Отзывы читателей на книги по Linux и UNIX.

by Jerry Peek, Mike Loukides, Tim O`Reilly, and et al.


Download Book

If you are the author or the publisher, and would like to link to your site here, please contact us .

About Book

Amazon.com
UNIX documentation typically comes in one of two flavors: at one extreme, light and fluffy books that assume you are a terrified PC user who needs to learn enough UNIX to get by at work, or massive and obscure tomes written for gurus, and indistinguishable from the most incomprehensible man pages.

This UNIX book, in contrast, assumes that you are basically a competent and intelligent individual, and that you are sufficiently secure in your self-image at work that you simply want to get things done, simply, by taking advantage of the real power of UNIX without having to learn "man-speak". It doesn"t skimp on clear introductions and overviews, but the focus of the book is on practical examples of the most useful UNIX commands and utilities. A minor quibble: the enclosed CD-ROM is a bit heavy with utilities and packages that are probably already resident on your UNIX system (like Perl, Emacs, pbmplus), but it does contain scripts that are used throughout the book and that you"d probably rather not type in. Highly recommended for anyone who really wants to use UNIX, and not just cower or pose.

Book Description
Book/CD package that is the ultimate "tips and techniques" book for the Unix operating system. CD-ROM is packed with utilities and scripts. Solves commonly encountered problems.

The publisher, O"Reilly and Associates
Ideal for UNIX users who hunger for technical--yet accessible--information, UNIX Power Tools consists of tips, tricks, concepts, and freeware (CD-ROM included). It also covers add-on utilities and how to take advantage of clever features in the most popular UNIX utilities. This is a browser"s book...like a magazine that you don"t read from start to finish, but leaf through repeatedly until you realize that you"ve read it all. The book is structured so that it bursts at the seams with cross references. Interesting "sidebars" explore syntax or point out other directions for exploration, including relevant technical details that might not be immediately apparent. You"ll find articles abstracted from O"Reilly Nutshell Handbooks(R), new information that highlights program "tricks" and "gotchas," tips posted to the Net over the years, and other accumulated wisdom. The 55 chapters in this book discuss topics like file management, text editors, shell programming--even office automation. Overall, there"s plenty of material here to satisfy even the most voracious appetites. The bottom line? UNIX Power Tools is loaded with practical advice about almost every aspect of UNIX. It will help you think creatively about UNIX, and will help you get to the point where you can analyze your own problems. Your own solutions won"t be far behind. The CD-ROM includes all of the scripts and aliases from the book, plus perl, GNU emacs, pbmplus (manipulation utilities), ispell,screen, the sc spreadsheet, and about 60 other freeware programs. In addition to the source code, all the software is precompiled for Sun3, Sun4, DECstation, IBM RS/6000, HP 9000 (700 series), SCO Xenix, and SCO UNIX. (SCO UNIX binaries will likely also run on other Intel UNIX platforms, including Univel"s new UNIXware.)

Inside Flap Copy
Book/CD package that is the ultimate "tips and techniques" book for the Unix operating system. CD-ROM is packed with utilities and scripts. Solves commonly encountered problems.

Comments

SEND A COMMENT

PLEASE READ: All comments must be approved before appearing in the thread; time and space constraints prevent all comments from appearing. We will only approve comments that are directly related to the article, use appropriate language and are not attacking the comments of others.

Отзывы: +2 / -1 Kalashmatik (2/02/2007): Супер книга действительно только для профессионалов, ИМХО должна быть на каждом столе работающего системного администратора, в ней множество дельных примеров на практике и идет частое сравнение HP-UX/Solaris/Linux систем, вообщем полезна всем bigadmin"ам из серии must have, новичкам будет сложновато, кстати, приятные впечатления производит юмор автора (сугубо проффесиональный).
Андрей К. aka Tomoe (3/02/07): Эту книгу в Рунете принято хвалить. Мне же хочется отступить от утвердившейся традиции. Главное впечатление, производимое этой книгой -- писалась она как-то бессистемно, под настроение авторов, "куда кривая выведет". В духе художественной литературы, когда не знаешь, куда кривая сюжета вынесет тебя в следующий момент.
Иногда вводит в задумчивость: по какому принципу отбиралось то, что в неё войдёт, и в каком именно количестве, а что -- нет. Например, нет вообще ничего о VoIP (в 2001-м году его не существовало, правда? ;) Да что там VoIP, вообще про конфигурирование звука и видео (даже просто X) ни единого слова!
Зато на 15-ти страницах вам подробно расскажут о системе резервного копирования Amanda (Вы ей пользуетесь? Отыщите её на Вашем любимом дистрибутиве:)
На протяжении всей книги краткие и чёткие перечни нужных действий ("Как добавить нового пользователя? Как добавить новый хост в DNS?") перемежаются обильными словоизлияниями на тему доменных имён, спама, ленточных накопителей, внутреннего устройства винчестера ("Это, дети, пласти-ины, а вот это -- головки!^^") и экскурсов в историю ("Как это было")...
Мне думается, что популярность этой книги обусловлена тем, что она появилась на русском языке в эпоху, когда по Юниксу практически никаких книг вообще не было, а вовсе не какими-то её выдающимися уникальными достоинствами.
Книга не свободна от откровенных ляпов. О.config ядра Linux: "Как видите, содержимое файла не слишком понятно; не даётся никаких пояснений относительно того, что означают тэги CONFIG." Заглянуть в Documentation/Configure.help умудрённые опытом и регалиями авторы (один из которых "имеет высшую степень технической сертификации Cisco") не догадались. Кстати, книга обильно пересыпана скрытой рекламой, призывающей покупать те или иные IT-продукты, особенно Cisco PIX. Уверен, что авторам бестселлера хорошо заплатили.
Как учебник по сетям -- книга никакая. Хотя, наверно, внятнее, чем творение Кирха и Доусона. Возьмите лучше любое руководство по подготовке к CCNA и будьте счастливы, а если Вы уже читали Немет и Ко., то сразу почувствуете, что такое настоящий учебник.
Перевод на русский язык: без претензий.
Плюсы: много заслуживающих внимания советов сисадмину, полезных в повседневной жизни. Готовые краткие руководства по решению типовых сисадминских задач. Есть хорошие описания системного софта (например, BIND (и DNS вообще); Syslog; почтовой подсистемы вообще и Sendmail и Postfix, в частности; NFS; Apache; множества демонов и пр.)
Минусы: полное молчание о многих важнейших задачах наших дней (особенно это касается мультимедийных задач). Приводятся описания конкретного софта, но ни слова не сообщается, как из обилия софта, решающего одну и ту же задачу, грамотно выбрать самый подходящий. То же касается и настроек системы (как грамотно выбрать файловую систему под задачу? Как её настроить? Молчок.)
Как учебник книга посредственна и по подбору материала и по его изложению.
Резюме: необременительное ленивое чтиво начинающего сисадмина, шпаргалка для опытного. В качестве систематического учебника с заботой об ученике лучше выбрать что-то другое на соответствующую конкретную тему, благо сейчас (2007 г.) есть из чего.
Жольнай К.С.- продвинутый новичок (22/03/2007): Кладезь мудрости. Следущее, что нужно иметь после "Запускаем Linux". + Много, подробно и по делу. Навыки: Админ *nix-систем, не для чайников (всю еше не осилил). Оценка: 5, маст хэв.

The latest edition of this best-selling favorite is loaded with advice about almost every aspect of Unix, covering all the new technologies that users need to know. In addition to vital information on Linux, Darwin, and BSD, Unix Power Tools 3rd Edition now offers more coverage of bash, zsh, and other new shells, along with discussions about modern utilities and applications. Several sections focus on security and Internet access. And there is a new chapter on access to Unix from Windows, addressing the heterogeneous nature of systems today. You’ll also find expanded coverage of software installation and packaging, as well as basic information on Perl and Python.

Unix Power Tools 3rd Edition is a browser’s book…like a magazine that you don’t read from start to finish, but leaf through repeatedly until you realize that you’ve read it all. Bursting with cross-references, interesting sidebars explore syntax or point out other directions for exploration, including relevant technical details that might not be immediately apparent. The book includes articles abstracted from other O’Reilly books, new information that highlights program tricks and gotchas, tips posted to the Net over the years, and other accumulated wisdom.

Affectionately referred to by readers as “the” Unix book, UNIX Power Tools provides access to information every Unix user is going to need to know. It will help you think creatively about UNIX, and will help you get to the point where you can analyze your own problems. Your own solutions won’t be far behind.

Table of Contents

How to Use This Book

Part I. Basic Unix Environment

1. Introduction
1.1 What’s Special About Unix?
1.2 Power Grows on You
1.3 The Core of Unix
1.4 Communication with Unix
1.5 Programs Are Designed to Work Together
1.6 There Are Many Shells
1.7 Which Shell Am I Running?
1.8 Anyone Can Program the Shell
1.9 Internal and External Commands
1.10 The Kernel and Daemons
1.11 Filenames
1.12 Filename Extensions
1.13 Wildcards
1.14 The Tree Structure of the Filesystem
1.15 Your Home Directory
1.16 Making Pathnames
1.17 File Access Permissions
1.18 The Superuser (Root)
1.19 When Is a File Not a File?
1.20 Scripting
1.21 Unix Networking and Communications
1.22 The X Window System

2. Getting Help
2.1 The man Command
2.2 whatis: One-Line Command Summaries
2.3 whereis: Finding Where a Command Is Located
2.4 Searching Online Manual Pages
2.5 How Unix Systems Remember Their Names
2.6 Which Version Am I Using?
2.7 What tty Am I On?
2.8 Who’s On?
2.9 The info Command

Part II. Customizing Your Environment

3. Setting Up Your Unix Shell
3.1 What Happens When You Log In
3.2 The Mac OS X Terminal Application
3.3 Shell Setup Files-Which, Where, and Why
3.4 Login Shells, Interactive Shells
3.5 What Goes in Shell Setup Files?
3.6 Tip for Changing Account Setup: Keep a Shell Ready
3.7 Use Absolute Pathnames in Shell Setup Files
3.8 Setup Files Aren’t Read When You Want?
3.9 Gotchas in set prompt Test
3.10 Automatic Setups for Different Terminals
3.11 Terminal Setup: Testing TERM
3.12 Terminal Setup: Testing Remote Hostname and X Display
3.13 Terminal Setup: Testing Port
3.14 Terminal Setup: Testing Environment Variables
3.15 Terminal Setup: Searching Terminal Table
3.16 Terminal Setup: Testing Window Size
3.17 Terminal Setup: Setting and Testing Window Name
3.18 A .cshrc.$HOST File for Per Host Setup
3.19 Making a “Login” Shell
3.20 RC Files
3.21 Make Your Own Manpages Without Learning troff
3.22 Writing a Simple Manpage with the -man Macros

4. Interacting with Your Environment
4.1 Basics of Setting the Prompt
4.2 Static Prompts
4.3 Dynamic Prompts
4.4 Simulating Dynamic Prompts
4.5 C-Shell Prompt Causes Problems in vi, rsh, etc.
4.6 Faster Prompt Setting with Built-ins
4.7 Multiline Shell Prompts
4.8 Session Info in Window Title or Status Line
4.9 A “Menu Prompt” for Naive Users
4.10 Highlighting and Color in Shell Prompts
4.11 Right-Side Prompts
4.12 Show Subshell Level with $SHLVL
4.13 What Good Is a Blank Shell Prompt?
4.14 dirs in Your Prompt: Better Than $cwd
4.15 External Commands Send Signals to Set Variables
4.16 Preprompt, Pre-execution, and Periodic Commands
4.17 Running Commands When You Log Out
4.18 Running Commands at Bourne/Korn Shell Logout
4.19 Stop Accidental Bourne-Shell Logouts

5. Getting the Most out of Terminals, xterm, and X Windows
5.1 There’s a Lot to Know About Terminals
5.2 The Idea of a Terminal Database
5.3 Setting the Terminal Type When You Log In
5.4 Querying Your Terminal Type: qterm
5.5 Querying Your xterm Size: resize
5.6 Checklist: Terminal Hangs When I Log In
5.7 Find Out Terminal Settings with stty
5.8 Setting Your Erase, Kill, and Interrupt Characters
5.9 Working with xterm and Friends
5.10 Login xterms and rxvts
5.11 Working with Scrollbars
5.12 How Many Lines to Save?
5.13 Simple Copy and Paste in xterm
5.14 Defining What Makes Up a Word for Selection Purposes
5.15 Setting the Titlebar and Icon Text
5.16 The Simple Way to Pick a Font
5.17 The xterm Menus
5.18 Changing Fonts Dynamically
5.19 Working with xclipboard
5.20 Problems with Large Selections
5.21 Tips for Copy and Paste Between Windows
5.22 Running a Single Command with xterm -e
5.23 Don’t Quote Arguments to xterm -e

6. Your X Environment
6.1 Defining Keys and Button Presses with xmodmap
6.2 Using xev to Learn Keysym Mappings
6.3 X Resource Syntax
6.4 X Event Translations
6.5 Setting X Resources: Overview
6.6 Setting Resources with the -xrm Option
6.7 How -name Affects Resources
6.8 Setting Resources with xrdb
6.9 Listing the Current Resources for a Client: appres
6.10 Starting Remote X Clients

Part III. Working with Files and Directories

7. Directory Organization
7.1 What? Me, Organized?
7.2 Many Homes
7.3 Access to Directories
7.4 A bin Directory for Your Programs and Scripts
7.5 Private (Personal) Directories
7.6 Naming Files
7.7 Make More Directories!
7.8 Making Directories Made Easier

8. Directories and Files
8.1 Everything but the find Command
8.2 The Three Unix File Times
8.3 Finding Oldest or Newest Files with ls -t and ls -u
8.4 List All Subdirectories with ls -R
8.5 The ls -d Option
8.6 Color ls
8.7 Some GNU ls Features
8.8 A csh Alias to List Recently Changed Files
8.9 Showing Hidden Files with ls -A and -a
8.10 Useful ls Aliases
8.11 Can’t Access a File? Look for Spaces in the Name
8.12 Showing Nonprintable Characters in Filenames
8.13 Counting Files by Types
8.14 Listing Files by Age and Size
8.15 newer: Print the Name of the Newest File
8.16 oldlinks: Find Unconnected Symbolic Links
8.17 Picking a Unique Filename Automatically

9. Finding Files with find
9.1 How to Use find
9.2 Delving Through a Deep Directory Tree
9.3 Don’t Forget -print
9.4 Looking for Files with Particular Names
9.5 Searching for Old Files
9.6 Be an Expert on find Search Operators
9.7 The Times That find Finds
9.8 Exact File-Time Comparisons
9.9 Running Commands on What You Find
9.10 Using -exec to Create Custom Tests
9.11 Custom -exec Tests Applied
9.12 Finding Many Things with One Command
9.13 Searching for Files by Type
9.14 Searching for Files by Size
9.15 Searching for Files by Permission
9.16 Searching by Owner and Group
9.17 Duplicating a Directory Tree
9.18 Using “Fast find” Databases
9.19 Wildcards with “Fast find” Database
9.20 Finding Files (Much) Faster with a find Database
9.21 grepping a Directory Tree
9.22 lookfor: Which File Has That Word?
9.23 Using Shell Arrays to Browse Directories
9.24 Finding the (Hard) Links to a File
9.25 Finding Files with -prune
9.26 Quick finds in the Current Directory
9.27 Skipping Parts of a Tree in find
9.28 Keeping find from Searching Networked Filesystem

10. Linking, Renaming, and Copying Files
10.1 What’s So Complicated About Copying Files
10.2 What’s Really in a Directory?
10.3 Files with Two or More Names
10.4 More About Links
10.5 Creating and Removing Links
10.6 Stale Symbolic Links
10.7 Linking Directories
10.8 Showing the Actual Filenames for Symbolic Links
10.9 Renaming, Copying, or Comparing a Set of Files
10.10 Renaming a List of Files Interactively
10.11 One More Way to Do It
10.12 Copying Directory Trees with cp -r
10.13 Copying Directory Trees with tar and Pipes

11. Comparing Files
11.1 Checking Differences with diff
11.2 Comparing Three Different Versions with diff3
11.3 Context diffs
11.4 Side-by-Side diffs: sdiff
11.5 Choosing Sides with sdiff
11.6 Problems with diff and Tabstops
11.7 cmp and diff
11.8 Comparing Two Files with comm
11.9 More Friendly comm Output
11.10 make Isn’t Just for Programmers!
11.11 Even More Uses for make

12. Showing What’s in a File
12.1 Cracking the Nut
12.2 What Good Is a cat?
12.3 “less” is More
12.4 Show Nonprinting Characters with cat -v or od -c
12.5 What’s in That Whitespace?
12.6 Finding File Types
12.7 Squash Extra Blank Lines
12.8 How to Look at the End of a File: tail
12.9 Finer Control on tail
12.10 How to Look at Files as They Grow
12.11 GNU tail File Following
12.12 Printing the Top of a File
12.13 Numbering Lines

13. Searching Through Files
13.1 Different Versions of grep
13.2 Searching for Text with grep
13.3 Finding Text That Doesn’t Match
13.4 Extended Searching for Text with egrep
13.5 grepping for a List of Patterns
13.6 Approximate grep: agrep
13.7 Search RCS Files with rcsgrep
13.8 GNU Context greps
13.9 A Multiline Context grep Using sed
13.10 Compound Searches
13.11 Narrowing a Search Quickly
13.12 Faking Case-Insensitive Searches
13.13 Finding a Character in a Column
13.14 Fast Searches and Spelling Checks with “look”
13.15 Finding Words Inside Binary Files
13.16 A Highlighting grep

14. Removing Files
14.1 The Cycle of Creation and Destruction
14.2 How Unix Keeps Track of Files: Inodes
14.3 rm and Its Dangers
14.4 Tricks for Making rm Safer
14.5 Answer “Yes” or “No” Forever with yes
14.6 Remove Some, Leave Some
14.7 A Faster Way to Remove Files Interactively
14.8 Safer File Deletion in Some Directories
14.9 Safe Delete: Pros and Cons
14.10 Deletion with Prejudice: rm -f
14.11 Deleting Files with Odd Names
14.12 Using Wildcards to Delete Files with Strange Names
14.13 Handling a Filename Starting with a Dash (-)
14.14 Using unlink to Remove a File with a Strange Name
14.15 Removing a Strange File by its i-number
14.16 Problems Deleting Directories
14.17 Deleting Stale Files
14.18 Removing Every File but One
14.19 Using find to Clear Out Unneeded Files

15. Optimizing Disk Space
15.1 Disk Space Is Cheap
15.2 Instead of Removing a File, Empty It
15.3 Save Space with “Bit Bucket” Log Files and Mailboxes
15.4 Save Space with a Link
15.5 Limiting File Sizes
15.6 Compressing Files to Save Space
15.7 Save Space: tar and compress a Directory Tree
15.8 How Much Disk Space?
15.9 Compressing a Directory Tree: Fine-Tuning
15.10 Save Space in Executable Files with strip
15.11 Disk Quotas

Part IV. Basic Editing

16. Spell Checking, Word Counting, and Textual Analysis
16.1 The Unix spell Command
16.2 Check Spelling Interactively with ispell
16.3 How Do I Spell That Word?
16.4 Inside spell
16.5 Adding Words to ispell’s Dictionary
16.6 Counting Lines, Words, and Characters: wc
16.7 Find a a Doubled Word
16.8 Looking for Closure
16.9 Just the Words, Please

17. vi Tips and Tricks
17.1 The vi Editor: Why So Much Material?
17.2 What We Cover
17.3 Editing Multiple Files with vi
17.4 Edits Between Files
17.5 Local Settings for vi
17.6 Using Buffers to Move or Copy Text
17.7 Get Back What You Deleted with Numbered Buffers
17.8 Using Search Patterns and Global Commands
17.9 Confirming Substitutions in vi
17.10 Keep Your Original File, Write to a New File
17.11 Saving Part of a File
17.12 Appending to an Existing File
17.13 Moving Blocks of Text by Patterns
17.14 Useful Global Commands (with Pattern Matches)
17.15 Counting Occurrences; Stopping Search Wraps
17.16 Capitalizing Every Word on a Line
17.17 Per-File Setups in Separate Files
17.18 Filtering Text Through a Unix Command
17.19 vi File Recovery Versus Networked Filesystems
17.20 Be Careful with vi -r Recovered Buffers
17.21 Shell Escapes: Running One Unix Command While Using Another
17.22 vi Compound Searches
17.23 vi Word Abbreviation
17.24 Using vi Abbreviations as Commands (Cut and Paste Between vi’s)
17.25 Fixing Typos with vi Abbreviations
17.26 vi Line Commands Versus Character Commands
17.27 Out of Temporary Space? Use Another Directory
17.28 Neatening Lines
17.29 Finding Your Place with Undo
17.30 Setting Up vi with the .exrc File

18. Creating Custom Commands in vi
18.1 Why Type More Than You Have To?
18.2 Save Time and Typing with the vi map Commands
18.3 What You Lose When You Use map!
18.4 vi @-Functions
18.5 Keymaps for Pasting into a Window Running vi
18.6 Protecting Keys from Interpretation by ex
18.7 Maps for Repeated Edits
18.8 More Examples of Mapping Keys in vi
18.9 Repeating a vi Keymap
18.10 Typing in Uppercase Without CAPS LOCK
18.11 Text-Input Mode Cursor Motion with No Arrow Keys
18.12 Don’t Lose Important Functions with vi Maps: Use noremap
18.13 vi Macro for Splitting Long Lines
18.14 File-Backup Macros

19. GNU Emacs
19.1 Emacs: The Other Editor
19.2 Emacs Features: A Laundry List
19.3 Customizations and How to Avoid Them
19.4 Backup and Auto-Save Files
19.5 Putting Emacs in Overwrite Mode
19.6 Command Completion
19.7 Mike’s Favorite Timesavers
19.8 Rational Searches
19.9 Unset PWD Before Using Emacs
19.10 Inserting Binary Characters into Files
19.11 Using Word-Abbreviation Mode
19.12 Directories for Emacs Hacks
19.13 An Absurd Amusement

20. Batch Editing
20.1 Why Line Editors Aren’t Dinosaurs
20.2 Writing Editing Scripts
20.3 Line Addressing
20.4 Useful ex Commands
20.5 Running Editing Scripts Within vi
20.6 Change Many Files by Editing Just One
20.7 ed/ex Batch Edits: A Typical Example
20.8 Batch Editing Gotcha: Editors Fail on Big Files
20.9 patch: Generalized Updating of Files That Differ
20.10 Quick Reference: awk
20.11 Versions of awk

21. You Can’t Quite Call This Editing
21.1 And Why Not?
21.2 Neatening Text with fmt
21.3 Alternatives to fmt
21.4 Clean Up Program Comment Blocks
21.5 Remove Mail/News Headers with behead
21.6 Low-Level File Butchery with dd
21.7 offset: Indent Text
21.8 Centering Lines in a File
21.9 Splitting Files at Fixed Points: split
21.10 Splitting Files by Context: csplit
21.11 Hacking on Characters with tr
21.12 Encoding “Binary” Files into ASCII
21.13 Text Conversion with dd
21.14 Cutting Columns or Fields
21.15 Making Text in Columns with pr
21.16 Make Columns Automatically with column
21.17 Straightening Jagged Columns
21.18 Pasting Things in Columns
21.19 Joining Lines with join
21.20 What Is (or Isn’t) Unique?
21.21 Rotating Text

22. Sorting
22.1 Putting Things in Order
22.2 Sort Fields: How sort Sorts
22.3 Changing the sort Field Delimiter
22.4 Confusion with Whitespace Field Delimiters
22.5 Alphabetic and Numeric Sorting
22.6 Miscellaneous sort Hints
22.7 lensort: Sort Lines by Length
22.8 Sorting a List of People by Last Name

Part V. Processes and the Kernel

23. Job Control
23.1 Job Control in a Nutshell
23.2 Job Control Basics
23.3 Using jobs Effectively
23.4 Some Gotchas with Job Control
23.5 The “Current Job” Isn’t Always What You Expect
23.6 Job Control and autowrite: Real Timesavers!
23.7 System Overloaded? Try Stopping Some Jobs
23.8 Notification When Jobs Change State
23.9 Stop Background Output with stty tostop
23.10 nohup
23.11 Disowning Processes
23.12 Linux Virtual Consoles
23.13 Stopping Remote Login Sessions

24. Starting, Stopping, and Killing Processes
24.1 What’s in This Chapter
24.2 fork and exec
24.3 Managing Processes: Overall Concepts
24.4 Subshells
24.5 The ps Command
24.6 The Controlling Terminal
24.7 Tracking Down Processes
24.8 Why ps Prints Some Commands in Parentheses
24.9 The /proc Filesystem
24.10 What Are Signals?
24.11 Killing Foreground Jobs
24.12 Destroying Processes with kill
24.13 Printer Queue Watcher: A Restartable Daemon Shell Script
24.14 Killing All Your Processes
24.15 Killing Processes by Name?
24.16 Kill Processes Interactively
24.17 Processes Out of Control? Just STOP Them
24.18 Cleaning Up an Unkillable Process
24.19 Why You Can’t Kill a Zombie
24.20 The Process Chain to Your Window
24.21 Terminal Windows Without Shells
24.22 Close a Window by Killing Its Process(es)

25. Delayed Execution
25.1 Building Software Robots the Easy Way
25.2 Periodic Program Execution: The cron Facility
25.3 Adding crontab Entries
25.4 Including Standard Input Within a cron Entry
25.5 The at Command
25.6 Making Your at Jobs Quiet
25.7 Checking and Removing Jobs
25.8 Avoiding Other at and cron Jobs
25.9 Waiting a Little While: sleep

26. System Performance and Profiling
26.1 Timing Is Everything
26.2 Timing Programs
26.3 What Commands Are Running and How Long Do They Take?
26.4 Checking System Load: uptime
26.5 Know When to Be “nice” to Other Users-and When Not To
26.6 A nice Gotcha
26.7 Changing a Running Job’s Niceness

Part VI. Scripting

27. Shell Interpretation
27.1 What the Shell Does
27.2 How the Shell Executes Other Commands
27.3 What’s a Shell, Anyway?
27.4 Command Evaluation and Accidentally Overwriting Files
27.5 Output Command-Line Arguments One by One
27.6 Controlling Shell Command Searches
27.7 Wildcards Inside Aliases
27.8 eval: When You Need Another Chance
27.9 Which One Will bash Use?
27.10 Which One Will the C Shell Use?
27.11 Is It “2>&1 file” or “> file 2>&1″? Why?
27.12 Bourne Shell Quoting
27.13 Differences Between Bourne and C Shell Quoting
27.14 Quoting Special Characters in Filenames
27.15 Verbose and Echo Settings Show Quoting
27.16 Here Documents
27.17 “Special” Characters and Operators
27.18 How Many Backslashes?

28. Saving Time on the Command Line
28.1 What’s Special About the Unix Command Line
28.2 Reprinting Your Command Line with CTRL-r
28.3 Use Wildcards to Create Files?
28.4 Build Strings with { }
28.5 String Editing (Colon) Operators
28.6 Automatic Completion
28.7 Don’t Match Useless Files in Filename Completion
28.8 Repeating Commands
28.9 Repeating and Varying Commands
28.10 Repeating a Command with Copy-and-Paste
28.11 Repeating a Time-Varying Command
28.12 Multiline Commands, Secondary Prompts
28.13 Here Document Example #1: Unformatted Form Letters
28.14 Command Substitution
28.15 Handling Lots of Text with Temporary Files
28.16 Separating Commands with Semicolons
28.17 Dealing with Too Many Arguments
28.18 Expect

29. Custom Commands
29.1 Creating Custom Commands
29.2 Introduction to Shell Aliases
29.3 C-Shell Aliases with Command-Line Arguments
29.4 Setting and Unsetting Bourne-Type Aliases
29.5 Korn-Shell Aliases
29.6 zsh Aliases
29.7 Sourceable Scripts
29.8 Avoiding C-Shell Alias Loops
29.9 How to Put if-then-else in a C-Shell Alias
29.10 Fix Quoting in csh Aliases with makealias and quote
29.11 Shell Function Basics
29.12 Shell Function Specifics
29.13 Propagating Shell Functions
29.14 Simulated Bourne Shell Functions and Aliases

30. The Use of History
30.1 The Lessons of History
30.2 History in a Nutshell
30.3 My Favorite Is !$
30.4 My Favorite Is !:n*
30.5 My Favorite Is ^^
30.6 Using !$ for Safety with Wildcards
30.7 History by Number
30.8 History Substitutions
30.9 Repeating a Cycle of Commands
30.10 Running a Series of Commands on a File
30.11 Check Your History First with:p
30.12 Picking Up Where You Left Off
30.13 Pass History to Another Shell
30.14 Shell Command-Line Editing
30.15 Changing History Characters with histchars
30.16 Instead of Changing History Characters

31. Moving Around in a Hurry
31.1 Getting Around the Filesystem
31.2 Using Relative and Absolute Pathnames
31.3 What Good Is a Current Directory?
31.4 How Does Unix Find Your Current Directory?
31.5 Saving Time When You Change Directories: cdpath
31.6 Loop Control: break and continue
31.7 The Shells’ pushd and popd Commands
31.8 Nice Aliases for pushd
31.9 Quick cds with Aliases
31.10 cd by Directory Initials
31.11 Finding (Anyone’s) Home Directory, Quickly
31.12 Marking Your Place with a Shell Variable
31.13 Automatic Setup When You Enter/Exit a Directory

32. Regular Expressions (Pattern Matching)
32.1 That’s an Expression
32.2 Don’t Confuse Regular Expressions with Wildcards
32.3 Understanding Expressions
32.4 Using Metacharacters in Regular Expressions
32.5 Regular Expressions: The Anchor Characters ^ and $
32.6 Regular Expressions: Matching a Character with a Character Set
32.7 Regular Expressions: Match Any Character with . (Dot)
32.8 Regular Expressions: Specifying a Range of Characters with [-]
32.9 Regular Expressions: Exceptions in a Character Set
32.10 Regular Expressions: Repeating Character Sets with *
32.11 Regular Expressions: Matching a Specific Number of Sets with \ { and \ }
32.12 Regular Expressions: Matching Words with \ < and \ >
32.13 Regular Expressions: Remembering Patterns with \ (,\), and \1
32.14 Regular Expressions: Potential Problems
32.15 Extended Regular Expressions
32.16 Getting Regular Expressions Right
32.17 Just What Does a Regular Expression Match?
32.18 Limiting the Extent of a Match
32.19 I Never Meta Character I Didn’t Like
32.20 Valid Metacharacters for Different Unix Programs
32.21 Pattern Matching Quick Reference with Examples

33. Wildcards
33.1 File-Naming Wildcards
33.2 Filename Wildcards in a Nutshell
33.3 Who Handles Wildcards?
33.4 What if a Wildcard Doesn’t Match?
33.5 Maybe You Shouldn’t Use Wildcards in Pathnames
33.6 Getting a List of Matching Files with grep -l
33.7 Getting a List of Nonmatching Files
33.8 nom: List Files That Don’t Match a Wildcard

34. The sed Stream Editor
34.1 sed Sermon^H^H^H^H^H^HSummary
34.2 Two Things You Must Know About sed
34.3 Invoking sed
34.4 Testing and Using a sed Script: checksed, runsed
34.5 sed Addressing Basics
34.6 Order of Commands in a Script
34.7 One Thing at a Time
34.8 Delimiting a Regular Expression
34.9 Newlines in a sed Replacement
34.10 Referencing the Search String in a Replacement
34.11 Referencing Portions of a Search String
34.12 Search and Replacement: One Match Among Many
34.13 Transformations on Text
34.14 Hold Space: The Set-Aside Buffer
34.15 Transforming Part of a Line
34.16 Making Edits Across Line Boundaries
34.17 The Deliberate Scrivener
34.18 Searching for Patterns Split Across Lines
34.19 Multiline Delete
34.20 Making Edits Everywhere Except-
34.21 The sed Test Command
34.22 Uses of the sed Quit Command
34.23 Dangers of the sed Quit Command
34.24 sed Newlines, Quoting, and Backslashes in a Shell Script

35. Shell Programming for the Uninitiated
35.1 Writing a Simple Shell Program
35.2 Everyone Should Learn Some Shell Programming
35.3 What Environment Variables Are Good For
35.4 Parent-Child Relationships
35.5 Predefined Environment Variables
35.6 The PATH Environment Variable
35.7 PATH and path
35.8 The DISPLAY Environment Variable
35.9 Shell Variables
35.10 Test String Values with Bourne-Shell case
35.11 Pattern Matching in case Statements
35.12 Exit Status of Unix Processes
35.13 Test Exit Status with the if Statement
35.14 Testing Your Success
35.15 Loops That Test Exit Status
35.16 Set Exit Status of a Shell (Script)
35.17 Trapping Exits Caused by Interrupts
35.18 read: Reading from the Keyboard
35.19 Shell Script “Wrappers” for awk, sed, etc.
35.20 Handling Command-Line Arguments in Shell Scripts
35.21 Handling Command-Line Arguments with a for Loop
35.22 Handling Arguments with while and shift
35.23 Loop Control: break and continue
35.24 Standard Command-Line Parsing
35.25 The Bourne Shell set Command
35.26 test: Testing Files and Strings
35.27 Picking a Name for a New Command
35.28 Finding a Program Name and Giving Your Program Multiple Names
35.29 Reading Files with the . and source Commands
35.30 Using Shell Functions in Shell Scripts

36. Shell Programming for the Initiated
36.1 Beyond the Basics
36.2 The Story of: # #!
36.3 Don’t Need a Shell for Your Script? Don’t Use One
36.4 Making #! Search the PATH
36.5 The exec Command
36.6 The Unappreciated Bourne Shell “:” Operator
36.7 Parameter Substitution
36.8 Save Disk Space and Programming: Multiple Names for a Program
36.9 Finding the Last Command-Line Argument
36.10 How to Unset All Command-Line Parameters
36.11 Standard Input to a for Loop
36.12 Making a for Loop with Multiple Variables
36.13 Using basename and dirname
36.14 A while Loop with Several Loop Control Commands
36.15 Overview: Open Files and File Descriptors
36.16 n>&m: Swap Standard Output and Standard Error
36.17 A Shell Can Read a Script from Its Standard Input, but-
36.18 Shell Scripts On-the-Fly from Standard Input
36.19 Quoted hereis Document Terminators: sh Versus csh
36.20 Turn Off echo for “Secret” Answers
36.21 Quick Reference: expr
36.22 Testing Characters in a String with expr
36.23 Grabbing Parts of a String
36.24 Nested Command Substitution
36.25 Testing Two Strings with One case Statement
36.26 Outputting Text to an X Window
36.27 Shell Lockfile

37. Shell Script Debugging and Gotchas
37.1 Tips for Debugging Shell Scripts
37.2 Bourne Shell Debugger Shows a Shell Variable
37.3 Stop Syntax Errors in Numeric Tests
37.4 Stop Syntax Errors in String Tests
37.5 Quoting and Command-Line Parameters
37.6 How Unix Keeps Time
37.7 Copy What You Do with script
37.8 Cleaning script Files
37.9 Making an Arbitrary-Size File for Testing

Part VII. Extending and Managing Your Environment

38. Backing Up Files
38.1 What Is This “Backup” Thing?
38.2 tar in a Nutshell
38.3 Make Your Own Backups
38.4 More Ways to Back Up
38.5 How to Make Backups to a Local Device
38.6 Restoring Files from Tape with tar
38.7 Using tar to a Remote Tape Drive
38.8 Using GNU tar with a Remote Tape Drive
38.9 On-Demand Incremental Backups of a Project
38.10 Using Wildcards with tar
38.11 Avoid Absolute Paths with tar
38.12 Getting tar’s Arguments in the Right Order
38.13 The cpio Tape Archiver
38.14 Industrial Strength Backups

39. Creating and Reading Archives
39.1 Packing Up and Moving
39.2 Using tar to Create and Unpack Archives
39.3 GNU tar Sampler
39.4 Managing and Sharing Files with RCS and CVS
39.5 RCS Basics
39.6 List RCS Revision Numbers with rcsrevs
39.7 CVS Basics
39.8 More CVS

40. Software Installation
40.1 /usr/bin and Other Software Directories
40.2 The Challenges of Software Installation on Unix
40.3 Which make?
40.4 Simplifying the make Process
40.5 Using Debian’s dselect
40.6 Installing Software with Debian’s Apt-Get
40.7 Interruptable gets with wget
40.8 The curl Application and One-Step GNU-Darwin Auto-Installer for OS X
40.9 Installation with FreeBSD Ports
40.10 Installing with FreeBSD Packages
40.11 Finding and Installing RPM Packaged Software

41. Perl
41.1 High-Octane Shell Scripting
41.2 Checking your Perl Installation
41.3 Compiling Perl from Scratch
41.4 Perl Boot Camp, Part 1: Typical Script Anatomy
41.5 Perl Boot Camp, Part 2: Variables and Data Types
41.6 Perl Boot Camp, Part 3: Branching and Looping
41.7 Perl Boot Camp, Part 4: Pattern Matching
41.8 Perl Boot Camp, Part 5: Perl Knows Unix
41.9 Perl Boot Camp, Part 6: Modules
41.10 Perl Boot Camp, Part 7: perldoc
41.11 CPAN
41.12 Make Custom grep Commands (etc.) with Perl
41.13 Perl and the Internet

42. Python
42.1 What Is Python?
42.2 Installation and Distutils
42.3 Python Basics
42.4 Python and the Web
42.5 urllib
42.6 urllib2
42.7 htmllib and HTMLParser
42.8 cgi
42.9 mod_python
42.10 What About Perl?

Part VIII. Communication and Connectivity

43. Redirecting Input and Output
43.1 Using Standard Input and Output
43.2 One Argument with a cat Isn’t Enough
43.3 Send (Only) Standard Error Down a Pipe
43.4 Problems Piping to a Pager
43.5 Redirection in C Shell: Capture Errors, Too?
43.6 Safe I/O Redirection with noclobber
43.7 The () Subshell Operators
43.8 Send Output Two or More Places
43.9 How to tee Several Commands into One Place
43.10 Redirecting Output to More Than One Place
43.11 Named Pipes: FIFOs
43.12 What Can You Do with an Empty File?

44. Devices
44.1 Quick Introduction to Hardware
44.2 Reading Kernel Boot Output
44.3 Basic Kernel Configuration
44.4 Disk Partitioning
44.5 Filesystem Types and /etc/fstab
44.6 Mounting and Unmounting Removable Filesystems
44.7 Loopback Mounts
44.8 Network Devices-ifconfig
44.9 Mounting Network Filesystems-NFS, SMBFS
44.10 Win Is a Modem Not a Modem?
44.11 Setting Up a Dialup PPP Session
44.12 USB Configuration
44.13 Dealing with Sound Cards and Other Annoying Hardware
44.14 Decapitating Your Machine-Serial Consoles

