Logo

UNIX Systems Programming for SVR4

Large book cover: UNIX Systems Programming for SVR4

UNIX Systems Programming for SVR4
by

Publisher: O'Reilly
ISBN/ASIN: 1565921631
ISBN-13: 9781565921634
Number of pages: 617

Description:
The book gives you the nitty gritty details on how UNIX interacts with applications. Whether you're a student, system administrator, or software developer, if you're working on any System V Release 4 platform, you'll find this book indispensable. The book contains many extended examples on topics ranging from string manipulation to network programming.

Home page url

Download or read it online for free here:
Download link
(multiple formats)

Similar books

Book cover: Motif Programming ManualMotif Programming Manual
by - O'Reilly
The Motif Programming Manual is a source for complete, accurate, and insightful guidance on Motif application programming. There is no other book that covers the ground as thoroughly or as well as this one. The book has been updated to Motif 1.2.
(7863 views)
Book cover: Introduction to UnixIntroduction to Unix
by - The Ohio State University
Table of contents: History of Unix; Unix Structure; Getting Started; System Resources and Printing; Shells; Special Unix Features; Text Processing; Other Useful Commands; Shell Programming; Editors; Unix Command Summary; A Short Unix Bibliography.
(6673 views)
Book cover: Filesystem Hierarchy StandardFilesystem Hierarchy Standard
by - Filesystem Hierarchy Standard Group
The filesystem standard has been designed to be used by Unix distribution developers, package developers, and system implementors. However, it is primarily intended to be a reference on how to manage a Unix filesystem or directory hierarchy.
(8412 views)
Book cover: UNIX System Security: A Guide for Users and System AdministratorsUNIX System Security: A Guide for Users and System Administrators
by - Addison-Wesley
The first up-to-date source to provide the UNIX system user or administrator with the information needed to protect data and system from unauthorized use. By following the procedures described, you can protect your UNIX system from most attackers.
(4596 views)