Logo

UNIX Text Processing by Dale Dougherty, Tim O'Reilly

Large book cover: UNIX Text Processing

UNIX Text Processing
by

Publisher: Hayden Books
ISBN/ASIN: 0810462915
Number of pages: 680

Description:
This book shows how UNIX can be used effectively in the preparation of written documents, especially in the process of producing book-length documents, i.e. typesetting. As this book will demonstrate the tools available in the UNIX environment, it is also valuable to examine text processing in terms of problems and solutions: the problems faced by a writer undertaking a large writing project and the solutions offered by using the resources and power of a computer system.

Home page url

Download or read it online for free here:
Download link
(27MB, PDF)

Similar books

Book cover: IBM Certification Study Guide AIX V4.3 System AdministrationIBM Certification Study Guide AIX V4.3 System Administration
by - IBM
This is a study guide for professionals wishing to prepare for the certification exam to achieve: IBM Certified Specialist - AIX V4.3 System Administration. It helps AIX administrators develop the knowledge and skills required for the certification.
(16474 views)
Book cover: AIX Reference for Sun Solaris AdministratorsAIX Reference for Sun Solaris Administrators
by - Vervante
This book is written for Sun Solaris administrators who wants to transfer their knowledge of Solaris UNIX skills to the AIX 5L operating system. This redbook will basically compare system administration tasks in Solaris 8 to AIX 5L Version 5.1.
(8893 views)
Book cover: A Quick Introduction to UnixA Quick Introduction to Unix
by - Wikibooks
Unix is an operating system designed for use on any kind of computer or computing device. It is a multi-tasking, multi-user system. Unix is also part of the underlying technology of the Internet. Many of the web servers run Apache under Unix.
(9499 views)
Book cover: UNIX System Security: A Guide for Users and System AdministratorsUNIX System Security: A Guide for Users and System Administrators
by - Addison-Wesley
The first up-to-date source to provide the UNIX system user or administrator with the information needed to protect data and system from unauthorized use. By following the procedures described, you can protect your UNIX system from most attackers.
(5784 views)