Apparel & AccessoriesBooksClassical MusicDVDElectronics & PhotoGourmet Food and GroceriesHealth & Personal CareHome & GardenIndustrial & ScientificKitchen
Popular MusicMusical InstrumentsOutdoor LivingComputer HardwareComputer SoftwareSporting GoodsToolsToys and GamesVHS VideoVideo Games

Search:

Browse by Catagory:

Books

Linux Programming


Linux Phrasebook (2nd Edition) (Developer's Library)

Linux Phrasebook (2nd Edition) (Developer's Library) Lowest new price: $17.21
Lowest used price: $19.90
List price: $29.99
Author: Scott Granneman

 

Get more done faster at the Linux command line! This best-selling Linux Phrasebook has been thoroughly updated in the second edition to reflect the newest distributions, incorporate feedback from hundreds of active Linux users, and cover today's newest tools and techniques -- including an entirely new chapter on text file manipulation. 


Linux Phrasebook, Second Edition offers a concise, handy reference to the Linux commands that, like a language phrasebook, can be used on the spot on moment's notice.

 

Don't waste a minute on non-essentials: this straight-to-the-point reference delivers specific information and tested commands designed to work with any modern Linux distribution. Portable enough to take anywhere, it starts with a quick introduction to essential command line concepts, and then delivers all the modern Linux command examples, variations, and parameters you need to: 

  • View, manipulate, archive, and compress files
  • Control file ownership and permissions
  • Find anything on your systems
  • Efficiently use the Linux shell
  • Monitor system resources
  • Install software
  • Test, fix, and work with networks

Linux Phrasebook, Second Edition is the perfect quick command line reference for millions of Linux users and administrators at all levels of experience: people who want to get reliable information they can use right now -- with no distractions and no diversions!


Contents at a Glance

 

Part I: Getting Started


Chapter 1 Things to Know About Your Command Line

Everything Is a File

Maximum Filename Lengths

Names Are Case-Sensitive

Special Characters to Avoid in Names

Wildcards and What They Mean

Special Files That Affect Your Command Line

If There’s Too Much Stuff on Screen, Reset

Chapter 2 Navigating Your File System

List Files and Folders

List the Contents of Other Folders

List Folder Contents Using Wildcards

View a List of Files in Subfolders

View a List of Contents in a Single Column

View Contents As a Comma-Separated List

View Hidden Files and Folders

Visually Display a File’s Type

Display Contents in Color

List Permissions, Ownership, and More

Reverse the Order Contents Are Listed

Sort Contents by Date and Time

Sort Contents by Size

Express File Sizes in Terms of K, M, and G

Display the Path of Your Current Directory

Change to a Different Directory

Change to Your Home Directory

Change to Your Previous Directory

Chapter 3 Creation and Destruction

Change a File to the Current Time

Change a File to Any Desired Time

Create a New, Empty File

Create a New Directory

Create a New Directory and Any Necessary Subdirectories

Copy Files

Copy Files Using Wildcards

Copy Files Verbosely

Stop Yourself from Copying over Important Files

Copy Directories

Copy Files As Perfect Backups in Another Directory

Move Files and Folders

Rename Files and Folders

Understand How Linux Stores Files

Create a Link Pointing to Another File or Directory

Delete Files

Remove Several Files at Once with Wildcards

Prevent Yourself from Deleting Key Files

Delete an Empty Directory

Remove Files and Directories That Aren’t Empty

Deleting Troublesome Files

Chapter 4 Learning About Commands

Find Out About Commands with man

Quickly Find Out What a Command Does Based on Its Name

Search for a Command Based on What It Does

Read a Command’s Specific Man Page

Learn About Commands with info

Navigate Within info

Locate the Paths for a Command’s Executable, Source Files, and Man Pages

Find Out Which Version of a Command Will Run

Discover How a Command Will Be Interpreted

Chapter 5 Building Blocks

Run Several Commands Sequentially

Run Commands Only If the Previous Ones Succeed

Run a Command Only If the Previous One Fails

Plug the Output of a Command into Another Command

Understand Input/Output Streams

Use the Output of One Command As Input for Another

Redirect a Command’s Output to a File

Prevent Overwriting Files When Using Redirection

Append a Command’s Output to a File

Use a File As Input for a Command

Combine Input and Output Redirection

Send Output to a File and to stdout at the Same Time

Part II: Working with Files


Chapter 6 Viewing (Mostly Text) Files

Figure Out a File’s Type

View Files on stdout

Concatenate Files to stdout

Concatenate Files to Another File

Concatenate Files and Number the Lines

View Text Files a Screen at a Time

Search Within Your Pager

Edit Files Viewed with a Pager

View the First 10 Lines of a File

View the First 10 Lines of Several Files

View the First Several Lines of a File or Files

View the First Several Bytes, Kilobytes, or Megabytes of a File

View the Last 10 Lines of a File

View the Last 10 Lines of Several Files

View the Last Several Lines of a File or Files

View the Constantly Updated Last Lines of a File or Files

Chapter 7 Manipulating Text Files with Filters

Count the Number of Words, Lines, and Characters in a File

Number Lines in a File

Select an Entire Column of Data in a Delimited File

Sort the Contents of a File

Sort the Contents of a File Numerically

Remove Duplicate Lines in a File

Substitute Selected Characters with Others

Replace Repeated Characters with a Single Instance

Delete Matching Characters

Transform Text in a File

Print Specific Fields in a File

Chapter 8 Ownerships and Permissions

Become Another User

Become Another User, with His Environment Variables

Become root

Become root, with Its Environment Variables

Change the Group Owning Files and Directories

Recursively Change the Group Owning a Directory

Change the Owner of Files and Directories

Change the Owner and Group of Files and Directories

Understand the Basics of Permissions

Change Permissions on Files and Directories Using Alphabetic Notation

Change Permissions on Files and Directories Using Numeric Permissions

Change Permissions Recursively

Set and Then Clear suid

Set and Then Clear sgid

Set and Then Clear the Sticky Bit

Chapter 9 Archiving and Compression

Archive and Compress Files Using zip

Get the Best Compression Possible with zip

Archive and Compress Files of a Specified Type in Directories and Subdirectories

Password-Protect Compressed Zip Archives

Unzip Files

Test Files That Will Be Unzipped

Archive and Compress Files Using gzip

Archive and Compress Files Recursively Using gzip

Uncompress Files Compressed with gzip

Test Files That Will Be Unzipped with gunzip

Archive and Compress Files Using bzip2

Uncompress Files Compressed with bzip2

Test Files That Will Be Unzipped with bunzip2

Archive Files with tar

Archive and Compress Files with tar and gzip

Test Files That Will Be Untarred and Uncompressed

Untar and Uncompress Files

Part III: Finding Files, Words, and More


Chapter 10 Finding Files, Directories, Words, and Phrases

Search a Database of Filenames

Search a Database of Filenames Without Worrying About Case

Update the Database Used by locate

Searching Inside Text Files for Patterns

The Basics of Searching Inside Text Files for Patterns

Search Recursively for Text in Files

Search for Words and Highlight the Results

Search for Text in Files, Ignoring Case

Search for Whole Words in Files

Show Line Numbers Where Words Appear in Files

Search the Output of Other Commands for Specific Words

See Context for Words Appearing in Files

Show Lines Where Words Do Not Appear in Files

List Files Containing Searched-for Words

List the Number of Occurrences of Words in Files

Search for Words Inside Search Results

Chapter 11 The find Command

Find Files by Name

Find Files by Ownership

Find Files by File Size

Find Files by File Type

Find Files by Time

Show Results If the Expressions Are True (AND)

Show Results If Either Expression Is True (OR)

Show Results If the Expression Is Not True (NOT)

Execute a Command on Found Files

Execute a Command on Found Files More Efficiently

Execute a Command on Found Files Containing Spaces

Part IV: Your Environment


Chapter 12 Your Shell

View Your Command-Line History

Run the Last Command Again

Run a Previous Command Using Numbers

Run a Previous Command Using a String

Search for a Previous Command and Run It

Display All Command Aliases

View a Specific Command Alias

Create a New Temporary Alias

Create a New Permanent Alias

Remove an Alias

Create a New Temporary Function

Create a New Permanent Function

Display All Functions

Remove a Function

When to Use an Alias and When to Use a Function

Chapter 13 Monitoring System Resources

Discover How Long Your Computer Has Been Running

View All Currently Running Processes

View a Process Tree

View Processes Owned by a Particular User

End a Running Process

View a Dynamically Updated List of Running Processes

List Open Files

List a User’s Open Files

List Users for a Particular File

List Processes for a Particular Program

Display Information About System RAM

Show File System Disk Usage

Report File Space Used by a Directory

Report Just the Total Space Used for a Directory

Chapter 14 Installing Software

Install Software Packages (RPM)

Remove Software Packages (RPM)

Install Software Packages and Dependencies (RPM)

Remove Software Packages and Dependencies (RPM)

Upgrade Software Packages and Dependencies (RPM)

Find Packages Available for Download (RPM)

Install Software Packages (DEB)

Remove Software Packages (DEB)

Install Software Packages and Dependencies (DEB)

Remove Software Packages and Dependencies (DEB)

Upgrade Software Packages and Dependencies (DEB)

Find Packages Available for Download (DEB)

Clean Up Unneeded Installation Packages (DEB)

Troubleshoot Problems with APT (DEB)

Part V: Networking


Chapter 15 Connectivity

View the Status of Your Network Interfaces

Verify That a Computer Is Running and Accepting Requests

Trace the Route Packets Take Between Two Hosts

Query DNS Records

Configure a Network Interface

View the Status of Your Wireless Network Interfaces

Configure a Wireless Network Interface

Grab a New Address Using DHCP

Make a Network Connection Active

Bring a Network Connection Down

Display Your IP Routing Table

Change Your IP Routing Table

Troubleshooting Network Problems

Chapter 16 Working on the Network

Securely Log In to Another Compute

Securely Log In to Another Machine Without a Password

Securely Transfer Files Between Machines

Securely Copy Files Between Hosts

Securely Transfer and Back Up Files

Download Files Non-interactively

Download Websites Non-interactively

Download Sequential Files and Internet Resources


Similar Products:


Shell Programming in Unix, Linux and OS X: The Fourth Edition of Unix Shell Programming (4th Edition) (Developer's Library)

Shell Programming in Unix, Linux and OS X: The Fourth Edition of Unix Shell Programming (4th Edition) (Developer's Library) Lowest new price: $26.00
Lowest used price: $30.17
List price: $44.99
Author: Stephen G. Kochan

Shell Programming in Unix, Linux and OS X is a thoroughly updated revision of Kochan and Wood’s classic Unix Shell Programming tutorial. Following the methodology of the original text, the book focuses on the POSIX standard shell, and teaches you how to develop programs in this useful programming environment, taking full advantage of the underlying power of Unix and Unix-like operating systems.


After a quick review of Unix utilities, the book’s authors take you step-by-step through the process of building shell scripts, debugging them, and understanding how they work within the shell’s environment. All major features of the shell are covered, and the large number of practical examples make it easy for you to build shell scripts for your particular applications. The book also describes the major features of the Korn and Bash shells.

 

Learn how to…

  • Take advantage of the many utilities provided in the Unix system
  • Write powerful shell scripts
  • Use the shell’s built-in decision-making and looping constructs
  • Use the shell’s powerful quoting mechanisms
  • Make the most of the shell’s built-in history and command editing capabilities
  • Use regular expressions with Unix commands
  • Take advantage of the special features of the Korn and Bash shells
  • Identify the major differences between versions of the shell language
  • Customize the way your Unix system responds to you
  • Set up your shell environment
  • Make use of functions
  • Debug scripts

Contents at a Glance


1  A Quick Review of the Basics

2  What Is the Shell?

3  Tools of the Trade

4  And Away We Go

5  Can I Quote You on That?

6  Passing Arguments

7  Decisions, Decisions

8  ‘Round and ‘Round She Goes

9  Reading and Printing Data

10 Your Environment

11 More on Parameters

12 Loose Ends

13 Rolo Revisited

14 Interactive and Nonstandard Shell Features


A Shell Summary

B For More Information


Similar Products:


LPI Linux Essentials Certification All-in-One Exam Guide

LPI Linux Essentials Certification All-in-One Exam Guide Lowest new price: $19.96
Lowest used price: $20.11
List price: $40.00
Author: Robb H. Tracy

Complete coverage of the newest exam release from the Linux Professional Institute, and the first step toward LPIC-1 and CompTIA Linux+

Linux Essentials All-in-One Exam Guide covers this "first-of-its-kind" program intended for the academic sector, aspiring IT professionals, and anyone new to the world of Linux and open source technology. This comprehensive, classroom-based reference offers 100% coverage of all exam objectives for the Linux Essentials exam. The book includes expert discussion sidebars to convey in-depth information. Tip, Caution, and Note icons highlight key topics; end-of-chapter quizzes test retention and exam readiness; and Exam Tips guide you through tough technical topics that may be tricky come exam day. The All-in-One also includes hands-on examples and exercises that reinforce practical learning for real-world applicability. Electronic content includes a practice exam (Windows based) and an Adobe Digital Editions e-book (available for download)

Similar Products:


Learning Red Hat Linux, 2nd Edition

Learning Red Hat Linux, 2nd Edition Lowest new price: $17.36
Lowest used price: $1.89
List price: $34.95
Author: Bill McCarty
Brand: Brand: O'Reilly Media

With roughly 20 million users worldwide, Linux is the most talked about success story of open source and free software. Even devotees of Microsoft Windows and Apple's Macintosh are attracted by the unsurpassed stability and flexibility of Linux, but learning a Unix-style operating system can be a daunting task. The second edition of Learning Red Hat Linux gives newcomers exactly what they need to get started.The book includes a complete Linux system CD-ROM from Red Hat Software, one of the most popular distributions of Linux in the U.S. Once it guides beginners through the process of installing and configuring this software, the book offers a thorough but gentle introduction to the basics of using Red Hat Linux. This new edition has been "upgraded" to cover installation and configuration of Red Hat version 7.2, with improved sections on how to use the GNOME and KDE desktop environments, and how to use the Red Hat Package Manager (RPM). Highlights ofLearning Red Hat Linux include:

  • How to prepare your system for installing Linux
  • How to install and configure Linux
  • How to install and configure the X Window System
  • How to use X and the GNOME and KDE desktop environments
  • How to obtain and set up Linux applications
  • How to set up a Linux system for networking, either on your local area network (LAN), or via a dialup connection to the Internet
  • How to install and configure Linux-based servers, including the Apache web server and Samba for integrated file and print services with Windows-based networks
  • How to understand and write shell scripts to extend the power of Linux
  • How to install, upgrade, and remove packages using RPM

The economics of the free software business has taken another football bounce with the release of O'Reilly's Learning Red Hat Linux, a guide to the most popular distribution of the freely redistributable operating system. The bounce is this: for the typical tech-book list price of $35, you get Bill McCarty's beginners' survey and Red Hat 7.2, a $60 value at Red Hat's own retail price. McCarty's introduction claims that the two-CD set, printed with the O'Reilly logo, contains "everything you need to install and configure your own Red Hat Linux system." But is it really Red Hat 7.2? Yes, according to one Red Hat official, but like batteries, support is sold separately for $20 a month. Economics militate in favor of purchasing the book as well as a separate support contract from Red Hat, if needed. The book is, then, the freebie, and consequently a good deal.

McCarty follows his nose through the installation procedure and annotates each step with do's and don'ts; e.g., do use the "custom" install mode rather than "server" or "workstation" if you don't want to lose existing data on the hard drive. He intuits just what the new Linux user will want to do: configure X11, connect to ISP over a modem or LAN, use e-mail, run Samba over the network to read a PC hard drive, configure and start an Apache Web server, and configure a basic firewall. His chapter on RPM, the Red Hat Package Manager, is brief but useful, and his one-page discussion of the Red Hat Network $20-a-month support option is far too brief to be useful, but contains enough hints to allow a new member to keep expectations modest.

Brevity and velocity are the book's strengths, as McCarty glides from the highlights of one configuration protocol to another. Error recovery is ignored in favor of tips and hints on error avoidance. Larger issues in system administration strategies are unevenly treated: partitioning theory, dual booting, and backing up are skipped. Loading kernel modules dynamically is not discussed, and neither is kernel compiling, and the ubiquitous DHCP client is introduced only after the rather advanced DHCP server is discussed. To round out the knowledge base, I recommend Matt Welch's peerless Running Linux as the entry point for serious Linux system administration.

In his hurry, McCarty blurs distinctions between Linux distributions, leaving the reader wondering why Red Hat is singled out for book-length coverage. But his single biggest omission is an introduction to linuxdocs.org and the indispensable world of HOWTOs. Rather, reference to HOWTOs is relegated to an appendix on the boot process.

Ultimately, Learning Red Hat Linux should be viewed as an inexpensive way to obtain legitimate CDs of Red Hat 7.2, with installation documentation that exceeds the norm. Once the installation has either succeeded or failed, however, readers will want to move along to linuxdocs.org or Running Linux. --Peter Leopold

Features:

  • Used Book in Good Condition

Similar Products:


Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools Lowest new price: $32.36
Lowest used price: $27.49
List price: $49.95
Author: Bruce Nikkel
Brand: No Starch Press

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical Forensic Imaging takes a detailed look at how to secure and manage digital evidence using Linux-based command line tools. This essential guide walks you through the entire forensic acquisition process and covers a wide range of practical scenarios and situations related to the imaging of storage media.

You’ll learn how to:
–Perform forensic imaging of magnetic hard disks, SSDs and flash drives, optical discs, magnetic tapes, and legacy technologies
–Protect attached evidence media from accidental modification
–Manage large forensic image files, storage capacity, image format conversion, compression, splitting, duplication, secure transfer and storage, and secure disposal
–Preserve and verify evidence integrity with cryptographic and piecewise hashing, public key signatures, and RFC-3161 timestamping
–Work with newer drive and interface technologies like NVME, SATA Express, 4K-native sector drives, SSHDs, SAS, UASP/USB3x, and Thunderbolt
–Manage drive security such as ATA passwords; encrypted thumb drives; Opal self-encrypting drives; OS-encrypted drives using BitLocker, FileVault, and TrueCrypt; and others
–Acquire usable images from more complex or challenging situations such as RAID systems, virtual machine images, and damaged media

With its unique focus on digital forensic acquisition and evidence preservation, Practical Forensic Imaging is a valuable resource for experienced digital forensic investigators wanting to advance their Linux skills and experienced Linux administrators wanting to learn digital forensics. This is a must-have reference for every digital forensics lab.

Features:

  • No Starch Press

Similar Products:


Beginning Linux Programming

Beginning Linux Programming Lowest new price: $25.72
Lowest used price: $11.77
List price: $39.99
Author: Neil Matthew
Brand: Neil Matthew

Beginning Linux Programming, Fourth Edition continues its unique approach to teaching UNIX programming in a simple and structured way on the Linux platform. Through the use of detailed and realistic examples, students learn by doing, and are able to move from being a Linux beginner to creating custom applications in Linux. The book introduces fundamental concepts beginning with the basics of writing Unix programs in C, and including material on basic system calls, file I/O, interprocess communication (for getting programs to work together), and shell programming. Parallel to this, the book introduces the toolkits and libraries for working with user interfaces, from simpler terminal mode applications to X and GTK+ for graphical user interfaces. Advanced topics are covered in detail such as processes, pipes, semaphores, socket programming, using MySQL, writing applications for the GNOME or the KDE desktop, writing device drivers, POSIX Threads, and kernel programming for the latest Linux Kernel.

Features:

  • Beginning Linux Programming

Similar Products:


Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort

Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort Lowest new price: $47.28
Lowest used price: $19.97
List price: $49.95
Author: Michael Rash
Brand: Brand: No Starch Press

System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop.

Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of these topics:

  • Passive network authentication and OS fingerprinting
  • iptables log analysis and policies
  • Application layer attack detection with the iptables string match extension
  • Building an iptables ruleset that emulates a Snort ruleset
  • Port knocking vs. Single Packet Authorization (SPA)
  • Tools for visualizing iptables logs

    Perl and C code snippets offer practical examples that will help you to maximize your deployment of Linux firewalls. If you're responsible for keeping a network secure, you'll find Linux Firewalls invaluable in your attempt to understand attacks and use iptables-along with psad and fwsnort-to detect and even prevent compromises.

