start page
|
rating of books
|
rating of authors
|
reviews
|
copyrights
Symbols
|
A
|
B
|
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
|
N
|
O
| P |
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
X
|
Y
|
Z
Index: P
-p command-line option
:
7.7. Writing a Filter
modifying files with :
7.9. Modifying a File in Place with -i Switch
pack(�)
1.4. Converting Between ASCII Characters and Values
8.13. Updating a Random-Access File
converting binary and decimal numbers :
2.4. Converting Between Binary and Decimal
with Tk resize events :
15.16. Responding to Tk Resize Events
package statement
:
12.0. Introduction
__PACKAGE__ symbol
10.4. Determining Current Function Name
12.5. Determining the Caller's Package
packages
(see also
modules
)
12.0. Introduction
12.19. Program: Finding Versions and Descriptions of Installed Modules
determining current/calling :
12.5. Determining the Caller's Package
overriding built-in functions :
12.11. Overriding Built-In Functions
private variables and functions :
12.4. Making Variables Private to a Module
referring to indirectly :
12.13. Referring to Packages Indirectly
paragraphs
counting in files :
8.2. Counting Lines (or Paragraphs or Records) in a File
in pod documentation :
12.16. Documenting Your Module with Pod
reading files backwards by :
8.4. Reading a File Backwards by Line or Paragraph
reformatting :
1.12. Reformatting Paragraphs
paragrep program (example)
:
6.11. Testing for a Valid Pattern
parameterized HTML
:
20.9. Creating HTML Templates
parent classes
accessing overridden methods :
13.10. Accessing Overridden Methods
cloning objects :
13.6. Cloning Objects
inheritance and :
13.12. Solving the Data Inheritance Problem
parse_csv subroutines
:
1.15. Parsing Comma-Separated Data
ParseDate(�)
3.7. Parsing Dates and Times from Strings
3.11. Program: hopdelta
parsing
comma-separated data :
1.15. Parsing Comma-Separated Data
command-line arguments :
15.1. Parsing Program Arguments
commas into numbers :
2.17. Putting Commas in Numbers
datetime from strings :
3.7. Parsing Dates and Times from Strings
filenames :
9.10. Splitting a Filename into Its Component Parts
HTML tags :
20.6. Extracting or Removing HTML Tags
web server log file :
20.12. Parsing a Web Server Log File
partial URLs
:
19.0. Introduction
passing by named parameter
:
10.7. Passing by Named Parameter
passing by reference
:
10.5. Passing Arrays and Hashes by Reference
passwords
randomly generating :
2.7. Generating Random Numbers
reading without echo :
15.10. Reading Passwords
paths
:
19.0. Introduction
pattern matching
(see also
regular expressions
)
1.16. Soundex Matching
6.0. Introduction
abbreviations :
6.20. Matching Abbreviations
across multiple lines :
6.6. Matching Multiple Lines
backtracking :
6.0. Introduction
copying and substituting :
6.1. Copying and Substituting Simultaneously
duplicate words :
6.16. Detecting Duplicate Words
eager :
6.0. Introduction
email addresses :
6.19. Matching a Valid Mail Address
extracting ranges of lines :
6.8. Extracting a Range of Lines
filenames :
9.6. Globbing, or Getting a List of Filenames Matching a Pattern
fuzzy matching :
6.13. Approximate Matching
greedy vs. non-greedy
6.0. Introduction
6.15. Greedy and Non-Greedy Matches
history.db file :
14.11. Program: ggh - Grep Netscape Global History
honoring locale settings :
6.12. Honoring Locale Settings in Regular Expressions
logical functionality in :
6.17. Expressing AND, OR, and NOT in a Single Pattern
matching letters :
6.2. Matching Letters
matching words :
6.3. Matching Words
modifiers for :
6.0. Introduction
multiple-byte charactrs :
6.18. Matching Multiple-Byte Characters
Nth matches :
6.5. Finding the Nth Occurrence of a Match
shell wildcards for :
6.9. Matching Shell Globs as Regular Expressions
tcgrep program :
6.22. Program: tcgrep
testing for invalid patterns :
6.11. Testing for a Valid Pattern
urlify program :
6.21. Program: urlify
useful and interesting patterns (list) :
6.23. Regular Expression Grabbag
using /o modifier :
6.10. Speeding Up Interpolated Matches
where last pattern ended :
6.14. Matching from Where the Last Pattern Left Off
pattern separators, reading data with
:
6.7. Reading Records with a Pattern Separator
pattern-matching
progressive (with /g) :
6.5. Finding the Nth Occurrence of a Match
PDL modules
matrix multiplication :
2.14. Multiplying Matrices
periods (.) in numbers
:
2.17. Putting Commas in Numbers
Perl
programming conventions :
Conventions Used in This Book
references on :
Other Books
release notes :
Platform Notes
$PERL5LIB environment variable
:
12.7. Keeping Your Own Module Directory
perldoc program
:
12.16. Documenting Your Module with Pod
perlmenu module
:
15.12. Managing the Screen
permissions, testing files for trustworthiness
:
8.17. Testing a File for Trustworthiness
permutations, generating all possible
:
4.19. Program: permute
permute program
:
4.19. Program: permute
persistent
data structures :
11.14. Transparently Persistent Data Structures
database data :
14.9. Persistent Data
subroutine variables :
10.3. Creating Persistent Private Variables
PF_ constants
:
17.0. Introduction
.ph filename extension
:
12.14. Using h2ph to Translate C #include Files
pinging machines
:
18.7. Pinging a Machine
pipe(�)
16.0. Introduction
16.10. Communicating Between Related Processes
pipe1 program (example)
:
16.10. Communicating Between Related Processes
pipe2 program (example)
:
16.10. Communicating Between Related Processes
pipe3 program (example)
:
16.10. Communicating Between Related Processes
pipe4 program (example)
:
16.10. Communicating Between Related Processes
pipe5 program (example)
:
16.10. Communicating Between Related Processes
pipe6 program (example)
:
16.10. Communicating Between Related Processes
places(�)
:
13.14. Overloading Operators
pluralizing words
:
2.18. Printing Correct Plurals
.pm filename extension
:
12.0. Introduction
pmdesc program (example)
:
12.19. Program: Finding Versions and Descriptions of Installed Modules
pod documentation
:
12.16. Documenting Your Module with Pod
sorting =head1 sections :
15.19. Program: tkshufflepod
pod2html, pod2text tools
:
12.16. Documenting Your Module with Pod
pop(�)
circular lists :
4.16. Implementing a Circular List
on multiple array elements :
4.11. Processing Multiple Elements of an Array
Tie::IxHash module and :
5.6. Retrieving from a Hash in Insertion Order
POP3 servers
:
18.5. Reading Mail with POP3
popgrep1 program (example)
:
6.10. Speeding Up Interpolated Matches
popgrep2 program (example)
:
6.10. Speeding Up Interpolated Matches
popgrep3 program (example)
:
6.10. Speeding Up Interpolated Matches
popgrep4 program (example)
:
6.10. Speeding Up Interpolated Matches
port connection attempts, logging
:
17.17. Program: backsniff
pos(�)
:
6.14. Matching from Where the Last Pattern Left Off
POSIX module
blocking signals :
16.20. Blocking Signals
floor(�) and ceil(�) :
2.3. Rounding Floating-Point Numbers
trigonometric functions :
2.12. Calculating More Trigonometric Functions
POSIX termios interface
:
15.8. Using POSIX termios
POSIX::setsid function
:
17.15. Making a Daemon Server
POST method
19.0. Introduction
19.1. Writing a CGI Script
20.2. Automating Form Submission
posting Usenet messages
:
18.4. Reading and Posting Usenet News Messages
pragmas
:
12.0. Introduction
pre-forking servers
:
17.12. Pre-Forking Servers
preallocating memory for hashes
:
5.13. Presizing a Hash
precision, controlling in output
:
13.14. Overloading Operators
preforker program (example)
:
17.12. Pre-Forking Servers
prime numbers, calculating
:
2.19. Program: Calculating Prime Factors
prime_pattern program (example)
:
6.16. Detecting Duplicate Words
print(�)
:
17.0. Introduction
print_line program (example)
:
8.8. Reading a Particular Line in a File
printf(�)
%c format :
1.4. Converting Between ASCII Characters and Values
rounding floating-point numbers :
2.3. Rounding Floating-Point Numbers
printing
data structures :
11.11. Printing Data Structures
datetime information :
3.8. Printing a Date
hashes :
5.5. Printing a Hash
lists with commas :
4.2. Printing a List with Commas
simultaneously to multiple filehandles :
7.18. Printing to Many Filehandles Simultaneously
specific lines from files :
7.0. Introduction
private
methods :
13.0. Introduction
module variables and functions :
12.4. Making Variables Private to a Module
subroutine variables :
10.2. Making Variables Private to a Function
processes
:
16.0. Introduction
catching Ctrl-C :
16.18. Catching Ctrl-C
communicating between :
16.10. Communicating Between Related Processes
controlling program input/output :
16.8. Controlling Input and Output of Another Program
creating :
16.0. Introduction
filtering output :
16.5. Filtering Your Own Output
gathering program output :
16.1. Gathering Output from a Program
groups
7.22. Program: lockarea
16.14. Sending a Signal
imitating files with named pipes :
16.11. Making a Process Look Like a File with Named Pipes
preprocessing input :
16.6. Preprocessing Input
reading from/writing to programs :
16.4. Reading or Writing to Another Program
reading STDERR from programs :
16.7. Reading STDERR from a Program
replacing programs :
16.3. Replacing the Current Program with a Different One
running multiple programs :
16.2. Running Another Program
sharing variables among :
16.12. Sharing Variables in Different Processes
signals :
16.0. Introduction
blocking :
16.20. Blocking Signals
handlers for :
16.15. Installing a Signal Handler
listing available :
16.13. Listing Available Signals
sending :
16.14. Sending a Signal
timing out operations :
16.21. Timing Out an Operation
zombies
16.0. Introduction
16.19. Avoiding Zombie Processes
programs
command-line arguments, parsing :
15.1. Parsing Program Arguments
controlling input/output of :
16.8. Controlling Input and Output of Another Program
controlling with Expect :
15.13. Controlling Another Program with Expect
filtering output :
16.5. Filtering Your Own Output
gathering output from :
16.1. Gathering Output from a Program
interface : (see
user interfaces
)
preprocessing input :
16.6. Preprocessing Input
reading from/writing to :
16.4. Reading or Writing to Another Program
reading STDERR from :
16.7. Reading STDERR from a Program
replacing :
16.3. Replacing the Current Program with a Different One
running multiple :
16.2. Running Another Program
simulating telnet from :
18.6. Simulating Telnet from a Program
testing if running interactively :
15.2. Testing Whether a Program Is Running Interactively
programs, CGI
: (see
CGI programming
)
progressive matching
:
6.5. Finding the Nth Occurrence of a Match
protocols for Internet
:
18.0. Introduction
protocols, socket
:
17.0. Introduction
prototypes
10.11. Prototyping Functions
13.0. Introduction
proxy, submitting forms through
:
20.2. Automating Form Submission
pseudo-random numbers
: (see
random, numbers
)
psgrep program (example)
:
1.18. Program: psgrep
public methods
:
13.0. Introduction
push(�)
4.9. Appending One Array to Another
11.2. Making Hashes of Arrays
circular lists :
4.16. Implementing a Circular List
Tie::IxHash module and :
5.6. Retrieving from a Hash in Insertion Order
Symbols
|
A
|
B
|
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
|
N
|
O
| P |
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
X
|
Y
|
Z
Copyright © 2001
O'Reilly & Associates. All rights reserved.