Solved

books to read

Posted on 2003-11-21
5
196 Views
Last Modified: 2010-08-05
I am new linux environment.Please tell me some books that i should follow in sequence in order to become an expert 'C' programmer under linux.Also Ilike study the working of linux OS,so please tell the books for this also.[NOTE:I AM BEGINNER].
0
Comment
Question by:saravanan_tip
5 Comments
 
LVL 45

Accepted Solution

by:
sunnycoder earned 43 total points
ID: 9801906
Hi saravanan_tip,

www.tldp.org
C programming by kernighan and ritchie

as far working of linux is concerend, get into the habit of reading the man pages carefully

Cheers!
Sunny:o)
0
 
LVL 23

Assisted Solution

by:brettmjohnson
brettmjohnson earned 41 total points
ID: 9803677
As Sunny says,  "The C Programming Language" by Brian Kernighan and Dennis Ritchie
is the definitive reference.  It is the book I used to learn the language.

However, keep in mind that no book can make you an "expert C programmer".  
The only way to become an expert is to write code, lots of code.  You will need to work
with experts - to learn from them and to have them critique your code.  You will need
to read the code of experts and understand the constructs and algorithms used.  As
with any craft or profession, it takes years to become an expert.

0
 
LVL 44

Assisted Solution

by:Karl Heinz Kremer
Karl Heinz Kremer earned 41 total points
ID: 9804715
If you are new to Linux, you should read "Running Linux" by Matt Welsh at al.
To learn (or improve) programming in a Unix environment I would recommend anything by W. Richard Stevens, but you should start with "Advanced Programming in the UNIX(R) Environment". It's about Unix in general (and it's a bit dated, but the Unix environment has not changed a lot). This book and the Network Programming series by Stevens will give you are pretty solid background in Unix programming. Of course, you need to know your C before you start to dive into serious Unix programming.
 
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Have you ever been frustrated by having to click seven times in order to retrieve a small bit of information from the web, always the same seven clicks, scrolling down and down until you reach your target? When you know the benefits of the command l…
The purpose of this article is to fix the unknown display problem in Linux Mint operating system. After installing the OS if you see Display monitor is not recognized then we can install "MESA" utilities to fix this problem or we can install additio…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now