Unix Power Tools. 3rd Edition
- Autorzy:
- Jerry Peek, Shelley Powers, Tim O'Reilly
- Promocja Przejdź
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 1156
- Dostępne formaty:
-
ePubMobi
Opis
książki
:
Unix Power Tools. 3rd Edition
With the growing popularity of Linux and the advent of Darwin, Unix has metamorphosed into something new and exciting. No longer perceived as a difficult operating system, more and more users are discovering the advantages of Unix for the first time. But whether you are a newcomer or a Unix power user, you'll find yourself thumbing through the goldmine of information in the new edition of Unix Power Tools to add to your store of knowledge. Want to try something new? Check this book first, and you're sure to find a tip or trick that will prevent you from learning things the hard way.The latest edition of this best-selling favorite is loaded with advice about almost every aspect of Unix, covering all the new technologies that users need to know. In addition to vital information on Linux, Darwin, and BSD, Unix Power Tools 3rd Edition now offers more coverage of bash, zsh, and other new shells, along with discussions about modern utilities and applications. Several sections focus on security and Internet access. And there is a new chapter on access to Unix from Windows, addressing the heterogeneous nature of systems today. You'll also find expanded coverage of software installation and packaging, as well as basic information on Perl and Python.Unix Power Tools 3rd Edition is a browser's book...like a magazine that you don't read from start to finish, but leaf through repeatedly until you realize that you've read it all. Bursting with cross-references, interesting sidebars explore syntax or point out other directions for exploration, including relevant technical details that might not be immediately apparent. The book includes articles abstracted from other O'Reilly books, new information that highlights program tricks and gotchas, tips posted to the Net over the years, and other accumulated wisdom.Affectionately referred to by readers as "the" Unix book, UNIX Power Tools provides access to information every Unix user is going to need to know. It will help you think creatively about UNIX, and will help you get to the point where you can analyze your own problems. Your own solutions won't be far behind.
Wybrane bestsellery
-
Bestseller Promocja Promocja 2za1
To piąte, gruntownie zaktualizowane wydanie podręcznika, który doceni każdy student informatyki i inżynier oprogramowania. Książka obejmuje szeroki zakres zagadnień, od podstawowych pojęć po zaawansowaną problematykę związaną z najnowszymi trendami w systemach operacyjnych. Wyczerpująco omawia procesy, wątki, zarządzanie pamięcią, systemy plików, operacje wejścia-wyjścia, zakleszczenia, interfejsy użytkownika, multimedia czy kompromisy wydajnościowe. Szczegółowo, jako studia przypadków, zostały tu opisane systemy: Windows 11, Unix, Linux i Android. Jasny i przystępny styl, a także liczne przykłady i ćwiczenia ułatwiają zrozumienie nawet bardzo skomplikowanych zagadnień.- Druk
- PDF + ePub + Mobi pkt
(116,35 zł najniższa cena z 30 dni)
107.40 zł
179.00 zł (-40%) -
Promocja Promocja 2za1
Ta książka jest przeznaczona dla programistów i administratorów, którzy poszukują wydajnej metody zarządzania systemami. Pokazano w niej, w jaki sposób działa Ansible i jak należy przygotować go do pracy. Omówiono sposoby tworzenia scenariuszy (są to skrypty do zarządzania konfiguracją), zasady zarządzania zewnętrznymi serwerami, a także zaprezentowano najciekawsze funkcjonalności tego oprogramowania: wbudowane deklaratywne moduły . W tym wydaniu uwzględniono zmiany wynikające z dynamicznego rozwoju Ansible, dodano też kilka rozdziałów poświęconych kontenerom, platformie Molecule, kolekcjom Ansible, obrazom i infrastrukturze chmurowej.- Druk
- PDF + ePub + Mobi pkt
(59,40 zł najniższa cena z 30 dni)
59.40 zł
99.00 zł (-40%) -
Promocja Promocja 2za1
Ta książka jest kolejnym, uzupełnionym i zaktualizowanym wydaniem kultowego podręcznika dla profesjonalnych administratorów zarządzających środowiskami produkcyjnymi w korporacjach czy urzędach. Znajdziesz tu obszerne wyjaśnienie takich zagadnień, jak instalacja systemu, skrypty powłoki, kontrolowanie procesów czy konfiguracja uprawnień. Dowiesz się, jak zarządzać użytkownikami, przestrzenią dyskową, zadaniami okresowymi oraz backupami. Przestudiujesz zagadnienia sieciowe, a zwłaszcza kwestie bezpieczeństwa i reakcji na incydenty. W tym wydaniu znajdziesz m.in. omówienie demonów zarządzania systemem, zasady zarządzania kontem użytkownika root, techniki kontroli wersji za pomocą Git, kwestie związane z zarządzaniem sieciami w chmurze, tworzeniem i utrzymywaniem centrów danych, opis metodologii DevOps i wiele innych!- Druk
- PDF + ePub + Mobi pkt
Unix i Linux. Przewodnik administratora systemów. Wydanie V
Evi Nemeth, Garth Snyder, Trent R. Hein, Ben Whaley, Dan Mackin
(119,40 zł najniższa cena z 30 dni)
119.40 zł
199.00 zł (-40%) -
Promocja Promocja 2za1
Ta książka jest unikalną relacją historyczną z początków Uniksa. Zawiera wspomnienia naocznych świadków z pierwszych lat istnienia tego systemu, jego rozwoju i stopniowego przenikania technologii uniksowych do poszczególnych dziedzin informatyki. Znajdziesz tu niewiele trudnych, naukowych i technicznych detali, za to zachwycisz się niezwykłą historią, zapoczątkowaną przez wyjątkowych ludzi, którzy wybiegłszy myślą daleko w przyszłość, zapewnili środowisko do nieskrępowanych, niekonwencjonalnych eksperymentów. Przekonasz się, że dzieje Uniksa wciąż są skarbnicą inspiracji w zakresie projektowania oprogramowania i nowych możliwości technologii.- Druk
- PDF + ePub + Mobi pkt
(30,87 zł najniższa cena z 30 dni)
29.40 zł
49.00 zł (-40%) -
Ta książka jest przeznaczona dla osób zajmujących się automatyzacją — od żmudnych codziennych zadań po złożone wdrożenia infrastruktury jako kodu. Ten praktyczny przewodnik pozwoli na sprawne rozpoczęcie korzystania z frameworka Ansible 2.9. Na początku pokazano, jak go zainstalować i skonfigurować, później zaprezentowano proste, jednowierszowe polecenia automatyzacji, aby stopniowo wprowadzać czytelników do tworzenia własnego kodu rozszerzającego możliwości Ansible, a nawet automatyzującego infrastrukturę chmury i kontenerów. Znalazło się tu mnóstwo praktycznych przykładów kodu, a zdobyte umiejętności pozwolą na korzystanie z Ansible w sposób skalowalny, powtarzalny i niezawodny.
- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja Promocja 2za1
Edytor tekstowy Vim to właściwie wieloplatformowy klon edytora tekstu vi. Jego możliwości jednak są większe od vi, aktualnie więc Vim jest chętnie wybierany przez programistów pracujących w systemach uniksowych i pochodnych. W związku z tym ktoś, kto planuje karierę developera, testera, czy - właśnie - administratora tego typu systemów, powinien się zapoznać także z edytorem Vim. Bo choć nie należy on do najprostszych w obsłudze i nie jest intuicyjny, to gdy już się go w pełni opanuje, ujawnia swoje zalety, a praca w nim przynosi wymierne korzyści.- Videokurs pkt
(39,75 zł najniższa cena z 30 dni)
87.45 zł
159.00 zł (-45%) -
Promocja Promocja 2za1
Automation is essential for success in the modern DevOps world. Ansible provides a simple yet powerful automation engine to tackle complex automation challengesThis book provides you with the knowledge you need to understand how Ansible 2.7 works at a fundamental level and leverage its advanced capabilities.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
Promocja Promocja 2za1
This practical guide covers 70-740 exam objectives required for MCSA: Windows Server 2016 certification. Additionally, this certification guide will come in handy when preparing to take the exam 70-743: Upgrading Your Skills to MCSA: Windows Server 2016.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
Promocja Promocja 2za1
This book is intended as a study guide for anyone preparing for the (SK0-004) exam. Each chapter covers one or more of the exam objectives as standalone read. In addition, its content is such that the book will also serve as a valuable reference for entry-level network technicians and those looking for a refresher.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
Promocja Promocja 2za1
This book will guide you from container basic concepts to orchestrating containerized applications in Kubernetes. You’ll learn about the Kubernetes basic architecture, components, resources, admission control, and extensions. We’ll show you how to utilize Kubernetes services in three top cloud providers.- PDF + ePub + Mobi pkt
DevOps with Kubernetes. Accelerating software delivery with container orchestrators - Second Edition
(29,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł (-10%)
Jerry Peek, Shelley Powers, Tim O'Reilly - pozostałe książki
-
Unix został stworzony przeszło 30 lat temu z myślą o naukowcach i doświadczonych użytkownikach, potrzebujących bardzo wydajnego i zarazem elastycznego systemu operacyjnego. Od tego czasu został znacznie udoskonalony. Ponieważ system był projektowany przede wszystkim dla specjalistów, na pierwszy rzut oka może wydawać się nieco przytłaczający. Jedna
- Druk pkt
Niedostępna
-
Promocja Promocja 2za1
If you are new to Unix, this concise book will tell you just what you need to get started and no more. Unix was one of the first operating systems written in C, a high-level programming language, and its natural portability and low price made it a popular choice among universities. Initially, two main dialects of Unix existed: one produced by AT&T- ePub + Mobi pkt
(101,15 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł (-15%) -
Promocja Promocja 2za1
Why reinvent the wheel every time you run into a problem with JavaScript? This cookbook is chock-full of code recipes for common programming tasks, along with techniques for building apps that work in any browser. You'll get adaptable code samples that you can add to almost any project--and you'll learn more about JavaScript in the process.The reci- ePub + Mobi pkt
(220,15 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł (-15%) -
Promocja Promocja 2za1
Take your web development skills from browser to server with Node—and learn how to write fast, highly scalable network applications on this JavaScript-based platform. Updated for the latest Node Long Term Support (LTS) and Node Current (6.0) releases, this hands-on edition helps you master Node’s core fundamentals and gain experience with several b- ePub + Mobi pkt
(109,65 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł (-15%) -
"Ajax. Implementacje" to książka dla programistów, którzy mają doświadczenie w tworzeniu witryn internetowych i są zainteresowani ulepszaniem istniejących już aplikacji. Czytając ją, nauczysz się, jak zwiększać możliwości stron www poprzez dodawanie do nich efektów Ajaxa, dowiesz się, jak korzystać z języka SVG oraz obiektu Canvas. Poznasz jedną z najciekawszych możliwości Ajaksa, czyli dodawanie usług sieciowych i łączenie danych bezpośrednio na stronach internetowych na wiele różnych sposobów.
- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Dzięki książce Grafika w internecie poznasz wszystkie aspekty pracy z obrazami umieszczanymi w globalnej sieci. Shelley Powers przedstawi Ci wykorzystywane formaty plików graficznych oraz pokaże, do czego każdy z nich nadaje się najlepiej. Zdobędziesz wiedzę na temat dostępnych narzędzi do obróbki grafiki — zarówno tych płatnych, jak i darmowych. Ponadto nauczysz się tworzyć miniatury zdjęć i układać zdjęcia na stronie. Dowiesz się, jak tworzyć grafikę użytkową, jakie zasady obowiązują przy pracy z grafiką wektorową oraz jakie możliwości drzemią w formacie SVG. Na koniec zapoznasz się z tematami związanymi z projektowaniem stron internetowych — zrozumiesz, jak wykorzystać kaskadowe arkusze stylów (CSS), jak przygotować dobrą i przejrzystą stronę oraz jak dynamicznie zmieniać właściwości grafiki!
- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja 2za1
In the early days of the 20th century, department store magnate JohnWanamaker famously said, "I know that half of my advertising doesn'twork. The problem is that I don't know which half." That remainedbasically true until Google transformed advertising with AdSense basedon new uses of data and analysis. The same might be said about healthcare and i- ePub + Mobi pkt
-
"JavaScript. Wprowadzenie" to podręcznik, dzięki któremu opanujesz możliwości JavaScriptu i nauczysz się wykorzystywać go w swoich projektach.
- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja 2za1
Open source is not only a catalyst for small business growth, but also a driver of future success for many startups today. Bringing together Bluehost anonymized customer data and trends with O’Reilly Media’s job market data, along with other sources of trend data, this report captures the current state of open source as it relates to small to mediu- ePub + Mobi pkt
-
Promocja Promocja 2za1
If you're a web developer or designer familiar with CSS and JavaScript, this tightly focused introduction shows you how to add HTML5 media elements to your web pages, and how to provide custom controls for letting web visitors interact with the content.You'll also learn how to provide subtitles and captions, using file formats that work in browsers- ePub + Mobi pkt
(46,74 zł najniższa cena z 30 dni)
50.91 zł
59.90 zł (-15%)
Ebooka "Unix Power Tools. 3rd Edition" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Booxs i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Unix Power Tools. 3rd Edition" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolonych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Unix Power Tools. 3rd Edition" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły książki
- ISBN Ebooka:
- 978-05-965-5055-4, 9780596550554
- Data wydania ebooka :
- 2002-10-28 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@helion.pl.
- Język publikacji:
- 1
- Rozmiar pliku ePub:
- 3MB
- Rozmiar pliku Mobi:
- 10.4MB
- Zgłoś erratę
- Kategorie:
Systemy operacyjne » Unix
Spis treści książki
- UNIX Power Tools, 3rd Edition
- SPECIAL OFFER: Upgrade this ebook with OReilly
- A Note Regarding Supplemental Files
- How to Use This Book
- Preface
- A Book for Browsing
- Like an Almanac
- Like a News Magazine
- Like a Hypertext Database
- Programs on the Web
- About Unix Versions
- Cross-References
- Whats New in the Third Edition
- Typefaces and Other Conventions
- The Authors
- The Fine Print
- Request for Comments
- Acknowledgments for the First Edition
- Acknowledgments for the Second Edition
- Acknowledgments for the Third Edition
- I. Basic Unix Environment
- 1. Introduction
- 1.1. What's Special About Unix?
- 1.2. Power Grows on You
- 1.3. The Core of Unix
- 1.4. Communication with Unix
- 1.5. Programs Are Designed to Work Together
- 1.6. There Are Many Shells
- 1.7. Which Shell Am I Running?
- 1.8. Anyone Can Program the Shell
- 1.9. Internal and External Commands
- 1.10. The Kernel and Daemons
- 1.11. Filenames
- 1.12. Filename Extensions
- 1.13. Wildcards
- 1.14. The Tree Structure of the Filesystem
- 1.15. Your Home Directory
- 1.16. Making Pathnames
- 1.17. File Access Permissions
- 1.18. The Superuser (Root)
- 1.19. When Is a File Not a File?
- 1.20. Scripting
- 1.21. Unix Networking and Communications
- 1.22. The X Window System
- 2. Getting Help
- 2.1. The man Command
- 2.2. whatis: One-Line Command Summaries
- 2.3. whereis: Finding Where a Command Is Located
- 2.4. Searching Online Manual Pages
- 2.5. How Unix Systems Remember Their Names
- 2.6. Which Version Am I Using?
- 2.7. What tty Am I On?
- 2.8. Who's On?
- 2.9. The info Command
- 1. Introduction
- II. Customizing Your Environment
- 3. Setting Up Your Unix Shell
- 3.1. What Happens When You Log In
- 3.2. The Mac OS X Terminal Application
- 3.3. Shell Setup Files Which, Where, and Why
- 3.4. Login Shells, Interactive Shells
- 3.4.1. Login Shells
- 3.4.2. Interactive Shells
- 3.5. What Goes in Shell Setup Files?
- 3.6. Tip for Changing Account Setup: Keep a Shell Ready
- 3.7. Use Absolute Pathnames in Shell Setup Files
- 3.8. Setup Files Aren't Read When You Want?
- 3.9. Gotchas in set prompt Test
- 3.10. Automatic Setups for Different Terminals
- 3.11. Terminal Setup: Testing TERM
- 3.12. Terminal Setup: Testing Remote Hostname and X Display
- 3.13. Terminal Setup: Testing Port
- 3.14. Terminal Setup: Testing Environment Variables
- 3.15. Terminal Setup: Searching Terminal Table
- 3.16. Terminal Setup: Testing Window Size
- 3.17. Terminal Setup: Setting and Testing Window Name
- 3.18. A .cshrc.$HOST File for Per Host Setup
- 3.19. Making a "Login" Shell
- 3.20. RC Files
- 3.21. Make Your Own Manpages Without Learning troff
- 3.22. Writing a Simple Manpage with the -man Macros
- 4. Interacting with Your Environment
- 4.1. Basics of Setting the Prompt
- 4.2. Static Prompts
- 4.3. Dynamic Prompts
- 4.4. Simulating Dynamic Prompts
- 4.5. C-Shell Prompt Causes Problems in vi, rsh, etc.
- 4.6. Faster Prompt Setting with Built-ins
- 4.7. Multiline Shell Prompts
- 4.8. Session Info in Window Title or Status Line
- 4.9. A "Menu Prompt" for Naive Users
- 4.10. Highlighting and Color in Shell Prompts
- 4.11. Right-Side Prompts
- 4.12. Show Subshell Level with $SHLVL
- 4.13. What Good Is a Blank Shell Prompt?
- 4.14. dirs in Your Prompt: Better Than $cwd
- 4.15. External Commands Send Signals to Set Variables
- 4.16. Preprompt, Pre-execution, and Periodic Commands
- 4.17. Running Commands When You Log Out
- 4.18. Running Commands at Bourne/Korn Shell Logout
- 4.19. Stop Accidental Bourne-Shell Logouts
- 5. Getting the Most out of Terminals, xterm, and X Windows
- 5.1. There's a Lot to Know About Terminals
- 5.2. The Idea of a Terminal Database
- 5.3. Setting the Terminal Type When You Log In
- 5.4. Querying Your Terminal Type: qterm
- 5.5. Querying Your xterm Size: resize
- 5.6. Checklist: Terminal Hangs When I Log In
- 5.6.1. Output Stopped?
- 5.6.2. Job Stopped?
- 5.6.3. Program Waiting for Input?
- 5.6.4. Stalled Data Connection?
- 5.6.5. Aborting Programs
- 5.7. Find Out Terminal Settings with stty
- 5.8. Setting Your Erase, Kill, and Interrupt Characters
- 5.9. Working with xterm and Friends
- 5.10. Login xterms and rxvts
- 5.11. Working with Scrollbars
- 5.12. How Many Lines to Save?
- 5.13. Simple Copy and Paste in xterm
- 5.14. Defining What Makes Up a Word for Selection Purposes
- 5.15. Setting the Titlebar and Icon Text
- 5.16. The Simple Way to Pick a Font
- 5.17. The xterm Menus
- 5.18. Changing Fonts Dynamically
- 5.18.1. VT Fonts Menu
- 5.18.2. Enabling Escape Sequence and Selection
- 5.19. Working with xclipboard
- 5.20. Problems with Large Selections
- 5.21. Tips for Copy and Paste Between Windows
- 5.22. Running a Single Command with xterm -e
- 5.23. Don't Quote Arguments to xterm -e
- 6. Your X Environment
- 6.1. Defining Keys and Button Presses with xmodmap
- 6.2. Using xev to Learn Keysym Mappings
- 6.3. X Resource Syntax
- 6.4. X Event Translations
- 6.5. Setting X Resources: Overview
- 6.6. Setting Resources with the -xrm Option
- 6.7. How -name Affects Resources
- 6.8. Setting Resources with xrdb
- 6.9. Listing the Current Resources for a Client: appres
- 6.10. Starting Remote X Clients
- 6.10.1. Starting Remote X Clients from Interactive Logins
- 6.10.2. Starting a Remote Client with rsh and ssh
- 3. Setting Up Your Unix Shell
- III. Working with Files and Directories
- 7. Directory Organization
- 7.1. What? Me, Organized?
- 7.2. Many Homes
- 7.3. Access to Directories
- 7.4. A bin Directory for Your Programs and Scripts
- 7.5. Private (Personal) Directories
- 7.6. Naming Files
- 7.7. Make More Directories!
- 7.8. Making Directories Made Easier
- 8. Directories and Files
- 8.1. Everything but the find Command
- 8.2. The Three Unix File Times
- 8.3. Finding Oldest or Newest Files with ls -t and ls -u
- 8.4. List All Subdirectories with ls -R
- 8.5. The ls -d Option
- 8.6. Color ls
- 8.6.1. Trying It
- 8.6.2. Configuring It
- 8.6.3. The -- color Option
- 8.6.4. Another color ls
- 8.7. Some GNU ls Features
- 8.8. A csh Alias to List Recently Changed Files
- 8.9. Showing Hidden Files with ls -A and -a
- 8.10. Useful ls Aliases
- 8.11. Can't Access a File? Look for Spaces in the Name
- 8.12. Showing Nonprintable Characters in Filenames
- 8.13. Counting Files by Types
- 8.14. Listing Files by Age and Size
- 8.15. newer: Print the Name of the Newest File
- 8.16. oldlinks: Find Unconnected Symbolic Links
- 8.17. Picking a Unique Filename Automatically
- 9. Finding Files with find
- 9.1. How to Use find
- 9.2. Delving Through a Deep Directory Tree
- 9.3. Don't Forget -print
- 9.4. Looking for Files with Particular Names
- 9.5. Searching for Old Files
- 9.6. Be an Expert on find Search Operators
- 9.7. The Times That find Finds
- 9.8. Exact File-Time Comparisons
- 9.9. Running Commands on What You Find
- 9.10. Using -exec to Create Custom Tests
- 9.11. Custom -exec Tests Applied
- 9.12. Finding Many Things with One Command
- 9.13. Searching for Files by Type
- 9.14. Searching for Files by Size
- 9.15. Searching for Files by Permission
- 9.16. Searching by Owner and Group
- 9.17. Duplicating a Directory Tree
- 9.18. Using "Fast find" Databases
- 9.19. Wildcards with "Fast find" Database
- 9.20. Finding Files (Much) Faster with a find Database
- 9.21. grepping a Directory Tree
- 9.22. lookfor: Which File Has That Word?
- 9.23. Using Shell Arrays to Browse Directories
- 9.23.1. Using the Stored Lists
- 9.23.2. Expanding Ranges
- 9.24. Finding the (Hard) Links to a File
- 9.25. Finding Files with -prune
- 9.26. Quick finds in the Current Directory
- 9.27. Skipping Parts of a Tree in find
- 9.28. Keeping find from Searching Networked Filesystem
- 10. Linking, Renaming, and Copying Files
- 10.1. What's So Complicated About Copying Files
- 10.2. What's Really in a Directory?
- 10.3. Files with Two or More Names
- 10.4. More About Links
- 10.4.1. Differences Between Hard and Symbolic Links
- 10.4.2. Links to a Directory
- 10.5. Creating and Removing Links
- 10.6. Stale Symbolic Links
- 10.7. Linking Directories
- 10.8. Showing the Actual Filenames for Symbolic Links
- 10.9. Renaming, Copying, or Comparing a Set of Files
- 10.10. Renaming a List of Files Interactively
- 10.11. One More Way to Do It
- 10.12. Copying Directory Trees with cp -r
- 10.13. Copying Directory Trees with tar and Pipes
- 11. Comparing Files
- 11.1. Checking Differences with diff
- 11.2. Comparing Three Different Versions with diff3
- 11.3. Context diffs
- 11.4. Side-by-Side diffs: sdiff
- 11.5. Choosing Sides with sdiff
- 11.6. Problems with diff and Tabstops
- 11.7. cmp and diff
- 11.8. Comparing Two Files with comm
- 11.9. More Friendly comm Output
- 11.10. make Isn't Just for Programmers!
- 11.11. Even More Uses for make
- 12. Showing What's in a File
- 12.1. Cracking the Nut
- 12.2. What Good Is a cat?
- 12.3. "less" is More
- 12.4. Show Nonprinting Characters with cat -v or od -c
- 12.5. What's in That Whitespace?
- 12.6. Finding File Types
- 12.7. Squash Extra Blank Lines
- 12.8. How to Look at the End of a File: tail
- 12.9. Finer Control on tail
- 12.10. How to Look at Files as They Grow
- 12.11. GNU tail File Following
- 12.12. Printing the Top of a File
- 12.13. Numbering Lines
- 13. Searching Through Files
- 13.1. Different Versions of grep
- 13.2. Searching for Text with grep
- 13.3. Finding Text That Doesn't Match
- 13.4. Extended Searching for Text with egrep
- 13.5. grepping for a List of Patterns
- 13.6. Approximate grep: agrep
- 13.7. Search RCS Files with rcsgrep
- 13.7.1. rcsgrep, rcsegrep, rcsfgrep
- 13.7.2. rcsegrep.fast
- 13.8. GNU Context greps
- 13.9. A Multiline Context grep Using sed
- 13.10. Compound Searches
- 13.11. Narrowing a Search Quickly
- 13.12. Faking Case-Insensitive Searches
- 13.13. Finding a Character in a Column
- 13.14. Fast Searches and Spelling Checks with "look"
- 13.15. Finding Words Inside Binary Files
- 13.16. A Highlighting grep
- 14. Removing Files
- 14.1. The Cycle of Creation and Destruction
- 14.2. How Unix Keeps Track of Files: Inodes
- 14.3. rm and Its Dangers
- 14.4. Tricks for Making rm Safer
- 14.5. Answer "Yes" or "No" Forever with yes
- 14.6. Remove Some, Leave Some
- 14.7. A Faster Way to Remove Files Interactively
- 14.8. Safer File Deletion in Some Directories
- 14.9. Safe Delete: Pros and Cons
- 14.10. Deletion with Prejudice: rm -f
- 14.11. Deleting Files with Odd Names
- 14.12. Using Wildcards to Delete Files with Strange Names
- 14.13. Handling a Filename Starting with a Dash (-)
- 14.14. Using unlink to Remove a File with a Strange Name
- 14.15. Removing a Strange File by its i-number
- 14.16. Problems Deleting Directories
- 14.17. Deleting Stale Files
- 14.18. Removing Every File but One
- 14.19. Using find to Clear Out Unneeded Files
- 15. Optimizing Disk Space
- 15.1. Disk Space Is Cheap
- 15.2. Instead of Removing a File, Empty It
- 15.3. Save Space with "Bit Bucket" Log Files and Mailboxes
- 15.4. Save Space with a Link
- 15.5. Limiting File Sizes
- 15.5.1. limit and ulimit
- 15.5.2. Other Ideas
- 15.6. Compressing Files to Save Space
- 15.7. Save Space: tar and compress a Directory Tree
- 15.8. How Much Disk Space?
- 15.9. Compressing a Directory Tree: Fine-Tuning
- 15.10. Save Space in Executable Files with strip
- 15.11. Disk Quotas
- 7. Directory Organization
- IV. Basic Editing
- 16. Spell Checking, Word Counting, and Textual Analysis
- 16.1. The Unix spell Command
- 16.2. Check Spelling Interactively with ispell
- 16.3. How Do I Spell That Word?
- 16.4. Inside spell
- 16.5. Adding Words to ispell's Dictionary
- 16.6. Counting Lines, Words, and Characters: wc
- 16.7. Find a a Doubled Word
- 16.8. Looking for Closure
- 16.9. Just the Words, Please
- 17. vi Tips and Tricks
- 17.1. The vi Editor: Why So Much Material?
- 17.2. What We Cover
- 17.3. Editing Multiple Files with vi
- 17.4. Edits Between Files
- 17.5. Local Settings for vi
- 17.6. Using Buffers to Move or Copy Text
- 17.7. Get Back What You Deleted with Numbered Buffers
- 17.8. Using Search Patterns and Global Commands
- 17.8.1. Global Searches
- 17.9. Confirming Substitutions in vi
- 17.10. Keep Your Original File, Write to a New File
- 17.11. Saving Part of a File
- 17.12. Appending to an Existing File
- 17.13. Moving Blocks of Text by Patterns
- 17.14. Useful Global Commands (with Pattern Matches)
- 17.15. Counting Occurrences; Stopping Search Wraps
- 17.16. Capitalizing Every Word on a Line
- 17.17. Per-File Setups in Separate Files
- 17.18. Filtering Text Through a Unix Command
- 17.19. vi File Recovery Versus Networked Filesystems
- 17.20. Be Careful with vi -r Recovered Buffers
- 17.21. Shell Escapes: Running One UnixCommand While Using Another
- 17.22. vi Compound Searches
- 17.23. vi Word Abbreviation
- 17.24. Using vi Abbreviations as Commands (Cut and Paste Between vi's)
- 17.25. Fixing Typos with vi Abbreviations
- 17.26. vi Line Commands Versus Character Commands
- 17.27. Out of Temporary Space? Use Another Directory
- 17.28. Neatening Lines
- 17.29. Finding Your Place with Undo
- 17.30. Setting Up vi with the .exrc File
- 18. Creating Custom Commands in vi
- 18.1. Why Type More Than You Have To?
- 18.2. Save Time and Typing with the vi map Commands
- 18.2.1. Command Mode Maps
- 18.2.2. Text-Input Mode Maps
- 18.3. What You Lose When You Use map!
- 18.4. vi @-Functions
- 18.4.1. Defining and Using Simple @-Functions
- 18.4.2. Combining @-Functions
- 18.4.3. Reusing a Definition
- 18.4.4. Newlines in an @-Function
- 18.5. Keymaps for Pasting into a Window Running vi
- 18.6. Protecting Keys from Interpretation by ex
- 18.7. Maps for Repeated Edits
- 18.8. More Examples of Mapping Keys in vi
- 18.9. Repeating a vi Keymap
- 18.10. Typing in Uppercase Without CAPS LOCK
- 18.11. Text-Input Mode Cursor Motion with No Arrow Keys
- 18.12. Don't Lose Important Functions with vi Maps: Use noremap
- 18.13. vi Macro for Splitting Long Lines
- 18.14. File-Backup Macros
- 19. GNU Emacs
- 19.1. Emacs: The Other Editor
- 19.2. Emacs Features: A Laundry List
- 19.3. Customizations and How to Avoid Them
- 19.4. Backup and Auto-Save Files
- 19.5. Putting Emacs in Overwrite Mode
- 19.6. Command Completion
- 19.7. Mike's Favorite Timesavers
- 19.8. Rational Searches
- 19.9. Unset PWD Before Using Emacs
- 19.10. Inserting Binary Characters into Files
- 19.11. Using Word-Abbreviation Mode
- 19.11.1. Trying Word Abbreviations for One Session
- 19.11.2. Making Word Abbreviations Part of Your Startup
- 19.12. Directories for Emacs Hacks
- 19.13. An Absurd Amusement
- 20. Batch Editing
- 20.1. Why Line Editors Aren't Dinosaurs
- 20.2. Writing Editing Scripts
- 20.3. Line Addressing
- 20.4. Useful ex Commands
- 20.5. Running Editing Scripts Within vi
- 20.6. Change Many Files by Editing Just One
- 20.7. ed/ex Batch Edits: A Typical Example
- 20.8. Batch Editing Gotcha: Editors Fail on Big Files
- 20.9. patch: Generalized Updating of Files That Differ
- 20.10. Quick Reference: awk
- 20.10.1. Command-Line Syntax
- 20.10.2. Patterns and Procedures
- 20.10.2.1. Patterns
- 20.10.2.2. Procedures
- 20.10.2.3. Simple pattern-procedure examples
- 20.10.3. awk System Variables
- 20.10.4. Operators
- 20.10.5. Variables and Array Assignments
- 20.10.6. Group Listing of awk Commands
- 20.10.7. Alphabetical Summary of Commands
- 20.11. Versions of awk
- 21. You Can't Quite Call This Editing
- 21.1. And Why Not?
- 21.2. Neatening Text with fmt
- 21.3. Alternatives to fmt
- 21.4. Clean Up Program Comment Blocks
- 21.4.1. The recomment Script
- 21.4.2. fmt -p
- 21.5. Remove Mail/News Headers with behead
- 21.6. Low-Level File Butchery with dd
- 21.7. offset: Indent Text
- 21.8. Centering Lines in a File
- 21.9. Splitting Files at Fixed Points: split
- 21.10. Splitting Files by Context: csplit
- 21.11. Hacking on Characters with tr
- 21.12. Encoding "Binary" Files into ASCII
- 21.12.1. uuencoding
- 21.12.2. MIME Encoding
- 21.13. Text Conversion with dd
- 21.14. Cutting Columns or Fields
- 21.15. Making Text in Columns with pr
- 21.15.1. One File per Column: -m
- 21.15.2. One File, Several Columns: -number
- 21.15.3. Order Lines Across Columns: -l
- 21.16. Make Columns Automatically with column
- 21.17. Straightening Jagged Columns
- 21.18. Pasting Things in Columns
- 21.19. Joining Lines with join
- 21.20. What Is (or Isn't) Unique?
- 21.21. Rotating Text
- 22. Sorting
- 22.1. Putting Things in Order
- 22.2. Sort Fields: How sort Sorts
- 22.3. Changing the sort Field Delimiter
- 22.4. Confusion with Whitespace Field Delimiters
- 22.5. Alphabetic and Numeric Sorting
- 22.6. Miscellaneous sort Hints
- 22.6.1. Dealing with Repeated Lines
- 22.6.2. Ignoring Blanks
- 22.6.3. Case-Insensitive Sorts
- 22.6.4. Dictionary Order
- 22.6.5. Month Order
- 22.6.6. Reverse Sort
- 22.7. lensort: Sort Lines by Length
- 22.8. Sorting a List of People by Last Name
- 16. Spell Checking, Word Counting, and Textual Analysis
- V. Processes and the Kernel
- 23. Job Control
- 23.1. Job Control in a Nutshell
- 23.2. Job Control Basics
- 23.2.1. How Job Control Works
- 23.2.2. Using Job Control from Your Shell
- 23.3. Using jobs Effectively
- 23.4. Some Gotchas with Job Control
- 23.5. The "Current Job" Isn't Always What You Expect
- 23.6. Job Control and autowrite: Real Timesavers!
- 23.7. System Overloaded? Try Stopping Some Jobs
- 23.8. Notification When Jobs Change State
- 23.9. Stop Background Output with stty tostop
- 23.10. nohup
- 23.11. Disowning Processes
- 23.12. Linux Virtual Consoles
- 23.12.1. What Are They?
- 23.12.2. Scrolling, Using a Mouse
- 23.13. Stopping Remote Login Sessions
- 24. Starting, Stopping, and Killing Processes
- 24.1. What's in This Chapter
- 24.2. fork and exec
- 24.3. Managing Processes: Overall Concepts
- 24.4. Subshells
- 24.5. The ps Command
- 24.6. The Controlling Terminal
- 24.7. Tracking Down Processes
- 24.7.1. System V
- 24.7.2. BSD
- 24.8. Why ps Prints Some Commands in Parentheses
- 24.9. The /proc Filesystem
- 24.9.1. Memory Information
- 24.9.2. Kernel and System Statistics
- 24.9.3. Statistics of the Current Process
- 24.9.4. Statistics of Processes by PID
- 24.9.5. A Glimpse at Hardware
- 24.10. What Are Signals?
- 24.11. Killing Foreground Jobs
- 24.12. Destroying Processes with kill
- 24.13. Printer Queue Watcher: A Restartable Daemon Shell Script
- 24.14. Killing All Your Processes
- 24.15. Killing Processes by Name?
- 24.16. Kill Processes Interactively
- 24.16.1. killall -i
- 24.16.2. zap
- 24.17. Processes Out of Control? Just STOP Them
- 24.18. Cleaning Up an Unkillable Process
- 24.19. Why You Can't Kill a Zombie
- 24.20. The Process Chain to Your Window
- 24.21. Terminal Windows Without Shells
- 24.22. Close a Window by Killing Its Process(es)
- 24.22.1. Example #1: An xterm Window
- 24.22.2. Example #2: A Web Browser
- 24.22.3. Closing a Window from a Shell Script
- 25. Delayed Execution
- 25.1. Building Software Robots the Easy Way
- 25.2. Periodic Program Execution: The cron Facility
- 25.2.1. Execution Scheduling
- 25.2.2. A Little Help, etc.
- 25.3. Adding crontab Entries
- 25.4. Including Standard Input Within a cron Entry
- 25.5. The at Command
- 25.6. Making Your at Jobs Quiet
- 25.7. Checking and Removing Jobs
- 25.8. Avoiding Other at and cron Jobs
- 25.9. Waiting a Little While: sleep
- 26. System Performance and Profiling
- 26.1. Timing Is Everything
- 26.2. Timing Programs
- 26.3. What Commands Are Running and How Long Do They Take?
- 26.4. Checking System Load: uptime
- 26.5. Know When to Be "nice" to Other Users...and When Not To
- 26.5.1. BSD C Shell nice
- 26.5.2. BSD Standalone nice
- 26.5.3. System V C Shell nice
- 26.5.4. System V Standalone nice
- 26.6. A nice Gotcha
- 26.7. Changing a Running Job's Niceness
- 23. Job Control
- VI. Scripting
- 27. Shell Interpretation
- 27.1. What the Shell Does
- 27.2. How the Shell Executes Other Commands
- 27.3. What's a Shell, Anyway?
- 27.3.1. How Shells Run Other Programs
- 27.3.2. Interactive Use Versus Shell Scripts
- 27.3.3. Types of Shells
- 27.3.4. Shell Search Paths
- 27.3.5. Bourne Shell Used Here
- 27.3.6. Default Commands
- 27.4. Command Evaluation and Accidentally Overwriting Files
- 27.5. Output Command-Line Arguments One by One
- 27.6. Controlling Shell Command Searches
- 27.7. Wildcards Inside Aliases
- 27.8. eval: When You Need Another Chance
- 27.9. Which One Will bash Use?
- 27.10. Which One Will the C Shell Use?
- 27.11. Is It "2>&1 file" or "> file 2>&1"? Why?
- 27.12. Bourne Shell Quoting
- 27.12.1. Special Characters
- 27.12.2. How Quoting Works
- 27.12.3. Single Quotes Inside Single Quotes?
- 27.12.4. Multiline Quoting
- 27.13. Differences Between Bourne and C Shell Quoting
- 27.13.1. Special Characters
- 27.13.2. How Quoting Works
- 27.14. Quoting Special Characters in Filenames
- 27.15. Verbose and Echo Settings Show Quoting
- 27.16. Here Documents
- 27.17. "Special" Characters and Operators
- 27.18. How Many Backslashes?
- 28. Saving Time on the Command Line
- 28.1. What's Special About the Unix Command Line
- 28.2. Reprinting Your Command Line with CTRL-r
- 28.3. Use Wildcards to Create Files?
- 28.4. Build Strings with { }
- 28.5. String Editing (Colon) Operators
- 28.6. Automatic Completion
- 28.6.1. General Example: Filename Completion
- 28.6.2. Menu Completion
- 28.6.3. Command-Specific Completion
- 28.6.4. Editor Functions for Completion
- 28.7. Don't Match Useless Files in Filename Completion
- 28.8. Repeating Commands
- 28.9. Repeating and Varying Commands
- 28.9.1. A foreach Loop
- 28.9.2. A for Loop
- 28.10. Repeating a Command with Copy-and-Paste
- 28.11. Repeating a Time-Varying Command
- 28.12. Multiline Commands, Secondary Prompts
- 28.13. Here Document Example #1: Unformatted Form Letters
- 28.14. Command Substitution
- 28.15. Handling Lots of Text with Temporary Files
- 28.16. Separating Commands with Semicolons
- 28.17. Dealing with Too Many Arguments
- 28.18. Expect
- 28.18.1. Dialback
- 28.18.2. Automating /bin/passwd
- 28.18.3. Testing: A Story
- 28.18.4. Other Problems
- 29. Custom Commands
- 29.1. Creating Custom Commands
- 29.2. Introduction to Shell Aliases
- 29.3. C-Shell Aliases with Command-Line Arguments
- 29.4. Setting and Unsetting Bourne-Type Aliases
- 29.5. Korn-Shell Aliases
- 29.6. zsh Aliases
- 29.7. Sourceable Scripts
- 29.8. Avoiding C-Shell Alias Loops
- 29.9. How to Put if-then-else in a C-Shell Alias
- 29.10. Fix Quoting in csh Aliases with makealias and quote
- 29.11. Shell Function Basics
- 29.11.1. Simple Functions: ls with Options
- 29.11.2. Functions with Loops: Internet Lookup
- 29.11.3. Setting Current Shell Environment: The work Function
- 29.11.4. Functions Calling Functions: Factorials
- 29.11.5. Conclusion
- 29.12. Shell Function Specifics
- 29.13. Propagating Shell Functions
- 29.13.1. Exporting bash Functions
- 29.13.2. FPATH Search Path
- 29.13.2.1. Korn shell
- 29.13.2.2. zsh
- 29.14. Simulated Bourne Shell Functions and Aliases
- 30. The Use of History
- 30.1. The Lessons of History
- 30.2. History in a Nutshell
- 30.3. My Favorite Is !$
- 30.4. My Favorite Is !:n*
- 30.5. My Favorite Is ^^
- 30.6. Using !$ for Safety with Wildcards
- 30.7. History by Number
- 30.8. History Substitutions
- 30.9. Repeating a Cycle of Commands
- 30.10. Running a Series of Commands on a File
- 30.11. Check Your History First with :p
- 30.12. Picking Up Where You Left Off
- 30.12.1. bash, ksh, zsh
- 30.12.2. C Shells
- 30.13. Pass History to Another Shell
- 30.14. Shell Command-Line Editing
- 30.14.1. vi Editing Mode
- 30.14.2. Emacs Editing Mode
- 30.14.3. tcsh Editing
- 30.14.4. ksh Editing
- 30.14.5. bash Editing
- 30.14.6. zsh Editing
- 30.15. Changing History Characters with histchars
- 30.16. Instead of Changing History Characters
- 31. Moving Around in a Hurry
- 31.1. Getting Around the Filesystem
- 31.2. Using Relative and Absolute Pathnames
- 31.3. What Good Is a Current Directory?
- 31.4. How Does Unix Find Your Current Directory?
- 31.5. Saving Time When You Change Directories: cdpath
- 31.6. Loop Control: break and continue
- 31.7. The Shells' pushd and popd Commands
- 31.8. Nice Aliases for pushd
- 31.9. Quick cds with Aliases
- 31.10. cd by Directory Initials
- 31.11. Finding (Anyone's) Home Directory, Quickly
- 31.12. Marking Your Place with a Shell Variable
- 31.13. Automatic Setup When You Enter/Exit a Directory
- 32. Regular Expressions (Pattern Matching)
- 32.1. That's an Expression
- 32.2. Don't Confuse Regular Expressions with Wildcards
- 32.3. Understanding Expressions
- 32.4. Using Metacharacters in Regular Expressions
- 32.5. Regular Expressions: The Anchor Characters ^ and $
- 32.6. Regular Expressions: Matching a Character with a Character Set
- 32.7. Regular Expressions: Match Any Character with . (Dot)
- 32.8. Regular Expressions: Specifying a Range of Characters with [...]
- 32.9. Regular Expressions: Exceptions in a Character Set
- 32.10. Regular Expressions: Repeating Character Sets with *
- 32.11. Regular Expressions: Matching a Specific Number of Sets with \ { and \ }
- 32.12. Regular Expressions: Matching Words with \ < and \ >
- 32.13. Regular Expressions: Remembering Patterns with \ (, \ ), and \1
- 32.14. Regular Expressions: Potential Problems
- 32.15. Extended Regular Expressions
- 32.16. Getting Regular Expressions Right
- 32.17. Just What Does a Regular Expression Match?
- 32.18. Limiting the Extent of a Match
- 32.19. I Never Meta Character I Didn't Like
- 32.20. Valid Metacharacters for Different Unix Programs
- 32.21. Pattern Matching Quick Reference with Examples
- 32.21.1. Examples of Searching
- 32.21.2. Examples of Searching and Replacing
- 33. Wildcards
- 33.1. File-Naming Wildcards
- 33.2. Filename Wildcards in a Nutshell
- 33.3. Who Handles Wildcards?
- 33.4. What if a Wildcard Doesn't Match?
- 33.5. Maybe You Shouldn't Use Wildcards in Pathnames
- 33.6. Getting a List of Matching Files with grep -l
- 33.7. Getting a List of Nonmatching Files
- 33.7.1. Using grep -c
- 33.7.2. The vgrep Script
- 33.8. nom: List Files That Don't Match a Wildcard
- 34. The sed Stream Editor
- 34.1. sed Sermon^H^H^H^H^H^HSummary
- 34.2. Two Things You Must Know About sed
- 34.3. Invoking sed
- 34.4. Testing and Using a sed Script: checksed, runsed
- 34.4.1. checksed
- 34.4.2. runsed
- 34.5. sed Addressing Basics
- 34.6. Order of Commands in a Script
- 34.7. One Thing at a Time
- 34.8. Delimiting a Regular Expression
- 34.9. Newlines in a sed Replacement
- 34.10. Referencing the Search String in a Replacement
- 34.11. Referencing Portions of a Search String
- 34.12. Search and Replacement: One Match Among Many
- 34.13. Transformations on Text
- 34.14. Hold Space: The Set-Aside Buffer
- 34.15. Transforming Part of a Line
- 34.16. Making Edits Across Line Boundaries
- 34.17. The Deliberate Scrivener
- 34.18. Searching for Patterns Split Across Lines
- 34.19. Multiline Delete
- 34.20. Making Edits Everywhere Except...
- 34.21. The sed Test Command
- 34.22. Uses of the sed Quit Command
- 34.23. Dangers of the sed Quit Command
- 34.24. sed Newlines, Quoting, and Backslashes in a Shell Script
- 35. Shell Programming for the Uninitiated
- 35.1. Writing a Simple Shell Program
- 35.2. Everyone Should Learn Some Shell Programming
- 35.3. What Environment Variables Are Good For
- 35.4. Parent-Child Relationships
- 35.5. Predefined Environment Variables
- 35.6. The PATH Environment Variable
- 35.7. PATH and path
- 35.8. The DISPLAY Environment Variable
- 35.9. Shell Variables
- 35.10. Test String Values with Bourne-Shell case
- 35.11. Pattern Matching in case Statements
- 35.12. Exit Status of Unix Processes
- 35.13. Test Exit Status with the if Statement
- 35.14. Testing Your Success
- 35.15. Loops That Test Exit Status
- 35.15.1. Looping Until a Command Succeeds
- 35.15.2. Looping Until a Command Fails
- 35.16. Set Exit Status of a Shell (Script)
- 35.17. Trapping Exits Caused by Interrupts
- 35.18. read: Reading from the Keyboard
- 35.19. Shell Script "Wrappers" for awk, sed, etc.
- 35.20. Handling Command-Line Arguments in Shell Scripts
- 35.20.1. With the "$@" Parameter
- 35.20.2. With a Loop
- 35.20.3. Counting Arguments with $#
- 35.21. Handling Command-Line Arguments with a for Loop
- 35.22. Handling Arguments with while and shift
- 35.23. Loop Control: break and continue
- 35.24. Standard Command-Line Parsing
- 35.25. The Bourne Shell set Command
- 35.25.1. Setting Options
- 35.25.2. Setting (and Parsing) Parameters
- 35.25.3. (Avoiding?) set with No Arguments
- 35.25.4. Watch Your Quoting
- 35.25.5. Can't Set $0
- 35.26. test: Testing Files and Strings
- 35.27. Picking a Name for a New Command
- 35.28. Finding a Program Name and Giving Your Program Multiple Names
- 35.29. Reading Files with the . and source Commands
- 35.30. Using Shell Functions in Shell Scripts
- 36. Shell Programming for the Initiated
- 36.1. Beyond the Basics
- 36.2. The Story of : # #!
- 36.3. Don't Need a Shell for Your Script? Don't Use One
- 36.4. Making #! Search the PATH
- 36.5. The exec Command
- 36.6. The Unappreciated Bourne Shell ":" Operator
- 36.7. Parameter Substitution
- 36.8. Save Disk Space and Programming: Multiple Names for a Program
- 36.9. Finding the Last Command-Line Argument
- 36.10. How to Unset All Command-Line Parameters
- 36.11. Standard Input to a for Loop
- 36.12. Making a for Loop with Multiple Variables
- 36.13. Using basename and dirname
- 36.13.1. Introduction to basename and dirname
- 36.13.2. Use with Loops
- 36.14. A while Loop with Several Loop Control Commands
- 36.15. Overview: Open Files and File Descriptors
- 36.16. n>&m: Swap Standard Output and Standard Error
- 36.17. A Shell Can Read a Script from Its Standard Input, but...
- 36.18. Shell Scripts On-the-Fly from Standard Input
- 36.19. Quoted hereis Document Terminators: sh Versus csh
- 36.20. Turn Off echo for "Secret" Answers
- 36.21. Quick Reference: expr
- 36.21.1. Syntax
- 36.21.2. Examples
- 36.22. Testing Characters in a String with expr
- 36.23. Grabbing Parts of a String
- 36.23.1. Matching with expr
- 36.23.2. Using echo with awk or cut
- 36.23.3. Using set and IFS
- 36.23.4. Using sed
- 36.24. Nested Command Substitution
- 36.25. Testing Two Strings with One case Statement
- 36.26. Outputting Text to an X Window
- 36.27. Shell Lockfile
- 37. Shell Script Debugging and Gotchas
- 37.1. Tips for Debugging Shell Scripts
- 37.1.1. Use -xv
- 37.1.2. Unmatched Operators
- 37.1.3. Exit Early
- 37.1.4. Missing or Extra esac, ;;, fi, etc.
- 37.1.5. Line Numbers Reset Inside Redirected Loops
- 37.2. Bourne Shell Debugger Shows a Shell Variable
- 37.3. Stop Syntax Errors in Numeric Tests
- 37.4. Stop Syntax Errors in String Tests
- 37.5. Quoting and Command-Line Parameters
- 37.6. How Unix Keeps Time
- 37.7. Copy What You Do with script
- 37.8. Cleaning script Files
- 37.9. Making an Arbitrary-Size File for Testing
- 37.1. Tips for Debugging Shell Scripts
- 27. Shell Interpretation
- VII. Extending and Managing Your Environment
- 38. Backing Up Files
- 38.1. What Is This "Backup" Thing?
- 38.2. tar in a Nutshell
- 38.3. Make Your Own Backups
- 38.4. More Ways to Back Up
- 38.5. How to Make Backups to a Local Device
- 38.5.1. What to Back Up
- 38.5.2. Backing Up to Tape
- 38.5.3. Backing Up to Floppies or Zip Disks
- 38.5.4. To gzip, or Not to gzip?
- 38.6. Restoring Files from Tape with tar
- 38.6.1. Restoring a Few Files
- 38.6.2. Remote Restoring
- 38.7. Using tar to a Remote Tape Drive
- 38.8. Using GNU tar with a Remote Tape Drive
- 38.9. On-Demand Incremental Backups of a Project
- 38.10. Using Wildcards with tar
- 38.10.1. Without GNU tar
- 38.10.2. With GNU tar
- 38.10.3. Wildcard Gotchas in GNU tar
- 38.11. Avoid Absolute Paths with tar
- 38.12. Getting tar's Arguments in the Right Order
- 38.13. The cpio Tape Archiver
- 38.14. Industrial Strength Backups
- 39. Creating and Reading Archives
- 39.1. Packing Up and Moving
- 39.2. Using tar to Create and Unpack Archives
- 39.3. GNU tar Sampler
- 39.4. Managing and Sharing Files with RCS and CVS
- 39.5. RCS Basics
- 39.6. List RCS Revision Numbers with rcsrevs
- 39.7. CVS Basics
- 39.8. More CVS
- 40. Software Installation
- 40.1. /usr/bin and Other Software Directories
- 40.2. The Challenges of Software Installation on Unix
- 40.3. Which make?
- 40.4. Simplifying the make Process
- 40.5. Using Debian's dselect
- 40.5.1. Choosing the Access Method
- 40.5.2. Updating Information on Available Packages
- 40.5.3. Choosing Packages for Installation or Removal
- 40.5.4. Exiting the Select Function
- 40.5.5. Installing Packages
- 40.5.6. Configuring Packages
- 40.5.7. Removing Packages
- 40.5.8. Exiting dselect
- 40.6. Installing Software with Debian's Apt-Get
- 40.6.1. Configuring the sources.list File
- 40.6.2. Using apt-get
- 40.6.2.1. Updating information on available packages
- 40.6.2.2. Installing a package
- 40.6.2.3. Upgrading installed packages
- 40.7. Interruptable gets with wget
- 40.8. The curl Application and One-Step GNU-Darwin Auto-Installer for OS X
- 40.9. Installation with FreeBSD Ports
- 40.10. Installing with FreeBSD Packages
- 40.11. Finding and Installing RPM Packaged Software
- 41. Perl
- 41.1. High-Octane Shell Scripting
- 41.2. Checking your Perl Installation
- 41.3. Compiling Perl from Scratch
- 41.4. Perl Boot Camp, Part 1: Typical Script Anatomy
- 41.5. Perl Boot Camp, Part 2: Variables and Data Types
- 41.5.1. Scalars
- 41.5.2. Arrays
- 41.5.3. Hashes
- 41.5.4. References
- 41.6. Perl Boot Camp, Part 3: Branching and Looping
- 41.7. Perl Boot Camp, Part 4: Pattern Matching
- 41.8. Perl Boot Camp, Part 5: Perl Knows Unix
- 41.9. Perl Boot Camp, Part 6: Modules
- 41.10. Perl Boot Camp, Part 7: perldoc
- 41.11. CPAN
- 41.11.1. Installing Modules the Easy Way
- 41.11.2. Installing Modules the Hard Way
- 41.11.3. Browsing the CPAN Web Site
- 41.12. Make Custom grep Commands (etc.) with Perl
- 41.13. Perl and the Internet
- 41.13.1. Be Your Own Web Browser with LWP
- 41.13.2. Sending Mail with Mail::Sendmail
- 41.13.3. CGI Teaser
- 42. Python
- 42.1. What Is Python?
- 42.2. Installation and Distutils
- 42.3. Python Basics
- 42.3.1. Indentation
- 42.3.2. Functions
- 42.3.3. Everything's an Object
- 42.3.4. Modules and Packages
- 42.3.5. I/O and Formatting
- 42.3.6. wxPython
- 42.4. Python and the Web
- 42.5. urllib
- 42.6. urllib2
- 42.7. htmllib and HTMLParser
- 42.8. cgi
- 42.9. mod_python
- 42.10. What About Perl?
- 38. Backing Up Files
- VIII. Communication and Connectivity
- 43. Redirecting Input and Output
- 43.1. Using Standard Input and Output
- 43.2. One Argument with a cat Isn't Enough
- 43.3. Send (Only) Standard Error Down a Pipe
- 43.4. Problems Piping to a Pager
- 43.5. Redirection in C Shell: Capture Errors, Too?
- 43.6. Safe I/O Redirection with noclobber
- 43.7. The ( ) Subshell Operators
- 43.7.1. Combining Several Commands
- 43.7.2. Temporary Change of Directory and Environment
- 43.8. Send Output Two or More Places
- 43.9. How to tee Several Commands into One Place
- 43.10. Redirecting Output to More Than One Place
- 43.11. Named Pipes: FIFOs
- 43.12. What Can You Do with an Empty File?
- 44. Devices
- 44.1. Quick Introduction to Hardware
- 44.2. Reading Kernel Boot Output
- 44.3. Basic Kernel Configuration
- 44.4. Disk Partitioning
- 44.5. Filesystem Types and /etc/fstab
- 44.6. Mounting and Unmounting Removable Filesystems
- 44.7. Loopback Mounts
- 44.8. Network Devices ifconfig
- 44.9. Mounting Network Filesystems NFS, SMBFS
- 44.10. Win Is a Modem Not a Modem?
- 44.11. Setting Up a Dialup PPP Session
- 44.12. USB Configuration
- 44.13. Dealing with Sound Cards and Other Annoying Hardware
- 44.14. Decapitating Your Machine Serial Consoles
- 45. Printing
- 45.1. Introduction to Printing
- 45.2. Introduction to Printing on Unix
- 45.2.1. lpr-Style Printing Commands
- 45.2.2. lp-Style Printing Commands
- 45.3. Printer Control with lpc
- 45.4. Using Different Printers
- 45.5. Using Symbolic Links for Spooling
- 45.6. Formatting Plain Text: pr
- 45.7. Formatting Plain Text: enscript
- 45.8. Printing Over a Network
- 45.9. Printing Over Samba
- 45.9.1. Printing to Unix Printers from Windows
- 45.9.2. Printing to Windows Printers from Unix
- 45.10. Introduction to Typesetting
- 45.11. A Bit of Unix Typesetting History
- 45.12. Typesetting Manpages: nroff
- 45.13. Formatting Markup Languages troff, LATEX, HTML, and So On
- 45.14. Printing Languages PostScript, PCL, DVI, PDF
- 45.15. Converting Text Files into a Printing Language
- 45.16. Converting Typeset Files into a Printing Language
- 45.17. Converting Source Files Automagically Within the Spooler
- 45.18. The Common Unix Printing System (CUPS)
- 45.19. The Portable Bitmap Package
- 46. Connectivity
- 46.1. TCP/IP IP Addresses and Ports
- 46.1.1. Internet Protocol (IP)
- 46.1.2. Layer 4 Protocols: TCP, UDP, and ICMP
- 46.2. /etc/services Is Your Friend
- 46.3. Status and Troubleshooting
- 46.4. Where, Oh Where Did That Packet Go?
- 46.5. The Director of Operations: inetd
- 46.6. Secure Shell (SSH)
- 46.7. Configuring an Anonymous FTP Server
- 46.8. Mail SMTP, POP, and IMAP
- 46.9. Domain Name Service (DNS)
- 46.10. Dynamic Host Configuration Protocol (DHCP)
- 46.11. Gateways and NAT
- 46.12. Firewalls
- 46.13. Gatewaying from a Personal LAN over a Modem
- 46.1. TCP/IP IP Addresses and Ports
- 47. Connecting to MS Windows
- 47.1. Building Bridges
- 47.2. Installing and Configuring Samba
- 47.3. Securing Samba
- 47.4. SWAT and GUI SMB Browsers
- 47.5. Printing with Samba
- 47.6. Connecting to SMB Shares from Unix
- 47.7. Sharing Desktops with VNC
- 47.7.1. Connecting to a Windows VNC server
- 47.7.2. Setting up VNC on Unix
- 47.8. Of Emulators and APIs
- 47.8.1. VMWare
- 47.8.2. Wine
- 47.9. Citrix: Making Windows Multiuser
- 47.9.1. Citrix Metaframe
- 47.9.2. rdesktop
- 47.9.3. Hob
- 43. Redirecting Input and Output
- IX. Security
- 48. Security Basics
- 48.1. Understanding Points of Vulnerability
- 48.2. CERT Security Checklists
- 48.3. Keeping Up with Security Alerts
- 48.4. What We Mean by Buffer Overflow
- 48.5. What We Mean by DoS
- 48.6. Beware of Sluggish Performance
- 48.6.1. Check Processes
- 48.6.2. Checking Swap Space
- 48.6.3. Check Network Connections
- 48.6.4. Other Checks
- 48.7. Intruder Detection
- 48.8. Importance of MOTD
- 48.9. The Linux proc Filesystem
- 48.10. Disabling inetd
- 48.11. Disallow rlogin and rsh
- 48.12. TCP Wrappers
- 49. Root, Group, and User Management
- 49.1. Unix User/Group Infrastructure
- 49.2. When Does a User Become a User
- 49.3. Forgetting the root Password
- 49.4. Setting an Exact umask
- 49.5. Group Permissions in a Directory with the setgid Bit
- 49.6. Groups and Group Ownership
- 49.7. Add Users to a Group to Deny Permissions
- 49.8. Care and Feeding of SUID and SGID Scripts
- 49.9. Substitute Identity with su
- 49.10. Never Log In as root
- 49.11. Providing Superpowers with sudo
- 49.12. Enabling Root in Darwin
- 49.13. Disable logins
- 50. File Security, Ownership, and Sharing
- 50.1. Introduction to File Ownership and Security
- 50.2. Tutorial on File and Directory Permissions
- 50.2.1. User, Group, and World
- 50.2.2. Which Group is Which?
- 50.3. Who Will Own a New File?
- 50.4. Protecting Files with the Sticky Bit
- 50.5. Using chmod to Change File Permission
- 50.6. The Handy chmod = Operator
- 50.7. Protect Important Files: Make Them Unwritable
- 50.8. cx, cw, c-w: Quick File Permission Changes
- 50.9. A Loophole: Modifying Files Without Write Access
- 50.10. A Directory That People Can Access but Can't List
- 50.11. Juggling Permissions
- 50.12. File Verification with md5sum
- 50.13. Shell Scripts Must Be Readable and (Usually) Executable
- 50.14. Why Can't You Change File Ownership?
- 50.15. How to Change File Ownership Without chown
- 51. SSH
- 51.1. Enabling Remote Access on Mac OS X
- 51.2. Protecting Access Through SSH
- 51.3. Free SSH with OpenSSH
- 51.4. SSH Problems and Solutions
- 51.5. General and Authentication Problems
- 51.6. Key and Agent Problems
- 51.7. Server and Client Problems
- 48. Security Basics
- Glossary
- Index
- About the Authors
- Colophon
- SPECIAL OFFER: Upgrade this ebook with OReilly
O'Reilly Media - inne książki
-
Nowość Promocja Promocja 2za1
Business decisions in any context—operational, tactical, or strategic—can have considerable consequences. Whether the outcome is positive and rewarding or negative and damaging to the business, its employees, and stakeholders is unknown when action is approved. These decisions are usually made under the proverbial cloud of uncertainty.With this pra- ePub + Mobi pkt
(186,15 zł najniższa cena z 30 dni)
194.65 zł
228.99 zł (-15%) -
Nowość Promocja Promocja 2za1
If you're a developer looking to build a distributed, resilient, scalable, high-performance application, you may be evaluating distributed SQL and NoSQL solutions. Perhaps you're considering the Aerospike database.This practical book shows developers, architects, and engineers how to get the highly scalable and extremely low-latency Aerospike datab- ePub + Mobi pkt
Aerospike: Up and Running. Developing on a Modern Operational Database for Globally Distributed Apps
(245,65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł (-15%) -
Promocja Promocja 2za1
Learn how to use Go's strengths to develop services that are scalable and resilient even in an unpredictable environment. With this book's expanded second edition, Go developers will explore the composition and construction of cloud native applications, from lower-level Go features and mid-level patterns to high-level architectural considerations.E- ePub + Mobi pkt
(220,15 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł (-15%) -
Promocja Promocja 2za1
Reinforcement learning (RL) has led to several breakthroughs in AI. The use of the Q-learning (DQL) algorithm alone has helped people develop agents that play arcade games and board games at a superhuman level. More recently, RL, DQL, and similar methods have gained popularity in publications related to financial research.This book is among the fir- ePub + Mobi pkt
(220,15 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł (-15%) -
Promocja Promocja 2za1
To ensure that applications are reliable and always available, more businesses today are moving applications to AWS. But many companies still struggle to design and build these cloud applications effectively, thinking that because the cloud is resilient, their applications will be too. With this practical guide, software, DevOps, and cloud engineer- ePub + Mobi pkt
(211,65 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł (-15%) -
Promocja Promocja 2za1
Performance tuning is an experimental science, but that doesn't mean engineers should resort to guesswork and folklore to get the job done. Yet that's often the case. With this practical book, intermediate to advanced Java technologists working with complex platforms will learn how to tune Java cloud applications for performance using a quantitativ- ePub + Mobi pkt
(220,15 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł (-15%) -
Promocja Promocja 2za1
Today, investment in financial technology and digital transformation is reshaping the financial landscape and generating many opportunities. Too often, however, engineers and professionals in financial institutions lack a practical and comprehensive understanding of the concepts, problems, techniques, and technologies necessary to build a modern, r- ePub + Mobi pkt
(220,15 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł (-15%) -
Promocja Promocja 2za1
Until recently, infrastructure was the backbone of organizations operating software they developed in-house. But now that cloud vendors run the computers, companies can finally bring the benefits of agile custom-centricity to their own developers. Adding product management to infrastructure organizations is now all the rage.But how's that possible- ePub + Mobi pkt
(186,15 zł najniższa cena z 30 dni)
194.65 zł
228.99 zł (-15%) -
Promocja Promocja 2za1
Cloud services and SaaS software permeate every company's IT landscape, requiring a shift from manually provisioned services to a more structured approach, with codification at its core. Terraform provides tools to manage the lifecycle of your IT landscape across thousands of different cloud providers and SaaS platforms.By defining your infrastruct- ePub + Mobi pkt
(203,15 zł najniższa cena z 30 dni)
220.15 zł
259.00 zł (-15%) -
Promocja Promocja 2za1
Using machine learning for products, services, and critical business processes is quite different from using ML in an academic or research setting—especially for recent ML graduates and those moving from research to a commercial environment. Whether you currently work to create products and services that use ML, or would like to in the future, this- ePub + Mobi pkt
(245,65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł (-15%)
Dzięki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep@helion.pl
Książka drukowana
Oceny i opinie klientów: Unix Power Tools. 3rd Edition Jerry Peek, Shelley Powers, Tim O'Reilly (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.