start page | rating of books | rating of authors | reviews | copyrights
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: S
- safe compartments : 20.2.2.3. Security features
- Safe module : 1.2.5.1. Trojan horses
- Sarathy, Gurusamy
- 10.2.2. Data::Dumper
- 10.3.2. MLDBM
- save stack : 20.4.3. Inside Other Stacks
- SBDM module : 10.3.1. DBM
- scalars
- dereferencing
- 1.1.3. References to Scalars
- 1.2.2. Performance Efficiency
- dynamic allocation of : 1.2.3. References to Anonymous Storage
- dynamic binding : 9.1. Tying Scalars
- scalar values (SVs) : 20.3.1. Scalar Values
- Scale widgets
- A.7. Scale
- 14.3.10. Scale
- schema
- evolution of : 11.2.10. Schema Evolution
- generation for database : 17.2.1. Oh, and Can You Do This Too?
- scope stack : 20.4.3. Inside Other Stacks
- scoping, lexical versus dynamic : 3.1.2. Lexical Versus Dynamic Scoping
- scratchpads : 3.1.1. Lexical Variables
- scripting, advantages of : The Case for Scripting
- ScrlListBox function : 14.3.9. Scrollbars and Scrolling
- ScrlText function : 14.3.9. Scrollbars and Scrolling
- scrollbars (scrolling) : A.6. Scrollbars and Scrolling
- Scrolled function : 14.3.9. Scrollbars and Scrolling
- scrolling widgets : 14.3.9. Scrollbars and Scrolling
- SDBM module : 9.3. Tying Hashes
- SDBM_File module : 10.3.1. DBM
- search_files subroutine (example) : 19.3. Examples
- searching
- man pages with perlman : 16.2.2. Searching for Text
- for methods : 7.3.1. Searching for Methods
- multipattern grep for (example) : 5.5.1. A Fast Multipattern grep
- security
- eval function and : 5.1. The String Form: Expression Evaluation
- module privacy : 6.4. Privacy
- references and : 1.2.5.1. Trojan horses
- taint checking : 20.2.2.3. Security features
- select function : 12.3.2. Multiplexing Using select
- Select module
- 12.3.2. Multiplexing Using select
- 12.5. IO Objects and Filehandles
- select statement (SQL) : 10.4.1.2. Select
- selective aliases : 3.3.1. Selective Aliasing
- sending sockets : 12.2.2. Sender
- serialization : 10.1. Persistence Issues
- Data::Dumper module : 10.2.2. Data::Dumper
- FreezeThaw module : 10.2.1. FreezeThaw
- Storable module : 10.2.3. Storable
- servers : 12.4. Real-World Servers
- forking : 12.3.1. Multiple Threads of Execution
- quiescent : 12.3.3. Nonblocking Filehandles
- set_attributes function
- 11.2.2. Object Encapsulation
- 11.3.2.2. Queries
- database mapping and : 11.2.4. Multivalued Attributes and Database Mapping
- setjmp function : 5.6. Using Eval for Time-Outs
- shadow classes, SWIG and : 18.3. SWIG Features
- shallow binding : 4.5.2. Python
- shared string tables : 20.3.3.1. Inside HVs
- %SIG variable : 4.2.2. Signal Handlers
- SIGALRM signal : 14.5. Timers
- SIGIO signal : 12.3. Handling Multiple Clients
- signals : 4.2.2. Signal Handlers
- ALRM (alarm) : 5.6. Using Eval for Time-Outs
- CHLD (child process) : 12.3.1. Multiple Threads of Execution
- SIGALRM : 14.5. Timers
- SIGIO (I/O) : 12.3. Handling Multiple Clients
- smart callbacks : 4.4.1. Using Closures as "Smart" Callbacks
- socket call : 12.5. IO Objects and Filehandles
- sockets : 12.1. Networking Primer
- bidirectional communication : 12.2.3. Bidirectional Communications
- handling multiple sockets : 12.3. Handling Multiple Clients
- IO::Socket module : 12.2. Socket API and IO::Socket
- receiving with : 12.2.1. Receiver
- sending with : 12.2.2. Sender
- servers and : 12.4. Real-World Servers
- Socket API : 12.2. Socket API and IO::Socket
- soft references : (see symbolic references)
- SpecPerl utility : 14.2.1. GUI Forms: The Easy Way
- SpecTcl utility : 14.2.1. GUI Forms: The Easy Way
- speed : (see performance)
- Sql statement (SQL) : 10.4.2. Win32::ODBC
- SQL statements : 10.4.1.1. Basic SQL accesses
- ST macro : 20.4.2.1. Returning a variable list of results
- stacks
- 20.2.1. Perl Objects
- 20.4. Stacks and Messaging Protocol
- stashes : (see symbol tables)
- static allocation : 1.1. Referring to Existing Variables
- static methods : 7.2.5. Class Methods and Attributes
- static typing hints : 20.7. A Peek into the Future
- statically linked extensions : 19.4. Adding Extensions
- Stopwatch facility (example) : 9.1.1. Example: Stopwatch
- Storable module : 10.2.3. Storable
- store function
- 9.1. Tying Scalars
- 11.2.6. Object Identity
- Adaptor::DBI module : 11.3.2.1. Storing objects
- Adaptor::File module : 11.3.1.1. Storing objects
- stores procedures : 10.4.1.6. What DBI does not provide
- streamed data, modules for : 10.2. Streamed Data
- streams : 4.4.2. Iterators and Streams
- strict directive, symbolic references and : 1.5. Symbolic References
- strings : 20.3.1. Scalar Values
- as filehandles : 3.4.4. Strings as Handles
- shared string tables : 20.3.3.1. Inside HVs
- struct declaration (C) : 2.1. User-Defined Structures
- structures
- Academy Award data (example) : 2.4. Pass the Envelope
- magic variables : 20.3.6. Magic Variables
- nested
- B.2. Nested Data Structures
- 1.3. Nested Data Structures
- 18.3. SWIG Features
- opcodes : 20.2.2.1. Inside opcodes
- Perl value types : 20.3. Perl Value Types
- PerlInterpreter : 20.2.1.1. Multiple interpreters
- printing : 2.5. Pretty-Printing
- stacks : 20.4. Stacks and Messaging Protocol
- SWIG and : 18.3. SWIG Features
- type-checking hints : 20.7. A Peek into the Future
- user-defined : 2.1. User-Defined Structures
- matrices example : 2.2. Example: Matrices
- subroutines
- anonymous
- 3.3.3. Naming Anonymous Subroutines
- 4.1.2. References to Anonymous Subroutines
- BEGIN, compilation and : 6.3. Package Initialization and Destruction
- calling : 20.4.1. Calling a Perl Subroutine
- closures : 4.3. Closures
- delaying loading of : 6.7. Autoloading
- dispatch tables : 4.2.1. Dispatch Table
- eval function and : 5.1. The String Form: Expression Evaluation
- modules/packages and : 6.1. Basic Package
- passing arrays/hashes to : 1.2.1. Passing Arrays and Hashes to Subroutines
- passing filehandles to : 3.4.2. Passing Filehandles to Subroutines
- private names for : 6.4.1. Enforcing Privacy
- referencing : 4.1. Subroutine References
- substitutions, /e flag with : 5.4.1. Expression Evaluation in Substitutions
- substr function : 5.5.2. Extracting Columns from a File
- SUPER pseudoclass : 7.2.6.1. Overriding base classes
- superclasses : 7.2.6. The Need for Inheritance
- SVs (scalar values) : 20.3.1. Scalar Values
- SWIG tool
- 2.1. User-Defined Structures
- 17.1. On Code Generation
- 18. Extending Perl:A First Course
- C header file and : 18.1.1. The Extension Process
- features of : 18.3. SWIG Features
- Mandelbrot code example : 18.2.1. Fractals Using SWIG
- typemaps : 20.5.7. SWIG Typemaps
- XS tool versus : 18.1.2. SWIG or XS?
- XSUBs and : 20.4.2. The Called Side: Hand-Coding an XSUB
- Symbol module : 3.4. Filehandles, Directory Handles, and Formats
- symbol tables
- 3.1. Perl Variables, Symbol Table, and Scoping
- 20.2.1. Perl Objects
- 20.3.4. Glob Values and Symbol Tables
- accessing : 6.8. Accessing the Symbol Table
- modules/packages and : 6.1.1. Packages and Variables
- symbolic references
- B.6. Dynamic Behavior
- 1.5. Symbolic References
- 1.6.1. Reference Counts
- 4.1.4. Symbolic References
- modules/packages and : 6.1.2. Symbolic References
- symbols, importing : 6.5. Importing Symbols
- Symdump module : 20.1. Reading the Source
- synchronicity : 13.2. Remote Procedure Calls (RPC)
- syntax tree : 17.2. Jeeves Example
- sysread operator
- 12.3.3. Nonblocking Filehandles
- 12.3.2.1. Blocking looms again
- 12.5. IO Objects and Filehandles
- syswrite operator
- 12.2.3. Bidirectional Communications
- 12.3.3. Nonblocking Filehandles
- 12.3.2.1. Blocking looms again
- 12.5. IO Objects and Filehandles
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.
[
Library Home
|
Perl in a Nutshell
| Learning Perl
|
Learning Perl on Win32
|
Programming Perl
|
Advanced Perl Programming
|
Perl Cookbook
]