete Command
Table 5–4: Some Examples of Yanking
Table 5–5: Some Useful vi Options
Chapter 6: The GNOME Desktop
Table 6–1: Items on the Desktop Context Menu
Chapter 7: The CDE and KDE Desktops
Table 7–1: The CDE Desktop Front Panel
Table 7–2: Items on the KDE Desktop Context Menu
Table 7–3: KDE Control Center Submenus and Their Functions
Table 7–4: KDE Sidebar Icons in Konqueror
Table 7–5: Built-in KDE Accessories and Their Functions
Table 7–6: Some Additional KDE Built-in Graphics Applications
Table 7–7: Additional KDE Built-in Internet Applications
Table 7–8: Some Other KDE Audio Players and Tools
Chapter 8: Electronic Mail
Table 8–1: Common UNIX Mail Clients
Chapter 9: Networking with TCP/IP
Table 9–1: The Most Commonly Used ftp Commands
Chapter 10: The Internet
Table 10–1: Some Popular Newsgroup Prefixes
Table 10–2: Some Popular Newsgroups and Their Topics
Table 10–3: Some readnews Commands
Table 10–4: Some Commonly Used vnews Commands
Table 10–5: Some Newsgroup-Level rn Commands
Table 10–6: Some Article-Level rn Commands
Table 10–7: Some Useful ircll Commands
Table 10–8: Some Common Internet File Formats and Their File Extensions
Table 10–9: Some Popular Helper Applications
Chapter 11: Processes and Scheduling
Table 11–1: The Thirty Most Common UNIX Signals
Chapter 13: Basic System Administration
Table 13–1: Software Installation Parameters
Chapter 14: Advanced System Administration
Table 14–1: ufsrestore Required Options
Chapter 17: Network Administration
Table 17–1: Network Classes and Their Netmasks, Including Host IP Examples
Table 17–2: Permissions Used to Enable Anonymous FTP
Chapter 18: Using UNIX and Windows Together
Table 18–1: Basic Commands in DOS and the UNIX System
Table 18–2: Differences in Syntactic Use of Slash, Backslash in DOS and UNIX
Chapter 19: Filters and Utilities
Table 19–1: grep Regular Expressions
Table 19–2: Additional egrep Regular Expressions
Table 19–3: Options for sort
Table 19–4: date Format Specifications
Table 19–5: bc Operators and Functions
Table 19–6: dc Operators
Table 19–7: Command Summary
Chapter 20: Shell Scripting
Table 20–1: Integer Tests
Table 20–2: String Tests
Table 20–3: Logical Operators
Table 20–4: Tests for Files and Directories
Table 20–5: echo Escape Sequences
Table 20–6: Interrupt Codes
Chapter 21: awk and sed
Table 21–1: awk Regular Expressions
Table 21–2: awk Built-in Variables
Chapter 22: Perl
Table 22–1: Comparison Operators
Table 22–2: Perl Regular Expressions
Table 22–3: Basic Perl Functions
Table 22–4: Special Characters Used in Perl
Chapter 23: Python
Table 23–1: Python Regular Expressions
Table 23–2: Python Keywords
Table 23–3: Python Module
Chapter 24: C and C++ Programming Tools
Table 24–1: gcc Command Line Options
Table 24–2: Makefile Automatic Variables
Table 24–3: gdb Commands
Table 24–4: cvs update Character Flags
Table 24–5: cvs Commands
Chapter 25: An Overview of Java
Table 25–1: Java Simple Types
Table 25–2: Relational and Logical Operators
Table 25–3: Java Packages
Appendix- How to Use the Man (Manual) Pages
Table A–1: Section Categories for UNIX man Pages
Previous page
Table of content
UNIX: The Complete Reference, Second Edition (Complete Reference Series)
ISBN: 0072263369
EAN: 2147483647
Year: 2006
Pages: 316
Authors:
Kenneth Rosen
,
Douglas Host
,
Rachel Klee
,
Richard Rosinski
BUY ON AMAZON
CISSP Exam Cram 2
SECURITY-MANAGEMENT PRACTICES
Documents and Guidelines
Network Equipment
Business Continuity Planning
History of Encryption
Strategies for Information Technology Governance
Integration Strategies and Tactics for Information Technology Governance
Linking the IT Balanced Scorecard to the Business Objectives at a Major Canadian Financial Group
Measuring ROI in E-Commerce Applications: Analysis to Action
Governing Information Technology Through COBIT
The Evolution of IT Governance at NB Power
A+ Fast Pass
Domain 2 Diagnosing and Troubleshooting
Domain 3 Preventive Maintenance
Domain 6 Basic Networking
Domain 1 Operating System Fundamentals
Domain 3 Diagnosing and Troubleshooting
101 Microsoft Visual Basic .NET Applications
Building Web Applications
Working with Console Applications
Interacting with the Operating System
COM Interop/PInvoke
Coding Conventions
Mastering Delphi 7
Building the User Interface
Working with ADO
Web Programming with IntraWeb
The Microsoft .NET Architecture from the Delphi Perspective
Delphi for .NET Preview: The Language and the RTL
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Working with Ideas
Voice of the Customer (VOC)
Data Collection
Descriptive Statistics and Data Displays
Variation Analysis
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies