UNIX Complete

Overview

UNIX Complete is a one-of-a-kind computer book — valuable both for its broad content and its low price. This book contains the essentials you need to know about using the popular operating system of universities and research centers, as well as at many Fortune 500 companies. Enormously powerful, UNIX is also complex enough to require that users first read a tutorial and then keep a reference handy for specialized commands.

With UNIX Complete, ...

See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (28) from $1.99   
  • New (2) from $50.00   
  • Used (26) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$50.00
Seller since 2014

Feedback rating:

(136)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$50.00
Seller since 2014

Feedback rating:

(136)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

UNIX Complete is a one-of-a-kind computer book — valuable both for its broad content and its low price. This book contains the essentials you need to know about using the popular operating system of universities and research centers, as well as at many Fortune 500 companies. Enormously powerful, UNIX is also complex enough to require that users first read a tutorial and then keep a reference handy for specialized commands.

With UNIX Complete, you'll learn how to get the most out of UNIX System V — from building file systems to connecting to remote computers and the Internet, and using mainstream programs.

As you become more proficient with UNIX, you'll find the UNIX System V Desk Reference to be an invaluable daily tool. This comprehensive reference quickly puts every command, option, and concept at your fingertips.

UNIX Complete introduces you to the work of some of Sybex's finest authors, so you'll know where to go to learn even more about what's possible with UNIX.

Inside:

Getting Started
* Gaining access to the Internet
* Learning the SCO Unix GUI
* Using simple commands

File Systems
Understanding directories, trees, and hierarchies
Creating your own files
Establishing home rule and permissions
Setting up electronic mail

Your Own Personalized Unix
Changing your password
Choosing your shell
Creating login profiles

Exploiting the Shell
Shell and Subshell Variables
More on Metacharacters
Advanced Shell Scripts

Reaching Out to Remote Computers
UUCP & UUCP security
Unix and Networking: Reaching the Promised LAN
Accessingthe Internet

Basic System Administration
Essential administration
Backing Up

X Windows Exposed
X Windows Managers: Open Look and Motif Using X
X Marks the Spot: The Future of X

Windows Inside Windows — Opening the Door to Mainstream Applications
Unix Applications... Get 'em Now!
Vision and Merge

Reference Guide
The Complete UNIX Desk Reference: an A-Z listing of UNIX commands and concepts

Read More Show Less

Product Details

  • ISBN-13: 9780782125283
  • Publisher: Wiley
  • Publication date: 5/28/1999
  • Series: Sybex Complete Series
  • Edition number: 1
  • Pages: 1032
  • Product dimensions: 5.92 (w) x 8.28 (h) x 2.28 (d)

Meet the Author

Stan Kelly-Bootle has been computing since the 1950s, when he graduated from Cambridge University in Pure Mathematics. He helped pioneer the EDSAC I computer. He is a contributing editor to Software Development Magazine and a regular columnist in UNIX Review since 1984. His other books include Understanding Unix and Mastering Turbo C by Sybex; and The Computer Contradictionary, and The Devil's DP Dictionary.

Peter Dyson is a software engineering consultant with 20 years of experience in engineering, software development, and technical support. He is the author of nearly 30 books on operating systems and software, including The PC User's Pocket Dictionary and Unix Desk Reference by Sybex.

Read More Show Less

Read an Excerpt

UNIX Complete


By Peter Dyson

John Wiley & Sons

ISBN: 0-7821-2528-X


Chapter One

Are You Online Yet?

The first stage of your journey is a mental one. You must accept that Unix is a large, complex system to tackle. Unless you take one careful, diligent step at a time, it is easy to become somewhat overawed. If you flip aimlessly through the mountains of official documentation, you can be forgiven for feeling daunted by the number of commands and options, and by the sheer weight of quirky detail. The good news is that you need learn only a few Unix basics in order to become productive. As you build on this solid foundation, layer by layer, the climb becomes more gentle. This book stresses constant practice with useful examples so that you see cause and effect rather than ponder textbook abstractions. It also emphasizes motivation: knowing why the Unix designers provided certain features often clarifies how they are implemented. It proves much easier to assimilate facts when they are interrelated in some way, rather than picked up in isolation.

We can certainly discount any rumors that Unix is impossibly arcane unless you have an advanced degree in computer science. The proof can be found in thousands of ordinary office installations worldwide. Although Unix dominates the academic and research arenas, its presence in the business world has been growing rapidly on every platform from mainframe to PC.

Gaining Access-What You Need to Get Started

As with any computer system, there are several prerequisites before you can gain access and start using Unix. You obviously need a suitable terminal correctly connected to a computer that is running Unix. (The latter caution is not as dumb as it seems-many computers nowadays are capable of running several operating systems, so you need to be sure that you are talking to the right one.) Each Unix vendor supplies precise documentation for installing a particular combination of hardware and version of Unix.

When you are connected and ready to go, you are said to be online to the computer. When you lose connection for any reason, you go offline, and life becomes simple again. Your terminal may be local, directly cabled (or hardwired) to the computer, or it may be remotely connected via modems and telephone lines. The difference affects only the way you establish a connection; once you are online, the type of connection, local or remote, does not normally affect the way you work.

Remote connection is made by dialing the number of the Unix system just as you would make a normal telephone call. In most cases, the dialing is automated with suitable telecommunications software. The actual procedures are very much site-dependent, so you will need to consult your local guru or Unix vendor. Operating remotely, of course, exposes you to the random gremlins of the telecommunications underworld-glitches on the lines, electrical interference, broken connections, and so on-as well as the psychological stresses of isolation if things go wrong.

Terminals

Unix supports almost every type of terminal ever invented, and indeed is designed so that terminals not yet invented can be handled by simple software changes. As far as the beginner is concerned, a terminal can be looked on as a device with a keyboard for typing in instructions and data to the computer (input), and a CRT or monitor screen to echo your input and display messages or responses from the computer (output). The computer itself usually has a hard-wired terminal referred to as the console or systems console.

Terminals can be dumb or intelligent, although it is not always easy to tell the difference. A dumb terminal has a keyboard and CRT but no local processing power-it relies on the central computer for all its processing needs. An intelligent (or smart) terminal, in addition to a keyboard and CRT, has some built-in processing power and local memory. With the low costs of microprocessors and integrated circuits, the completely dumb terminal is now quite rare. The same cost factor has also led to the widespread use of PCs (personal computers) as very intelligent devices capable of working both online as Unix terminals and offline as stand-alone PCs. Indeed, with the advent of superfast microprocessors such as the Intel Pentium and Motorola G3, which can handle high-capacity disks and lots of RAM, your Unix may well be running on a PC or workstation while supporting other terminals and PCs.

Keyboards

Whether you have a dumb or intelligent terminal, an online PC, or a PC running Unix, you will have a keyboard for input and a screen for output. With all the varieties of keyboard layout and key labeling currently on the market, you will appreciate that the instructions in this book may need some adjustment for your particular keyboard. To further complicate matters, most smart terminals allow you to personalize the keyboard in various ways. In other words, you may be able to remap the keyboard, thereby changing the action of certain keys or sequences of keys.

An extreme form of remapping is the use of emulation software that makes a brand X terminal behave like a brand Y model. Whatever tricks you perform, Unix needs to know the type and mode of the terminal being used so it can correctly interpret the stream of characters you are sending. The normal alphanumeric printable characters are fairly standard (usually the so-called ASCII set), but the invisible control characters, like Ctrl, Alt, Shift and Insert, are subject to the more diverse interpretations of the hardware jungle of keyboards, screens, and (especially) printers. The parts of Unix that cope with these vagaries are, perforce, correspondingly messy. Until you know more, therefore, it is best to have your vendor or system administrator set up Unix for your particular terminal.

To avoid too many diversions, I will assume the standard PC keyboard conventions. When we encounter the need for special keystrokes other than the universal alphanumeric keys, I will point out some of the most common variants. For example, the key called Enter on the PC plays an essential role in Unix input. Your Enter key may be marked as Return, CR, Car Ret, or ??.

Screens

Although Unix was originally developed for systems using monochrome, text-based displays, today most versions of Unix use some kind of GUI (Graphical User Interface). GUIs are, like Microsoft Windows, designed to make using the computer more intuitive to you, the user.

This book was written for monochrome text displays using standard 25-line-X-80-column displays. Unless specifically stated otherwise, this is the configuration you should be using to work through the examples in this book. The reason we use a text-based approach instead of a GUI-based approach is twofold. First, virtually every one of the functions and commands for operating Unix are text-based or have a text-based equivalent. And second, although Unix has many graphical operations that correspond to the text commands, there are many that have no graphical equivilant and would therefore be impossible to show in a graphics-only environment. Additionally, although almost all Unix systems today use some variation of X-Windows for their GUI, there are several variations that could make these initial descriptions quite difficult to follow. As such, we'll leave the discussion of how X-Windows operates for later on in this book. For the moment, you need to get to a text window to proceed.

