Soumettre la recherche
Mettre en ligne
Unix command-line tools
•
Télécharger en tant que PPT, PDF
•
117 j'aime
•
45,103 vues
Eric Wilson
Suivre
Technologie
Signaler
Partager
Signaler
Partager
1 sur 134
Télécharger maintenant
Recommandé
Practical unix utilities for text processing
Practical unix utilities for text processing
Anton Arhipov
Grep - A powerful search utility
Grep - A powerful search utility
Nirajan Pant
Learning sed and awk
Learning sed and awk
Yogesh Sawant
Grep
Grep
Dr.M.Karthika parthasarathy
Regular Expressions grep and egrep
Regular Expressions grep and egrep
Tri Truong
Talk Unix Shell Script 1
Talk Unix Shell Script 1
Dr.Ravi
Airlover 20030324 1
Airlover 20030324 1
Dr.Ravi
Talk Unix Shell Script
Talk Unix Shell Script
Dr.Ravi
Recommandé
Practical unix utilities for text processing
Practical unix utilities for text processing
Anton Arhipov
Grep - A powerful search utility
Grep - A powerful search utility
Nirajan Pant
Learning sed and awk
Learning sed and awk
Yogesh Sawant
Grep
Grep
Dr.M.Karthika parthasarathy
Regular Expressions grep and egrep
Regular Expressions grep and egrep
Tri Truong
Talk Unix Shell Script 1
Talk Unix Shell Script 1
Dr.Ravi
Airlover 20030324 1
Airlover 20030324 1
Dr.Ravi
Talk Unix Shell Script
Talk Unix Shell Script
Dr.Ravi
Using Unix
Using Unix
Dr.Ravi
Unix And C
Unix And C
Dr.Ravi
Unix lab manual
Unix lab manual
Chaitanya Kn
3.7 search text files using regular expressions
3.7 search text files using regular expressions
Acácio Oliveira
Unix Basics
Unix Basics
Dr.Ravi
Unix 1st sem lab programs a - VTU Karnataka
Unix 1st sem lab programs a - VTU Karnataka
iCreateWorld
101 3.7 search text files using regular expressions
101 3.7 search text files using regular expressions
Acácio Oliveira
101 3.7 search text files using regular expressions
101 3.7 search text files using regular expressions
Acácio Oliveira
Unix
Unix
lilututu
Unit 8 text processing tools
Unit 8 text processing tools
root_fibo
15 practical grep command examples in linux
15 practical grep command examples in linux
Teja Bheemanapally
Bioinformatica: Esercizi su Perl, espressioni regolari e altre amenità (BMR G...
Bioinformatica: Esercizi su Perl, espressioni regolari e altre amenità (BMR G...
Andrea Telatin
DevChatt 2010 - *nix Cmd Line Kung Foo
DevChatt 2010 - *nix Cmd Line Kung Foo
brian_dailey
Unix Tutorial
Unix Tutorial
Sanjay Saluth
Working with text, Regular expressions
Working with text, Regular expressions
Krasimir Berov (Красимир Беров)
You Can Do It! Start Using Perl to Handle Your Voyager Needs
You Can Do It! Start Using Perl to Handle Your Voyager Needs
Roy Zimmer
Using Regular Expressions in Grep
Using Regular Expressions in Grep
Dan Morrill
Introducing Modern Perl
Introducing Modern Perl
Dave Cross
Love Your Command Line
Love Your Command Line
Liz Henry
Web Application Security with PHP
Web Application Security with PHP
jikbal
Sed & awk the dynamic duo
Sed & awk the dynamic duo
Joshua Thijssen
Secure SHell
Secure SHell
Çağrı Çakır
Contenu connexe
Tendances
Using Unix
Using Unix
Dr.Ravi
Unix And C
Unix And C
Dr.Ravi
Unix lab manual
Unix lab manual
Chaitanya Kn
3.7 search text files using regular expressions
3.7 search text files using regular expressions
Acácio Oliveira
Unix Basics
Unix Basics
Dr.Ravi
Unix 1st sem lab programs a - VTU Karnataka
Unix 1st sem lab programs a - VTU Karnataka
iCreateWorld
101 3.7 search text files using regular expressions
101 3.7 search text files using regular expressions
Acácio Oliveira
101 3.7 search text files using regular expressions
101 3.7 search text files using regular expressions
Acácio Oliveira
Unix
Unix
lilututu
Unit 8 text processing tools
Unit 8 text processing tools
root_fibo
15 practical grep command examples in linux
15 practical grep command examples in linux
Teja Bheemanapally
Bioinformatica: Esercizi su Perl, espressioni regolari e altre amenità (BMR G...
Bioinformatica: Esercizi su Perl, espressioni regolari e altre amenità (BMR G...
Andrea Telatin
DevChatt 2010 - *nix Cmd Line Kung Foo
DevChatt 2010 - *nix Cmd Line Kung Foo
brian_dailey
Unix Tutorial
Unix Tutorial
Sanjay Saluth
Working with text, Regular expressions
Working with text, Regular expressions
Krasimir Berov (Красимир Беров)
You Can Do It! Start Using Perl to Handle Your Voyager Needs
You Can Do It! Start Using Perl to Handle Your Voyager Needs
Roy Zimmer
Using Regular Expressions in Grep
Using Regular Expressions in Grep
Dan Morrill
Introducing Modern Perl
Introducing Modern Perl
Dave Cross
Love Your Command Line
Love Your Command Line
Liz Henry
Tendances
(19)
Using Unix
Using Unix
Unix And C
Unix And C
Unix lab manual
Unix lab manual
3.7 search text files using regular expressions
3.7 search text files using regular expressions
Unix Basics
Unix Basics
Unix 1st sem lab programs a - VTU Karnataka
Unix 1st sem lab programs a - VTU Karnataka
101 3.7 search text files using regular expressions
101 3.7 search text files using regular expressions
101 3.7 search text files using regular expressions
101 3.7 search text files using regular expressions
Unix
Unix
Unit 8 text processing tools
Unit 8 text processing tools
15 practical grep command examples in linux
15 practical grep command examples in linux
Bioinformatica: Esercizi su Perl, espressioni regolari e altre amenità (BMR G...
Bioinformatica: Esercizi su Perl, espressioni regolari e altre amenità (BMR G...
DevChatt 2010 - *nix Cmd Line Kung Foo
DevChatt 2010 - *nix Cmd Line Kung Foo
Unix Tutorial
Unix Tutorial
Working with text, Regular expressions
Working with text, Regular expressions
You Can Do It! Start Using Perl to Handle Your Voyager Needs
You Can Do It! Start Using Perl to Handle Your Voyager Needs
Using Regular Expressions in Grep
Using Regular Expressions in Grep
Introducing Modern Perl
Introducing Modern Perl
Love Your Command Line
Love Your Command Line
En vedette
Web Application Security with PHP
Web Application Security with PHP
jikbal
Sed & awk the dynamic duo
Sed & awk the dynamic duo
Joshua Thijssen
Secure SHell
Secure SHell
Çağrı Çakır
Secure shell protocol
Secure shell protocol
Baspally Sai Anirudh
PHP Secure Programming
PHP Secure Programming
Balavignesh Kasinathan
Unix Command Line Productivity Tips
Unix Command Line Productivity Tips
Keith Bennett
Practical Example of grep command in unix
Practical Example of grep command in unix
Javin Paul
Web Application Security: Introduction to common classes of security flaws an...
Web Application Security: Introduction to common classes of security flaws an...
Thoughtworks
How to Setup A Pen test Lab and How to Play CTF
How to Setup A Pen test Lab and How to Play CTF
n|u - The Open Security Community
Defeating The Network Security Infrastructure V1.0
Defeating The Network Security Infrastructure V1.0
Philippe Bogaerts
class12_Networking2
class12_Networking2
T. J. Saotome
SSH - Secure Shell
SSH - Secure Shell
Peter R. Egli
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
Michael Coates
Secure Shell(ssh)
Secure Shell(ssh)
Pina Parmar
SSH
SSH
Zach Dennis
Top 100 Linux Interview Questions and Answers 2014
Top 100 Linux Interview Questions and Answers 2014
iimjobs and hirist
RHCE FINAL Questions and Answers
RHCE FINAL Questions and Answers
Radien software
Introduction to SSH
Introduction to SSH
Hemant Shah
Linux Performance Analysis: New Tools and Old Secrets
Linux Performance Analysis: New Tools and Old Secrets
Brendan Gregg
Linux Systems Performance 2016
Linux Systems Performance 2016
Brendan Gregg
En vedette
(20)
Web Application Security with PHP
Web Application Security with PHP
Sed & awk the dynamic duo
Sed & awk the dynamic duo
Secure SHell
Secure SHell
Secure shell protocol
Secure shell protocol
PHP Secure Programming
PHP Secure Programming
Unix Command Line Productivity Tips
Unix Command Line Productivity Tips
Practical Example of grep command in unix
Practical Example of grep command in unix
Web Application Security: Introduction to common classes of security flaws an...
Web Application Security: Introduction to common classes of security flaws an...
How to Setup A Pen test Lab and How to Play CTF
How to Setup A Pen test Lab and How to Play CTF
Defeating The Network Security Infrastructure V1.0
Defeating The Network Security Infrastructure V1.0
class12_Networking2
class12_Networking2
SSH - Secure Shell
SSH - Secure Shell
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
Secure Shell(ssh)
Secure Shell(ssh)
SSH
SSH
Top 100 Linux Interview Questions and Answers 2014
Top 100 Linux Interview Questions and Answers 2014
RHCE FINAL Questions and Answers
RHCE FINAL Questions and Answers
Introduction to SSH
Introduction to SSH
Linux Performance Analysis: New Tools and Old Secrets
Linux Performance Analysis: New Tools and Old Secrets
Linux Systems Performance 2016
Linux Systems Performance 2016
Similaire à Unix command-line tools
Perl Presentation
Perl Presentation
Sopan Shewale
Perl.Hacks.On.Vim
Perl.Hacks.On.Vim
Lin Yo-An
Advanced Perl Techniques
Advanced Perl Techniques
Dave Cross
Codementor Office Hours with Eric Chiang: Stdin, Stdout: pup, Go, and life at...
