Secure Programming for Linux and Unix HOWTO
by David A. Wheeler
This book provides a set of design and implementation guidelines for writing secure programs for Linux and Unix systems. Such programs include application programs used as viewers of remote data, web applications (including CGI scripts), network servers, and setuid/setgid programs. This document includes specific guidance for a number of languages, including C, C++, Java, Perl, Python, and Ada95.
Home page url
Download or read it online for free here:
by Peter H. Salus - Reed Media Services
In addition to covering a history of free and open source, The Daemon, the Gnu, and the Penguin explores how free and open software is changing the world. It is authored by Peter Salus, a noted UNIX, open source, and Internet historian and author.
by IBM Redbooks - IBM
This is a study guide for professionals wishing to prepare for the certification exam to achieve: IBM Certified Specialist - AIX V4.3 System Administration. It helps AIX administrators develop the knowledge and skills required for the certification.
This book covers the practical aspects of using and interacting with the Bourne Shell, the root of all shells in Unix world. That includes interacting with the shell on a day-to-day basis for the purposes of operating the computer in normal tasks.
by R. Russell, D. Quinlan, C. Yeoh - Filesystem Hierarchy Standard Group
The filesystem standard has been designed to be used by Unix distribution developers, package developers, and system implementors. However, it is primarily intended to be a reference on how to manage a Unix filesystem or directory hierarchy.