Flylib.com
Learning the bash Shell: Unix Shell Programming (In a Nutshell (OReilly))
Learning the bash Shell: Unix Shell Programming (In a Nutshell (OReilly))
ISBN: 0596009658
EAN: 2147483647
Year: 2005
Pages: 139
Authors:
Cameron Newham
BUY ON AMAZON
Learning the bash Shell, 3rd Edition
Table of Contents
Copyright
Preface
bash Versions
Summary of bash Features
Intended Audience
Code Examples
Chapter Summary
Conventions Used in This Handbook
We d Like to Hear from You
Using Code Examples
Safari Enabled
Acknowledgments for the First Edition
Acknowledgments for the Second Edition
Acknowledgments for the Third Edition
Chapter 1. bash Basics
1.1. What Is a Shell?
1.2. Scope of This Book
1.3. History of UNIX Shells
1.4. Getting bash
1.5. Interactive Shell Use
1.6. Files
1.7. Input and Output
1.8. Background Jobs
1.9. Special Characters and Quoting
1.10. Help
Chapter 2. Command-Line Editing
2.1. Enabling Command-Line Editing
2.2. The History List
2.3. emacs Editing Mode
2.4. vi Editing Mode
2.5. The fc Command
2.6. History Expansion
2.7. readline
2.8. Keyboard Habits
Chapter 3. Customizing Your Environment
3.1. The .bash_profile, .bash_logout, and .bashrc Files
3.2. Aliases
3.3. Options
3.4. Shell Variables
3.5. Customization and Subprocesses
3.6. Customization Hints
Chapter 4. Basic Shell Programming
4.1. Shell Scripts and Functions
4.2. Shell Variables
4.3. String Operators
4.4. Command Substitution
4.5. Advanced Examples: pushd and popd
Chapter 5. Flow Control
5.1. ifelse
5.2. for
5.3. case
5.4. select
5.5. while and until
Chapter 6. Command-Line Options and Typed Variables
6.1. Command-Line Options
6.2. Typed Variables
6.3. Integer Variables and Arithmetic
6.4. Arrays
Chapter 7. InputOutput and Command-Line Processing
7.1. IO Redirectors
7.2. String IO
7.3. Command-Line Processing
Chapter 8. Process Handling
8.1. Process IDs and Job Numbers
8.2. Job Control
8.3. Signals
8.4. trap
8.5. Coroutines
8.6. Subshells
8.7. Process Substitution
Chapter 9. Debugging Shell Programs
9.1. Basic Debugging Aids
9.2. A bash Debugger
Chapter 10. bash Administration
10.1. Installing bash as the Standard Shell
10.2. Environment Customization
10.3. System Security Features
Chapter 11. Shell Scripting
11.1. What s That Do?
11.2. Starting Up
11.3. Potential Problems
11.4. Don t Use bash
Chapter 12. bash for Your System
12.1. Obtaining bash
12.2. Unpacking the Archive
12.3. What s in the Archive
12.4. Who Do I Turn to?
Appendix A. Related Shells
A.1. The Bourne Shell
A.2. The IEEE 1003.2 POSIX Shell Standard
A.3. The Korn Shell
A.4. pdksh
A.5. zsh
A.6. Shell Clones and Unix-like Platforms
Appendix B. Reference Lists
B.1. Invocation
B.2. Prompt String Customizations
B.3. Built-In Commands and Reserved Words
B.4. Built-In Shell Variables
B.5. Test Operators
B.6. set Options
B.7. shopt Options
B.8. IO Redirection
B.9. emacs Mode Commands
B.10. vi Control Mode Commands
Appendix C. Loadable Built-Ins
Appendix D. Programmable Completion
Colophon
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_X
index_Y
index_Z
Learning the bash Shell: Unix Shell Programming (In a Nutshell (OReilly))
ISBN: 0596009658
EAN: 2147483647
Year: 2005
Pages: 139
Authors:
Cameron Newham
BUY ON AMAZON
Crystal Reports 9 on Oracle (Database Professionals)
Oracle Advanced SELECT Options
PL/SQL
Optimizing: The Crystal Reports Side
Data Dictionary Report
Appendix A Common Issues
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Trees
Dialogs
JFace Wizards
Eclipse Forms
Sample Application
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity I
Tcpdump
Cisco Secure IDS
Policy and Procedures
Security Business Issues
Cultural Imperative: Global Trends in the 21st Century
Cultural Spectacles
Cognitive Processes
The China Phenomenon
Culture and Globalization
Empires Past, Present, and Future
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Attacking the TNS Listener and Dispatchers
Attacking the Authentication Process
Indirect Privilege Escalation
Accessing the File System
Java All-In-One Desk Reference For Dummies
Welcome to Java
Using JavaBeans
Working with Files
Database for $100, Please
Book IX - Fun and Games
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies