A Practical Guide to Linux Commands Editors and Shell Programming
For use with all versions of Linux, including Ubuntu,™ Fedora,™ openSUSE,™ Red Hat,® Debian, Mandriva, Mint, and now OS X, too! Get more done faster, and become a true Linux guru by mastering the command line! Learn from hundreds of realistic, high-quality examples NEW! Coverage of the Mac OS X command line and its unique tools NEW! Expert primer on automating tasks with Perl The Most Useful Linux Tutorial and Reference, with Hundreds of High-Quality Examples for Every Distribution–Now Covers OS X and Perl, Too! To be truly productive with Linux, you need to thoroughly master shells and the command line. Until now, you had to buy two books to gain that mastery: a tutorial on fundamental Linux concepts and techniques, plus a separate reference. Now, there’s a far better solution. Renowned Linux expert Mark Sobell has brought together comprehensive, insightful guidance on the tools system administrators, developers, and power users need most, and an outstanding day-to-day reference, both in the same book. This book is 100 percent distribution and release agnostic: You can use it with any Linux system, now and for years to come. Use Macs, too? This new edition adds comprehensive coverage of the Mac OS X command line, including essential OS X-only tools and utilities other Linux/UNIX books ignore. Packed with hundreds of high-quality, realistic examples, this book gives you Linux from the ground up: the clearest explanations and most useful knowledge about everything from filesystems to shells, editors to utilities, and programming tools to regular expressions. Sobell has also added an outstanding new primer on Perl, the most important programming tool for Linux admins seeking to automate complex, time-consuming tasks. A Practical Guide to Linux® Commands, Editors, and Shell Programming, Second Edition, is the only book to deliver Better, more realistic examples covering tasks you’ll actually need to perform Deeper insight, based on Sobell’s immense knowledge of every Linux and OS X nook and cranny A start-to-finish primer on Perl for every system administrator In-depth coverage of basic and advanced Linux shell programming with bash and tcsh Practical explanations of 100 core utilities, from aspell to xargs–including Mac OS X specific utilities from ditto to SetFile All-new coverage of automating remote backups with rsync Dozens of system security tips, including step-by-step walkthroughs of implementing secure communications using ssh and scp Tips and tricks for customizing the shell and using it interactively from the command line Complete guides to high-productivity editing with both vim and emacs A comprehensive, 286-page command reference section–now with revised and expanded indexes for faster access to the information you need Instructions for updating systems automatically with apt-get and yum Dozens of exercises to help you practice and gain confidence And much more, including coverage of BitTorrent, gawk, sed, find, sort, bzip2, and regular expressions
The Art of UNIX Programming
The Art of UNIX Programming poses the belief that understanding the unwritten UNIX engineering tradition and mastering its design patterns will help programmers of all stripes to become better programmers. This book attempts to capture the engineering wisdom and design philosophy of the UNIX, Linux, and Open Source software development community as it has evolved over the past three decades, and as it is applied today by the most experienced programmers. Eric Raymond offers the next generation of "hackers" the unique opportunity to learn the connection between UNIX philosophy and practice through careful case studies of the very best UNIX/Linux programs.
The Complete FreeBSD
This practical guidebook explains not only how to get a computer up and running with the FreeBSD operating system, but how to turn it into a highly functional and secure server that can host large numbers of users and disks, support remote access and provide key parts of the Inter
Coders at Work
The Future of Ideas
The Internet revolution has come. Some say it has gone. In The Future of Ideas, Lawrence Lessig explains how the revolution has produced a counterrevolution of potentially devastating power and effect. Creativity once flourished because the Net protected a commons on which widest range of innovators could experiment. But now, manipulating the law for their own purposes, corporations have established themselves as virtual gatekeepers of the Net while Congress, in the pockets of media magnates, has rewritten copyright and patent laws to stifle creativity and progress. Lessig weaves the history of technology and its relevant laws to make a lucid and accessible case to protect the sanctity of intellectual freedom. He shows how the door to a future of ideas is being shut just as technology is creating extraordinary possibilities that have implications for all of us. Vital, eloquent, judicious and forthright, The Future of Ideas is a call to arms that we can ill afford to ignore. From the Trade Paperback edition.
The Architecture of Computer Hardware and System Software An Information Technology Approach 5th Edition
The Architecture of Computer Hardware and System Software provides the right amount of technical detail needed to succeed in the field. This accessible introduction provides the basic principles of computer system architecture and organization in the context of the current technological landscape. The author provides chapters on the fundamentals of networking as it relates to computer systems as well as all kinds of business systems, from entrepreneurial to small business, networked, distributed, and more. This valuable book provides IT professionals with several real-world case studies that clearly show how the concepts are applied in the field.
Memory Management: Algorithms and Implementation in C/C++ describes how to construct production-quality memory managers. This approach includes both high-performance explicit memory managers and more intricate garbage collectors like those popularized by the Java Virtual Machine. Every implementation is complemented by an in-depth presentation of theory, benchmark tests, extensive source code examples, and a discussion of each implementation's trade-offs.
The Art of Computer Virus Research and Defense
Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats. Szor also offers the most thorough and practical primer on virus analysis ever published—addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includes Discovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic Mastering empirical methods for analyzing malicious code—and what to do with what you learn Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more Using worm blocking, host-based intrusion prevention, and network-level defense strategies