Codementor Office Hours with Eric Chiang: Stdin, Stdout: pup, Go, and life at...
Arc & Codementor
spug_2008-08
spug_2008-08
colinmeyer
Unix shell scripting basics
Unix shell scripting basics
Abhay Sapru
Unix Shell Scripting Basics
Unix Shell Scripting Basics
Dr.Ravi
Why Perl, when you can use bash+awk+sed? :P
Why Perl, when you can use bash+awk+sed? :P
Luciano Rocha
Perl.Hacks.On.Vim Perlchina
Perl.Hacks.On.Vim Perlchina
guestcf9240
Perl.Hacks.On.Vim Perlchina
Perl.Hacks.On.Vim Perlchina
Lin Yo-An
Cleancode
Cleancode
hendrikvb
Unix shell scripting basics
Unix shell scripting basics
Manav Prasad
BASH Variables Part 1: Basic Interpolation
BASH Variables Part 1: Basic Interpolation
Workhorse Computing
Writing Friendly libraries for CodeIgniter
Writing Friendly libraries for CodeIgniter
CodeIgniter Conference
Unix Shell Scripting Basics
Unix Shell Scripting Basics
Sudharsan S
Dealing with Legacy Perl Code - Peter Scott
Dealing with Legacy Perl Code - Peter Scott
O'Reilly Media
Your own (little) gem: building an online business with Ruby
Your own (little) gem: building an online business with Ruby
Lindsay Holmwood
Getting groovy (ODP)
Getting groovy (ODP)
Nick Dixon
BSDM with BASH: Command Interpolation
BSDM with BASH: Command Interpolation
Workhorse Computing
Easy R
Easy R
Ajay Ohri
Similaire à Unix command-line tools
(20)
Perl Presentation
Perl Presentation
Perl.Hacks.On.Vim
Perl.Hacks.On.Vim
Advanced Perl Techniques
Advanced Perl Techniques
Codementor Office Hours with Eric Chiang: Stdin, Stdout: pup, Go, and life at...
Codementor Office Hours with Eric Chiang: Stdin, Stdout: pup, Go, and life at...
spug_2008-08
spug_2008-08
Unix shell scripting basics
Unix shell scripting basics
Unix Shell Scripting Basics
Unix Shell Scripting Basics
Why Perl, when you can use bash+awk+sed? :P
Why Perl, when you can use bash+awk+sed? :P
Perl.Hacks.On.Vim Perlchina
Perl.Hacks.On.Vim Perlchina
Perl.Hacks.On.Vim Perlchina
Perl.Hacks.On.Vim Perlchina
Cleancode
Cleancode
Unix shell scripting basics
Unix shell scripting basics
BASH Variables Part 1: Basic Interpolation
BASH Variables Part 1: Basic Interpolation
Writing Friendly libraries for CodeIgniter
Writing Friendly libraries for CodeIgniter
Unix Shell Scripting Basics
Unix Shell Scripting Basics
Dealing with Legacy Perl Code - Peter Scott
Dealing with Legacy Perl Code - Peter Scott
Your own (little) gem: building an online business with Ruby
Your own (little) gem: building an online business with Ruby
Getting groovy (ODP)
Getting groovy (ODP)
BSDM with BASH: Command Interpolation
BSDM with BASH: Command Interpolation
Easy R
Easy R
Dernier
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
LoriGlavin3
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
Raghuram Pandurangan
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Mark Goldstein
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Pim van der Noll
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
Neo4j
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Alan Dix
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
ThousandEyes
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
Knoldus Inc.
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Curtis Poe
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
LoriGlavin3
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
Hiroshi SHIBATA
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Alkin Tezuysal
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
Rick Flair
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
Ravi Sanghani
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
ThousandEyes
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
MounikaPolabathina
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
Inflectra
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
Nicole Novielli
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
Ingrid Airi González
Dernier
(20)
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
Unix command-line tools
1.
find, grep, sed,
& awk Increasing productivity with command-line tools.
2.
3.
4.
Part 0 –
pipes and xargs
5.
6.
7.
Part 1:
find
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
55.
56.
57.
58.
59.
60.
61.
62.
63.
64.
65.
66.
67.
68.
69.
70.
71.
72.
73.
74.
75.
76.
77.
78.
79.
80.
81.
82.
83.
84.
85.
86.
87.
88.
89.
90.
91.
92.
93.
94.
95.
96.
97.
98.
99.
100.
101.
102.
103.
104.
105.
106.
107.
108.
109.
110.
111.
112.
113.
114.
115.
116.
117.
118.
119.
120.
121.
122.
123.
124.
125.
126.
127.
128.
129.
130.
131.
132.
133.
134.
Télécharger maintenant