Flylib.com
Unix in a Nutshell, Fourth Edition
Unix in a Nutshell, Fourth Edition
ISBN: 0596100299
EAN: 2147483647
Year: 2005
Pages: 201
Authors:
Arnold Robbins
BUY ON AMAZON
Unix in a Nutshell, 4th Edition
Table of Contents
Copyright
Dedication
Preface
Audience
Scope of This Book
Conventions
Using Code Examples
Safari Enabled
How to Contact Us
Acknowledgments
Part I: Commands and Shells
Chapter 1. Introduction
1.1. Unix in the 21st Century
1.2. Obtaining Compilers
1.3. Building Software
1.4. What s in the Quick Reference
1.5. Beginner s Guide
1.6. Solaris: Standard Compliant Programs
Chapter 2. Unix Commands
2.1. Introduction
2.2. Alphabetical Summary of Common Commands
2.3. Alphabetical Summary of Solaris Commands
2.4. Alphabetical Summary of GNULinux Commands
2.5. Alphabetical Summary of Mac OS X Commands
2.6. Alphabetical Summary of Java Commands
Chapter 3. The Unix Shell: An Overview
3.1. Introduction to the Shell
3.2. Purpose of the Shell
3.3. Shell Flavors
3.4. Shell Source Code URLs
3.5. Common Features
3.6. Differing Features
Chapter 4. The Bash and Korn Shells
4.1. Overview of Features
4.2. Invoking the Shell
4.3. Syntax
4.4. Functions
4.5. Variables
4.6. Arithmetic Expressions
4.7. Command History
4.8. Job Control
4.9. Command Execution
4.10. Restricted Shells
4.11. Built-in Commands (Bash and Korn Shells)
Chapter 5. tcsh: An Extended C Shell
5.1. Overview of Features
5.2. Invoking the Shell
5.3. Syntax
5.4. Variables
5.5. Expressions
5.6. Command History
5.7. Command-Line Manipulation
5.8. Job Control
5.9. Built-in Commands
Chapter 6. Package Management
6.1. Linux Package Management
6.2. The Red Hat Package Manager
6.3. Yum: Yellowdog Updater Modified
6.4. up2date: Red Hat Update Agent
6.5. The Debian Package Manager
6.6. Mac OS X Package Management
6.7. Solaris Package Management
Part II: Text Editing and Processing
Chapter 7. Pattern Matching
7.1. Filenames Versus Patterns
7.2. Metacharacters
7.3. Metacharacters, Listed by Unix Program
7.4. Examples of Searching
Chapter 8. The Emacs Editor
8.1. Conceptual Overview
8.2. Command-Line Syntax
8.3. Summary of Commands by Group
8.4. Summary of Commands by Key
8.5. Summary of Commands by Name
Chapter 9. The vi, ex, and vim Editors
9.1. Conceptual Overview
9.2. Command-Line Syntax
9.3. Review of vi Operations
9.4. vi Commands
9.5. vi Configuration
9.6. ex Basics
9.7. Alphabetical Summary of ex Commands
Chapter 10. The sed Editor
10.1. Conceptual Overview
10.2. Command-Line Syntax
10.3. Syntax of sed Commands
10.4. Group Summary of sed Commands
10.5. Alphabetical Summary of sed Commands
Chapter 11. The awk Programming Language
11.1. Conceptual Overview
11.2. Command-Line Syntax
11.3. Patterns and Procedures
11.4. Built-in Variables
11.5. Operators
11.6. Variable and Array Assignment
11.7. User-Defined Functions
11.8. Gawk-Specific Features
11.9. Implementation Limits
11.10. Group Listing of awk Functions and Commands
11.11. Alphabetical Summary of awk Functions and Commands
11.12. Output Redirections
11.13. Source Code
Part III: Software Development
Chapter 12. Source Code Management: An Overview
12.1. Introduction and Terminology
12.2. Usage Models
12.3. Unix Source Code Management Systems
12.4. Other Source Code Management Systems
Chapter 13. The Revision Control System
13.1. Overview of Commands
13.2. Basic Operation
13.3. General RCS Specifications
13.4. Alphabetical Summary of Commands
Chapter 14. The Concurrent Versions System
14.1. Conceptual Overview
14.2. Command-Line Syntax and Options
14.3. Dot Files
14.4. Environment Variables
14.5. Keywords and Keyword Modes
14.6. Dates
14.7. CVSROOT Variables
14.8. Alphabetical Summary of Commands
Chapter 15. The Subversion Version Control System
15.1. Conceptual Overview
15.2. Obtaining Subversion
15.3. Using Subversion: A Quick Tour
15.4. The Subversion Command Line Client: svn
15.5. Repository Administration: svnadmin
15.6. Examining the Repository: svnlook
15.7. Providing Remote Access: svnserve
15.8. Other Subversion Components
Chapter 16. The GNU make Utility
16.1. Conceptual Overview
16.2. Command-Line Syntax
16.3. Makefile Lines
16.4. Macros
16.5. Special Target Names
16.6. Writing Command Lines
Chapter 17. The GDB Debugger
17.1. Conceptual Overview
17.2. Command-Line Syntax
17.3. Initialization Files
17.4. GDB Expressions
17.5. The GDB Text User Interface
17.6. Group Listing of GDB Commands
17.7. Summary of set and show Commands
17.8. Summary of the info Command
17.9. Alphabetical Summary of GDB Commands
Chapter 18. Writing Manual Pages
18.1. Introduction
18.2. Overview of nrofftroff
18.3. Alphabetical Summary of man Macros
18.4. Predefined Strings
18.5. Internal Names
18.6. Sample Document
Part IV: Commands and Shells
Appendix A. ISO 8859-1 (Latin-1) Character Set
Bibliography
Unix Descriptions and Programmer s Manuals
Unix Internals
System and Network Administration
Programming with the Unix Mindset
Programming Languages
TCPIP Networking
Software Development
Emacs
Standards
O Reilly Books
About the Author
Colophon
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_X
index_Y
index_Z
Unix in a Nutshell, Fourth Edition
ISBN: 0596100299
EAN: 2147483647
Year: 2005
Pages: 201
Authors:
Arnold Robbins
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Connecting to SQL Server Using Integrated Security from ASP.NET
Connecting to Exchange or Outlook
Avoiding Referential Integrity Problems When Updating the Data Source
Binding Data to a Web Forms DataList
Debugging a SQL Server Stored Procedure
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Managing Project Constraints and Documenting Risks
Quantifying and Analyzing Activity Risks
Quantifying and Analyzing Project Risk
Closing Projects
Conclusion
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Building a Dynamic Library Using Boost.Build
Building a Static Library with an IDE
Enforcing Strict Conformance to the C++ Standard
Sorting a Range
Internationalization
SQL Hacks
Hack 10. Convert Subqueries to JOINs
Text Handling
Hack 54. Denormalize Your Tables
Hack 85. Traverse a Simple Tree
Hack 97. Allow an Anonymous Account
Cisco Voice Gateways and Gatekeepers
Connecting to the PSTN
Numbering Plans
COR Operation
Review Questions
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Relationships in the Supply Chain
Market Orientation and Supply Chain Management in the Fashion Industry
Logistics in Tesco: Past, Present and Future
Temperature-Controlled Supply Chains
The Development of E-tail Logistics
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies