LINUX : (Record no. 6975)

MARC details
000 -LEADER
fixed length control field 16309cam a2200265 a 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 0201725959 (pbk.)
Terms of availability TZs.60000/-
040 ## - CATALOGING SOURCE
Original cataloging agency MUL
Language of cataloging en
Description conventions AACR
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.432 SAR
100 1# - MAIN ENTRY--AUTHOR NAME
Personal name Sarwar, Syed Mansoor.
245 10 - TITLE STATEMENT
Title LINUX :
Sub Title the textbook /
Statement of responsibility, etc Syed Mansoor Sarwar, Robert Koretsky and Syed Aqeel Sarwar.
250 ## - Edition Statement
Edition statement 1st ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Boston, MA :
Name of publisher Addison-Wesley,
Year of publication c2002.
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 v. (in various pagings) :
Other physical details ill. ;
Dimensions 23 cm.
500 ## - GENERAL NOTE
General note Includes index.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes index
505 ## - Formatted Contents
Formatted contents note Overview of Operating Systems<br/> 1 (8)<br/> Introduction<br/> 2 (1)<br/> What is an Operating System?<br/> 2 (2)<br/> Operating System Services<br/> 4 (1)<br/> Character Versus Graphical User Interfaces<br/> 4 (1)<br/> Types of Operating Systems<br/> 5 (1)<br/> The LINUX Family<br/> 6 (3)<br/> Summary<br/> 7 (1)<br/> Problems<br/> 7 (2)<br/> LINUX History<br/> 9 (8)<br/> Introduction<br/> 10 (1)<br/> Open Source Background<br/> 10 (2)<br/> Linus Torvalds<br/> 12 (1)<br/> LINUX Distributions<br/> 13 (1)<br/> Kernel History<br/> 13 (1)<br/> Popularity of LINUX<br/> 14 (1)<br/> Future Developments<br/> 14 (1)<br/> Web Resources<br/> 14 (3)<br/> Summary<br/> 14 (1)<br/> Problems<br/> 15 (2)<br/> Getting Started<br/> 17 (24)<br/> Introduction<br/> 18 (1)<br/> Computer System Hardware<br/> 18 (3)<br/> Main/Primary Storage<br/> 18 (1)<br/> Central Processing Unit (CPU)<br/> 19 (1)<br/> Disk<br/> 20 (1)<br/> Bus<br/> 20 (1)<br/> I/O Devices<br/> 21 (1)<br/> LINUX Software Architecture<br/> 21 (4)<br/> Device Driver Layer<br/> 21 (1)<br/> The LINUX Kernel<br/> 22 (2)<br/> The System Call Interface<br/> 24 (1)<br/> Language Libraries<br/> 24 (1)<br/> LINUX Shell<br/> 24 (1)<br/> Applications<br/> 25 (1)<br/> Logging On and Logging Off<br/> 25 (4)<br/> Correcting Command Line Typing Mistakes<br/> 29 (1)<br/> Some Important System Setups<br/> 30 (2)<br/> Some Useful Commands for the Beginner<br/> 32 (9)<br/> Changing Your Password<br/> 32 (1)<br/> Getting Help<br/> 32 (4)<br/> Finding Out Who You Are and What the Name of Your LINUX System Is<br/> 36 (1)<br/> Summary<br/> 37 (1)<br/> Problems<br/> 38 (3)<br/> LINUX Shells<br/> 41 (20)<br/> Introduction<br/> 42 (1)<br/> Various LINUX Shells<br/> 43 (6)<br/> Various Shell Programs<br/> 44 (1)<br/> Which Shell Suits Your Needs?<br/> 44 (1)<br/> Various Ways to Change Your Shell<br/> 45 (3)<br/> Shell Start-up Files and Environment Variables<br/> 48 (1)<br/> Some Useful General-Purpose Commands<br/> 49 (7)<br/> Creating and Displaying Directories<br/> 49 (2)<br/> Displaying Files<br/> 51 (1)<br/> Printing Files<br/> 51 (1)<br/> Displaying a Calendar<br/> 51 (1)<br/> One-Way Real-Time Messaging<br/> 52 (1)<br/> Notification of and Permission for Electronic Communication<br/> 52 (1)<br/> Creating Pseudonyms for Commands<br/> 53 (3)<br/> Displaying System Up Time<br/> 56 (1)<br/> Shell Metacharacters<br/> 56 (5)<br/> Summary<br/> 58 (1)<br/> Problems<br/> 59 (2)<br/> Editing Text Files<br/> 61 (46)<br/> Introduction<br/> 62 (1)<br/> How to Do Short and Simple Edits by Using the pico Editor<br/> 63 (6)<br/> Creating the Text of an E-mail Message with the pico Text Editor<br/> 63 (1)<br/> How to Start, Save a File, and Exit<br/> 64 (2)<br/> General Keystroke Commands and Cursor Movement<br/> 66 (2)<br/> Cutting, Pasting, and Searching<br/> 68 (1)<br/> Obtaining More Control Using the vi Editor<br/> 69 (15)<br/> Shell Script File<br/> 70 (2)<br/> How to Start, Save a File, and Exit<br/> 72 (1)<br/> The Format of a vi Command and the Modes of Operation<br/> 73 (5)<br/> Cursor Movement and Editing Commands<br/> 78 (2)<br/> Yank and Put (Copy and Paste) and Substitute (Search and Replace)<br/> 80 (3)<br/> Setting the vi Environment<br/> 83 (1)<br/> Executing Shell Commands from Within vi<br/> 84 (1)<br/> Getting Maximum Control by Using the emacs Editor<br/> 84 (11)<br/> DOS Aliases<br/> 84 (2)<br/> How to Start, Save a File, and Exit<br/> 86 (1)<br/> Cursor Movement and Editing Commands<br/> 87 (1)<br/> Keyboard Macros<br/> 88 (3)<br/> Cut or Copy and Paste and Search and Replace<br/> 91 (4)<br/> How to do Graphical Editing by Using XEmacs<br/> 95 (5)<br/> Editing Data Files with XEmacs<br/> 95 (2)<br/> XEmacs Menus and Buttons<br/> 97 (1)<br/> How to Start, Save a File, and Exit<br/> 98 (2)<br/> Command Line Editing<br/> 100 (7)<br/> Summary<br/> 104 (1)<br/> Problems<br/> 104 (3)<br/> Electronic Mail<br/> 107 (52)<br/> Introduction<br/> 108 (3)<br/> How to Use the LINUX mail Command Effectively<br/> 111 (9)<br/> Sending and Reading E-mail with the LINUX mail Command<br/> 111 (1)<br/> Sending E-mail with the mail Command<br/> 112 (3)<br/> Reading E-mail with mail<br/> 115 (2)<br/> Saving Messages in Folders<br/> 117 (1)<br/> Replying to and Forwarding Messages and Including Attachments<br/> 118 (1)<br/> mail Aliases<br/> 119 (1)<br/> elm---A Full-Screen Display E-mail System<br/> 120 (11)<br/> Sending a Message in elm<br/> 121 (1)<br/> Sending E-mail with elm<br/> 121 (1)<br/> Reading E-mail in elm<br/> 121 (5)<br/> Forwarding and Replying to an E-mail message in elm<br/> 126 (3)<br/> Saving Messages in Folders<br/> 129 (1)<br/> elm Aliases<br/> 129 (2)<br/> pine---Another Full-Screen Display E-mail System<br/> <br/> Sending an E-mail Message by Using pine with an Attachment Created in vi<br/> 131 (3)<br/> Sending E-mail with pine<br/> 134 (2)<br/> Reading E-mail with pine<br/> 136 (1)<br/> Disposing of E-mail in Folders in pine<br/> 137 (2)<br/> Using the pine Address Book<br/> 139 (4)<br/> A Summary of pine Commands<br/> 143 (1)<br/> Graphical E-mail with Kmail<br/> 144 (15)<br/> Starting Out with Kmail<br/> 145 (2)<br/> Reading E-mail in Kmail<br/> 147 (3)<br/> Sending E-mail in Kmail<br/> 150 (2)<br/> Simple Filtering of E-mail into Folders<br/> 152 (2)<br/> Summary<br/> 154 (1)<br/> Problems<br/> 155 (4)<br/> Files and File System Structure<br/> 159 (38)<br/> Introduction<br/> 159 (1)<br/> The