start page
|
rating of books
|
rating of authors
|
reviews
|
copyrights
Symbols
|
A
|
B
|
C
|
D
|
E
|
F
|
G
|
H
| I |
J
|
K
|
L
|
M
|
N
|
O
|
P
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
X
|
Y
|
Z
Index: I
-I command-line option
:
12.7. Keeping Your Own Module Directory
-i command-line option
:
7.7. Writing a Filter
modifying files with :
7.9. Modifying a File in Place with -i Switch
/i pattern-matching modifier
:
6.0. Introduction
I/O operations
:
7.0. Introduction
buffering
7.0. Introduction
7.12. Flushing Output
8.0. Introduction
17.3. Communicating over TCP
controlling for other programs :
16.8. Controlling Input and Output of Another Program
flushing output :
7.12. Flushing Output
non-blocking :
7.14. Doing Non-Blocking I/O
preprocessing input :
16.6. Preprocessing Input
random-access I/O :
8.12. Using Random-Access I/O
reading/writing to other programs :
16.4. Reading or Writing to Another Program
ic_cookies program (example)
:
19.10. Managing Cookies
idempotency
:
19.0. Introduction
If-Modified-Since header
:
20.10. Mirroring Web Pages
imaginary numbers
:
2.15. Using Complex Numbers
importing from modules
10.14. Redefining a Function
12.0. Introduction
INADDR_ANY
17.1. Writing a TCP Client
17.14. Writing a Multi-Homed Server
@INC array
:
12.7. Keeping Your Own Module Directory
#include header, translating with h2ph
:
12.14. Using h2ph to Translate C #include Files
indeces of array elements
: (see
arrays
)
indents
: (see
whitespace
)
indices of hash elements
:
5.0. Introduction
indirect filehandles
7.0. Introduction
7.16. Storing Filehandles in Variables
indirect notation
:
13.0. Introduction
inet_ntoa(�)
:
17.0. Introduction
infix (->) notation
:
11.0. Introduction
inheritance
13.0. Introduction
13.9. Writing an Inheritable Class
13.12. Solving the Data Inheritance Problem
initializers
: (see
constructors
)
initializing
arrays :
4.1. Specifying a List In Your Program
hashes :
5.0. Introduction
modules :
12.6. Automating Module Clean-Up
inodes
:
9.0. Introduction
input
checking for waiting :
15.9. Checking for Waiting Input
comma-separated, parsing :
1.15. Parsing Comma-Separated Data
controlling for other programs :
16.8. Controlling Input and Output of Another Program
editing :
15.11. Editing Input
executing shell commands from (CGI) :
19.6. Executing Commands Without Shell Escapes
expanding variables in :
1.8. Expanding Variables in User Input
Expect-controlled programs and :
15.13. Controlling Another Program with Expect
extracting variable-length fields :
8.9. Processing Variable-Length Text Fields
from HTML forms : (see
CGI programming
)
parsing command-line arguments :
15.1. Parsing Program Arguments
preprocessing :
16.6. Preprocessing Input
random-access I/O :
8.12. Using Random-Access I/O
reading from keyboard :
15.6. Reading from the Keyboard
reading from other programs :
16.4. Reading or Writing to Another Program
reading passwords :
15.10. Reading Passwords
reading records with pattern separators :
6.7. Reading Records with a Pattern Separator
reading STDERR from programs :
16.7. Reading STDERR from a Program
installing
modules from CPAN :
12.17. Building and Installing a CPAN Module
signal handlers :
16.15. Installing a Signal Handler
instance data
13.0. Introduction
13.3. Managing Instance Data
circular data structures :
13.13. Coping with Circular Data Structures
inheritance and :
13.12. Solving the Data Inheritance Problem
instance methods
:
13.0. Introduction
int(�)
:
2.3. Rounding Floating-Point Numbers
integers
: (see
numbers
)
interactivity, testing for
:
15.2. Testing Whether a Program Is Running Interactively
interfaces
: (see
user interfaces
)
Internet domain sockets
:
17.0. Introduction
Internet services
:
18.0. Introduction
DNS lookups :
18.1. Simple DNS Lookups
expn and vrfy programs (examples) :
18.9. Program: expn and vrfy
FTP clients :
18.2. Being an FTP Client
mail : (see
email
)
pinging machines :
18.7. Pinging a Machine
simulating telnet connection :
18.6. Simulating Telnet from a Program
Usenet news :
18.4. Reading and Posting Usenet News Messages
whois service :
18.8. Using Whois to Retrieve Information from the InterNIC
intersections on lists
:
4.7. Finding Elements in One Array but Not Another
inverting hashes
:
5.8. Inverting a Hash
IO::File module
7.0. Introduction
7.1. Opening a File
temporary files :
7.5. Creating Temporary Files
IO::Handle module
:
7.0. Introduction
IO::Pty module
:
15.13. Controlling Another Program with Expect
IO::Select module
7.13. Reading from Many Filehandles Without Blocking
16.9. Controlling the Input, Output, and Error of Another Program
IO::Socket module
closing socket after forking :
17.9. Closing a Socket After Forking
IO::Socket::INET class :
17.1. Writing a TCP Client
UDP clients and servers :
17.4. Setting Up a UDP Client
IO::Stty module
:
15.13. Controlling Another Program with Expect
ioctl(�)
7.15. Determining the Number of Bytes to Read
10.10. Returning Failure
12.14. Using h2ph to Translate C #include Files
IP addresses
determining your own :
17.8. Finding Your Own Name and Address
DNS lookups :
18.1. Simple DNS Lookups
expn and vrfy programs (examples) :
18.9. Program: expn and vrfy
identifying at socket ends :
17.7. Identifying the Other End of a Socket
multi-homed servers :
17.14. Writing a Multi-Homed Server
packed, converting to ASCII strings :
17.0. Introduction
IPC::Open2 module
:
16.8. Controlling Input and Output of Another Program
IPC::Open3
:
16.9. Controlling the Input, Output, and Error of Another Program
IPC::Shareable
:
16.12. Sharing Variables in Different Processes
is_safe(�)
:
8.17. Testing a File for Trustworthiness
is_verysafe(�)
:
8.17. Testing a File for Trustworthiness
@ISA array
:
13.0. Introduction
isa(�) (UNIVERSAL)
:
13.8. Determining Subclass Membership
iterations
: (see
arrays
;
lists
)
iterator variables
:
4.4. Doing Something with Every Element in a List
Symbols
|
A
|
B
|
C
|
D
|
E
|
F
|
G
|
H
| I |
J
|
K
|
L
|
M
|
N
|
O
|
P
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
X
|
Y
|
Z
Copyright © 2001
O'Reilly & Associates. All rights reserved.