O'Reilly logo

UNIX: The Complete Reference, Second Edition, 2nd Edition by Richard Rosinski, Douglas Host, Kenneth Rosen, Rachel Klee

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Korn shell. See ksh shell

KPDF (KDE PDF viewer), 210

ksh command aliases, 120–121

ksh (Korn) shell, 93–94

configuring, 109–113

history substitution in, 125

setting the line editor, 127

ksh variables, 113–117

KSnapshot (KDE), 211

K3b tool, 778–779

Kubuntu Linux, 39

KVM switch, 542

L

Labeled security protection, 354

LAMP, 475–478

LAN (local area network), 440

Languages, shell vs. other programming, 585–586

Least privilege, principle of, 331

len function (Python), 680–681

length function (Perl), 647

Leopard (Mac OS X), 23

less command, 85, 87–88

let command, for arithmetic operations, 597

lex tool, 726

Libraries

creating and using, 706–708

dynamically linked, 707–708

statistically linked, 707

LIDS (Linux Intrusion and Detection System), 517

Life ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required