Image of RHCE Red Hat Certified Engineer Linux Study Guide (Exam RH302) (Certification Press)
Image of Advanced Programming in the UNIX Environment, Second Edition (Addison-Wesley Professional Computing Series)
Image of Operating System Concepts
Image of Linux Kernel Development (3rd Edition)

Accessing Cisco Secure ACS 5.X Internals

Cisco Secure Access Control System is based on CentOS. This post will show you how to access the Bash shell as root, and explores the underlying filesystem layout and utilities which make up this product..

DARPA Open Catalog

The DARPA (Defence Advanced Research Agency) Open Catalog is worth visiting at least once to check out the range of open source software that is available for manipulating big data. From the website: The DARPA Open Catalog organizes publically releasable material from DARPA programs, beginning with the XDATA program in the Information Innovation Office (I2O). XDATA is developing an open source software library for big data. DARPA has an open source strategy through XDATA and other I2O programs to help increase the impact of government investments. Lots of interesting software is available.

Source a Function in KSH93

Ksh93 allows you to source a file or a function into local scope. Other shells support sourcing a file but ksh93 is the only shell that I am aware of that allows you to also invoke a function with the source command. From the KSH93 manpage: . name [ arg … ] If name is a function defined with the function name reserved word syntax, the function is executed in the current environment (as if it had been defined with the name() syntax.) Otherwise if name refers to a file, the file is read in its entirety and the commands