To access a text window, you should do one of the following:


* Open a Terminal window on your GUI. In most X-Window systems, when you initially log in, the system will automatically open a terminal window for you in the GUI. If your systems does not automatically open a terminal window for you, you can open one by clicking the appropriate icon on the Control Panel.
* Switch to a text-only screen. In SCO Unix you can accomplish this by holding down the Ctrl and Alt keys and then pressing one of the function keys: F1-F12.

When you get to the new text screen, you will need to log in again. Don't let this throw you, just enter your login name and password again.

Who Does What?

In larger installations, there are staff specially assigned to manage the system, so you would not normally be concerned with such mundane tasks as installing terminals and ensuring that Unix is set to handle them. In particular, you'll find a system administrator (SA for short) who will be the chief liaison between you as user and the Unix system. Whether system administration is a single full-time job or spread among staff members according to shifts or particular responsibilities will depend on the size and complexity of your Unix site. At smaller installations, the system administrator may simply be a designated user selected (or sentenced) to play this role in addition to other duties. The system administrator may even be you! Fear not, this book explains the chief responsibilities of the SA. For the moment, I will assume that you have someone who can get you online.

The first sign that your terminal awaits you is that your screen displays the prompt

login:

with the cursor blinking impatiently after the colon. A prompt is any message or symbol that indicates that input is expected-in other words, you are being prompted to type something! The cursor is a distinctive symbol on the screen indicating where your next typed character will appear.

Although you are online to Unix and Unix is talking to you, you are not yet an active user. You must first log in (some say log on) and satisfy Unix that you are a legitimate user. Let's see how.

Logging In

In a single-user environment, such as DOS, anyone booting up the system can usually start operating it without permission. DOS itself just doesn't care. If you want to control access, you must install some additional security system (either mechanical locks or software barriers). With a multiuser system such as Unix, the need for security has to be taken more seriously since access may be possible from terminals beyond your immediate control. Unix offers a host of built-in security features that allow the system administrator to control who can get online as well as what the users can and cannot do when they get online. The system administrator is free to decide how much security is appropriate for a given installation, but there is a minimum level found at most sites.

The basic idea is that the system administrator assigns each user a unique user name, also called a logon, and an initial password. The SA sets up your logon and password on the system and tells you what they are. Once you have logged on (you'll see how soon), you are free to change your password but not your logon name. The latter is usually your first name in lowercase letters, such as stan or mary. In larger installations, it may be necessary to use fuller names and/or initials to ensure uniqueness. Whatever scheme is adopted, your logon must be in lowercase, and it serves to identify you to Unix at all times.

The choice of passwords needs careful consideration and we'll be discussing this in detail later on. For now, make sure you know your password and keep it to yourself. And try not to forget your password-it means more work for the system administrator, who may be annoyed enough to issue you a temporary, deflating password such as dummy.

At the login: prompt, type your logon. As you type, you'll see your keystrokes echoed on the screen. The stream of characters you type is actually going to a temporary storage area inside Unix known as a buffer. Each character in turn is sent back to the screen as you type-hence the terms echo and echoing. Most of your keyboard entries will be echoed in this way, but there are important exceptions, as you'll see shortly.

Typing Errors

Your keyboard entry builds up in the buffer until you press Enter, at which point Unix starts examining what you have typed. You therefore have a chance to correct your input before you press the Enter key.

If you make a conscious typing error, there are two ways to recover: erase and retype characters or scrub the entire entry and start over again.

To erase characters to the left of your cursor, you can press the Backspace key. If your keyboard lacks a Backspace key, use Ctrl-H. Ctrl-H means holding down the Ctrl key and pressing the H key. You may see this written ^H in Unix documentation.

To delete a whole line, type Ctrl-U, then retype from the beginning. (Your system may allow the use of # to delete the previous character, or @ to delete the whole line. Check with your system administrator or experiment!)

The Enter Key

When you think you have correctly typed your user name, press the Enter key. Until you press Enter, Unix will simply wait for more keystrokes. This is a general rule: pressing Enter signals the end of your typing and asks Unix to process what you have typed. Unix responds with the prompt

Password:

The password is case-sensitive. Carefully type your password exactly as the system administrator set it up (using the proper upper- and lowercase letters); then press Enter. (This is the last time I'll remind you that Enter is needed after every completed line of input.) I stress the word carefully for two reasons:


* What you type in the password field is not echoed on the screen, lest Peeping Toms are lurking behind you.
* Passwords are (or should be) strange, un-English, hard-to-type combinations.

Unix now checks both your logon name and your password. If the logon is valid and matches the password previously assigned, you will be logged into Unix.

Login Errors

If you make a login error, you get the message

Login incorrect

followed by another login prompt:

login:

Note that Unix plays its cards pretty close here. If you type stam in place of stan, followed by Stan's password, Unix will not say logon name invalid. If you type stan followed by Mary's password, Unix will not say password invalid. All you know is that either the logon name, the password, or both do not match. This withholding of clues is all part of the cloak and dagger game-no help for the potential intruder. If you keep getting Login incorrect messages, check the Caps Lock key; you may be using the wrong case. If this doesn't help, you'll have to double-check with your system administrator.

Logged In at Last!

Once you've passed the login hurdle, Unix can respond in many ways depending on the way your system is set up. Both you and the system administrator can tailor your environment to suit your lifestyle. This is the two-edged sword of Unix: infinite flexibility! In the simplest case, your successful login is greeted by a single character, known as the shell prompt. A $ symbol indicates that you have the Bourne shell; a % means you have the C shell. (There are other shells and other prompts, but these two are the most common.)

The differences between the Bourne shell and C shell will not affect you until we reach more advanced Unix operations. The examples here display the Bourne shell, so when you see the $ prompt in the following examples, make the mental adjustment to % if you are using the C shell.

I'll have more to say about shells later. For now, look on them as special Unix programs that will interpret your typed commands and pass them on for further action. A Unix shell is something like the command-line interpreter, COMMAND.COM, in DOS. Most Unix systems now offer you a choice of shells so that you or your system administrator can select the default shell to suit your tastes. The word default crops up frequently in data processing, so let's take a brief time-out to discuss what it means.

Defaults

If you have a simple situation where the computer expects a yes or no response, it may be that 90 percent of the time yes is the more appropriate response, as in Are you sure you want to Exit? y/n?. If the program has been arranged so that the Enter key works as though y had been entered, we say that y is the default. More generally, if one option among many is the one programmed to be selected in the absence of user input to the contrary, that option can be the default. In many Unix situations, you can change a default permanently or for a particular session. In the latter case, you would revert to the default default, as it were, in subsequent sessions.

Login Greetings

In addition to the shell prompt, Unix may reward you with a message or two. If Unix is uncertain as to your type of terminal, it may prompt you for information before proceeding:

TERM = unknown)

or

TERM = vt100)

(Continues...)



Excerpted from UNIX Complete by Peter Dyson Excerpted by permission.
All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher.
Excerpts are provided by Dial-A-Book Inc. solely for the personal use of visitors to this web site.

Read More Show Less

Table of Contents

Introduction
Part I Unix Tutorial
Chapter: 1 Are You Online Yet?
Chapter: 2 Simple Commands
Chapter: 3 Meet the Unix File System
Chapter: 4 Creating Your Own Files
Chapter: 5 Electronic Mail
Chapter: 6 Your Own Personalized Unix
Chapter: 7 Your Own File System
Chapter: 8 Processes and Multitasking
Chapter: 9 Printing and Spooling
Chapter: 10 The vi Family of Editors
Chapter: 11 Advanced vi Techniques
Chapter: 12 Exploiting the Shell
Chapter: 13 Dipping into the Toolbox
Chapter: 14 grepping, sedding, and a Little awking
Chapter: 15 Advanced Shell Scripts
Chapter: 16 Reaching Out to Remote Computers
Chapter: 17 Basic System Administration
Chapter: 18 X Windows Exposed
Chapter: 19 Out of the Vacuum: The Door to Mainstream Applications

Part II Unix Desktop Reference
Chapter: 20 The Complete Unix Desk Reference

Index




Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted April 29, 2003

    Great.

    This is probably the best book for knowledge-to-dollar ratio. A steal at only 20 bucks, if your new to unix or simply want to get better, buy this book.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)