45. Printing
45.1 Introduction to Printing
45.2 Introduction to Printing on Unix
45.3 Printer Control with lpc
45.4 Using Different Printers
45.5 Using Symbolic Links for Spooling
45.6 Formatting Plain Text: pr
45.7 Formatting Plain Text: enscript
45.8 Printing Over a Network
45.9 Printing Over Samba
45.10 Introduction to Typesetting
45.11 A Bit of Unix Typesetting History
45.12 Typesetting Manpages: nroff
45.13 Formatting Markup Languages- troff, LATEX, HTML, and So On
45.14 Printing Languages-PostScript, PCL, DVI, PDF
45.15 Converting Text Files into a Printing Language
45.16 Converting Typeset Files into a Printing Language
45.17 Converting Source Files Automagically Within the Spooler
45.18 The Common Unix Printing System (CUPS)
45.19 The Portable Bitmap Package

46. Connectivity
46.1 TCP/IP-IP Addresses and Ports
46.2 /etc/services Is Your Friend
46.3 Status and Troubleshooting
46.4 Where, Oh Where Did That Packet Go?
46.5 The Director of Operations: inetd
46.6 Secure Shell (SSH)
46.7 Configuring an Anonymous FTP Server
46.8 Mail-SMTP, POP, and IMAP
46.9 Domain Name Service (DNS)
46.10 Dynamic Host Configuration Protocol (DHCP)
46.11 Gateways and NAT
46.12 Firewalls
46.13 Gatewaying from a Personal LAN over a Modem

47. Connecting to MS Windows
47.1 Building Bridges
47.2 Installing and Configuring Samba
47.3 Securing Samba
47.4 SWAT and GUI SMB Browsers
47.5 Printing with Samba
47.6 Connecting to SMB Shares from Unix
47.7 Sharing Desktops with VNC
47.8 Of Emulators and APIs
47.9 Citrix: Making Windows Multiuser

Part IX. Security

48. Security Basics
48.1 Understanding Points of Vulnerability
48.2 CERT Security Checklists
48.3 Keeping Up with Security Alerts
48.4 What We Mean by Buffer Overflow
48.5 What We Mean by DoS
48.6 Beware of Sluggish Performance
48.7 Intruder Detection
48.8 Importance of MOTD
48.9 The Linux proc Filesystem
48.10 Disabling inetd
48.11 Disallow rlogin and rsh
48.12 TCP Wrappers

49. Root, Group, and User Management
49.1 Unix User/Group Infrastructure
49.2 When Does a User Become a User
49.3 Forgetting the root Password
49.4 Setting an Exact umask
49.5 Group Permissions in a Directory with the setgid Bit
49.6 Groups and Group Ownership
49.7 Add Users to a Group to Deny Permissions
49.8 Care and Feeding of SUID and SGID Scripts
49.9 Substitute Identity with su
49.10 Never Log In as root
49.11 Providing Superpowers with sudo
49.12 Enabling Root in Darwin
49.13 Disable logins

50. File Security, Ownership, and Sharing
50.1 Introduction to File Ownership and Security
50.2 Tutorial on File and Directory Permissions
50.3 Who Will Own a New File?
50.4 Protecting Files with the Sticky Bit
50.5 Using chmod to Change File Permission
50.6 The Handy chmod = Operator
50.7 Protect Important Files: Make Them Unwritable
50.8 cx, cw, c-w: Quick File Permission Changes
50.9 A Loophole: Modifying Files Without Write Access
50.10 A Directory That People Can Access but Can’t List
50.11 Juggling Permissions
50.12 File Verification with md5sum
50.13 Shell Scripts Must Be Readable and (Usually) Executable
50.14 Why Can’t You Change File Ownership?
50.15 How to Change File Ownership Without chown

51. SSH
51.1 Enabling Remote Access on Mac OS X
51.2 Protecting Access Through SSH
51.3 Free SSH with OpenSSH
51.4 SSH Problems and Solutions
51.5 General and Authentication Problems
51.6 Key and Agent Problems
51.7 Server and Client Problems

http://rapidshare.de/files/11397297/O_Reilly_-_Unix_-_Unix_Power_Tools.rar.htm


Sponsored High Speed Downloads

Loaded with even more practical advice about almost every aspect of UNIX, this Ideal for UNIX users who hunger for technical -- yet accessible -- information, UNIX Power Tools, 2nd Edition , consists of tips, tricks, concepts, and freeware (CD-ROM included). It also covers add-on utilities and how to take advantage of clever features in the most popular UNIX utilities.

Loaded with even more practical advice about almost every aspect of UNIX, this edition addresses the technology that UNIX users face today, differing from the first edition in a number of important ways.

First, it slants the blend of options and commands more toward the POSIX utilities, including the GNU versions; the bash and tcsh shells have greater coverage, but we"ve kept the first edition"s emphasis on the core concepts of sh and csh that will help you use all UNIX shells; and, Perl is more important than awk these days, so we"ve de-emphasized awk in this edition.

This is a browser"s book...like a magazine that you don"t read from start to finish, but leaf through repeatedly until you realize that you"ve read it all. The book is structured so that it bursts at the seams with cross references. Interesting "sidebars" explore syntax or point out other directions for exploration, including relevant technical details that might not be immediately apparent. You"ll find articles abstracted from other O"Reilly books, new information that highlights program "tricks" and "gotchas," tips posted to the Net over the years, and other accumulated wisdom.

The 53 chapters in this book discuss topics like file management, text editors, shell programming -- even office automation. Overall, there"s plenty of material here to satisfy even the most voracious appetites. The bottom line? UNIX Power Tools is loaded with practical advice about almost every aspect of UNIX. It will help you think creatively about UNIX, and will help you get to the point where you can analyze your own problems. Your own solutions won"t be far behind.

The CD-ROM includes all of the scripts and aliases from the book, plus perl , GNU emacs , netpbm (graphics manipulation utilities), ispell ,screen , the sc spreadsheet, and about 60 other freeware programs. In addition to the source code, all the software is precompiled for Sun4, Digital UNIX, IBM AIX, HP/UX, Red Hat Linux, Solaris, and SCO UNIX.