start page | rating of books | rating of authors | reviews | copyrights

Perl CookbookPerl CookbookSearch this book Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: I

-I command-line option : 12.7. Keeping Your Own Module Directory
-i command-line option : 7.7. Writing a Filter
modifying files with : 7.9. Modifying a File in Place with -i Switch
/i pattern-matching modifier : 6.0. Introduction
I/O operations : 7.0. Introduction
buffering
7.0. Introduction
7.12. Flushing Output
8.0. Introduction
17.3. Communicating over TCP
controlling for other programs : 16.8. Controlling Input and Output of Another Program
flushing output : 7.12. Flushing Output
non-blocking : 7.14. Doing Non-Blocking I/O
preprocessing input : 16.6. Preprocessing Input
random-access I/O : 8.12. Using Random-Access I/O
reading/writing to other programs : 16.4. Reading or Writing to Another Program
ic_cookies program (example) : 19.10. Managing Cookies
idempotency : 19.0. Introduction
If-Modified-Since header : 20.10. Mirroring Web Pages
imaginary numbers : 2.15. Using Complex Numbers
importing from modules
10.14. Redefining a Function
12.0. Introduction
INADDR_ANY
17.1. Writing a TCP Client
17.14. Writing a Multi-Homed Server
@INC array : 12.7. Keeping Your Own Module Directory
#include header, translating with h2ph : 12.14. Using h2ph to Translate C #include Files
indeces of array elements : (see arrays)
indents : (see whitespace)
indices of hash elements : 5.0. Introduction
indirect filehandles
7.0. Introduction
7.16. Storing Filehandles in Variables
indirect notation : 13.0. Introduction
inet_ntoa(�) : 17.0. Introduction
infix (->) notation : 11.0. Introduction
inheritance
13.0. Introduction
13.9. Writing an Inheritable Class
13.12. Solving the Data Inheritance Problem
initializers : (see constructors)
initializing
arrays : 4.1. Specifying a List In Your Program
hashes : 5.0. Introduction
modules : 12.6. Automating Module Clean-Up
inodes : 9.0. Introduction
input
checking for waiting : 15.9. Checking for Waiting Input
comma-separated, parsing : 1.15. Parsing Comma-Separated Data
controlling for other programs : 16.8. Controlling Input and Output of Another Program
editing : 15.11. Editing Input
executing shell commands from (CGI) : 19.6. Executing Commands Without Shell Escapes
expanding variables in : 1.8. Expanding Variables in User Input
Expect-controlled programs and : 15.13. Controlling Another Program with Expect
extracting variable-length fields : 8.9. Processing Variable-Length Text Fields
from HTML forms : (see CGI programming)
parsing command-line arguments : 15.1. Parsing Program Arguments
preprocessing : 16.6. Preprocessing Input
random-access I/O : 8.12. Using Random-Access I/O
reading from keyboard : 15.6. Reading from the Keyboard
reading from other programs : 16.4. Reading or Writing to Another Program
reading passwords : 15.10. Reading Passwords
reading records with pattern separators : 6.7. Reading Records with a Pattern Separator
reading STDERR from programs : 16.7. Reading STDERR from a Program
installing
modules from CPAN : 12.17. Building and Installing a CPAN Module
signal handlers : 16.15. Installing a Signal Handler
instance data
13.0. Introduction
13.3. Managing Instance Data
circular data structures : 13.13. Coping with Circular Data Structures
inheritance and : 13.12. Solving the Data Inheritance Problem
instance methods : 13.0. Introduction
int(�) : 2.3. Rounding Floating-Point Numbers
integers : (see numbers)
interactivity, testing for : 15.2. Testing Whether a Program Is Running Interactively
interfaces : (see user interfaces)
Internet domain sockets : 17.0. Introduction
Internet services : 18.0. Introduction
DNS lookups : 18.1. Simple DNS Lookups
expn and vrfy programs (examples) : 18.9. Program: expn and vrfy
FTP clients : 18.2. Being an FTP Client
mail : (see email)
pinging machines : 18.7. Pinging a Machine
simulating telnet connection : 18.6. Simulating Telnet from a Program
Usenet news : 18.4. Reading and Posting Usenet News Messages
whois service : 18.8. Using Whois to Retrieve Information from the InterNIC
intersections on lists : 4.7. Finding Elements in One Array but Not Another
inverting hashes : 5.8. Inverting a Hash
IO::File module
7.0. Introduction
7.1. Opening a File
temporary files : 7.5. Creating Temporary Files
IO::Handle module : 7.0. Introduction
IO::Pty module : 15.13. Controlling Another Program with Expect
IO::Select module
7.13. Reading from Many Filehandles Without Blocking
16.9. Controlling the Input, Output, and Error of Another Program
IO::Socket module
closing socket after forking : 17.9. Closing a Socket After Forking
IO::Socket::INET class : 17.1. Writing a TCP Client
UDP clients and servers : 17.4. Setting Up a UDP Client
IO::Stty module : 15.13. Controlling Another Program with Expect
ioctl(�)
7.15. Determining the Number of Bytes to Read
10.10. Returning Failure
12.14. Using h2ph to Translate C #include Files
IP addresses
determining your own : 17.8. Finding Your Own Name and Address
DNS lookups : 18.1. Simple DNS Lookups
expn and vrfy programs (examples) : 18.9. Program: expn and vrfy
identifying at socket ends : 17.7. Identifying the Other End of a Socket
multi-homed servers : 17.14. Writing a Multi-Homed Server
packed, converting to ASCII strings : 17.0. Introduction
IPC::Open2 module : 16.8. Controlling Input and Output of Another Program
IPC::Open3 : 16.9. Controlling the Input, Output, and Error of Another Program
IPC::Shareable : 16.12. Sharing Variables in Different Processes
is_safe(�) : 8.17. Testing a File for Trustworthiness
is_verysafe(�) : 8.17. Testing a File for Trustworthiness
@ISA array : 13.0. Introduction
isa(�) (UNIVERSAL) : 13.8. Determining Subclass Membership
iterations : (see arrays; lists)
iterator variables : 4.4. Doing Something with Every Element in a List


Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Library Navigation Links

Copyright © 2001 O'Reilly & Associates. All rights reserved.