LINUX File Concept<br/> 160 (1)<br/> Types of Files<br/> 160 (3)<br/> Simple/Ordinary File<br/> 160 (1)<br/> Directory<br/> 161 (1)<br/> Link File<br/> 162 (1)<br/> Special File (Device)<br/> 162 (1)<br/> Named Pipe (FIFO)<br/> 163 (1)<br/> File System Structure<br/> 163 (7)<br/> File System Organization<br/> 163 (1)<br/> Home and Present Working Directories<br/> 164 (1)<br/> Pathnames: Absolute and Relative<br/> 164 (1)<br/> Some Standard Directories and Files<br/> 165 (5)<br/> Navigating the File Structure<br/> 170 (18)<br/> Determining the Absolute Pathname for Your Home Directory<br/> 171 (1)<br/> Browsing the File System<br/> 172 (4)<br/> Creating Files<br/> 176 (1)<br/> Creating and Removing Directories<br/> 176 (2)<br/> Manipulating the Directory Stack<br/> 178 (5)<br/> Determining File Attributes<br/> 183 (4)<br/> Determining the Type of a File's Contents<br/> 187 (1)<br/> File Representation and Storage in LINUX<br/> 188 (3)<br/> Standard Files and File Descriptors<br/> 191 (1)<br/> End of File (eof) Marker<br/> 192 (5)<br/> Summary<br/> 193 (1)<br/> Problems<br/> 194 (3)<br/> File Security<br/> 197 (22)<br/> Introduction<br/> 198 (1)<br/> Password-Based Protection<br/> 198 (1)<br/> Encryption-Based Protection<br/> 198 (2)<br/> Protection-Based on Access Permission<br/> 200 (1)<br/> Types of Users<br/> 200 (1)<br/> Types of File Operations/Access Permissions<br/> 200 (1)<br/> Determining and Changing File Access Privileges<br/> 201 (10)<br/> Determining File Access Privileges<br/> 202 (2)<br/> Changing File Access Privilages<br/> 204 (5)<br/> Default File Access Privileges<br/> 209 (2)<br/> Special Access Bits<br/> 211 (5)<br/> The Set-User-ID (SUID) Bit<br/> 211 (2)<br/> The Set-Group-ID (SGID) Bit<br/> 213 (1)<br/> The Sticky Bit<br/> 214 (2)<br/> File Permissions and Types<br/> 216 (3)<br/> Summary<br/> 216 (1)<br/> Problems<br/> 217 (2)<br/> Basic File Processing<br/> 219 (40)<br/> Introduction<br/> 220 (1)<br/> Viewing Contents of Text Files<br/> 220 (11)<br/> Viewing Complete Files<br/> 220 (3)<br/> Viewing Files One Page at a Time<br/> 223 (4)<br/> Viewing the Head or Tail of a File<br/> 227 (4)<br/> Copying, Moving, and Removing Files<br/> 231 (9)<br/> Copying Files<br/> 231 (3)<br/> Moving Files<br/> 234 (2)<br/> Removing/Deleting Files<br/> 236 (2)<br/> Determining File Size<br/> 238 (2)<br/> Appending to Files<br/> 240 (2)<br/> Combining Files<br/> 242 (2)<br/> Comparing Files<br/> 244 (5)<br/> Removing Repeated Lines<br/> 249 (2)<br/> Printing Files and Controlling Print Jobs<br/> 251 (8)<br/> LINUX Mechanism for Printing Files<br/> 251 (1)<br/> Printing Files<br/> 252 (2)<br/> Finding the Status of a Print Request<br/> 254 (1)<br/> Canceling Print Jobs<br/> 254 (2)<br/> Summary<br/> 256 (1)<br/> Problems<br/> 257 (2)<br/> Advanced File Processing<br/> 259 (42)<br/> Introduction<br/> 260 (1)<br/> Regular Expressions<br/> 260 (2)<br/> Compressing Files<br/> 262 (6)<br/> The gzip Command<br/> 263 (1)<br/> The gunzip Command<br/> 264 (1)<br/> The gzexe Command<br/> 265 (1)<br/> The zcat Command<br/> 266 (1)<br/> The zforce Command<br/> 267 (1)<br/> Sorting Files<br/> 268 (3)<br/> Searching for Commands and Files<br/> 271 (4)<br/> The find Command<br/> 272 (2)<br/> The where is Command<br/> 274 (1)<br/> The which Command<br/> 275 (1)<br/> Searching Files<br/> 275 (6)<br/> Cutting and Pasting<br/> 281 (5)<br/> Encoding and Decoding<br/> 286 (2)<br/> Command History<br/> 288 (13)<br/> Summary<br/> 297 (1)<br/> Problems<br/> 298 (3)<br/> File Sharing<br/> 301 (24)<br/> Introduction<br/> 302 (1)<br/> Duplicate Shared Files<br/> 302 (1)<br/> Common Login for Members of a Team<br/> 302 (1)<br/> Setting Appropriate Access Permissions on Shared Files<br/> 303 (1)<br/> Common Group for Members of a Team<br/> 303 (1)<br/> File Sharing via Links<br/> 303 (18)<br/> Hard Links<br/> 304 (8)<br/> Drawbacks of Hard Links<br/> 312 (2)<br/> Soft/Symbolic Links<br/> 314 (5)<br/> Types of Symbolic Links<br/> 319 (1)<br/> Pros and Cons of Symbolic Links<br/> 319 (2)<br/> Searching for Symbolic Links<br/> 321 (4)<br/> Summary<br/> 322 (1)<br/> Problems<br/> 323 (2)<br/> Redirection and Piping<br/> 325 (30)<br/> Introduction<br/> 326 (1)<br/> Standard Files<br/> 326 (1)<br/> Input Redirection<br/> 326 (2)<br/> Output Redirection<br/> 328 (2)<br/> Combining Input and Output Redirection<br/> 330 (1)<br/> I/O Redirection with File Descriptors<br/> 331 (1)<br/> Redirecting Standard Error<br/> 332 (1)<br/> Redirecting stdout and stderr in One Command<br/> 333 (2)<br/> Redirecting stdin, stdout, and stderr in One Command<br/> 335 (2)<br/> Redirecting Without Overwriting File Contents (Appending)<br/> 337 (2)<br/> LINUX pipes<br/> 339 (4)<br/> Redirection and Piping Combined<br/> 343 (2)<br/> Error Redirection in the TC Shell<br/> 345 (4)<br/> Recap of I/O and Error Redirection<br/> 349 (6)<br/> Summary<br/> 351 (1)<br/> Problems<br/> 352 (3)<br/> Processes<br/> 355 (46)<br/> Introduction<br/> 356 (1)<br/> Running Multiple Processes Simultaneously<br/> 356 (1)<br/> LINUX Process States<br/> 357 (1)<br/> Execution of Shell Commands<br/> 357 (5)<br/> Process Attributes<br/> 362 (11)<br/> Process and Job Control<br/> 373 (20)<br/> Foreground and Background Processes and Related Commands<br/> 373 (8)<br/> LINUX Daemons<br/> 381 (1)<br/> Sequential and Parallel Execution of Commands<br/> 382 (5)<br/> Abnormal Termination of Commands and Processes<br/> 387 (5)<br/> Conditional Command Execution<br/> 392 (1)<br/> Process Hierarchy in LINUX<br/> 393 (8)<br/> Summary<br/> 397 (1)<br/> Problems<br/> 398 (3)<br/> Networks and Internetworking<br/> 401 (48)<br/> Introduction<br/> 402 (1)<br/> Computer Networks and Internetworks<br/> 402 (1)<br/> The Reasons for Computer Networks and Internetworks<br/> 403 (1)<br/> Network Models<br/> 404 (2)<br/> The TCP/IP Protocol Suite<br/> 406 (8)<br/> TCP and UDP<br/> 406 (1)<br/> Routing of Application Data---The Internet Protocol (IP)<br/> 407 (2)<br/> Ipv4 Addresses in Dotted Decimal Notation<br/> 409 (1)<br/> Symbolic Names<br/> 410 (2)<br/> Translating Names to IP Addresses---The Domain Name System<br/> 412 (2)<br/> Internet Services and Protocols<br/> 414 (1)<br/> The Client-Server Software Model<br/> 415 (1)<br/> Application Software<br/> 416 (33)<br/> Displaying the Host Name<br/> 416 (1)<br/> Displaying List of Users Using Hosts on a Network<br/> 417 (2)<br/> Displaying the Status of Hosts on a Network<br/> 419 (1)<br/> Testing a Network Connection<br/> 420 (2)<br/> Displaying Information About Users<br/> 422 (3)<br/> Remote Login<br/> 425 (8)<br/> Remote Command Execution<br/> 433 (3)<br/> File Transfer<br/> 436 (3)<br/> Remote Copy<br/> 439 (3)<br/> Interactive Chat<br/> 442 (1)<br/> Tracing the Route from One Site to Another Site<br/> 443 (2)<br/> Summary<br/> 445 (1)<br/> Problems<br/> 445 (4)<br/> Introductory Bash Programming<br/> 449 (54)<br/> Introduction<br/> 450 (1)<br/> Running a Bash Script<br/> 450 (1)<br/> Shell Variables and Related Commands<br/> 451 (21)<br/> Controlling the Prompt<br/> 457 (1)<br/> Variable Declaration<br/> 457 (3)<br/> Reading and Writing Shell Variables<br/> 460 (4)<br/> Command Substitution<br/> 464 (1)<br/> Exporting Environment<br/> 465 (3)<br/> Resetting Variables<br/> 468 (1)<br/> Creating Read-Only User Defined Variables<br/> 469 (1)<br/> Reading from Standard Input<br/> 470 (2)<br/> Passing Arguments to Shell Scripts<br/> 472 (5)<br/> Comments and Program Headers<br/> 477 (1)<br/> Program Control Flow Commands<br/> 478 (25)<br/> The if-then-elif-else-fi Statement<br/> 478 (10)<br/> The for Statement<br/> 488 (2)<br/> The while Statement<br/> 490 (3)<br/> The until Statement<br/> 493 (1)<br/> The break and continue Commands<br/> 494 (1)<br/> The case Statement<br/> 495 (5)<br/> Summary<br/> 500 (1)<br/> Problems<br/> 501 (2)<br/> Advanced Bash Programming<br/> 503 (44)<br/> Introduction<br/> 504 (1)<br/> Numeric Data Processing<br/> 504 (10)<br/> Array Processing<br/> 514 (5)<br/> The Here Document<br/> 519 (4)<br/> Interrupt (Signal) Processing<br/> 523 (4)<br/> The exec Command and File I/O<br/> 527 (11)<br/> Execution of a Command without Creating a New Process<br/> 528 (2)<br/> File I/O via the exec Command<br/> 530 (8)<br/> Functions In Bash<br/> 538 (9)<br/> The Reasons for Functions<br/> 538 (1)<br/> Function Definition<br/> 539 (1)<br/> Function Invocation/Call<br/> 539 (1)<br/> Examples of Functions<br/> 539 (3)<br/> Debugging Shell Programs<br/> 542 (2)<br/> Summary<br/> 544 (1)<br/> Problems<br/> 545 (2)<br/> Introductory TC Shell Programming<br/> 547 (42)<br/> Introduction<br/> 548 (1)<br/> Running a TC Shell Script<br/> 548 (1)<br/> Shell Variables and Related Commands<br/> 549 (14)<br/> Reading and Writing Shell Variables<br/> 553 (2)<br/> Command Substitution<br/> 555 (1)<br/> Exporting Environment<br/> 556 (3)<br/> Resetting Variables<br/> 559 (1)<br/> Creating Read-Only User-Defined Variables<br/> 560 (1)<br/> Reading from Standard Input<br/> 561 (2)<br/> Passing Arguments to Shell Scripts<br/> 563 (4)<br/> Comments and Program Headers<br/> 567 (1)<br/> Program Control Commands<br/> 568 (21)<br/> The if-then-else-endif Statement<br/> 568 (9)<br/> The foreach Statement<br/> 577 (2)<br/> The while Statement<br/> 579 (2)<br/> The break, continue and goto Commands<br/> 581 (1)<br/> The switch Statement<br/> 582 (4)<br/> Summary<br/> 586 (1)<br/> Problems<br/> 586 (3)<br/> Advanced TC Shell Programming<br/> 589 (20)<br/> Introduction<br/> 590 (1)<br/> Numeric Data Processing<br/> 590 (2)<br/> Array Processing<br/> 592 (6)<br/> The Here Document<br/> 598 (2)<br/> Interrupt (Signal) Processing<br/> 600 (5)<br/> Debugging Shell Programs<br/> 605 (4)<br/> Summary<br/> 606 (1)<br/> Problems<br/> 607 (2)<br/> File System Backup<br/> 609 (16)<br/> Introduction<br/> 610 (1)<br/> Archiving and Restoring Files Via tar<br/> 610 (12)<br/> Archiving Files<br/> 611 (5)<br/> Restoring Archived Files<br/> 616 (4)<br/> Copying Directory Hierarchies<br/> 620 (2)<br/> Software Distributions in the tar Format<br/> 622 (3)<br/> Summary<br/> 623 (1)<br/> Problems<br/> 623 (2)<br/> LINUX Tools for Software Development<br/> 625 (98)<br/> Introduction<br/> 626 (1)<br/> Computer Programming Languages<br/> 626 (2)<br/> The Compilation Process<br/> 628 (1)<br/> The Software Engineering Life Cycle<br/> 628 (2)<br/> Program Generation Tools<br/> 630 (67)<br/> Generating C Source Files<br/> 631 (1)<br/> Indenting C Source Code<br/> 631 (3)<br/> Compiling C Programs<br/> 634 (5)<br/> Handling Module-Based C Software<br/> 639 (13)<br/> Creating, Modifying, and Extracting from Libraries/Archives<br/> 652 (8)<br/> Version Control<br/> 660 (37)<br/> Static Analysis Tools<br/> 697 (7)<br/> Profiling C Source Code<br/> 698 (6)<br/> Dynamic Analysis Tools<br/> 704 (19)<br/> Source Code Debugging<br/> 704 (13)<br/> Run-Time Performance<br/> 717 (2)<br/> Summary<br/> 719 (1)<br/> Problems<br/> 719 (4)<br/> Xfree 86 and the LINUX GUI<br/> 723 <br/> Introduction<br/> 724 <br/> The Basics of Xfree86<br/> 725 <br/> Comparisons and Advantages<br/> 725 <br/> The Key Components of Interactivity---Events and Requests<br/> 727 <br/> The Role of a Window Manager in the User Interface and fvwm<br/> 729 <br/> Customizing Xfree86 and fvwm<br/> 734 <br/> The GNOME Desktop Manager<br/> 742 <br/> Logging In and Out and the Appearance of the GNOME Desktop<br/> 743 <br/> The GNOME Panel<br/> 744 <br/> Customizing the Panel<br/> 747 <br/> GnoRPM Installation of New Packages<br/> 751 <br/> The Sawfish Window Manager<br/> 755 <br/> The GNOME Control Center<br/> 760 <br/> File Management with the GNOME File Manager<br/> 761 <br/> The KDE Desktop Manager<br/> 763 <br/> Logging In and Out<br/> 764 <br/> The KDE Panel<br/> 766 <br/> New Packages Installation<br/> 771 <br/> The K Window Manager<br/> 775 <br/> The KDE Control Center<br/> 778 <br/> File Management with kfm<br/> 780 <br/> Internet Resources<br/> 782 <br/> Summary<br/> 783 <br/> Problems<br/> 784 <br/>Appendix A: LINUX Installation A-1 <br/>Appendix B: Command Dictionary A-13 <br/>Glossary G-1 <br/>Index l-1
546 ## - LANGUAGE NOTE
Language note eng
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Operating systems (Computers)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Mathematics- General
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Operating systems (Computers)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term UNIX (Computer file)
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Koretsky, Robert.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Sarwar, Syed Aqeel.
942 ## - ADDED ENTRY ELEMENTS
Item type Book
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Date acquired Source of acquisition Full call number Accession Number Copy number Price effective from Koha item type
        Mzumbe University Main Campus Library Mzumbe University Main Campus Library 02/01/2003 Donation 005.432 SAR 0047944 1 12/12/2022 Book

Mzumbe University Library
©2022