start page | rating of books | rating of authors | reviews | copyrights

Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Z

Index: A

-A operator : 10.5. The -x File Tests
a2p program : 18.1. Converting awk Programs to Perl
Abba : 15.5. Transliteration
access time, changing : 13.7. Modifying Timestamps
ACTION attribute (<FORM>) : 19.6. Form Generation
action of signals : 14.6. Sending and Receiving Signals
ActiveWare : 19.10.2. Embedded Perl
addition, operator for : 2.4.1. Operators for Numbers
address labels, and formats, examples of : 11.3. Invoking a Format
aliases database : 17.1. DBM Databases and DBM Hashes
aliases, CGI programs and : 19.3. Simplest CGI Program
:all import tag : 19.5. Less Typing
alternation, in regular expressions : 7.3.2.4. Alternation
Amiga, Perl on the : 1.3. Availability
anchoring, in regular expressions : 7.3.3. Anchoring Patterns
appending to a file : 10.2. Opening and Closing a Filehandle
Apple Macintosh, and Perl : 1.3. Availability
archaeology : 15.2. Extracting and Replacing a Substring
arguments, to subroutines : 8.4. Arguments
@ARGV
for command-line arguments : 6.2. Input from the Diamond Operator
example of accessing : A.12. Chapter 13, File and Directory Manipulation
array assignment operator : 3.4.1. Assignment
array elements
accessing : 1.5.5. More than One Secret Word
numbering of : 3.4.2. Array Element Access
referencing : 3.4.2. Array Element Access
array expression, as subscript : 3.4.2. Array Element Access
array literals : 3.2. Literal Representation
array operators : 3.4. Array Operators and Functions
array variables : 3.3. Variables
in array literals : 3.4.1. Assignment
assigned scalar values : 3.4.1. Assignment
automatically growing : 3.4.2. Array Element Access
default value of : 3.3. Variables
foreach statement and : 4.5. The foreach Statement
interpolated into strings : 3.7. Variable Interpolation of Arrays
in scalar context : 3.4.1. Assignment
arrays
1.5.5. More than One Secret Word
3.1. What Is a List or Array?
associative : (see associative arrays)
empty : 3.2. Literal Representation
readdir(�) and : 12.5. Reading a Directory Handle
referencing elements : 3.4.2. Array Element Access
size boundaries : 3.1. What Is a List or Array?
slices of : 3.4.2. Array Element Access
Artistic License : 1.3. Availability
assigning to a substr(�) operator : 15.2. Extracting and Replacing a Substring
assigning to an array : 1.5.5. More than One Secret Word
assignment, binary : 2.6.1. Binary Assignment Operators
assignment operator : 2.6. Scalar Operators and Functions
associative array key : 1.5.6. Giving Each Person a Different Secret Word
associative array operators : 5.4. Hash Functions
associative arrays
1.5.6. Giving Each Person a Different Secret Word
5.1. What Is a Hash?
creating new elements of : 5.2. Hash Variables
example of assignment to : 1.5.6. Giving Each Person a Different Secret Word
literal representation of : 5.3. Literal Representation of a Hash
order in : 5.1. What Is a Hash?
removing elements from with delete : 5.4.4. The delete Function
sorting (sort-of) : 15.4. Advanced Sorting
stepping through with the each(�) operator : 5.4.3. The each Function
variables : 5.2. Hash Variables
associativity : 2.4.3. Operator Precedence and Associativity
Astro, pronouncing "Windex" : 15.1. Finding a Substring
Atari ST, Perl on the : 1.3. Availability
autodecrement operator : 2.6.2. Autoincrement and Autodecrement
autoincrement operator
2.6.2. Autoincrement and Autodecrement
4.4. The for Statement
automation with LWP : 19.10.3. Web Automation with LWP
availability of Perl : 1.3. Availability
awk programs, converting to Perl : 18.1. Converting awk Programs to Perl


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.