  • Features:

    • Used Book in Good Condition

    Similar Products:


    Linux+ Guide to Linux Certification (Test Preparation)

    Linux+ Guide to Linux Certification (Test Preparation) Lowest new price: $34.00
    Lowest used price: $6.00
    List price: $199.95
    Author: Jason W. Eckert
    Brand: Cengage Learning

    LINUX+ GUIDE TO LINUX CERTIFICATION, THIRD EDITION offers the most up-to-date information to empower users to successfully pass CompTIA's Linux+ (Powered by LPI) Certification exam, while maintaining a focus on quality, classroom usability, and real-world experience. This complete guide provides not only the conceptual knowledge, but also the hands-on skills necessary to work with the Linux operation systems in a network administration environment. Comprehensive coverage includes updated information pertinent to the latest Linux distributions, as well as new storage technologies such as LVM and ext4. Readers will learn about new and expanded material on key job-related networking services including FTP, NFS, Samba, Apache, DNS, DHCP, NTP, RADIUS, LDAP, Squid, Sendmail, Postfix, X, SSH, VNC, SQL, and updated information on security practices and technologies. The Hands-On Projects help learners practice new skills, and review questions and key terms reinforce important concepts.

    Features:

    • Used Book in Good Condition

    Similar Products:


    Red Hat Enterprise Linux 6 Administration: Real World Skills for Red Hat Administrators

    Red Hat Enterprise Linux 6 Administration: Real World Skills for Red Hat Administrators Lowest new price: $29.66
    Lowest used price: $19.17
    List price: $59.99
    Author: Sander van Vugt
    Brand: Brand: Sybex

    The definitive guide to administering a Red Hat Enterprise Linux 6 network

    Linux professionals who need a go-to guide on version 6 of Red Hat Enterprise Linux (RHEL) will find what they need in this comprehensive Sybex book. It covers RHEL administration in detail, including how to set up and manage web and mail services, use RHEL in enterprise environments, secure it, optimize storage, configure for virtualization and high availability, and much more. It also provides a great study aid for those preparing for either the RHCSA or RHCE certification exam.

    • Red Hat is the Linux market leader, and Red Hat administrators are in demand
    • This Sybex guide is a comprehensive resource on Red Hat Enterprise Linux administration and useful for those preparing for one of the Red Hat certification exams
    • Covers setting up and managing web and mail services, using RHEL in enterprise environments, securing RHEL, and optimizing storage to fit your environment
    • Explores advanced RHEL configurations, including virtualization and high availability

    Red Hat Enterprise Linux 6 Administration is the guide Linux professionals and Red Hat administrators need to stay current on the newest version.

    Features:

    • Used Book in Good Condition

    Similar Products:


    Shell Scripting: Learn Linux Shell Programming Step-By-Step (Bash Scripting, UNIX)

    Shell Scripting: Learn Linux Shell Programming Step-By-Step (Bash Scripting, UNIX) Lowest new price: $13.11
    Lowest used price: $13.43
    List price: $13.38
    Author: Harry Harvey

    SHELL SCRIPTING , UNIX , LINUX

    This book is for all those who are willing to learn UNIX like operating system and shell scripting. You can start reading this book without any knowledge of programming / scripting or any knowledge of any Linux/ UNIX operating system.


    All of the programs / scripts in this book are explained as a step by step program with clear instructions. Each chapter will contain a certain number of relevant topics with illustrations and exercises where necessary, this will all be finished off with an end of chapter quiz for an easy and enjoyable learning.


    In this book you will find the following topics: wildcards, functions, text processing, text searching, loops, troubleshooting and debugging.

    At the end of this book you will learn how to write more complex scripts using variables, functions and loops.

    If you are Linux new user, so this book is good for you, keep in mind this is not about Linux system administration.


    CLICK ADD TO CART TO GET THIS AMAZING BOOK!


    << Prev   Next >>
    Page 5 of 124

    [Kindle]    [Kindle DX]
      Privacy Policy

    CERTAIN CONTENT THAT APPEARS ON THIS SITE COMES FROM AMAZON SERVICES LLC. THIS CONTENT IS PROVIDED AS IS AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.