Авторизация
Поиск по указателям
Sobell M.G., Seebach P. — A Practical Guide to UNIX® for Mac OS® X Users
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: A Practical Guide to UNIX® for Mac OS® X Users
Авторы: Sobell M.G., Seebach P.
Аннотация: Beneath Mac OS® X's stunning graphical user interface (GUI) is the most powerful operating system ever created: UNIX®. With unmatched clarity and insight, this book explains UNIX for the Mac OS X usergiving you total control over your system, so you can get more done, faster. Building on Mark Sobell's highly praised A Practical Guide to the UNIX System, it delivers comprehensive guidance on the UNIX command line tools every user, administrator, and developer needs to mastertogether with the world's best day-to-day UNIX reference.
This book is packed with hundreds of high-quality examples. From networking and system utilities to shells and programming, this is UNIX from the ground upboth the "whys" and the "hows"for every Mac user. You'll understand the relationships between GUI tools and their command line counterparts. Need instant answers? Don't bother with confusing online "manual pages": rely on this book's example-rich, quick-access, 236-page command reference!
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 2005
Количество страниц: 1056
Добавлена в каталог: 23.04.2006
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
Quotation mark, single versus double 2nd
Quotation mark, usage message
Quoting
Quoting, characters 2nd
Quoting, defined
Quoting, shell variables
Quoting, special characters
Quoting, variables
Quoting, whitespace
Radio Button
RAM
RAM, defined
RAM, disk
Random Access Memory [See RAM]
Random bytes, generating
random file
Random number generator
Random variable
RAS
rc file
rc.local file
rc.netboot file
rcp utility 2nd
RDF
READ
read builtin 2nd 3rd 4th 5th
read() system call 2nd
Read, access 2nd
Read, user input
Readline Library
Readline Library, about 2nd
Readline Library, completion
readnews utility
readonly builtin 2nd 3rd 4th
Readonly memory [See ROM]
Readonly variable
reboot utility
rec.skiing newsgroup
Recursion
Recursion, defined
Recursion, example
Recursion, infinite, alias 2nd
Recursive plunge [See Recursion; infinite alias]
Redirect
Redirect, data fork
Redirect, operators, bash
Redirect, output
Redirect, standard
Redirect, standard, error 2nd 3rd 4th
Redirect, standard, input 2nd
Redirect, standard, output 2nd 3rd 4th 5th
Redirect, standard, output and error
Redirect, standard, output of background job
Redirect, standard, output using tee
Redirect, standard, output, and append
Redirection 2nd 3rd 4th
Reentrant code 2nd
Reexecuting commands 2nd
Refresh screen
Regular character
Regular expression
Regular expression, ampersand 2nd
Regular expression, anchor
Regular expression, asterisk
Regular expression, awk
Regular expression, bracket
Regular expression, bracketing
Regular expression, caret
Regular expression, character class
Regular expression, defined
Regular expression, delimiter
Regular expression, dollar sign
Regular expression, empty
Regular expression, extended 2nd
Regular expression, full
Regular expression, grep
Regular expression, list operator
Regular expression, longest match
Regular expression, period
Regular expression, quoted digit
Regular expression, quoting parentheses
Regular expression, quoting special characters
Regular expression, replacement string
Regular expression, rules of use
Regular expression, simple string
Regular expression, special character
Regular expression, special character, quoting
Regular expression, square bracket
Regular expression, summary
Regular expression, vim
Regular expression, \(...\) bracket expression
rehash builtin
Relational operator
Relative pathname 2nd 3rd 4th
release command (cvs)
Release, CVS
Religious statue, miniature [See Icon]
Remainder operator
Remote
Remote, access server [See RAS]
Remote, filesystem
