home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam  


Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: N

namespaces
importing symbols into : 6.5. Importing Symbols
privacy and : 6.4. Privacy
working with multiple : 6.1. Basic Package
naming
anonymous subroutines : 3.3.3. Naming Anonymous Subroutines
modules versus libraries : 6.2. Packages and Files
named hashes : 1.3. Nested Data Structures
predifined variables : 3.2.2.3. Friendly predefined variables with aliases
nested
data structures
B.2. Nested Data Structures
1.3. Nested Data Structures
SWIG and : 18.3. SWIG Features
modules/packages : 6.6. Nesting Packages
Net::FTP module : 12.6.1. Net::FTP
Net::POP3 module : 12.6.2. Net::POP3
networking : 12. Networking with Sockets
bidirectional communication : 12.2.3. Bidirectional Communications
handling multiple clients : 12.3. Handling Multiple Clients
IO objects and filehandles : 12.5. IO Objects and Filehandles
RPC module : 13.2. Remote Procedure Calls (RPC)
servers : 12.4. Real-World Servers
new function
Adaptor::DBI module
11.2.2. Object Encapsulation
11.3.2. Adaptor::DBI
Adaptor::File module : 11.2.2. Object Encapsulation
IO::Socket module : 12.5. IO Objects and Filehandles
NEXTKEY function : 9.3. Tying Hashes
nonnblocking filehandles : 12.3.3. Nonblocking Filehandles
NVs (doubles) : 20.3.1. Scalar Values


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.