Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Shell Scripting Recipes: A Problem-Solution Approach

Buy

Filled with over 150 essential, practical recipes that empower Unix users to regain lost time spent creating and testing shell scripts. The majority of scripts included are POSIX-compliant

and supported by many of the major shell variants, including Bash, ksh, and sh. Each real-world example recipe follows the same problem-solution structure, meaning cross-referencing is easy and fast. Recipe topics include file conversion (DOS, UNIX, and Mac), system administration, resource monitoring, filename management, complex date calculations, screen control capabilities, and much more.

Completely updated for this second edition and taking all the changes of the past ten years into account, every recipe in this book is now relevant for a modern audience. Authors Chris Johnson’s and Jayant Varma’s code is clear, direct, and applicable. Add this excellent reference to your library today.

(HTML tags aren't allowed.)

Manager's Guide to Compliance
Manager's Guide to Compliance
"Wide perspectives and best practices combined deliver a punch that will knock your 'SOX' off! The author has blended together a critical mix necessary for effectively handling the requirements of SOX."
—Rob Nance, Publisher, AccountingWEB, Inc.

"Robust compliance and corporate governance is an absolute necessity...

The Effectiveness of Promotion Agencies at Attracting Foreign Investment
The Effectiveness of Promotion Agencies at Attracting Foreign Investment
With many millions of dollars being spent annually by governments on promotion to attract foreign investors to various countries, a perplexing question has become increasingly important: Does investment promotion really work? Jacques Morisset and Kelly Andrews-Johnson have made a major step in providing a convincing answer to this and associated...
Graph Algorithms, Third Edition (Algorithms in Java, Part 5)
Graph Algorithms, Third Edition (Algorithms in Java, Part 5)

Graphs and Graph algorithms are pervasive in modern computing applications. This book describes the most important known methods for solving the graph-processing problems that arise in practice. Its primary aim is to make these methods and the basic principles behind them accessible to the growing number of people in need of...


The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Uncover, exploit, and close security holes in any software or operating system

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This...

Data Networks, IP and the Internet: Protocols, Design and Operation
Data Networks, IP and the Internet: Protocols, Design and Operation
Modern data networks are all based on the Internet or on IP (Internet Protocol). But many people remain confused by multiprotocol networks. How do all the protocols fit together? How do I build a network? What do all the components do? What sort of problems should I expect?

Data Networks, IP and the Internet is intended not only for...

Quantum Approach to Informatics
Quantum Approach to Informatics
An essential overview of quantum information

Information, whether inscribed as a mark on a stone tablet or encoded as a magnetic domain on a hard drive, must be stored in a physical object and thus made subject to the laws of physics. Traditionally, information processing such as computation occurred in a framework governed by laws of classical...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy