home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam    

Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: S

safe compartments : 20.2.2.3. Security features
Safe module : 1.2.5.1. Trojan horses
Sarathy, Gurusamy
10.2.2. Data::Dumper
10.3.2. MLDBM
save stack : 20.4.3. Inside Other Stacks
SBDM module : 10.3.1. DBM
scalars
dereferencing
1.1.3. References to Scalars
1.2.2. Performance Efficiency
dynamic allocation of : 1.2.3. References to Anonymous Storage
dynamic binding : 9.1. Tying Scalars
scalar values (SVs) : 20.3.1. Scalar Values
Scale widgets
A.7. Scale
14.3.10. Scale
schema
evolution of : 11.2.10. Schema Evolution
generation for database : 17.2.1. Oh, and Can You Do This Too?
scope stack : 20.4.3. Inside Other Stacks
scoping, lexical versus dynamic : 3.1.2. Lexical Versus Dynamic Scoping
scratchpads : 3.1.1. Lexical Variables
scripting, advantages of : The Case for Scripting
ScrlListBox function : 14.3.9. Scrollbars and Scrolling
ScrlText function : 14.3.9. Scrollbars and Scrolling
scrollbars (scrolling) : A.6. Scrollbars and Scrolling
Scrolled function : 14.3.9. Scrollbars and Scrolling
scrolling widgets : 14.3.9. Scrollbars and Scrolling
SDBM module : 9.3. Tying Hashes
SDBM_File module : 10.3.1. DBM
search_files subroutine (example) : 19.3. Examples
searching
man pages with perlman : 16.2.2. Searching for Text
for methods : 7.3.1. Searching for Methods
multipattern grep for (example) : 5.5.1. A Fast Multipattern grep
security
eval function and : 5.1. The String Form: Expression Evaluation
module privacy : 6.4. Privacy
references and : 1.2.5.1. Trojan horses
taint checking : 20.2.2.3. Security features
select function : 12.3.2. Multiplexing Using select
Select module
12.3.2. Multiplexing Using select
12.5. IO Objects and Filehandles
select statement (SQL) : 10.4.1.2. Select
selective aliases : 3.3.1. Selective Aliasing
sending sockets : 12.2.2. Sender
serialization : 10.1. Persistence Issues
Data::Dumper module : 10.2.2. Data::Dumper
FreezeThaw module : 10.2.1. FreezeThaw
Storable module : 10.2.3. Storable
servers : 12.4. Real-World Servers
forking : 12.3.1. Multiple Threads of Execution
quiescent : 12.3.3. Nonblocking Filehandles
set_attributes function
11.2.2. Object Encapsulation
11.3.2.2. Queries
database mapping and : 11.2.4. Multivalued Attributes and Database Mapping
setjmp function : 5.6. Using Eval for Time-Outs
shadow classes, SWIG and : 18.3. SWIG Features
shallow binding : 4.5.2. Python
shared string tables : 20.3.3.1. Inside HVs
%SIG variable : 4.2.2. Signal Handlers
SIGALRM signal : 14.5. Timers
SIGIO signal : 12.3. Handling Multiple Clients
signals : 4.2.2. Signal Handlers
ALRM (alarm) : 5.6. Using Eval for Time-Outs
CHLD (child process) : 12.3.1. Multiple Threads of Execution
SIGALRM : 14.5. Timers
SIGIO (I/O) : 12.3. Handling Multiple Clients
smart callbacks : 4.4.1. Using Closures as "Smart" Callbacks
socket call : 12.5. IO Objects and Filehandles
sockets : 12.1. Networking Primer
bidirectional communication : 12.2.3. Bidirectional Communications
handling multiple sockets : 12.3. Handling Multiple Clients
IO::Socket module : 12.2. Socket API and IO::Socket
receiving with : 12.2.1. Receiver
sending with : 12.2.2. Sender
servers and : 12.4. Real-World Servers
Socket API : 12.2. Socket API and IO::Socket
soft references : (see symbolic references)
SpecPerl utility : 14.2.1. GUI Forms: The Easy Way
SpecTcl utility : 14.2.1. GUI Forms: The Easy Way
speed : (see performance)
Sql statement (SQL) : 10.4.2. Win32::ODBC
SQL statements : 10.4.1.1. Basic SQL accesses
ST macro : 20.4.2.1. Returning a variable list of results
stacks
20.2.1. Perl Objects
20.4. Stacks and Messaging Protocol
stashes : (see symbol tables)
static allocation : 1.1. Referring to Existing Variables
static methods : 7.2.5. Class Methods and Attributes
static typing hints : 20.7. A Peek into the Future
statically linked extensions : 19.4. Adding Extensions
Stopwatch facility (example) : 9.1.1. Example: Stopwatch
Storable module : 10.2.3. Storable
store function
9.1. Tying Scalars
11.2.6. Object Identity
Adaptor::DBI module : 11.3.2.1. Storing objects
Adaptor::File module : 11.3.1.1. Storing objects
stores procedures : 10.4.1.6. What DBI does not provide
streamed data, modules for : 10.2. Streamed Data
streams : 4.4.2. Iterators and Streams
strict directive, symbolic references and : 1.5. Symbolic References
strings : 20.3.1. Scalar Values
as filehandles : 3.4.4. Strings as Handles
shared string tables : 20.3.3.1. Inside HVs
struct declaration (C) : 2.1. User-Defined Structures
structures
Academy Award data (example) : 2.4. Pass the Envelope
magic variables : 20.3.6. Magic Variables
nested
B.2. Nested Data Structures
1.3. Nested Data Structures
18.3. SWIG Features
opcodes : 20.2.2.1. Inside opcodes
Perl value types : 20.3. Perl Value Types
PerlInterpreter : 20.2.1.1. Multiple interpreters
printing : 2.5. Pretty-Printing
stacks : 20.4. Stacks and Messaging Protocol
SWIG and : 18.3. SWIG Features
type-checking hints : 20.7. A Peek into the Future
user-defined : 2.1. User-Defined Structures
matrices example : 2.2. Example: Matrices
subroutines
anonymous
3.3.3. Naming Anonymous Subroutines
4.1.2. References to Anonymous Subroutines
BEGIN, compilation and : 6.3. Package Initialization and Destruction
calling : 20.4.1. Calling a Perl Subroutine
closures : 4.3. Closures
delaying loading of : 6.7. Autoloading
dispatch tables : 4.2.1. Dispatch Table
eval function and : 5.1. The String Form: Expression Evaluation
modules/packages and : 6.1. Basic Package
passing arrays/hashes to : 1.2.1. Passing Arrays and Hashes to Subroutines
passing filehandles to : 3.4.2. Passing Filehandles to Subroutines
private names for : 6.4.1. Enforcing Privacy
referencing : 4.1. Subroutine References
substitutions, /e flag with : 5.4.1. Expression Evaluation in Substitutions
substr function : 5.5.2. Extracting Columns from a File
SUPER pseudoclass : 7.2.6.1. Overriding base classes
superclasses : 7.2.6. The Need for Inheritance
SVs (scalar values) : 20.3.1. Scalar Values
SWIG tool
2.1. User-Defined Structures
17.1. On Code Generation
18. Extending Perl:A First Course
C header file and : 18.1.1. The Extension Process
features of : 18.3. SWIG Features
Mandelbrot code example : 18.2.1. Fractals Using SWIG
typemaps : 20.5.7. SWIG Typemaps
XS tool versus : 18.1.2. SWIG or XS?
XSUBs and : 20.4.2. The Called Side: Hand-Coding an XSUB
Symbol module : 3.4. Filehandles, Directory Handles, and Formats
symbol tables
3.1. Perl Variables, Symbol Table, and Scoping
20.2.1. Perl Objects
20.3.4. Glob Values and Symbol Tables
accessing : 6.8. Accessing the Symbol Table
modules/packages and : 6.1.1. Packages and Variables
symbolic references
B.6. Dynamic Behavior
1.5. Symbolic References
1.6.1. Reference Counts
4.1.4. Symbolic References
modules/packages and : 6.1.2. Symbolic References
symbols, importing : 6.5. Importing Symbols
Symdump module : 20.1. Reading the Source
synchronicity : 13.2. Remote Procedure Calls (RPC)
syntax tree : 17.2. Jeeves Example
sysread operator
12.3.3. Nonblocking Filehandles
12.3.2.1. Blocking looms again
12.5. IO Objects and Filehandles
syswrite operator
12.2.3. Bidirectional Communications
12.3.3. Nonblocking Filehandles
12.3.2.1. Blocking looms again
12.5. IO Objects and Filehandles


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.







??????????????@Mail.ru