Feeds

Shell programming in a nutshell

£12 off the definitive guide

  • alert
  • submit to reddit

Site Offer Nearly 50,000 UNIX/Linux sysadmins, developers, and power users have used UNIX Shells by Example to become expert shell programmers.

Drawing on 20 years' experience as a shell programming instructor, Ellie Quigley's new edition of UNIX® Shells by Example guides readers through every facet of programming all leading UNIX/Linux shells: bourne, bash, korn, C, and tcsh. Quigley illuminates each concept with up-to-date, classroom-tested code examples designed to help you jump-start your own projects. She also systematically introduces awk, sed, and grep for both UNIX and GNU/Linux . . . it covers everything you'll ever need to know about Shell.

Key features include:

  • Shell programming fundamentals: what shells are, what they do, how they work
  • Comprehensive coverage of Linux shell programming with bash
  • Shell Programming QuickStart: makes first-time shell programmers productive in just 15 pages
  • Shell programming for sysadmins: walks you through key UNIX and Linux system shell scripts

All these features make UNIX® Shells by Example the only shell programming book you’ll ever need, and at just £27.99 (a saving of £12 on the RRP) at The Register bookstore, it's also a bargain you can't afford to miss.

The Register bookstore also has the official strategy guide for Grand Theft Auto: San Andreas, the latest game in the world-renowned Grand Theft Auto series. For just £7.69 you can be the perfect criminal in San Andreas.

A selection of other new titles are also recent releases are featured below:

To browse or buy the other great discounted titles available to Reg readers, simply click on any of the links below:

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.