UNIX for programmers and users / (Record no. 2902)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 18256cam a22001814a 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9788177583595 (pb) |
040 ## - CATALOGING SOURCE | |
Transcribing agency | CUS |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.276 |
Item number | GLA/U |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Glass, Graham. |
245 10 - TITLE STATEMENT | |
Title | UNIX for programmers and users / |
Statement of responsibility, etc. | Graham Glass and King Ables. |
250 ## - EDITION STATEMENT | |
Edition statement | 3rd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | Upper Saddle River, N.J. : |
Name of publisher, distributor, etc. | Pearson Education, |
Date of publication, distribution, etc. | c2003. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxxi, 687 p. |
Other physical details | ill. ; |
Dimensions | 24 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references (p. 673-674) and index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | CHAPTER 1 What is UNIX?<br/>Motivation<br/>Prerequisites<br/>Objectives<br/>Presentation<br/>Computer Systems<br/>The Hardware<br/>Central Processing Unit (CPU)<br/>Random-Access Memory (RAM)<br/>Read-Only Memory (ROM)<br/>Disk<br/>CD-ROM Drive<br/>Monitor<br/>Graphics Card<br/>Keyboard<br/>Mouse<br/>Printer<br/>Tape<br/>Modem<br/>Ethernet Interface<br/>Other Peripherals<br/>Operating Systems<br/>The Software<br/>Sharing Resources<br/>Communication<br/>Utilities<br/>Programmer Support<br/>Standards<br/>List of UNIX Features (A Recap)<br/>UNIX Philosophies<br/>UNIX Yesterday<br/>UNIX Today<br/>UNIX Tomorrow<br/>The Rest of this Book<br/>Chapter Review<br/>Checklist<br/>' Quiz<br/>Exercise<br/>Project<br/>CHAPTER 2 UNIX Utilities for Nonprogrammers<br/>Motivation<br/>Prerequisites<br/>Objectives<br/>Presentation<br/>Utilities<br/>Shell Command<br/>Obtaining an account<br/>Logging In<br/>Shells<br/>Running a Utility<br/>Input, Output, and Error Channels<br/>Obtaining On-Line Help: man<br/>Special Characters<br/>Terminating a Process: Control-C<br/>Pausing Output: Control-SIControl-Q<br/>End of Input: Control-D<br/>Setting Your Password: passwd<br/>Logging Out<br/>Poetry in Motion: Exploring the File System<br/>Printing Your Shell's Current Working Directory: pwd<br/>Absolute and Relative Pathnames<br/>Creating a File<br/>Listing the Contents of a Directory: Is<br/>Listing a File: cat/more/page/head/tail<br/>Renaming a File: mv<br/>Making a Directory: mkdir<br/>Moving to a Directory: cd<br/>Copying a File: cp<br/>Editing a File: vi<br/>Deleting a Directory: rmdir<br/>Deleting a File: rm<br/>Printing a File: Ip/Ipstat/cancel<br/>Printing a File: Ipr/lpq/lprm<br/>Counting the Words in a File: wc<br/>File Attributes<br/>File Storage<br/>Filenames<br/>File Modification Time<br/>File Owner<br/>File Group<br/>File Types<br/>File Permissions<br/>Hard Link Count<br/>Groups<br/>Listing Your Groups: Groups<br/>Changing a File's Group: chgrp<br/>Changing a File's Permissions: chmod<br/>Changing a File's Owner: chown<br/>Changing Groups: newgrp<br/>Poetry in Motion: Epilogue<br/>Determining Your Terminal's Type: tset<br/>C shell<br/>Bourne/Korn/Bash shell<br/>C shell<br/>Bourne/Korn/Bash shell<br/>Changing a Terminal's Characteristics: stty<br/>Editing a File: vi<br/>Starting vi<br/>Text Entry Mode<br/>Command Mode<br/>Memory Buffer and Temporary Files<br/>Common Editing Features<br/>Cursor Movement<br/>Deleting Text<br/>Replacing Text<br/>Pasting Text<br/>Searching<br/>Searching and Replacing<br/>Saving and Loading Files<br/>Miscellaneous<br/>Customizing vi<br/>Keeping Your Customizations<br/>For More Information<br/>Editing a File: emacs<br/>Starting emacs<br/>emacs Commands<br/>Getting Out of Trouble<br/>Getting Help<br/>Leaving emacs<br/>emacs Modes<br/>Entering Text<br/>Common Editing Features<br/>Moving the Cursor<br/>Deleting, Pasting, and Undoing<br/>Searching<br/>Search and Replace<br/>Saving and Loading Files<br/>Miscellaneous<br/>For More Information<br/>Electronic Mail: mail/mailx<br/>Sending Mail<br/>Reading Mail<br/>Contacting the System Administrator<br/>Chapter Review<br/>Checklist<br/>Quiz<br/>Exercises<br/>Project<br/>CHAPTER 3 UNK Utilities for Power Users<br/>Motivation<br/>Prerequisites<br/>Objectives<br/>Presentation<br/>Utilities<br/>Introduction<br/>Filtering Files<br/>Filtering Patterns: egrep/ f grep/grep<br/>Removing Duplicate Lines: uniq<br/>Sorting Files: sort<br/>Comparing Files<br/>Testing for Sameness: cmp<br/>File Differences: dif f<br/>Finding Files: find<br/>Archives<br/>Copying Files: cpio<br/>Tape Archiving: tar<br/>Incremental Backups: dump and restore<br/>Scheduling Commands<br/>Periodic Execution: cron/crontab<br/>One-Time Execution: at<br/>Programmable Text Processing; awk<br/>awk Programs<br/>Accessing Individual Fields<br/>Begin and End<br/>Operators<br/>Variables<br/>Control Structures<br/>Extended Regular Expressions<br/>Condition Ranges<br/>Field Separators<br/>Built-in Functions<br/>Hard and Soft Links: In<br/>Identifying Shells: whoaini<br/>Substituting a User: su<br/>Checking for Mail: biff<br/>Transforming Files<br/>Compressing Files: compress/uncompress and gzip/gunzip<br/>File Encryption: crypt<br/>Stream Editing: sed<br/>Translating Characters: tr<br/>Converting Underline Sequences: ul<br/>Looking at Raw File Contents: od<br/>Mounting File Systems: mount/lunount<br/>Identifying Terminals: tty<br/>Text Formatting: nroff/troff/style/spell<br/>Timing Execution: time<br/>Rolling Your Own Programs: Perl<br/>Getting Perl<br/>Printing Text<br/>Variables, Strings, and Integers<br/>Arrays<br/>Mathematical and Logical Operators<br/>String Operators<br/>Comparison Operators<br/>If, While, For, and Foreach Loop Constructs<br/>File I/O<br/>Functions<br/>Library Functions<br/>Command-Line Arguments<br/>A Real-World Example<br/>Chapter Review<br/>Checklist<br/>Quiz<br/>Exercises<br/>Projects<br/>CHAPTER 4 The UNIX SheUs<br/>Motivation<br/>Prerequisites<br/>Objectives<br/>Presentation<br/>Utilities<br/>Shell Commands<br/>Introduction<br/>Shell Functionality<br/>Selecting a Shell<br/>Shell Operations<br/>Executable Files Versus Built-in Commands<br/>Displaying Information: echo<br/>Changing Directories: cd<br/>Metacharacters<br/>Redirection<br/>Output Redirection<br/>Input Redirection<br/>Filename Substitution (Wildcards)<br/>Pipes<br/>Command Substitution<br/>Sequences<br/>Conditional Sequences<br/>Grouping Commands<br/>Background Processing<br/>Redirecting Background Processes<br/>Redirecting Output<br/>Redirecting Input<br/>Shell Programs: Scripts<br/>Subshells<br/>Variables<br/>Quoting<br/>Here Documents<br/>Job Control<br/>Process Status: ps<br/>Signaling Processes: kill<br/>Waiting for Child Processes: wait<br/>Finding a Command: $path<br/>Overloading Standard Utilities<br/>Termination and Exit Codes<br/>Common Core Built-Ins<br/>eval<br/>exec<br/>shift<br/>umask<br/>Chapter Review<br/>Checklist<br/>Quiz<br/>Exercises<br/>Project<br/>CHAPTER 5 The Bourne Shell<br/>Motivation<br/>Prerequisites<br/>Objectives<br/>Presentation<br/>Utilities<br/>Shell Commands<br/>Introduction<br/>Start-Up<br/>Variables<br/>Creating/Assigning a Variable<br/>Accessing a Variable<br/>Reading a Variable from S^ndard Input<br/>Exporting Variables<br/>Read-Only Variables<br/>Predefined Local Variables<br/>Predefined Environment Variables<br/>Arithmetic<br/>Conditional Expressions<br/>Control Structures<br/>case .. in .. esac<br/>for .. do .. done<br/>if .. then .. fi<br/>trap<br/>until .. do .. done<br/>while .. done<br/>Sample Project: track<br/>Miscellaneous Built-Ins<br/>Read Command:.<br/>null Command<br/>Setting Shell Options: set<br/>Enhancements<br/>Sequenced Commands<br/>Command-Line Options<br/>Chapter Review<br/>Checklist<br/>Quiz<br/>Exercises<br/>Projects<br/>CHAPTER 6 The Kom Shell<br/>Motivation<br/>Prerequisites<br/>Objectives<br/>Presentation<br/>Shell Commands<br/>Introduction<br/>Start-Up<br/>Aliases<br/>Aliasing Built-in Commands<br/>Removing an Alias<br/>Predefined Aliases<br/>Some Useful Aliases<br/>Tracked Aliases<br/>Sharing Aliases<br/>History<br/>Numbered Commands<br/>Storage of Commands<br/>Command Reexecution<br/>Editing Commands<br/>Editing Commands<br/>The Built-in vi Editor<br/>The Built-in emacs/gmacs Editor<br/>Arithmetic<br/>Preventing Metacharacter Interpretation<br/>Return Values<br/>Hide Substitution<br/>Menus: select<br/>Functions<br/>Using Parameters<br/>Returning from a Function<br/>Context<br/>Local Variables<br/>Recursion<br/>Sharing Functions<br/>Enhanced Job Control<br/>Jobs<br/>Specifying a Job<br/>bg<br/>fg<br/>kill<br/>Enhancements<br/>Redirection<br/>Pipes<br/>Command Substitution<br/>Variables<br/>Formatting<br/>Case<br/>Type<br/>Miscellaneous<br/>Built-Ins<br/>Sample Project: Junk<br/>The Restricted Shell<br/>Command-Line Options<br/>Chapter Review<br/>Checklist<br/>Quiz<br/>Exercises<br/>Projects<br/>CHAPTER 7 The C Shell<br/>Motivation<br/>Prerequisites<br/>Objectives<br/>Presentation<br/>Shell Commands<br/>Introduction<br/>Start-Up<br/>Variables<br/>Creating and Assigning Simple Variables<br/>Accessing a Simple Variable<br/>Creating and Assigning List Variables<br/>Accessing a List Variable<br/>Building Lists<br/>Predefined Local Variables<br/>Creating and Assigning Environment Variables<br/>Predefined Environment Variables<br/>Expressions<br/>String Expressions<br/>Arithmetic Expressions<br/>File-Oriented Expressions<br/>Filename Completion<br/>Aliases<br/>Removing an Alias<br/>Useful Aliases<br/>Sharing Aliases<br/>Parameterized Aliases<br/>History<br/>Numbered Commands<br/>Storage of Commands<br/>Reading History<br/>Command Reexecution<br/>Accessing Pieces of History<br/>Accessing Portions of Filenames<br/>History Substitution<br/>Control Structures<br/>foreach .. end<br/>goto<br/>if .. then .. else .. endif<br/>onintr<br/>repeat<br/>switch .. case .• endsw<br/>while .. end<br/>Sample Project: Junk<br/>Enhancements<br/>Command Reexecution: A Shortcut<br/>Metacharacters: {}<br/>Filename Substitution<br/>Piping<br/>Job Control<br/>Terminating a Login Shell<br/>Built-Ins<br/>chdir<br/>glob<br/>source<br/>The Directory Stack<br/>The Hash Table<br/>Command-Line Options<br/>Chapter Review<br/>Checklist<br/>Quiz<br/>Exercises<br/>Project<br/>CHAPTER 8 The Bourne Again SheU<br/>Motivation<br/>Prerequisites<br/>Objectives<br/>Presentation<br/>Shell Commands<br/>Introduction<br/>Getting Bash<br/>Start-Up<br/>Variables<br/>Creating and Assigning a Simple Variable<br/>Accessing Simple Variables<br/>Creating and Assigning a List Variable<br/>Accessing List Variables<br/>Building Lists<br/>Destroying Lists<br/>Exporting Variables<br/>Predefined Variables<br/>Command Shortcuts<br/>Aliases<br/>Command History<br/>Autocompletion<br/>Arithmetic<br/>Conditional Expressions<br/>Arithmetic Tests<br/>String Comparisons<br/>File-Oriented Expressions<br/>Control Structures<br/>case .. in .. esac<br/>if .. then .. elif .. then .. else .. fi<br/>for .. do .. done<br/>while/until .. do .. done<br/>Directory Stack<br/>Job Control<br/>Functions<br/>Miscellaneous Built-in Commands<br/>Command-Line Options<br/>Chapter Review<br/>Checklist<br/>Quiz<br/>Exercise<br/>Project<br/>CHAPTER 9 Networking<br/>Motivation<br/>Prerequisites<br/>Objectives<br/>Presentation<br/>Commands<br/>Introduction<br/>Building a Network<br/>Ethernets<br/>Bridges<br/>Routers<br/>Gateways<br/>Internetworking<br/>Packet Switching<br/>Internet Addresses<br/>Naming<br/>Routing<br/>Security<br/>Ports and Common Services<br/>Network Programming<br/>Users<br/>Listing Users: users / rusers<br/>More User Listings: who / rwho/w<br/>Your Own Host Name: hostname<br/>Personal Data: finger<br/>Communicating with Users<br/>Shielding Yourself from Communication: mesg<br/>Sending a Line at a Time: write<br/>Interactive Conversations: talk<br/>Messages to Everyone: wall<br/>Distributing Data<br/>Copying Files between Two UNIX Hosts: rep<br/>Copying Files between Non-UNIX Hosts: f tp<br/>Distributing Processing<br/>Remote Logins: rlogin<br/>Executing Remote Commands: rsh<br/>Remote Connections: telnet<br/>Network File System: NFS<br/>For More Information...<br/>Chapter Review<br/>Checklist<br/>Quiz<br/>Exercises<br/>Project<br/>CHAPTER 10 The Internet<br/>Motivation<br/>Prerequisites<br/>Objectives<br/>Presentation<br/>The Evolution of the Internet<br/>In the Beginning: The 1960s<br/>Standardizing the Internet: The 1970s<br/>Rearchitecting and Renaming the Internet: The 1980s<br/>The Web: The 1990s<br/>Using Today's Internet<br/>URLs<br/>Chapter Review<br/>Checklist<br/>Quiz<br/>Exercises<br/>Project<br/>CHAPTER 11 Windowing Systems<br/>Motivation<br/>Prerequisites<br/>Objectives<br/>Presentation<br/>Utilities<br/>Introduction<br/>Graphical User Interfaces<br/>Mit<br/>X Servers<br/>Screen Geometry<br/>Security and Authorization<br/>X Window Managers<br/>Focus<br/>Program Start-Up<br/>Open and Closed Windows<br/>Choices of Window Managers<br/>Widgets<br/>Menus<br/>Push Buttons<br/>Check Boxes and Radio Buttons<br/>Scroll Bars<br/>Motif Window Manager Functions<br/>Bringing Up the Root Menu<br/>Opening a Window<br/>Closing a Window<br/>Moving a Window<br/>Resizing a Window<br/>Raising or Lowering a Window<br/>Bringing Up a Window Menu<br/>Client Applications<br/>xclock<br/>xbif f<br/>xterm<br/>Standard X Client Arguments<br/>Geometry<br/>Foreground and Background<br/>Title<br/>Iconic<br/>Advanced Topics<br/>Copy and Paste<br/>Networking Capabilities<br/>Application Resources<br/>Configuration and Start-Up<br/>A (Limited) Survey of Other X-Compatible Desktops<br/>CDE<br/>Gnome<br/>KDE<br/>OpenWindows<br/>VUE<br/>Chapter Review<br/>Checklist<br/>Quiz<br/>Exercises<br/>Project<br/>CHAPTER 12 CProgramining Tools<br/>Motivation<br/>Prerequisites<br/>Objectives<br/>Presentation<br/>Utilities<br/>The C Language<br/>C Compilers<br/>Single-Module Programs<br/>Compiling a C Program<br/>A Listing of the Corrected Reverse Program<br/>Running a C Program<br/>Overriding the Default Executable Name<br/>Multimodule Programs<br/>Reusable Functions<br/>Preparing a Reusable Function<br/>Compiling and Linking Modules Separately<br/>The Stand-Alone Loader: Id<br/>Reusing the Reverse Function<br/>Maintaining Multimodule Programs<br/>The UNIX File Dependency System; make<br/>Make Files<br/>The Order of Make Rules<br/>Executing a Make<br/>Make Rules<br/>Writing Your Own Rules<br/>Touch<br/>Macros<br/>Other Make Facilities<br/>The UNIX Archive System: ar<br/>Creating an Archive<br/>Adding a File<br/>Appending a File<br/>Obtaining a Table of Contents<br/>Deleting a File<br/>Extracting a File<br/>Maintaining an Archive from the Command Line<br/>Maintaining an Archive by Using Make<br/>Ordering Archives<br/>Creating a Table of Contents: ranlib<br/>Shared Libraries<br/>The UNIX Source Code Control System: SCCS<br/>Creating an SCCS File<br/>Checking Out a File<br/>Monitoring SCCS Activity<br/>Undoing a Checkout and Returning a File<br/>Creating a New Delta<br/>Obtaining a File's History<br/>SCCS Identification Keywords<br/>Creating a New Release<br/>Checking Out Read-Only Copies of Previous Versions<br/>Checking Out Editable Copies of Previous Versions<br/>Editing Multiple Versions<br/>Deleting Versions<br/>Compressing SCCS Files<br/>Restricting Access to SCCS Files<br/>Locking Releases<br/>The UNIX Profiler: prof<br/>Double-Checking Programs: lint<br/>The UNIX Debugger: dbx<br/>Preparing a Program for Debugging<br/>Entering the Debugger<br/>Running a Program<br/>Tracing a Program<br/>Tracing Variables and Function Calls<br/>The Bug<br/>Breakpoints<br/>Single Stepping<br/>Accessing Variables<br/>Listing a Program<br/>Leaving the Debugger<br/>Summary<br/>When You're Done: strip<br/>Chapter Review<br/>Checklist<br/>Quiz<br/>Exercises<br/>Projects<br/>CHAPTER 13 Systems Programming<br/>Motivation<br/>Prerequisites<br/>Objectives<br/>Presentation<br/>System Calls and Library Routines<br/>Introduction<br/>Error Handling: perror ()<br/>Regular File Management<br/>A File Management Primer<br/>First Example: reverse<br/>How reverse Works<br/>reverse.c: Listing<br/>Opening a File: open ()<br/>Reading from a File: read {)<br/>Writing to.a File: write ()<br/>Moving in a File: 1 seek ()<br/>Closing a File: close ()<br/>Deleting a File: unl ink ()<br/>Second Example: monitor<br/>How monitor Works<br/>monitor .c: Listing<br/>Obtaining File Information; St at ()<br/>Reading Directory Information: getdents {)<br/>Miscellaneous File Management System Calls<br/>Changing a File's Owner or Group: chown () and fchown ()<br/>Changing a File's Permissions: chmod () and fchmod ()<br/>Duplicating a File Descriptor: dup {) and dup2 ()<br/>FileDescriptor Operations: font 1 ()<br/>Controlling Devices: ioctl ()<br/>Creating Hard Links: link ()<br/>Creating Special Files: mknod ()<br/>Flushing the File System Buffers: sync {)<br/>Truncating a File: truncate () and f truncate ()<br/>STREAMS<br/>Process Management<br/>Creating a New Process: fork ()<br/>Orphan Processes<br/>Terminating a Process: exi t ()<br/>Zombie Processes<br/>Waiting for a Child: wai t ()<br/>Differentiating a Process: exec ()<br/>Changing Directories: chdir ()<br/>Changing Priorities: nice ()<br/>Accessing User and Group IDs<br/>Sample Program: Background Processing<br/>Sample Program: Disk Usage<br/>Threads<br/>Redirection<br/>Signals<br/>The Defined Signals<br/>A List of Signals<br/>Terminal Signals<br/>Requesting an Alarm Signal: alarm ()<br/>Handling Signals: signal 0<br/>Protecting Critical Code and Chaining Interrupt Handlers<br/>Sending Signals: ki 11 0<br/>Death of Children<br/>Suspending and Resuming Processes<br/>Process Groups and Control Terminals<br/>IPC<br/>Pipes<br/>Sockets<br/>Shared Memory<br/>Semaphores<br/>Ibe Internet Shell<br/>Restrictions<br/>Command Syntax<br/>Starting the Internet Shell<br/>Built-in Conunands<br/>Some Regular Examples<br/>Some Internet Examples<br/>How It Works<br/>The Main Command Loop<br/>Parsing<br/>Executing a Conunand Sequence<br/>Executing Pipelines<br/>Executing a Simple Command<br/>Redirection<br/>Extensions<br/>Chapter Review<br/>Checklist<br/>Quiz<br/>Exercises<br/>Projects<br/>CHAPTER 14 UNIX Internals<br/>Motivation<br/>Prerequisites<br/>Objectives<br/>Presentation<br/>Introduction<br/>Kernel Basics<br/>Kernel Subsystems<br/>Processes and Files<br/>Talking to the Kernel<br/>System Calls<br/>User Mode and Kernel Mode<br/>Synchronous versus Asynchronous Processing<br/>Interrupting Interrupts<br/>The Rle System<br/>■ Disk Architecture<br/>Interleaving<br/>Storing a File<br/>Block I/O<br/>Inodes<br/>Inode Contents<br/>The Block Map<br/>File System Layout<br/>The Superblock<br/>Bad Blocks<br/>Directories<br/>li-anslating Pathnames into Inode Numbers<br/>Sample Pathname-to-Inode Translation<br/>Mounting File Systems<br/>File System I/O<br/>Process Management<br/>Executable Files<br/>The First Processes<br/>Kernel Processes and User Processes<br/>The Process Hierarchy<br/>Process States<br/>Process Composition<br/>The User Area<br/>The Process Table<br/>The Scheduler<br/>Scheduling Rules<br/>Memory Management<br/>Memory Pages<br/>Page Tables and Regions<br/>The RAM Table<br/>Loading an Executable File: exec ()<br/>Address Translation<br/>Illustration of MMU Algorithm<br/>The MMU and the Page Table<br/>The Memory Layout after the First Instruction<br/>The Page Daemon<br/>Swap Space<br/>The Page Daemon Algorithm<br/>The Memory Layout after Some Page Outs<br/>Accessing a Page That's Stored in Swap Space<br/>Duplicating a Process: fork ()<br/>Processing References to Shared RAM and Swap Pages<br/>Thrashing and Swapping<br/>Terminating a Process: exi t ()<br/>Signals<br/>Input/Output<br/>I/O Objects<br/>I/O System Calls<br/>I/O Buffering<br/>Regular File I/O<br/>Directory File I/O<br/>Mounting File Systems<br/>Translation of Filenames<br/>Special File I/O<br/>Terminal I/O<br/>Streams<br/>Interprocess Communication<br/>Pipes<br/>Sockets<br/>Chapter Review<br/>Checklist<br/>Quiz<br/>Exercises<br/>Projects<br/>CHAPTER 15 System Administration<br/>Motivation<br/>Prerequisites<br/>Objectives<br/>Presentation<br/>Utilities<br/>Introduction<br/>Becoming a Superuser<br/>Starting UNIX<br/>Stopping the System<br/>Maintaining the File System<br/>File System Integrity<br/>Disk Usage<br/>Assigning Quotas<br/>Creating New File Systems<br/>Backing Up File Systems<br/>Maintaining User Accounts<br/>The Password File<br/>The Group File<br/>Installing Software<br/>Peripheral Devices<br/>Installing a Device<br/>Terminal Files<br/>The Network Interface<br/>Automating Tasks<br/>Accounting<br/>Configuring the Kernel<br/>Security Issues<br/>Chapter ReAuew<br/>Checklist<br/>Quiz<br/>Exercises<br/>Project<br/>CHAPTER l&The Future<br/>Motivation<br/>Prerequisites<br/>Objectives<br/>Presentation<br/>Introduction<br/>Current and Near-Future Influences on UNIX<br/>Object-Oriented Programming<br/>Open Source Software<br/>Parallel, Distributed, and Multiprocessor Systems<br/>TheYear-2000"Bug"<br/>Sixty-Four-Bit Systems<br/>Internet Addressing: IPv6<br/>High-Bandwidth Networks<br/>Fault-Tolerant Systems<br/>Survey of Current Popular Versions of UNIX<br/>AIX<br/>Caldera SCO/Unixware<br/>FreeBSD<br/>HP-UX<br/>IRIX<br/>Linux<br/>NetBSD<br/>OpenBSD<br/>Tru64 UNIX<br/>Solaris<br/>Chapter Review<br/>Checklist<br/>Quiz<br/>Exercise<br/>Project |
650 #0 - SUBJECT | |
Keyword | Operating Systems (Computers) |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | General Books |
Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Full call number | Accession number | Date last seen | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
Central Library, Sikkim University | Central Library, Sikkim University | General Book Section | 15/06/2016 | 005.276 GLA/U | P20399 | 15/06/2016 | General Books |