Index
  
     
  
 
   
    - a command (append in insert mode), 1st
 
    - a command (append text), 1st, 
      2nd
 
    - abbreviated user account names, 1st, 
      2nd, 3rd
 
    - abbreviating
 
     
      - commands, 1st, 2nd, 
        3rd, 4th
 
      - macros
 
       
        - command execution, 1st, 
          2nd
 
        - HTML files, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th
 
        - long words and phrases, 1st, 
          2nd, 3rd, 
          4th
 
        - mixing words, 1st, 
          2nd, 3rd, 
          4th, 5th
 
        - scripts, 1st, 2nd, 
          3rd, 4th, 
          5th, 6th, 
          7th, 8th
 
        - system administration, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th, 9th, 
          10th, 11th, 
          12th, 13th, 
          14th
 
        - typographical errors, 1st, 
          2nd, 3rd
 
      
    
    - access
 
     
      - FTP
 
       
        - restricting, 1st, 
          2nd, 3rd
 
      
      - local
 
       
        - unmounting devices, 1st
 
      
      - networks
 
       
        - troubleshooting, 1st, 
          2nd
 
      
      - remote
 
       
        - clear command, 1st
 
        - network configuration, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th, 9th, 
          10th
 
        - passwords, 1st, 2nd, 
          3rd
 
        - ping, 1st, 2nd, 
          3rd, 4th
 
        - reboot command, 1st
 
        - restricting, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th, 9th, 
          10th, 11th, 
          12th, 13th, 
          14th, 15th, 
          16th, 17th, 
          18th, 19th, 
          20th, 21st, 
          22nd
 
        - single-user state, 1st
 
        - unmounting, 1st
 
        - unmounting devices, 1st
 
      
      - root
 
       
        - monitoring, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th
 
        - UID passwords, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th
 
      
      - superuser root account, 1st
 
    
    - access permission, 1st
 
    - accounts
 
     
      - see user accounts, 1st
 
    
    - achievements
 
     
      - administrators
 
       
        - resumes, 1st
 
      
    
    - activating
 
     
      - swap files
 
       
        - on startup, 1st
 
      
    
    - adding
 
     
      - files
 
       
        - to terminfo, 1st, 
          2nd, 3rd, 
          4th, 5th
 
      
      - swap files, 1st, 2nd, 
        3rd, 4th
 
      - user accounts
 
       
        - from command prompts, 1st, 
          2nd, 3rd, 
          4th
 
      
    
    - addresses
 
     
      - Ethernet (MAC)
 
       
        - outputting, 1st, 
          2nd, 3rd, 
          4th, 5th
 
      
      - IP
 
       
        - editing, 1st
 
      
    
    - administration
 
     
      - local, 1st
 
      - macros
 
       
        - abbreviating, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th, 9th, 
          10th, 11th, 
          12th, 13th, 
          14th
 
      
      - multitasking, 1st
 
    
    - administrators, 1st
 
     
      - code of ethics, 1st
 
      - corporate policy, 1st, 
        2nd
 
      - customer support, 1st
 
      - documentation, 1st
 
      - employment, 1st
 
       
        - companies, 1st
 
        - conferences, 1st
 
        - conferences/seminars, 1st
 
        - email, 1st
 
        - networking, 1st, 
          2nd
 
        - newspapers, 1st
 
        - recruiters, 1st, 
          2nd
 
        - technical job fairs, 1st, 
          2nd
 
        - Usenet newsgroups, 1st, 
          2nd, 3rd
 
        - vendors, 1st, 2nd
 
        - web sites, 1st, 
          2nd
 
      
      - gurus, 1st, 2nd, 
        3rd
 
      - intermediate/advanced, 1st, 
        2nd, 3rd, 
        4th
 
      - interpersonal skills, 1st, 
        2nd, 3rd
 
      - interviews
 
       
        - candidates, 1st
 
        - case scenario questions, 1st, 
          2nd
 
        - employer questions, 1st, 
          2nd
 
        - favorite hard questions, 1st, 
          2nd, 3rd
 
        - file questions, 1st, 
          2nd, 3rd
 
        - in person, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th, 9th, 
          10th, 11th, 
          12th
 
        - interpersonal skills, 1st, 
          2nd, 3rd, 
          4th, 5th
 
        - nontechnical, 1st
 
        - preparation, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th
 
        - procedural questions, 1st, 
          2nd, 3rd
 
        - resume verification questions, 1st, 
          2nd, 3rd
 
        - standard questions, 1st, 
          2nd
 
        - system commands, 1st, 
          2nd, 3rd
 
        - technical, 1st
 
        - telephone, 1st, 
          2nd, 3rd, 
          4th
 
      
      - jobs
 
       
        - newspaper advertisements, 1st
 
      
      - junior-level, 1st, 
        2nd, 3rd
 
      - multiple
 
       
        - root access, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th
 
      
      - networking, 1st
 
      - networks, 1st
 
      - porting, 1st
 
      - programming, 1st
 
      - resumes
 
       
        - achievements, 1st
 
        - contact information, 1st, 
          2nd
 
        - contracting/consulting, 1st, 
          2nd, 3rd, 
          4th
 
        - devices, 1st
 
        - education, 1st, 
          2nd
 
        - format, 1st, 2nd, 
          3rd
 
        - keywords, 1st, 2nd, 
          3rd
 
        - multiple, 1st
 
        - objectives, 1st, 
          2nd
 
        - operating systems, 1st
 
        - organization affiliations, 1st
 
        - paper type, 1st, 
          2nd
 
        - sample, 1st, 2nd, 
          3rd, 4th, 
          5th, 6th, 
          7th, 8th, 
          9th, 10th, 
          11th, 12th
 
        - size, 1st
 
        - software, 1st, 2nd
 
        - submitting, 1st
 
        - systems, listing, 1st
 
        - updating, 1st
 
        - vendors, 1st
 
        - work experience, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th, 9th
 
      
      - salary, 1st, 2nd, 
        3rd
 
      - scripting languages, 1st
 
      - security, 1st
 
      - senior, 1st, 2nd, 
        3rd, 4th
 
      - support engineers (SE), 1st, 
        2nd, 3rd, 
        4th, 5th, 
        6th
 
      - systems
 
       
        - configuration, 1st
 
        - installation, 1st
 
      
      - terminals, 1st
 
      - users
 
       
        - interpersonal skills, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th, 9th, 
          10th, 11th, 
          12th, 13th
 
        - relationship with, 1st, 
          2nd, 3rd, 
          4th
 
      
      - vendor support, 1st
 
      - work experience, 1st
 
      - working hours, 1st
 
    
    - adminstrators
 
     
      - flavors
 
       
        - knowledge of, 1st
 
      
    
    - admintool (Aministration Tool), 1st
 
    - advertisements
 
     
      - employment
 
       
        - technical job fairs, 1st
 
        - Usenet newsgroups, 1st
 
      
    
    - AIX
 
     
      - smit (System Management Interface Tool), 1st
 
    
    - alias, 1st
 
    - alias command, 1st, 
      2nd, 3rd, 
      4th, 5th, 
      6th, 7th, 
      8th, 9th, 
      10th, 11th, 
      12th
 
     
      - directories
 
       
        - displaying, 1st
 
      
      - disk usage status, 1st
 
      - files
 
       
        - copying, 1st
 
        - deleting, 1st
 
        - finding, 1st
 
        - renaming, 1st
 
      
      - grep command, 1st
 
      - help system, 1st
 
      - logout, 1st
 
      - mail clients, 1st
 
      - NIS/YP, 1st
 
      - OpenWindows, 1st
 
      - permissions, 1st
 
      - printers, 1st
 
      - processes
 
       
        - killing, 1st
 
      
      - read access
 
       
        - denying, 1st
 
      
      - remote access, 1st
 
      - startup files, 1st
 
      - startup login scripts, 1st
 
      - terminals, 1st
 
      - time/date, 1st
 
      - write access
 
       
        - denying, 1st
 
      
      - X, 1st
 
    
    - aliases
 
     
      - cshrc file, 1st
 
      - directory manipulation, 1st
 
      - hostname, 1st
 
      - ls command, 1st
 
      - X Window applications, 1st
 
    
    - aliases command
 
     
      - redirecting to null, 1st, 
        2nd
 
      - see also unalias command, 1st
 
    
    - aliases, see also hotkeys, 1st, 
      2nd, 3rd, 
      4th, 5th
 
    - Aministration Tool (admintool), 1st
 
    - anonymous FTP servers
 
     
      - security, 1st, 2nd
 
    
    - ANSI terminal
 
     
      - database
 
       
        - compiling, 1st
 
      
    
    - append, 1st
 
    - appending
 
     
      - stty command
 
       
        - erase option, 1st
 
      
      - text, 1st
 
    
    - application directory
 
     
      - core files, 1st
 
    
    - application layer (layer 7), 1st
 
    - applications
 
     
      - architecture, 1st
 
      - user accounts
 
       
        - names, 1st, 2nd, 
          3rd, 4th
 
      
    
    - architecture
 
     
      - applications, 1st
 
      - file servers, 1st
 
      - kernel, 1st
 
    
    - archiving
 
     
      - files, 1st, 2nd
 
    
    - argument, 1st
 
    - arguments
 
     
      - command line, 1st
 
      - remote hosts
 
       
        - displaying, 1st
 
      
    
    - arp command
 
     
      - Ethernet (MAC) addresses, 1st, 
        2nd, 3rd, 
        4th, 5th
 
    
    - arrow keys, 1st, 2nd, 
      3rd
 
    - ASCII
 
     
      - symbol table, 1st
 
    
    - ascii command
 
     
      - symbol table, 1st, 
        2nd, 3rd, 
        4th, 5th, 
        6th, 7th
 
    
    - ASCII terminals
 
     
      - Ctrl+Q (unlock), 1st
 
      - Ctrl+S (lock), 1st
 
      - getty daemons, 1st, 
        2nd, 3rd, 
        4th
 
      - monitoring, 1st, 2nd, 
        3rd, 4th, 
        5th, 6th, 
        7th, 8th, 
        9th, 10th, 
        11th, 12th, 
        13th, 14th
 
      - noisy lines, 1st, 
        2nd, 3rd, 
        4th, 5th, 
        6th, 7th
 
      - power cycles, 1st, 
        2nd
 
      - security, 1st
 
      - troubleshooting, 1st
 
      - unlocking, 1st, 2nd, 
        3rd, 4th
 
    
    - asterisk (*), 1st
 
    - AT&T
 
     
      - ASCII symbol table
 
       
        - locating, 1st, 2nd, 
          3rd, 4th, 
          5th, 6th, 
          7th
 
      
      - binary files
 
       
        - decoding, 1st, 2nd, 
          3rd, 4th, 
          5th, 6th, 
          7th
 
        - encoding, 1st, 2nd, 
          3rd, 4th, 
          5th, 6th, 
          7th
 
      
      - boot up process
 
       
        - monitoring, 1st, 
          2nd, 3rd
 
      
      - commands
 
       
        - abbreviating, 1st, 
          2nd, 3rd, 
          4th
 
        - aliases, 1st, 2nd, 
          3rd, 4th, 
          5th, 6th, 
          7th, 8th, 
          9th, 10th, 
          11th, 12th
 
      
      - core files
 
       
        - dumping, 1st
 
        - finding, 1st, 2nd
 
        - monitoring, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th
 
        - sizing, 1st, 2nd, 
          3rd, 4th, 
          5th, 6th
 
      
      - crash files
 
       
        - monitoring, 1st, 
          2nd, 3rd, 
          4th
 
      
      - daemons
 
       
        - disabling, 1st, 2nd, 
          3rd, 4th, 
          5th, 6th, 
          7th, 8th
 
        - getty, 1st, 2nd, 
          3rd
 
        - restarting, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th
 
      
      - dashes (-)
 
       
        - removing, 1st, 2nd
 
      
      - data
 
       
        - discarding, 1st, 
          2nd
 
      
      - disk drives
 
       
        - testing, 1st, 2nd, 
          3rd, 4th, 
          5th, 6th, 
          7th, 8th, 
          9th, 10th, 
          11th, 12th
 
      
      - disk usage
 
       
        - free space, 1st, 
          2nd
 
        - monitoring, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th, 9th
 
        - percentage, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th
 
      
      - DOS files
 
       
        - ^M extension, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th
 
      
      - email
 
       
        - redirecting to null, 1st
 
      
      - Ethernet (MAC) addresses
 
       
        - outputting, 1st, 
          2nd, 3rd, 
          4th, 5th
 
      
      - files
 
       
        - aliases, 1st, 2nd
 
        - backups, 1st, 2nd, 
          3rd, 4th, 
          5th
 
        - compression, 1st, 
          2nd
 
        - cp command, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th
 
        - cpio command, 1st, 
          2nd, 3rd, 
          4th, 5th
 
        - dashes (-), 1st, 
          2nd, 3rd, 
          4th
 
        - decryption, 1st, 
          2nd, 3rd
 
        - deleting, 1st, 2nd, 
          3rd, 4th, 
          5th, 6th, 
          7th
 
        - editing multiple, 1st, 
          2nd, 3rd
 
        - egrep command, 1st, 
          2nd, 3rd, 
          4th
 
        - encryption, 1st, 
          2nd, 3rd, 
          4th, 5th
 
        - finding, 1st, 2nd, 
          3rd, 4th, 
          5th, 6th, 
          7th, 8th, 
          9th
 
        - finding multiple, 1st, 
          2nd
 
        - grep command, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th, 9th, 
          10th, 11th, 
          12th
 
        - headers, 1st, 2nd
 
        - hiding, 1st, 2nd, 
          3rd, 4th, 
          5th
 
        - loading multiple, 1st, 
          2nd
 
        - moving, 1st, 2nd, 
          3rd, 4th, 
          5th
 
        - null output, 1st
 
        - removing, 1st, 2nd
 
        - renaming, 1st, 2nd, 
          3rd, 4th, 
          5th, 6th, 
          7th
 
        - soft links, 1st
 
        - splitting, 1st, 
          2nd, 3rd, 
          4th
 
        - storing, 1st, 2nd, 
          3rd, 4th
 
        - tar command, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th
 
        - uncompression, 1st
 
        - zero size, 1st
 
      
      - FTP access
 
       
        - restricting, 1st, 
          2nd, 3rd
 
      
      - home directories
 
       
        - copying files, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th
 
      
      - hosts
 
       
        - monitoring with ping, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th
 
      
      - hotkeys, 1st, 2nd, 
        3rd, 4th, 
        5th
 
      - last day of month
 
       
        - Perl method, 1st, 
          2nd, 3rd, 
          4th
 
        - shell method, 1st, 
          2nd, 3rd
 
      
      - load averages
 
       
        - monitoring, 1st, 
          2nd, 3rd, 
          4th, 5th
 
      
      - log files
 
       
        - grep command, 1st, 
          2nd, 3rd, 
          4th, 5th
 
        - reducing, 1st, 2nd, 
          3rd, 4th, 
          5th, 6th, 
          7th, 8th
 
        - splitting, 1st, 
          2nd, 3rd, 
          4th, 5th
 
      
      - macros
 
       
        - creating, 1st, 2nd, 
          3rd, 4th, 
          5th, 6th
 
        - scripts, 1st, 2nd, 
          3rd, 4th, 
          5th, 6th, 
          7th, 8th
 
        - system administration, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th, 9th, 
          10th, 11th, 
          12th, 13th, 
          14th
 
      
      - man pages
 
       
        - escape characters, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th, 9th
 
      
      - mouse
 
       
        - controlling with keyboard, 1st, 
          2nd, 3rd, 
          4th
 
      
      - MS-DOS, 1st, 2nd, 
        3rd, 4th, 
        5th, 6th, 
        7th, 8th
 
      - networks
 
       
        - disabling, 1st
 
        - ifconfig command, 1st, 
          2nd, 3rd, 
          4th
 
        - troubleshooting, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th, 9th, 
          10th, 11th, 
          12th, 13th, 
          14th, 15th, 
          16th, 17th
 
      
      - NFS2
 
       
        - mounting with NFS3, 1st, 
          2nd, 3rd
 
        - talking with NFS3, 1st, 
          2nd, 3rd, 
          4th
 
      
      - null
 
       
        - copying files, 1st
 
      
      - packets
 
       
        - routed command, 1st, 
          2nd, 3rd
 
        - static routing, 1st, 
          2nd, 3rd, 
          4th
 
      
      - passwords
 
       
        - encryption, 1st, 
          2nd, 3rd
 
        - interpreting programs, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th
 
        - interpreting shells, 1st, 
          2nd, 3rd, 
          4th
 
        - shadow technique, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th
 
        - stripping, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th
 
      
      - PC users, 1st, 2nd, 
        3rd, 4th
 
      - processes
 
       
        - emailing output, 1st, 
          2nd, 3rd
 
        - monitoring, 1st
 
        - outputting, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th
 
        - redirecting, 1st, 
          2nd, 3rd, 
          4th, 5th
 
        - running after log out, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th
 
      
      - ranges of numbers
 
       
        - generating, 1st, 
          2nd, 3rd, 
          4th
 
      
      - remote access
 
       
        - passwords, 1st, 2nd, 
          3rd
 
        - restricting, 1st
 
      
      - remote hosts
 
       
        - copying files, 1st, 
          2nd, 3rd, 
          4th, 5th
 
        - FTP, 1st, 2nd, 
          3rd, 4th, 
          5th, 6th
 
        - NFS, 1st, 2nd, 
          3rd
 
        - ping, 1st, 2nd, 
          3rd, 4th
 
        - rcp command, 1st, 
          2nd
 
        - tar command, 1st, 
          2nd, 3rd, 
          4th
 
      
      - root access
 
       
        - UID passwords, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th
 
      
      - root password
 
       
        - clearing, 1st, 2nd, 
          3rd, 4th
 
      
      - screens
 
       
        - clear command, 1st, 
          2nd, 3rd, 
          4th, 5th
 
        - refreshing, 1st, 
          2nd, 3rd, 
          4th, 5th
 
        - xlock command, 1st, 
          2nd, 3rd, 
          4th
 
      
      - scripts
 
       
        - Edit Run Edit (ere), 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th
 
      
      - security
 
       
        - execute-only, 1st, 
          2nd
 
        - read/write, 1st, 
          2nd, 3rd
 
      
      - shells
 
       
        - changing, 1st, 2nd, 
          3rd, 4th, 
          5th
 
      
      - STDIN/STDOUT
 
       
        - displaying, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th, 9th, 
          10th
 
      
      - stty command
 
       
        - echo option, 1st, 
          2nd, 3rd, 
          4th
 
        - interrupt option (intr), 1st, 
          2nd
 
        - ^?, 1st, 2nd, 
          3rd, 4th, 
          5th, 6th, 
          7th
 
        - ^H, 1st, 2nd, 
          3rd, 4th, 
          5th, 6th, 
          7th
 
      
      - swap files
 
       
        - adding, 1st, 2nd
 
      
      - symbolic links, 1st
 
       
        - creating, 1st, 2nd, 
          3rd, 4th, 
          5th, 6th
 
        - dead, 1st, 2nd, 
          3rd, 4th
 
        - multiple, 1st, 2nd, 
          3rd
 
        - paths, 1st, 2nd, 
          3rd, 4th
 
        - physical directory, 1st
 
        - server, 1st
 
      
      - system data
 
       
        - collecting, 1st, 2nd, 
          3rd, 4th, 
          5th, 6th, 
          7th
 
      
      - systems
 
       
        - migrating to, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th
 
      
      - tail command, 1st, 
        2nd, 3rd, 
        4th, 5th, 
        6th, 7th, 
        8th
 
      - tapes
 
       
        - rewinding, 1st, 2nd, 
          3rd, 4th
 
      
      - tar files
 
       
        - encryption, 1st, 
          2nd, 3rd
 
      
      - telnet
 
       
        - restricting access, 1st, 
          2nd, 3rd
 
      
      - temporary files
 
       
        - storing, 1st, 2nd, 
          3rd, 4th, 
          5th, 6th, 
          7th, 8th, 
          9th, 10th, 
          11th, 12th, 
          13th, 14th, 
          15th, 16th
 
      
      - TERM variable
 
       
        - configuration, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th, 9th, 
          10th, 11th, 
          12th, 13th
 
      
      - terminals
 
       
        - columns, 1st, 2nd
 
        - configuration, 1st, 
          2nd, 3rd, 
          4th, 5th
 
        - rows, 1st, 2nd
 
      
      - terminfo database, 1st
 
      - uptime command, 1st, 
        2nd, 3rd, 
        4th, 5th, 
        6th, 7th, 
        8th, 9th
 
      - user accounts
 
       
        - adding, 1st, 2nd, 
          3rd, 4th, 
          5th, 6th
 
        - configuration, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th
 
        - killing, 1st, 2nd
 
        - programs, 1st, 2nd, 
          3rd
 
        - scripts, 1st, 2nd, 
          3rd
 
        - startup files, 1st, 
          2nd, 3rd, 
          4th
 
      
      - users
 
       
        - mailing list, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th
 
      
      - vi editor
 
       
        - mail command, 1st, 
          2nd, 3rd, 
          4th, 5th
 
        - man pages, 1st, 
          2nd
 
      
      - windows
 
       
        - killing, 1st, 2nd, 
          3rd, 4th
 
      
      - workstations
 
       
        - time verification, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th, 9th, 
          10th
 
      
      - X session
 
       
        - killing, 1st, 2nd, 
          3rd
 
      
      - X Window application
 
       
        - displaying, 1st
 
        - hard-coding, 1st
 
        - passing arguments, 1st
 
        - remote hosts, 1st, 
          2nd, 3rd, 
          4th, 5th, 
          6th, 7th, 
          8th, 9th, 
          10th, 11th
 
      
      - X Window applications
 
       
        - aliases, 1st
 
      
    
    - authentication
 
     
      - users, 1st
 
    
    - autoindentation
 
     
      - vi editor
 
       
        - parameters, 1st, 
          2nd
 
      
    
    - automating
 
     
      - tasks, 1st
 
    
    - avertisements
 
     
      - employment, 1st
 
       
        - conferences/seminars, 1st
 
        - networking, 1st
 
        - recruiters, 1st
 
        - vendors, 1st
 
        - web sites, 1st
 
      
    
    - awk command
 
     
      - ping, 1st
 
    
  
© Copyright Macmillan USA. 
  All rights reserved.