Remote, procedure call [See RPC]
Remove
remove command
Remove, directory using rmdir
Remove, file using rm
Remove, link using rm
Remove, variable
rename
rename shell script
Rename, directory using mv
Rename, file using mv 2nd
renice utility
Repair filesystem
repeat builtin
Repeating a command
Replacement string 2nd 3rd 4th
REPLY variable 2nd
Request for comments [See RFC]
Reserved port [See Privileged port]
reset utility
Resolver 2nd
Resource Description Framework [See RDF]
Resource fork 2nd 3rd
restore
Return code [See Exit; status]
RETURN key 2nd 3rd 4th
Reverse single quotation mark [See Back tick]
rexecd daemon
RFC
RFS
Ritchie, Dennis
rlogin utility 2nd
rm utility 2nd 3rd 4th 5th 6th
rmdir utility 2nd
rmstar variable
rn utility
Roam
ROM
Root
Root Directory
root login
root user [See Superuser]
Root, directory 2nd 3rd 4th
Root, filesystem
Root, login
ROT13
Rotate file
Router, network 2nd 3rd
RPC 2nd
rpc file 2nd
rpcinfo utility
RSA encryption
rsh utility 2nd 3rd
rtag command (cvs)
Run
Run, background command
Run, defined
Run, program
Run, shell script
S filename extension
Safari browser 2nd 3rd
safedit shell script
Samba
Samba, defined
Samba, NBT
Samba, NetBIOS
Samba, share
Samba, SMB
Samba, Windows share
Samba, WINS
savehist variable 2nd
sbin directory
sched builtin
Scheduling jobs
Schema
sci.med newsgroup
scp utility 2nd
Screen
Screen, file
Screen, refresh
script utility
Script, shell [See Shell script]
SCROLL
ScrollBar
sdiff utility
Search
Search, engine
Search, engine, database
Search, engine, defined
Search, engine, find a
Search, engine, index
Search, engine, Web crawler
Search, keyword using apropos
Search, path
Search, string using grep
Search, string using vi 2nd
Secondary prompt
secure file 2nd
securetty file
Security
Security, access permission 2nd
Security, ACL 2nd
Security, authentication
Security, back door
Security, checksum
Security, cipher
Security, ciphertext
Security, cleartext
Security, cookie
Security, cracker
Security, cryptography
Security, cypher [See Security; cipher]
Security, DDoS attack
Security, DoS attack
Security, finger utility
Security, firewall
Security, host based trust
Security, host, trusted
Security, hosts.equiv file
Security, Internet, root access
Security, IP spoofing
Security, IPng
Security, IPv6
Security, Kerberos
Security, kill
Security, locktty script
Security, login account
Security, Mac OS X features
Security, PAM
Security, password 2nd
Security, PATH and Superuser
Security, PATH variable
Security, rexecd daemon
Security, root access, Internet
Security, RSA
Security, setgid
Security, setuid 2nd
Security, spoofing
Security, ssh [See ssh]
Security, su utility
Security, sudo utility
Security, Superuser and PATH
Security, telnet
Security, Trojan horse 2nd
Security, trust
Security, trusted host
Security, virtual private network
Security, virus
Security, VPN
Security, wiping a file
Security, worm 2nd
Security, xinetd daemon [See xinetd daemon]
sed utility 2nd
Segment, network
select control structure
self-assigned IP address
sendmail utility
sendmail, masquerade
Separating commands
server
Server, defined
Server, mail list 2nd
Server, Message Block Protocol [See Samba]
Server, name 2nd
Server, process
Server, proxy
Server, setting up
Service, directory
Services
services database
Services file 2nd 3rd
Services, daemons providing
Services, Internet
Services, network
Services, nsswitch.conf file
session
Session, defined
Session, failsafe
set builtin 2nd 3rd 4th 5th 6th 7th 8th
Set group ID [See Setgid]
Set user ID [See Setuid]
setenv builtin 2nd 3rd
SetFile utility
setgid
Setgid, about
Setgid, defined
Setgid, display using ls
Setgid, permission
Setgid, root, files belonging to the group 2nd
SETUID
Setuid, about 2nd
Setuid, at
Setuid, crontab
Setuid, defined
Setuid, finding files using find
Setuid, grant privileges
Setuid, ls display of
Setuid, root, files owned by 2nd
Sexillion
Реклама