home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam  


Learning the Korn Shell

Learning the Korn ShellSearch this book

Symbols & Numbers | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: K

k command: 2.4.4. Moving Around in the History File
KEYBD fake signal: 9.1.2. Fake Signals
10.3. Customizing the Editing Modes
keywords
in command-line processing: 7.3.2. Substitution Order
list of: B.2. Built-in Commands and Keywords
order of precedence in command lookup: 4.1.1. Functions
kill command: 8.3.2. kill
8.3.4. kill: The Full Story
-l option to: 8.3. Signals
process IDs and: 8.3.3.1. System V
KILL signal: 8.3.1. Control-Key Signals
8.3.2. kill
Korn, David: 1.3.1. The Korn Shell
C.1. Korn Shell Web Sites
Korn shell
1988 version: A.2. The 1988 Korn Shell
building from source code: C. Building ksh from Source Code
customizing: 10. Korn Shell Administration
options for invoking (list): B.1. Invocation Options
security for: 10. Korn Shell Administration
10.4. System Security Features
versions/features of: 0.1. Korn Shell Versions
1.4. Getting the 1993 Korn Shell
vs. awk/egrep regular expressions: 4.5.2.3. Korn shell versus awk/egrep regular expressions
ksh93: 1.3.1. The Korn Shell
source code license agreement for: D. AT&T ast Source Code License Agreement
ksh shell (see Korn shell)
kshdb debugging tool: 9. Debugging Shell Programs
9.2. A Korn Shell Debugger
commands for: 9.2.3.1. Commands
limitations of: 9.2.3.7. Limitations
sample session of: 9.2.4. A Sample kshdb Session
source code for, downloading: 9.2. A Korn Shell Debugger


Symbols & Numbers | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Library Navigation Links

Copyright © 2003 O'Reilly & Associates, Inc. All Rights Reserved.