Sebanyak 752 item atau buku ditemukan

sed and awk Pocket Reference

For people who create and modify text files, sed and awk are power tools for editing. sed, awk, and regular expressions allow programmers and system administrators to automate editing tasks that need to be performed on one or more files, to simplify the task of performing the same edits on multiple files, and to write conversion programs.The sed & awk Pocket Reference is a companion volume to sed & awk, Second Edition, Unix in a Nutshell, Third Edition, and Effective awk Programming, Third Edition. This new edition has expanded coverage of gawk (GNU awk), and includes sections on: An overview of sed and awk?s command line syntax Alphabetical summaries of commands, including nawk and gawk Profiling with pgawk Coprocesses and sockets with gawk Internationalization with gawk A listing of resources for sed and awk users This small book is a handy reference guide to the information presented in the larger volumes. It presents a concise summary of regular expressions and pattern matching, and summaries of sed and awk.Arnold Robbins, an Atlanta native now happily living in Israel, is a professional programmer and technical author and coauthor of various O'Reilly Unix titles. He has been working with Unix systems since 1980, and currently maintains gawk and its documentation.

This new edition has expanded coverage of gawk (GNU awk), and includes sections on: An overview of sed and awk?s command line syntax Alphabetical summaries of commands, including nawk and gawk Profiling with pgawk Coprocesses and sockets ...

The art of turnaround

kisah-kisah restrukturisasi

Author's account on his experience to accelerate the restructuring corporate sector in Indonesia.

... Achmad Herry A. Sandiwan Suharto Desain Sampul LOWE Penata Letak
Nataniel D. Riona PK Hak Cipta dilindungi Undang-undang Diterbitkan oleh Ah**
Km***U Cetakan Pertama, 2003 Dicetak oleh PT Surya Multi Grafika Penerbit (\^
m*.

Tafsir Alkitab Perjanjian Lama

Ungkapan celakalah dalam ayat 8 hanya terdapat di sini dan dalam 2:12-14. Bin
Sirakh tidak menarik kesimpulan sebagai implikasi teologis dari ayat ini. Apakah
seseorang berdosa karena melanggar hukum atau berdosa oleh alam dan
demikian berpaling dari hukum ... Mereka merupakan beban dan sumber dari
ketakutan dan rasa malu. Karena anak perempuan dapat menjadi sumber
ekonomi, ayah yang bijak akan menjagai mereka (ay. 9). Para wanita, karena
dianggap bodoh, ...

Internet Forensics

Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to Internet Forensics from O'Reilly, there's something you can do about it. This practical guide to defending against Internet fraud gives you the skills you need to uncover the origins of the spammers, con artists, and identity thieves that plague the Internet. Targeted primarily at the developer community, Internet Forensics shows you how to extract the information that lies hidden in every email message, web page, and web server on the Internet. It describes the lengths the bad guys will go to cover their tracks, and offers tricks that you can use to see through their disguises. You'll also gain an understanding for how the Internet functions, and how spammers use these protocols to their devious advantage. The book is organized around the core technologies of the Internet-email, web sites, servers, and browsers. Chapters describe how these are used and abused and show you how information hidden in each of them can be revealed. Short examples illustrate all the major techniques that are discussed. The ethical and legal issues that arise in the uncovering of Internet abuse are also addressed. Not surprisingly, the audience for Internet Forensics is boundless. For developers, it's a serious foray into the world of Internet security; for weekend surfers fed up with spam, it's an entertaining and fun guide that lets them play amateur detective from the safe confines of their home or office.

The book is organized around the core technologies of the Internet-email, web sites, servers, and browsers. Chapters describe how these are used and abused and show you how information hidden in each of them can be revealed.

bash Pocket Reference

It's simple: you need to know how to work with the bash shell if you want to get to the heart of Mac OS X, Linux, and other Unix systems. Updated for the most recent version of bash, this concise little book puts all of the essential information about bash at your fingertips. You'll quickly find answers to annoying questions that always come up when you're writing shell scripts -- What characters do you need to quote? How do you get variable substitution to do exactly what you want? How do you use arrays? -- and much more. If you're a user or programmer of any Unix variant, or if you're using bash on Windows, you'll find this pocket reference indispensable. This book covers: Invoking the Shell Syntax Functions Variables Arithmetic Expressions Command History Programmable Completion Job Control Shell Options Command Execution Coprocesses Restricted Shells Built-in Commands

This book covers: Invoking the Shell Syntax Functions Variables Arithmetic Expressions Command History Programmable Completion Job Control Shell Options Command Execution Coprocesses Restricted Shells Built-in Commands