Flylib.com
index_S
Previous page
Table of content
Next page
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]
s/// operator
save opcode 2nd
saveall opcode 2nd
savec opcode (PASM)
savetop opcode (PASM)
saving registers
scalars
context 2nd 3rd
values, matching
Scheme
scope
lexical, closures
nested
subroutines
scratchpads, nested
sec opcode (PASM)
sech opcode (PASM)
seek opcode 2nd
selection control structures
sequences
escape
Huffman coding
set opcode 2nd 3rd
set_addr opcode
set_addr opcode (PASM)
set_addrop code
set_chartype opcode (PASM)
set_eh opcode (PASM)
set_encoding opcode (PASM)
setattribute opcode (PASM)
seti_ind opcode (PASM)
setn_ind opcode (PASM)
setp_ind opcode (PASM)
setprop opcode (PASM)
setpropopcode
sets_ind opcode (PASM)
shift opcode (PASM)
shl opcode (PASM)
shortcuts
curried subroutines
printing
typed variables
shr opcode (PASM)
SIGALRM
SIGCHLD
sigils
$
%
@
SIGINT
SIGKILL
siglets
signals 2nd
signatures
multi keyword
NCI functions
subroutines
SIGSEGV
simple loops
simplicity, principle of
sin opcode (PASM)
single values, scalar context
single-character modifiers
singleton opcode (PASM)
sinh opcode (PASM)
size modifier
sizeof opcode (PASM)
sleep opcode (PASM)
smart-match (~~) operators 2nd
snapshots, CVS repositories
source code 2nd [See also code]
compiler module
compiling
interpreter module 2nd
macros
obtaining
optimizer module
parser module
spawnw opcode (PASM)
speed
Spier, Robert
spilling, registers
splice opcode (PASM)
splitting strings
sprintf opcode 2nd
stability
stack-based subroutine calls
stacks
PASM
statements
if
.local
PIR
switch
unless
store_global opcode (PASM)
store_lex opcode 2nd
string_chartype opcode (PASM)
string_encoding opcode (PASM)
stringinfo opcode (PASM)
strings 2nd 3rd 4th
bitwise operators
chopping
code, evaluating
concatenation 2nd
context
copying
formatting
joining
length of
PASM
repeating
scalars
splitting
substrings
testing
structures, control (syntax)
stubs, subroutines
.sub directive 2nd
sub keyword
sub opcode (PASM)
subclass opcode 2nd
submethods
multi keyword
objects
submissions, patches
subroutines 2nd
anonymous
arguments
assertions
closures
continuations
coroutines 2nd
curried
dispatches
Lvalue
macros
matching
multi keyword
multiple
objects
parameters
PASM
PIR
scope
stubs
wrapped
substr opcode 2nd
substr_r opcode (PASM)
subtraction (-) operator
Sugalski, Dan
sweep opcode (PASM)
sweepoff opcode (PASM)
sweepon opcode (PASM)
switch statement
.sym directive
symbol operators 2nd
PIR
synchronous I/O
Synopses
Synopsis (development cycle)
syntax
AST
control structures
handles keyword
object declaration
operators
arithmetic
assignment
binding
bitwise
comparison
conditional
context forcing
hyper
junctions
lists
logical
references
smart-match (~~)
strings
zip
PASM
principle of reuse
rules 2nd 3rd
assertions
backtracking
built-in
escape sequences
hypothetical variables
quantifiers
variables
arrays
context
hashes
pairs
properties
references
scalars
types
sysinfo opcode (PASM)
Previous page
Table of content
Next page
Perl 6 and Parrot Essentials, Second Edition
ISBN: 059600737X
EAN: 2147483647
Year: 2003
Pages: 116
Authors:
Allison Randal
,
Dan Sugalski
,
Leopold Toetsch
BUY ON AMAZON
The .NET Developers Guide to Directory Services Programming
.NET Directory Services Programming Landscape
DirectorySearcher Overview
Returning Many Results with Paged Searches
Creating Users
Authentication Using SDS
Lotus Notes and Domino 6 Development (2nd Edition)
Working with Form-Level Events
Understanding Sections and Section Properties
Adding Framesets to Domino Applications
Understanding the Basics of HTML
Applying Field-Level Security
Adobe After Effects 7.0 Studio Techniques
The Timeline
Keyframes and The Graph Editor
Transform Offsets
Combining Multiple Masks
Offsetting Layers and Time
C++ GUI Programming with Qt 3
Staying Responsive During Intensive Processing
Vectors
Pointer-Based Containers
Connecting and Querying
XML
Cultural Imperative: Global Trends in the 21st Century
Cultural Black Holes
Cognitive Processes
The China Phenomenon
Culture and Globalization
Epilogue After September 11
Comparing, Designing, and Deploying VPNs
The Carriers Carrier Architecture
Designing and Deploying IPsec Remote Access and Teleworker VPNs
Designing and Building SSL Remote Access VPNs (WebVPN)
Summary
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies