Flylib.com
Writing Perl Modules for CPAN
Writing Perl Modules for CPAN
ISBN: 159059018X
EAN: 2147483647
Year: 2002
Pages: 110
Authors:
Sam Tregar
BUY ON AMAZON
Writing Perl Modules for CPAN
Table of Contents
Introduction
System Requirements
Perl Version
Chapter 1: CPAN
Why Contribute to CPAN?
Network Topology
Browsing CPAN
Searching CPAN
Installing CPAN Modules
ActivePerl PPM
Bundles
CPAN s Future
Summary
Chapter 2: Perl Module Basics
Using Modules
Packages
Modules
Read the Fine Manuals
Summary
Chapter 3: Module Design and Implementation
Check Your Slack
Size Matters
Document First
Interface Design
Summary
Chapter 4: CPAN Module Distributions
Module Installation
Always Begin with h2xs
Exploring the Distribution
Portability
Choosing a License
Summary
Chapter 5: Submitting Your Module to CPAN
Requesting Comments
Requesting a CPAN Author ID
Registering Your Namespace
Uploading Your Module Distribution
Post-Upload Processing
Summary
Chapter 6: Module Maintenance
Managing the Source
Making Releases
Summary
Chapter 7: Great CPAN Modules
What Makes a Great CPAN Module?
CGI.pm
DBI
Storable
Net::FTP
LWP
XML::SAX
Parse::RecDescent
Summary
Chapter 8: Programming Perl in C
Why C?
The Perl C API
References
Summary
Chapter 9: Writing C Modules with XS
Getting Started with XS
XSUB Techniques
XS Interface Design and Construction
Learning More about XS
Summary
Chapter 10: Writing C Modules with Inline::C
Inline::C Walkthrough
Getting Up Close and Personal
Getting Started with Inline::C
Inline::C Techniques
Learning More about Inline::C
Summary
Chapter 11: CGI Application Modules for CPAN
Introduction to CGI::Application
Advanced CGI::Application
CGI::Application and CPAN
Summary
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y-Z
List of Figures
List of Tables
List of Code Examples
List of Sidebars
Writing Perl Modules for CPAN
ISBN: 159059018X
EAN: 2147483647
Year: 2002
Pages: 110
Authors:
Sam Tregar
BUY ON AMAZON
Beginning Cryptography with Java
Symmetric Key Cryptography
Asymmetric Key Cryptography
Object Description in Cryptography Using ASN.1
CMS and S/MIME
Appendix C Using the Bouncy Castle API for Elliptic Curve
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Managing Project Constraints and Documenting Risks
Quantifying and Analyzing Activity Risks
Managing Activity Risks
Managing Project Risk
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Producing a Release Build
Determining a Days Number Within a Given Year
Exceptions and Safety
Implementing a Dynamically Sized Matrix
Creating a Thread
SQL Hacks
Hack 45. Process Web Server Logs
Hack 47. Exploit an SQL Injection Vulnerability
Hack 50. Combine Tables Containing Different Data
Hack 59. Define Personalized Parameters
Hack 94. Create Users and Administrators
Managing Enterprise Systems with the Windows Script Host
Logon Scripts and Scheduling
Networking Resources
File Operations
Internet Applications
System Administration
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Computer Network Basics
Designing and Installing Distributed Video Systems
Troubleshooting Video Systems
Troubleshooting and Maintaining a Home Security System
Appendix A Home Technology Project Management
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies