Flylib.com
Learning the bash Shell: Unix Shell Programming (In a Nutshell (OReilly))
Learning the bash Shell: Unix Shell Programming (In a Nutshell (OReilly))
ISBN: 0596009658
EAN: 2147483647
Year: 2005
Pages: 139
Authors:
Cameron Newham
BUY ON AMAZON
Learning the bash Shell, 3rd Edition
Table of Contents
Copyright
Preface
bash Versions
Summary of bash Features
Intended Audience
Code Examples
Chapter Summary
Conventions Used in This Handbook
We d Like to Hear from You
Using Code Examples
Safari Enabled
Acknowledgments for the First Edition
Acknowledgments for the Second Edition
Acknowledgments for the Third Edition
Chapter 1. bash Basics
1.1. What Is a Shell?
1.2. Scope of This Book
1.3. History of UNIX Shells
1.4. Getting bash
1.5. Interactive Shell Use
1.6. Files
1.7. Input and Output
1.8. Background Jobs
1.9. Special Characters and Quoting
1.10. Help
Chapter 2. Command-Line Editing
2.1. Enabling Command-Line Editing
2.2. The History List
2.3. emacs Editing Mode
2.4. vi Editing Mode
2.5. The fc Command
2.6. History Expansion
2.7. readline
2.8. Keyboard Habits
Chapter 3. Customizing Your Environment
3.1. The .bash_profile, .bash_logout, and .bashrc Files
3.2. Aliases
3.3. Options
3.4. Shell Variables
3.5. Customization and Subprocesses
3.6. Customization Hints
Chapter 4. Basic Shell Programming
4.1. Shell Scripts and Functions
4.2. Shell Variables
4.3. String Operators
4.4. Command Substitution
4.5. Advanced Examples: pushd and popd
Chapter 5. Flow Control
5.1. ifelse
5.2. for
5.3. case
5.4. select
5.5. while and until
Chapter 6. Command-Line Options and Typed Variables
6.1. Command-Line Options
6.2. Typed Variables
6.3. Integer Variables and Arithmetic
6.4. Arrays
Chapter 7. InputOutput and Command-Line Processing
7.1. IO Redirectors
7.2. String IO
7.3. Command-Line Processing
Chapter 8. Process Handling
8.1. Process IDs and Job Numbers
8.2. Job Control
8.3. Signals
8.4. trap
8.5. Coroutines
8.6. Subshells
8.7. Process Substitution
Chapter 9. Debugging Shell Programs
9.1. Basic Debugging Aids
9.2. A bash Debugger
Chapter 10. bash Administration
10.1. Installing bash as the Standard Shell
10.2. Environment Customization
10.3. System Security Features
Chapter 11. Shell Scripting
11.1. What s That Do?
11.2. Starting Up
11.3. Potential Problems
11.4. Don t Use bash
Chapter 12. bash for Your System
12.1. Obtaining bash
12.2. Unpacking the Archive
12.3. What s in the Archive
12.4. Who Do I Turn to?
Appendix A. Related Shells
A.1. The Bourne Shell
A.2. The IEEE 1003.2 POSIX Shell Standard
A.3. The Korn Shell
A.4. pdksh
A.5. zsh
A.6. Shell Clones and Unix-like Platforms
Appendix B. Reference Lists
B.1. Invocation
B.2. Prompt String Customizations
B.3. Built-In Commands and Reserved Words
B.4. Built-In Shell Variables
B.5. Test Operators
B.6. set Options
B.7. shopt Options
B.8. IO Redirection
B.9. emacs Mode Commands
B.10. vi Control Mode Commands
Appendix C. Loadable Built-Ins
Appendix D. Programmable Completion
Colophon
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_X
index_Y
index_Z
Learning the bash Shell: Unix Shell Programming (In a Nutshell (OReilly))
ISBN: 0596009658
EAN: 2147483647
Year: 2005
Pages: 139
Authors:
Cameron Newham
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.1 Install OpenSSH to Replace the Remote Access Protocols with Encrypted Versions
Step 2.1 Use the OpenSSH Tool Suite to Replace Clear-Text Programs
Step 3.4 Use PuTTYs Tools to Transfer Files from the Windows Command Line
Step 4.1 Authentication with Public Keys
Step 4.6 How to use PuTTY Passphrase Agents
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Summary
Catalyst Switch Role in IP Telephony
Cisco Unified CallManager Advanced Route Plans
Cisco VT Advantage Overview
Summary
Snort Cookbook
Installing Snort from Source on Unix
Configuring MySQL for Snort
Logging to Email
Dynamic Rules
Installing and Configuring Swatch
SQL Hacks
Hack 12. Simplify Complicated Updates
Date Handling
Hack 26. Include the Rows Your JOIN Forgot
Hack 35. Tally Results into a Chart
Hack 80. Play Six Degrees of Kevin Bacon
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Querying WMI
Instrumenting .NET Applications with WMI
The WMI Schema
WMI Providers
Comparing, Designing, and Deploying VPNs
What Is a Virtual Private Network?
Review Questions
Deploying MPLS Layer 3 VPNs
Summary
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies