Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: S
- safe compartments
: 20.2.2.3. Security features
- Safe module
: 1.2.5.1. Trojan horses
- Sarathy, Gurusamy
- 10.2.2. Data::Dumper
- 10.3.2. MLDBM
- save stack
: 20.4.3. Inside Other Stacks
- SBDM module
: 10.3.1. DBM
- scalars
- dereferencing
- 1.1.3. References to Scalars
- 1.2.2. Performance Efficiency
- dynamic allocation of
: 1.2.3. References to Anonymous Storage
- dynamic binding
: 9.1. Tying Scalars
- scalar values (SVs)
: 20.3.1. Scalar Values
- Scale widgets
- A.7. Scale
- 14.3.10. Scale
- schema
- evolution of
: 11.2.10. Schema Evolution
- generation for database
: 17.2.1. Oh, and Can You Do This Too?
- scope stack
: 20.4.3. Inside Other Stacks
- scoping, lexical versus dynamic
: 3.1.2. Lexical Versus Dynamic Scoping
- scratchpads
: 3.1.1. Lexical Variables
- scripting, advantages of
: The Case for Scripting
- ScrlListBox function
: 14.3.9. Scrollbars and Scrolling
- ScrlText function
: 14.3.9. Scrollbars and Scrolling
- scrollbars (scrolling)
: A.6. Scrollbars and Scrolling
- Scrolled function
: 14.3.9. Scrollbars and Scrolling
- scrolling widgets
: 14.3.9. Scrollbars and Scrolling
- SDBM module
: 9.3. Tying Hashes
- SDBM_File module
: 10.3.1. DBM
- search_files subroutine (example)
: 19.3. Examples
- searching
- man pages with perlman
: 16.2.2. Searching for Text
- for methods
: 7.3.1. Searching for Methods
- multipattern grep for (example)
: 5.5.1. A Fast Multipattern grep
- security
- eval function and
: 5.1. The String Form: Expression Evaluation
- module privacy
: 6.4. Privacy
- references and
: 1.2.5.1. Trojan horses
- taint checking
: 20.2.2.3. Security features
- select function
: 12.3.2. Multiplexing Using select
- Select module
- 12.3.2. Multiplexing Using select
- 12.5. IO Objects and Filehandles
- select statement (SQL)
: 10.4.1.2. Select
- selective aliases
: 3.3.1. Selective Aliasing
- sending sockets
: 12.2.2. Sender
- serialization
: 10.1. Persistence Issues
- Data::Dumper module
: 10.2.2. Data::Dumper
- FreezeThaw module
: 10.2.1. FreezeThaw
- Storable module
: 10.2.3. Storable
- servers
: 12.4. Real-World Servers
- forking
: 12.3.1. Multiple Threads of Execution
- quiescent
: 12.3.3. Nonblocking Filehandles
- set_attributes function
- 11.2.2. Object Encapsulation
- 11.3.2.2. Queries
- database mapping and
: 11.2.4. Multivalued Attributes and Database Mapping
- setjmp function
: 5.6. Using Eval for Time-Outs
- shadow classes, SWIG and
: 18.3. SWIG Features
- shallow binding
: 4.5.2. Python
- shared string tables
: 20.3.3.1. Inside HVs
- %SIG variable
: 4.2.2. Signal Handlers
- SIGALRM signal
: 14.5. Timers
- SIGIO signal
: 12.3. Handling Multiple Clients
- signals
: 4.2.2. Signal Handlers
- ALRM (alarm)
: 5.6. Using Eval for Time-Outs
- CHLD (child process)
: 12.3.1. Multiple Threads of Execution
- SIGALRM
: 14.5. Timers
- SIGIO (I/O)
: 12.3. Handling Multiple Clients
- smart callbacks
: 4.4.1. Using Closures as "Smart" Callbacks
- socket call
: 12.5. IO Objects and Filehandles
- sockets
: 12.1. Networking Primer
- bidirectional communication
: 12.2.3. Bidirectional Communications
- handling multiple sockets
: 12.3. Handling Multiple Clients
- IO::Socket module
: 12.2. Socket API and IO::Socket
- receiving with
: 12.2.1. Receiver
- sending with
: 12.2.2. Sender
- servers and
: 12.4. Real-World Servers
- Socket API
: 12.2. Socket API and IO::Socket
- soft references
: (see symbolic references)
- SpecPerl utility
: 14.2.1. GUI Forms: The Easy Way
- SpecTcl utility
: 14.2.1. GUI Forms: The Easy Way
- speed
: (see performance)
- Sql statement (SQL)
: 10.4.2. Win32::ODBC
- SQL statements
: 10.4.1.1. Basic SQL accesses
- ST macro
: 20.4.2.1. Returning a variable list of results
- stacks
- 20.2.1. Perl Objects
- 20.4. Stacks and Messaging Protocol
- stashes
: (see symbol tables)
- static allocation
: 1.1. Referring to Existing Variables
- static methods
: 7.2.5. Class Methods and Attributes
- static typing hints
: 20.7. A Peek into the Future
- statically linked extensions
: 19.4. Adding Extensions
- Stopwatch facility (example)
: 9.1.1. Example: Stopwatch
- Storable module
: 10.2.3. Storable
- store function
- 9.1. Tying Scalars
- 11.2.6. Object Identity
- Adaptor::DBI module
: 11.3.2.1. Storing objects
- Adaptor::File module
: 11.3.1.1. Storing objects
- stores procedures
: 10.4.1.6. What DBI does not provide
- streamed data, modules for
: 10.2. Streamed Data
- streams
: 4.4.2. Iterators and Streams
- strict directive, symbolic references and
: 1.5. Symbolic References
- strings
: 20.3.1. Scalar Values
- as filehandles
: 3.4.4. Strings as Handles
- shared string tables
: 20.3.3.1. Inside HVs
- struct declaration (C)
: 2.1. User-Defined Structures
- structures
- Academy Award data (example)
: 2.4. Pass the Envelope
- magic variables
: 20.3.6. Magic Variables
- nested
- B.2. Nested Data Structures
- 1.3. Nested Data Structures
- 18.3. SWIG Features
- opcodes
: 20.2.2.1. Inside opcodes
- Perl value types
: 20.3. Perl Value Types
- PerlInterpreter
: 20.2.1.1. Multiple interpreters
- printing
: 2.5. Pretty-Printing
- stacks
: 20.4. Stacks and Messaging Protocol
- SWIG and
: 18.3. SWIG Features
- type-checking hints
: 20.7. A Peek into the Future
- user-defined
: 2.1. User-Defined Structures
- matrices example
: 2.2. Example: Matrices
- subroutines
- anonymous
- 3.3.3. Naming Anonymous Subroutines
- 4.1.2. References to Anonymous Subroutines
- BEGIN, compilation and
: 6.3. Package Initialization and Destruction
- calling
: 20.4.1. Calling a Perl Subroutine
- closures
: 4.3. Closures
- delaying loading of
: 6.7. Autoloading
- dispatch tables
: 4.2.1. Dispatch Table
- eval function and
: 5.1. The String Form: Expression Evaluation
- modules/packages and
: 6.1. Basic Package
- passing arrays/hashes to
: 1.2.1. Passing Arrays and Hashes to Subroutines
- passing filehandles to
: 3.4.2. Passing Filehandles to Subroutines
- private names for
: 6.4.1. Enforcing Privacy
- referencing
: 4.1. Subroutine References
- substitutions, /e flag with
: 5.4.1. Expression Evaluation in Substitutions
- substr function
: 5.5.2. Extracting Columns from a File
- SUPER pseudoclass
: 7.2.6.1. Overriding base classes
- superclasses
: 7.2.6. The Need for Inheritance
- SVs (scalar values)
: 20.3.1. Scalar Values
- SWIG tool
- 2.1. User-Defined Structures
- 17.1. On Code Generation
- 18. Extending Perl:A First Course
- C header file and
: 18.1.1. The Extension Process
- features of
: 18.3. SWIG Features
- Mandelbrot code example
: 18.2.1. Fractals Using SWIG
- typemaps
: 20.5.7. SWIG Typemaps
- XS tool versus
: 18.1.2. SWIG or XS?
- XSUBs and
: 20.4.2. The Called Side: Hand-Coding an XSUB
- Symbol module
: 3.4. Filehandles, Directory Handles, and Formats
- symbol tables
- 3.1. Perl Variables, Symbol Table, and Scoping
- 20.2.1. Perl Objects
- 20.3.4. Glob Values and Symbol Tables
- accessing
: 6.8. Accessing the Symbol Table
- modules/packages and
: 6.1.1. Packages and Variables
- symbolic references
- B.6. Dynamic Behavior
- 1.5. Symbolic References
- 1.6.1. Reference Counts
- 4.1.4. Symbolic References
- modules/packages and
: 6.1.2. Symbolic References
- symbols, importing
: 6.5. Importing Symbols
- Symdump module
: 20.1. Reading the Source
- synchronicity
: 13.2. Remote Procedure Calls (RPC)
- syntax tree
: 17.2. Jeeves Example
- sysread operator
- 12.3.3. Nonblocking Filehandles
- 12.3.2.1. Blocking looms again
- 12.5. IO Objects and Filehandles
- syswrite operator
- 12.2.3. Bidirectional Communications
- 12.3.3. Nonblocking Filehandles
- 12.3.2.1. Blocking looms again
- 12.5. IO Objects and Filehandles
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2001 O'Reilly & Associates. All rights reserved.
|