home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam  


Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: P

-p command-line option : 7.7. Writing a Filter
modifying files with : 7.9. Modifying a File in Place with -i Switch
pack( )
1.4. Converting Between ASCII Characters and Values
8.13. Updating a Random-Access File
converting binary and decimal numbers : 2.4. Converting Between Binary and Decimal
with Tk resize events : 15.16. Responding to Tk Resize Events
package statement : 12.0. Introduction
__PACKAGE__ symbol
10.4. Determining Current Function Name
12.5. Determining the Caller's Package
packages
(see also modules)
12.0. Introduction
12.19. Program: Finding Versions and Descriptions of Installed Modules
determining current/calling : 12.5. Determining the Caller's Package
overriding built-in functions : 12.11. Overriding Built-In Functions
private variables and functions : 12.4. Making Variables Private to a Module
referring to indirectly : 12.13. Referring to Packages Indirectly
paragraphs
counting in files : 8.2. Counting Lines (or Paragraphs or Records) in a File
in pod documentation : 12.16. Documenting Your Module with Pod
reading files backwards by : 8.4. Reading a File Backwards by Line or Paragraph
reformatting : 1.12. Reformatting Paragraphs
paragrep program (example) : 6.11. Testing for a Valid Pattern
parameterized HTML : 20.9. Creating HTML Templates
parent classes
accessing overridden methods : 13.10. Accessing Overridden Methods
cloning objects : 13.6. Cloning Objects
inheritance and : 13.12. Solving the Data Inheritance Problem
parse_csv subroutines : 1.15. Parsing Comma-Separated Data
ParseDate( )
3.7. Parsing Dates and Times from Strings
3.11. Program: hopdelta
parsing
comma-separated data : 1.15. Parsing Comma-Separated Data
command-line arguments : 15.1. Parsing Program Arguments
commas into numbers : 2.17. Putting Commas in Numbers
datetime from strings : 3.7. Parsing Dates and Times from Strings
filenames : 9.10. Splitting a Filename into Its Component Parts
HTML tags : 20.6. Extracting or Removing HTML Tags
web server log file : 20.12. Parsing a Web Server Log File
partial URLs : 19.0. Introduction
passing by named parameter : 10.7. Passing by Named Parameter
passing by reference : 10.5. Passing Arrays and Hashes by Reference
passwords
randomly generating : 2.7. Generating Random Numbers
reading without echo : 15.10. Reading Passwords
paths : 19.0. Introduction
pattern matching
(see also regular expressions)
1.16. Soundex Matching
6.0. Introduction
abbreviations : 6.20. Matching Abbreviations
across multiple lines : 6.6. Matching Multiple Lines
backtracking : 6.0. Introduction
copying and substituting : 6.1. Copying and Substituting Simultaneously
duplicate words : 6.16. Detecting Duplicate Words
eager : 6.0. Introduction
email addresses : 6.19. Matching a Valid Mail Address
extracting ranges of lines : 6.8. Extracting a Range of Lines
filenames : 9.6. Globbing, or Getting a List of Filenames Matching a Pattern
fuzzy matching : 6.13. Approximate Matching
greedy vs. non-greedy
6.0. Introduction
6.15. Greedy and Non-Greedy Matches
history.db file : 14.11. Program: ggh - Grep Netscape Global History
honoring locale settings : 6.12. Honoring Locale Settings in Regular Expressions
logical functionality in : 6.17. Expressing AND, OR, and NOT in a Single Pattern
matching letters : 6.2. Matching Letters
matching words : 6.3. Matching Words
modifiers for : 6.0. Introduction
multiple-byte charactrs : 6.18. Matching Multiple-Byte Characters
Nth matches : 6.5. Finding the Nth Occurrence of a Match
shell wildcards for : 6.9. Matching Shell Globs as Regular Expressions
tcgrep program : 6.22. Program: tcgrep
testing for invalid patterns : 6.11. Testing for a Valid Pattern
urlify program : 6.21. Program: urlify
useful and interesting patterns (list) : 6.23. Regular Expression Grabbag
using /o modifier : 6.10. Speeding Up Interpolated Matches
where last pattern ended : 6.14. Matching from Where the Last Pattern Left Off
pattern separators, reading data with : 6.7. Reading Records with a Pattern Separator
pattern-matching
progressive (with /g) : 6.5. Finding the Nth Occurrence of a Match
PDL modules
matrix multiplication : 2.14. Multiplying Matrices
periods (.) in numbers : 2.17. Putting Commas in Numbers
Perl
programming conventions : Conventions Used in This Book
references on : Other Books
release notes : Platform Notes
$PERL5LIB environment variable : 12.7. Keeping Your Own Module Directory
perldoc program : 12.16. Documenting Your Module with Pod
perlmenu module : 15.12. Managing the Screen
permissions, testing files for trustworthiness : 8.17. Testing a File for Trustworthiness
permutations, generating all possible : 4.19. Program: permute
permute program : 4.19. Program: permute
persistent
data structures : 11.14. Transparently Persistent Data Structures
database data : 14.9. Persistent Data
subroutine variables : 10.3. Creating Persistent Private Variables
PF_ constants : 17.0. Introduction
.ph filename extension : 12.14. Using h2ph to Translate C #include Files
pinging machines : 18.7. Pinging a Machine
pipe( )
16.0. Introduction
16.10. Communicating Between Related Processes
pipe1 program (example) : 16.10. Communicating Between Related Processes
pipe2 program (example) : 16.10. Communicating Between Related Processes
pipe3 program (example) : 16.10. Communicating Between Related Processes
pipe4 program (example) : 16.10. Communicating Between Related Processes
pipe5 program (example) : 16.10. Communicating Between Related Processes
pipe6 program (example) : 16.10. Communicating Between Related Processes
places( ) : 13.14. Overloading Operators
pluralizing words : 2.18. Printing Correct Plurals
.pm filename extension : 12.0. Introduction
pmdesc program (example) : 12.19. Program: Finding Versions and Descriptions of Installed Modules
pod documentation : 12.16. Documenting Your Module with Pod
sorting =head1 sections : 15.19. Program: tkshufflepod
pod2html, pod2text tools : 12.16. Documenting Your Module with Pod
pop( )
circular lists : 4.16. Implementing a Circular List
on multiple array elements : 4.11. Processing Multiple Elements of an Array
Tie::IxHash module and : 5.6. Retrieving from a Hash in Insertion Order
POP3 servers : 18.5. Reading Mail with POP3
popgrep1 program (example) : 6.10. Speeding Up Interpolated Matches
popgrep2 program (example) : 6.10. Speeding Up Interpolated Matches
popgrep3 program (example) : 6.10. Speeding Up Interpolated Matches
popgrep4 program (example) : 6.10. Speeding Up Interpolated Matches
port connection attempts, logging : 17.17. Program: backsniff
pos( ) : 6.14. Matching from Where the Last Pattern Left Off
POSIX module
blocking signals : 16.20. Blocking Signals
floor( ) and ceil( ) : 2.3. Rounding Floating-Point Numbers
trigonometric functions : 2.12. Calculating More Trigonometric Functions
POSIX termios interface : 15.8. Using POSIX termios
POSIX::setsid function : 17.15. Making a Daemon Server
POST method
19.0. Introduction
19.1. Writing a CGI Script
20.2. Automating Form Submission
posting Usenet messages : 18.4. Reading and Posting Usenet News Messages
pragmas : 12.0. Introduction
pre-forking servers : 17.12. Pre-Forking Servers
preallocating memory for hashes : 5.13. Presizing a Hash
precision, controlling in output : 13.14. Overloading Operators
preforker program (example) : 17.12. Pre-Forking Servers
prime numbers, calculating : 2.19. Program: Calculating Prime Factors
prime_pattern program (example) : 6.16. Detecting Duplicate Words
print( ) : 17.0. Introduction
print_line program (example) : 8.8. Reading a Particular Line in a File
printf( )
%c format : 1.4. Converting Between ASCII Characters and Values
rounding floating-point numbers : 2.3. Rounding Floating-Point Numbers
printing
data structures : 11.11. Printing Data Structures
datetime information : 3.8. Printing a Date
hashes : 5.5. Printing a Hash
lists with commas : 4.2. Printing a List with Commas
simultaneously to multiple filehandles : 7.18. Printing to Many Filehandles Simultaneously
specific lines from files : 7.0. Introduction
private
methods : 13.0. Introduction
module variables and functions : 12.4. Making Variables Private to a Module
subroutine variables : 10.2. Making Variables Private to a Function
processes : 16.0. Introduction
catching Ctrl-C : 16.18. Catching Ctrl-C
communicating between : 16.10. Communicating Between Related Processes
controlling program input/output : 16.8. Controlling Input and Output of Another Program
creating : 16.0. Introduction
filtering output : 16.5. Filtering Your Own Output
gathering program output : 16.1. Gathering Output from a Program
groups
7.22. Program: lockarea
16.14. Sending a Signal
imitating files with named pipes : 16.11. Making a Process Look Like a File with Named Pipes
preprocessing input : 16.6. Preprocessing Input
reading from/writing to programs : 16.4. Reading or Writing to Another Program
reading STDERR from programs : 16.7. Reading STDERR from a Program
replacing programs : 16.3. Replacing the Current Program with a Different One
running multiple programs : 16.2. Running Another Program
sharing variables among : 16.12. Sharing Variables in Different Processes
signals : 16.0. Introduction
blocking : 16.20. Blocking Signals
handlers for : 16.15. Installing a Signal Handler
listing available : 16.13. Listing Available Signals
sending : 16.14. Sending a Signal
timing out operations : 16.21. Timing Out an Operation
zombies
16.0. Introduction
16.19. Avoiding Zombie Processes
programs
command-line arguments, parsing : 15.1. Parsing Program Arguments
controlling input/output of : 16.8. Controlling Input and Output of Another Program
controlling with Expect : 15.13. Controlling Another Program with Expect
filtering output : 16.5. Filtering Your Own Output
gathering output from : 16.1. Gathering Output from a Program
interface : (see user interfaces)
preprocessing input : 16.6. Preprocessing Input
reading from/writing to : 16.4. Reading or Writing to Another Program
reading STDERR from : 16.7. Reading STDERR from a Program
replacing : 16.3. Replacing the Current Program with a Different One
running multiple : 16.2. Running Another Program
simulating telnet from : 18.6. Simulating Telnet from a Program
testing if running interactively : 15.2. Testing Whether a Program Is Running Interactively
programs, CGI : (see CGI programming)
progressive matching : 6.5. Finding the Nth Occurrence of a Match
protocols for Internet : 18.0. Introduction
protocols, socket : 17.0. Introduction
prototypes
10.11. Prototyping Functions
13.0. Introduction
proxy, submitting forms through : 20.2. Automating Form Submission
pseudo-random numbers : (see random, numbers)
psgrep program (example) : 1.18. Program: psgrep
public methods : 13.0. Introduction
push( )
4.9. Appending One Array to Another
11.2. Making Hashes of Arrays
circular lists : 4.16. Implementing a Circular List
Tie::IxHash module and : 5.6. Retrieving from a Hash in Insertion Order


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.