Logo

UNIX Text Processing by Dale Dougherty, Tim O'Reilly

Large book cover: UNIX Text Processing

UNIX Text Processing
by

Publisher: Hayden Books
ISBN/ASIN: 0810462915
Number of pages: 680

Description:
This book shows how UNIX can be used effectively in the preparation of written documents, especially in the process of producing book-length documents, i.e. typesetting. As this book will demonstrate the tools available in the UNIX environment, it is also valuable to examine text processing in terms of problems and solutions: the problems faced by a writer undertaking a large writing project and the solutions offered by using the resources and power of a computer system.

Home page url

Download or read it online for free here:
Download link
(27MB, PDF)

Similar books

Book cover: The Unix Programming EnvironmentThe Unix Programming Environment
by - Oslo College
The Unix Programming Environment is a revised version of the UNIX compendium which forms the basis for a one or two semester course in UNIX. It is a reference guide which contains enough to help you to find what you need from other sources.
(7749 views)
Book cover: Unix System AdministrationUnix System Administration
by - The Ohio State University
Systems administration is the installation and maintenance of the UNIX computer system. The system administrator will need to maintain the software and hardware for the system. This includes hardware configuration, software installation, etc.
(6045 views)
Book cover: UNIX Systems Programming for SVR4UNIX Systems Programming for SVR4
by - O'Reilly
The nitty gritty details on how UNIX interacts with applications. If you're working on any System V Release 4 platform, you'll find this book indispensable. It contains examples on topics ranging from string manipulation to network programming.
(2428 views)
Book cover: UNIX System Security: A Guide for Users and System AdministratorsUNIX System Security: A Guide for Users and System Administrators
by - Addison-Wesley
The first up-to-date source to provide the UNIX system user or administrator with the information needed to protect data and system from unauthorized use. By following the procedures described, you can protect your UNIX system from most attackers.
(2124 views)