Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Shell Scripting Recipes: A Problem-Solution Approach (Expert's Voice in Open Source)

Buy

In today’s IT environment, harried system administrators are finding themselves more overworked than ever. This book helps them regain some of the lost time spent creating and testing shell scripts, and guides readers through more than 150 much-needed and practical real-world examples.

Because all scripts found in this book are POSIX (Portable Operating System Interface)-compliant, they are supported by all major shell variants, including Bash, Zsh and sh, among others. File conversion, system administration, and resource monitoring are just a few of the topics covered in this highly practical shell scripting reference.

When I was introduced to Unix in 1990, it was still the domain of multiuser systems and high-end workstations. Even the i386 system I started with had 12 users logging on concurrently through serial terminals. I had remote access through a blazingly fast 1200 bps modem.

Things were changing by the mid-1990s, when systems using the Linux kernel, integrated with GNU utilities and the X Window System, provided a viable alternative to Microsoft Windows. At the same time, computers with the power, memory, and hard drive space to run it came within reach of an individual’s pocketbook. The Internet brought fast and efficient distribution of the new systems and software (and enabled their development in the first place). Unix had arrived on the home computer.

The twenty-first century has seen the burgeoning of a new breed of Unix user: the home (or small business) user whose computer experience was previously limited, at most, to Microsoft Windows. Such computers may well be used by only one person. This modern user quite likely has no intention of becoming a system administrator, and just wants to use the computer with as little fuss as possible.

If that describes you, I hope this book will be an eye-opener. I want to give you a glimpse of the power of the shell. Shell scripts are not just for system administration; they can automate many tasks and solve many different problems. This book is not a tutorial, but by studying the scripts (after reading Chapter 1), you should gain a good grounding in the techniques of shell programming (and most of them can also be used at the command line).

If you are an experienced shell scripter, you may find in these pages the scripts you never got around to writing—perhaps even programs you didn’t think could be implemented as shell scripts. A few here had been on my to-do list for years; writing this book gave me the incentive to develop them. I hope you’ll also find interesting techniques and different ways of doing things.

(HTML tags aren't allowed.)

Self-Defending Networks: The Next Generation of Network Security
Self-Defending Networks: The Next Generation of Network Security

Protect your network with self-regulating network security solutions that combat both internal and external threats.

  • Provides an overview of the security components used to design proactive network security

  • Helps network security...

iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets
iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets
"This book is a must for anyone attempting to examine the iPhone. The level of forensic detail is excellent. If only all guides to forensics were written with this clarity!" -Andrew Sheldon, Director of Evidence Talks, computer forensics experts With iPhone use increasing in business networks, IT and security professionals face a serious...
Integrating Macs into Windows Networks (Network Pro Library)
Integrating Macs into Windows Networks (Network Pro Library)

Integrate Macs seamlessly into your Windows network

These days, almost every Windows network must include Macs--and not just as second-class citizens with limited connectivity, but as full members of the network. Covering Mac OS X Snow Leopard and Windows Server 2008 R2, Integrating Macs into Windows Networks shows you how...


Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering)
Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering)

Finally--a single volume guide to really effective security for both voice and data wireless networks!

More and more data and voice communications are going via wireless at some point between the sender and intended recipient. As a result, truly "bulletproof" wireless security is now more than a desirable
...

How Not to Program in C++: 111 Broken Programs and 3 Working Ones, or Why Does 2+2=5986
How Not to Program in C++: 111 Broken Programs and 3 Working Ones, or Why Does 2+2=5986
". . . a unique book that is fun to read while still providing valuable information." -- CodeGuru.com

". . .[like] cross training with the drill sergeant of debugging. . ." -- Chris Pelsor, Flash Developer

"If you have been programming in C++ for a while, this book is and excellent
...
Art and Technology of Entertainment Computing and Communication
Art and Technology of Entertainment Computing and Communication

Art and Technology of Entertainment Computing and Communication takes a blue sky research perspective on the field of interactive media for entertainment computing. Adrian David Cheok argues that entertainment as an end-product is useful for interactive play, however it is also a powerful tool for learning and communication and it is also a...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy