grep Pocket Reference is the first guide devoted to grep, the powerful utility program that helps you locate content in any file on a Unix or Linux system. Several applications use grep, from mail filtering and system log management to malware analysis and application development, and there are many other ways to use the utility. This pocket reference is ideal for system administrators, security professionals, developers, and others who want to learn more about grep and take new approaches with it. With grep Pocket Reference, you will: Learn methods for filtering large files for specific content Acquire information not included in the current grep documentation Get several tricks for using variants such as egrep Keep key information about grep right at your fingertips
Find the answers you need about grep quickly and easily. If you're familiar with this utility, grep Pocket Reference will help you refresh your basic knowledge, understand rare situations, and find more efficient uses. If you're new to grep, this book is the best way to get started.
About the Author
John Bambenek is a programmer and teacher with over ten years of experience. His work at the Internet Storm Center and the University of Illinois, as well as his contributions to SANS information management courses, will help him promote this book and give him a sound base from which to write.
Agnieszka Klus was born in Rzeszow, Poland and came here as a child. She lives in the northwest suburb of Chicago, but considers herself a Chicagoan. She is currently trying to get her Masters in Accountancy at the University of Illinois at Urbana-Champaign, and also works as a system administrator at the Coordinated Science Laboratory.
End-To-End E-Business Transaction Management Made Easy (IBM Redbooks) This Redbook will help you install, tailor, and configure the new Tivoli Monitoring for Transaction Performance Version 5.2, which will assist you in determining the business performance of e-business transactions.
This IBM Redbook will help you install, tailor, and configure the new IBM Tivoli Monitoring for Transaction Performance...
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.
The Information Security...
Fundamentals of Logic Design (with Companion CD-ROM)
After studying this text, you should be able to apply switching theory to the solution of
logic design problems.This means that you will learn both the basic theory of switching
circuits and how to apply it. After a brief introduction, you will study Boolean algebra,
which is the basic mathematical tool needed to analyze and synthesize...
High-Level Data Fusion Master cutting-edge Level 2 fusion techniques that help you develop powerful situation assessment services with eye-popping capabilities and performance with this trail-blazing resource. The book explores object and situation fusion processes with an appropriate handling of uncertainties, and applies cutting-edge artificial intelligence and...