Flylib.com
Learning Perl, 5th Edition
Learning Perl, 5th Edition
ISBN: 0596520107
EAN: 2147483647
Year: 2003
Pages: 232
Authors:
Randal Schwartz
,
Tom Phoenix
,
brian d foy
BUY ON AMAZON
Learning Perl, 4th Edition
Table of Contents
Copyright
Preface
History of This Book
Typographical Conventions
Using Code Examples
How to Contact Us
Safari Enabled
Acknowledgments
Chapter 1. Introduction
Section 1.1. Questions and Answers
Section 1.2. What Does
Section 1.3. How Can I Get Perl?
Section 1.4. How Do I Make a Perl Program?
Section 1.5. A Whirlwind Tour of Perl
Section 1.6. Exercises
Chapter 2. Scalar Data
Section 2.1. Numbers
Section 2.2. Strings
Section 2.3. Perl s Built-in Warnings
Section 2.4. Scalar Variables
Section 2.5. Output with print
Section 2.6. The if Control Structure
Section 2.7. Getting User Input
Section 2.8. The chomp Operator
Section 2.9. The while Control Structure
Section 2.10. The undef Value
Section 2.11. The defined Function
Section 2.12. Exercises
Chapter 3. Lists and Arrays
Section 3.1. Accessing Elements of an Array
Section 3.2. Special Array Indices
Section 3.3. List Literals
Section 3.4. List Assignment
Section 3.5. Interpolating Arrays into Strings
Section 3.6. The foreach Control Structure
Section 3.7. Scalar and List Context
Section 3.8. STDIN in List Context
Section 3.9. Exercises
Chapter 4. Subroutines
Section 4.1. Defining a Subroutine
Section 4.2. Invoking a Subroutine
Section 4.3. Return Values
Section 4.4. Arguments
Section 4.5. Private Variables in Subroutines
Section 4.6. Variable-Length Parameter Lists
Section 4.7. Notes on Lexical (my) Variables
Section 4.8. The use strict Pragma
Section 4.9. The return Operator
Section 4.10. Non-Scalar Return Values
Section 4.11. Exercises
Chapter 5. Input and Output
Section 5.1. Input from Standard Input
Section 5.2. Input from the Diamond Operator
Section 5.3. The Invocation Arguments
Section 5.4. Output to Standard Output
Section 5.5. Formatted Output with printf
Section 5.6. Filehandles
Section 5.7. Opening a Filehandle
Section 5.8. Fatal Errors with die
Section 5.9. Using Filehandles
Section 5.10. Reopening a Standard Filehandle
Section 5.11. Exercises
Chapter 6. Hashes
Section 6.1. What Is a Hash?
Section 6.2. Hash Element Access
Section 6.3. Hash Functions
Section 6.4. Typical Use of a Hash
Section 6.5. Exercises
Chapter 7. In the World of Regular Expressions
Section 7.1. What Are Regular Expressions?
Section 7.2. Using Simple Patterns
Section 7.3. Character Classes
Section 7.4. Exercises
Chapter 8. Matching with Regular Expressions
Section 8.1. Matches with m
Section 8.2. Option Modifiers
Section 8.3. Anchors
Section 8.4. The Binding Operator,
Section 8.5. Interpolating into Patterns
Section 8.6. The Match Variables
Section 8.7. General Quantifiers
Section 8.8. Precedence
Section 8.9. A Pattern Test Program
Section 8.10. Exercises
Chapter 9. Processing Text with Regular Expressions
Section 9.1. Substitutions with s
Section 9.2. The split Operator
Section 9.3. The join Function
Section 9.4. m in List Context
Section 9.5. More Powerful Regular Expressions
Section 9.6. Exercises
Chapter 10. More Control Structures
Section 10.1. The unless Control Structure
Section 10.2. The until Control Structure
Section 10.3. Expression Modifiers
Section 10.4. The Naked Block Control Structure
Section 10.5. The elsif Clause
Section 10.6. Autoincrement and Autodecrement
Section 10.7. The for Control Structure
Section 10.8. Loop Controls
Section 10.9. Logical Operators
Section 10.10. Exercise
Chapter 11. File Tests
Section 11.1. File Test Operators
Section 11.2. The stat and lstat Functions
Section 11.3. The localtime Function
Section 11.4. Bitwise Operators
Section 11.5. Using the Special Underscore Filehandle
Section 11.6. Exercises
Chapter 12. Directory Operations
Section 12.1. Moving Around the Directory Tree
Section 12.2. Globbing
Section 12.3. An Alternate Syntax for Globbing
Section 12.4. Directory Handles
Section 12.5. Recursive Directory Listing
Section 12.6. Manipulating Files and Directories
Section 12.7. Removing Files
Section 12.8. Renaming Files
Section 12.9. Links and Files
Section 12.10. Making and Removing Directories
Section 12.11. Modifying Permissions
Section 12.12. Changing Ownership
Section 12.13. Changing Timestamps
Section 12.14. Exercises
Chapter 13. Strings and Sorting
Section 13.1. Finding a Substring with index
Section 13.2. Manipulating a Substring with substr
Section 13.3. Formatting Data with sprintf
Section 13.4. Advanced Sorting
Section 13.5. Exercises
Chapter 14. Process Management
Section 14.1. The system Function
Section 14.2. The exec Function
Section 14.3. The Environment Variables
Section 14.4. Using Backquotes to Capture Output
Section 14.5. Processes as Filehandles
Section 14.6. Getting Down and Dirty with fork
Section 14.7. Sending and Receiving Signals
Section 14.8. Exercises
Chapter 15. Perl Modules
Section 15.1. Finding Modules
Section 15.2. Installing Modules
Section 15.3. Using Simple Modules
Section 15.4. Exercise
Chapter 16. Some Advanced Perl Techniques
Section 16.1. Trapping Errors with eval
Section 16.2. Picking Items from a List with grep
Section 16.3. Transforming Items from a List with map
Section 16.4. Unquoted Hash Keys
Section 16.5. Slices
Section 16.6. Exercise
Exercise Answers
Section A.1. Answers to Chapter 2 Exercises
Section A.2. Answers to Chapter 3 Exercises
Section A.3. Answers to Chapter 4 Exercises
Section A.4. Answers to Chapter 5 Exercises
Section A.5. Answers to Chapter 6 Exercises
Section A.6. Answers to Chapter 7 Exercises
Section A.7. Answers to Chapter 8 Exercises
Section A.8. Answers to Chapter 9 Exercises
Section A.9. Answer to Chapter 10 Exercise
Section A.10. Answers to Chapter 11 Exercises
Section A.11. Answers to Chapter 12 Exercises
Section A.12. Answers to Chapter 13 Exercises
Section A.13. Answers to Chapter 14 Exercises
Section A.14. Answer to Chapter 15 Exercise
Section A.15. Answer to Chapter 16 Exercise
Beyond the Llama
Section B.1. Further Documentation
Section B.2. Regular Expressions
Section B.3. Packages
Section B.4. Extending Perl s Functionality
Section B.5. Some Important Modules
Section B.6. Pragmas
Section B.7. Databases
Section B.8. Other Operators and Functions
Section B.9. Mathematics
Section B.10. Lists and Arrays
Section B.11. Bits and Pieces
Section B.12. Formats
Section B.13. Networking and IPC
Section B.14. Security
Section B.15. Debugging
Section B.16. The Common Gateway Interface (CGI)
Section B.17. Command-Line Options
Section B.18. Built-in Variables
Section B.19. Syntax Extensions
Section B.20. References
Section B.21. Tied Variables
Section B.22. Operator Overloading
Section B.23. Dynamic Loading
Section B.24. Embedding
Section B.25. Converting Other Languages to Perl
Section B.26. Converting find Command Lines to Perl
Section B.27. Command-Line Options in Your Programs
Section B.28. Embedded Documentation
Section B.29. More Ways to Open Filehandles
Section B.30. Locales and Unicode
Section B.31. Threads and Forking
Section B.32. Graphical User Interfaces (GUIs)
Section B.33. And More . . .
Colophon
About the Authors
Colophon
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
Learning Perl, 5th Edition
ISBN: 0596520107
EAN: 2147483647
Year: 2003
Pages: 232
Authors:
Randal Schwartz
,
Tom Phoenix
,
brian d foy
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
Collecting Software Engineering Data
Conducting In-Process Quality Assessments
Measuring Process Capability
Using Function Point Metrics to Measure Software Process Improvements
Process Improvement Economics
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Training
Conclusion
Appendix A MRP vs. Kanban
Appendix C Two-Bin Kanban Systems
Appendix J Abbreviations and Acronyms
Java for RPG Programmers, 2nd Edition
Data Types And Variables
Arrays And Vectors
Date And Time Manipulation
More Java
Appendix A Using Java on the AS/400
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Cisco VPN Products
System Maintenance
Configuring Static Routes
Summary
Deployment Scenarios
Quantitative Methods in Project Management
Organizing and Estimating the Work
Making Quantitative Decisions
Risk-Adjusted Financial Management
Quantitative Time Management
Quantitative Methods in Project Contracts
Comparing, Designing, and Deploying VPNs
AToM Pseudowire Operation
Designing MPLS Layer 3 Site-to-Site VPNs
Ensuring High Availability in an IPsec VPN
Review Questions
Enabling SSL VPNs (WebVPN) on Cisco IOS Devices
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies