Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
sed & awk (2nd Edition)

Buy
sed & awk (2nd Edition), 9781565922259 (1565922255), O'Reilly, 1997
The book begins with an overview and a tutorial that demonstrate a progression in functionality from grep to sed to awk. sed and awk share a similar command-line syntax, accepting user instructions in the form of a script. Because all three programs use UNIX regular expressions, an entire chapter is devoted to understanding UNIX regular expression syntax. Next, the book describes how to write sed scripts. After getting started by writing a few simple scripts, you'll learn other basic commands that parallel manual editing actions, as well as advanced commands that introduce simple programming constructs. Among the advanced commands are those that manipulate the hold space, a set-aside temporary buffer. The second part of the book has been extensively revised to include POSIX awk as well as coverage of three freely available and three commercial versions of awk. The book introduces the primary features of the awk language and how to write simple scripts. You'll also learn: common programming constructs; how to use awk's built-in functions; how to write user-defined functions; debugging techniques for awk programs; how to develop an application that processes an index, demonstrating much of the power of awk; and FTP and contact information for obtaining various versions of awk. Also included is a miscellany of user-contributed scripts that demonstrate a wide range of sed and awk scripting styles and techniques.
(HTML tags aren't allowed.)

Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
  • Learn about the various firewall models, user interfaces,...
Survey of Text Mining II: Clustering, Classification, and Retrieval
Survey of Text Mining II: Clustering, Classification, and Retrieval
The proliferation of digital computing devices and their use in communication has resulted in an increased demand for systems and algorithms capable of mining textual data. Thus, the development of techniques for mining unstructured, semi-structured, and fully-structured textual data has become increasingly important in both academia and industry....
Programming for Engineers: A Foundational Approach to Learning C and Matlab
Programming for Engineers: A Foundational Approach to Learning C and Matlab

Teaching programming for engineers in a rigorous manner, this volume introduces pointer-based memory manipulation in the first chapter, and moves on from C to Matlab and Octave programming, all of which are important methods for engineers in any sector.

...

Advanced Methods for Knowledge Discovery from Complex Data
Advanced Methods for Knowledge Discovery from Complex Data
This book brings together research articles by active practitioners and leading researchers reporting recent advances in the field of knowledge discovery. An overview of the field, looking at the issues and challenges involved is followed by coverage of recent trends in data mining. This provides the context for the subsequent chapters on methods...
TCP/IP Analysis and Troubleshooting Toolkit
TCP/IP Analysis and Troubleshooting Toolkit
Discover TCP/IP troubleshooting solutions that solve real-world networking problems

TCP/IP is the backbone of the Internet and corporate networks and has become much more complex in the last decade. If you’re a networking professional, you need to take trouble-shooting to a new level to address this complexity–and adopt solutions...

The Java(TM) 3D API Specification
The Java(TM) 3D API Specification
The Java 3D API, an exciting new part of the JavaMedia suite of APIs, enables the creation of three-dimensional graphics applications and Internet-based 3D applets. It gives developers high-level constructs for creating and manipulating 3D geometry and for building the structures used in rendering that geometry. With Java 3D, developers...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy