Logo

Effective AWK Programming by Arnold D. Robbins

Large book cover: Effective AWK Programming

Effective AWK Programming
by


ISBN/ASIN: 1578310008
ISBN-13: 9781578310005
Number of pages: 314

Description:
This tutorial covers the entire spectrum of awk script development: From the basics of opening, searching, and transforming text files, to a comprehensive tutorial for regular expressions, to more advanced features like internetworking. The focus is on the practical side of creating and running awk scripts, and there's plenty of hands-on advice for installing and running today's awk (and gawk).

Home page url

Download or read it online for free here:
Download link
(multiple formats)

Similar books

Book cover: Introduction to UnixIntroduction to Unix
by - The Ohio State University
Table of contents: History of Unix; Unix Structure; Getting Started; System Resources and Printing; Shells; Special Unix Features; Text Processing; Other Useful Commands; Shell Programming; Editors; Unix Command Summary; A Short Unix Bibliography.
(6681 views)
Book cover: UNIX Text ProcessingUNIX Text Processing
by - Hayden Books
The book shows how to use UNIX to prepare written documents. An introduction to the ex, vi, and sed editors and troff and nroff text processing tools. At the end, these tools are brought together by the make utility to do any text processing job.
(13960 views)
Book cover: Advanced Bash-Scripting GuideAdvanced Bash-Scripting Guide
by - Lulu.com
This text progresses rapidly toward an advanced level of instruction, it is a textbook, self-study manual, reference and source of knowledge on UNIX shell scripting. The exercises and examples invite reader participation. Suitable for classroom use.
(10643 views)
Book cover: UNIX System Security: A Guide for Users and System AdministratorsUNIX System Security: A Guide for Users and System Administrators
by - Addison-Wesley
The first up-to-date source to provide the UNIX system user or administrator with the information needed to protect data and system from unauthorized use. By following the procedures described, you can protect your UNIX system from most attackers.
(4604 views)