This unix and linux site aims to provide book reviews and free ebook on unix linux, unix commands, unix shell, unix programming, unix shell scripting, unix tutorial, suse linux, rehat linux, debian linux, slackware linux, linux server, linux commands, fedora linux, linux gui, linux networking, unix time sharing concepts, programming linux games, samba-3, motif programming, unix signal programming, and linux complete reference, etc

Oreilly Unix Linux Ebook Sample Chapters

Applying RCS and SCCS
Chapter 3: Basic Source Control Using RCS
Chapter 4: Basic Source Control Using SCCS
BSD Hacks
Chapter 67: Automate Security Patches
Chapter 82: Build a Port Without the Ports Tree
Chapter 100: Fun with X
Chapter 98: Rotate your Signature
Chapter 57: Tighten Security with Mandatory Access Control
Building Embedded Linux Systems
Chapter 5: Kernel Considerations
Building Secure Servers with Linux
Chapter 10: System Log Management and Monitoring
Classic Shell Scripting
Chapter 5: Pipelines Can Do Amazing Things
CVS Pocket Reference
Sample Excerpt: Administrator Commands
Effective awk Programming
Chapter 10: Advanced Features of gawk
Chapter 9: Internationalization with gawk
Essential System Administration
Chapter 11: Backup and Restore
Essential System Administration Pocket Reference
Sample Excerpt: User Accounts
Exim: The Mail Transfer Agent
Chapter 3: Exim Overview
Exploring Expect
Chapter 3: Getting Started With Expect
Exploring the JDS Linux Desktop
Chapter 4: JDS Networking
Extreme Programming Pocket Guide
Sample Excerpt: Roles in Extreme Programming
Fedora Linux
Chapter 1: Quick Start: Installing Fedora
GIMP Pocket Reference
Sample Excerpt: The Toolbox
Greasemonkey Hacks
Chapter 58: Add Keyboard Shortcuts to Google Search Results
Chapter 66: Add Saved Searches to Gmail
Chapter 84: Bypass Annoying Site Registrations
Chapter 94: Compare Book Prices
Chapter 37: Keep Track of Secure Site Passwords
Chapter 76: Make Google More Accessible for Low-Vision Users
Chapter 28: Make Pop-up Titles Prettier
Chapter 89: Syndicate Encrypted Content
Chapter 46: Trace XMLHttpRequest Activity
Hackers & Painters
Chapter 2: Hackers and Painters
High Performance Linux Clusters with OSCAR, Rocks, OpenMosix, and MPI
Chapter 10: Management Software
Knoppix Hacks
Chapter 46: Check for Root Kits
Chapter 40: Create an Emergency Router
Chapter 5: Free Your CD to Make Knoppix Run Faster
Chapter 33: Install Knoppix as a Single-Boot System
Chapter 61: Migrate to a New Hard Drive
Chapter 78: Scan for Viruses
Learning GNU Emacs
Chapter 6: Writing Macros
Learning Red Hat Enterprise Linux and Fedora
Chapter 10: Connecting to the Internet
Learning the bash Shell

Chapter 4: Basic Shell Programming
Learning the Korn Shell
Chapter 4: Basic Shell Programming
Learning the Unix Operating System
Chapter 2: Using Window Systems
Learning the vi Editor
Chapter 8: vi Clones Feature Summary
Linux Cookbook
Chapter 14: Printing with CUPS
Linux Desktop Hacks
Chapter 40: Create Your Own KDE Right-Click Menu Actions
Chapter 8: Jazz Up Your Debian System Boot
Chapter 20: Scrap X11 for Fancy Login Consoles
Chapter 97: Use an iPod with Linux
Chapter 54: View Word and PDF Files from Within Mutt
Linux Desktop Pocket Guide
Chapter 1: Distributions
Linux Device Drivers
Chapter 13: USB Drivers
Linux in a Nutshell
Chapter 4: Boot Methods
Linux in a Windows World
Chapter 7: Using NT Domains for Linux Authentication
Linux Network Administrator's Guide
Chapter 18: Wireless Networking
Linux Pocket Guide
Sample Excerpt: File Properties
Sample Excerpt: Programming with Shell Scripts
Linux Security Cookbook
Chapter 9: Testing and Monitoring (Sample Recipes)
Linux Server Hacks

Chapter 45: Creating a Firewall from the Command Line of any Server
Chapter 79: Distributing Server Load with Round-Robin DNS
Chapter 48: Forwarding TCP Ports to Arbitrary Machines
Chapter 73: Global Search and Replace with Perl
Chapter 58: Monitor System Resources with top
Chapter 15: Playing Hunt the Disk Hog
Chapter 66: Quick Logins with ssh Client Keys
Chapter 90: Simplistic Ad Referral Tracking
Chapter 38: Using rsync over ssh
Linux Server Hacks, Volume Two
Chapter 13: Autostart VNC Servers on Demand
Chapter 48: Create a Copy-on-Write Snapshot of an LVM Volume
Chapter 96: Piece Together Data from the lost+found
Chapter 74: Profile Your Systems Using /proc
Chapter 84: Send Log Messages to Your Jabber Client
Linux Server Security
Chapter 12: System Log Management and Monitoring
Linux Unwired

Chapter 3: Getting On the Network
Managing NFS and NIS
Chapter 15: Debugging Network Problems
Managing Projects with GNU Make
Chapter 12: Debugging Makefiles
Managing RAID on Linux
Chapter 2: Planning and Architecture
Mastering FreeBSD and OpenBSD Securit
Chapter 1: The Big Picture
MySQL in a Nutshell
Chapter 6: Date and Time Functions
Objective-C Pocket Reference
Sample Excerpt: Object Life Cycle
Open Sources 2.0
Sample Excerpt: Introduction
OpenOffice.org Writer
Chapter 2: Writing, Editing, and Reviewing Documents
Physics for Game Developers

Chapter 6: Projectiles
Postfix: The Definitive Guide
Chapter 9: Mail Relaying
Practical PostgreSQL
Chapter 2: Installing PostgreSQL
Programming with Qt
Chapter 8: Container Classes

Popular Posts