Logo

Advanced Bash-Scripting Guide

Large book cover: Advanced Bash-Scripting Guide

Advanced Bash-Scripting Guide
by

Publisher: Lulu.com
ISBN/ASIN: 143575218X
Number of pages: 802

Description:
This tutorial assumes no previous knowledge of scripting or programming, but progresses rapidly toward an intermediate/advanced level of instruction . . . all the while sneaking in little nuggets of UNIX wisdom and lore. It serves as a textbook, a manual for self-study, and a reference and source of knowledge on shell scripting techniques. The exercises and heavily-commented examples invite active reader participation, under the premise that the only way to really learn scripting is to write scripts. This book is suitable for classroom use as a general introduction to programming concepts.

Home page url

Download or read it online for free here:
Download link
(2.9MB, PDF)

Similar books

Book cover: Conquering the Command LineConquering the Command Line
by - ConqueringTheCommandLine.com
Learn to master the most valuable and useful command line tools for Unix and Linux based systems. In this book you will find not only the most useful command line tools you need to know, but also the most helpful options and flags for those tools.
(9209 views)
Book cover: A Quick Introduction to UnixA Quick Introduction to Unix
by - Wikibooks
Unix is an operating system designed for use on any kind of computer or computing device. It is a multi-tasking, multi-user system. Unix is also part of the underlying technology of the Internet. Many of the web servers run Apache under Unix.
(9218 views)
Book cover: An Awk PrimerAn Awk Primer
by - Wikibooks
Awk has two faces: it is a utility for performing simple text-processing tasks, and it is a programming language for performing complex text-processing tasks. Awk is useful for simple, quick-and-dirty computational programming.
(8436 views)
Book cover: UNIX System Security: A Guide for Users and System AdministratorsUNIX System Security: A Guide for Users and System Administrators
by - Addison-Wesley
The first up-to-date source to provide the UNIX system user or administrator with the information needed to protect data and system from unauthorized use. By following the procedures described, you can protect your UNIX system from most attackers.
(5597 views)