Secure Programming for Linux and Unix HOWTO
by David A. Wheeler
This book provides a set of design and implementation guidelines for writing secure programs for Linux and Unix systems. Such programs include application programs used as viewers of remote data, web applications (including CGI scripts), network servers, and setuid/setgid programs. This document includes specific guidance for a number of languages, including C, C++, Java, Perl, Python, and Ada95.
Home page url
Download or read it online for free here:
by Craig A. Finseth - Lulu.com
This book covers all aspects of creating a character-based text editor. In the process, it discusses many aspects of creating a large application program including user interface, speed/memory/I/O tradeoffs, and many other considerations.
This book covers the practical aspects of using and interacting with the Bourne Shell, the root of all shells in Unix world. That includes interacting with the shell on a day-to-day basis for the purposes of operating the computer in normal tasks.
by Arnold D. Robbins
This tutorial covers the entire spectrum of awk script development: From the basics of opening, searching, and transforming text files, to a comprehensive tutorial for regular expressions, to more advanced features like internetworking.
by Greg Lehey - O'Reilly
The book deals with the whole life cycle of porting, from setting up a source tree on your system to correcting platform differences. It discusses the differences between versions of UNIX and the areas where porters tend to have problems.