Symbols & Numbers
|
A
|
B
|
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
|
N
|
O
|
P
|
Q
| R |
S
|
T
|
U
|
V
|
W
|
X
|
Y
|
Z
Index: R
race conditions
:
19.4. Writing a Safe CGI Program
rad2deg( ) (example)
:
2.11. Doing Trigonometry in Degrees, not Radians
radians vs. degrees
:
2.11. Doing Trigonometry in Degrees, not Radians
radiobuttons
:
15.14. Creating Menus with Tk
rand( )
2.7. Generating Random Numbers
8.6. Picking a Random Line from a File
randcap program (example)
:
1.9. Controlling Case
random
email signatures :
16.22. Program: sigrand
lines from files :
8.6. Picking a Random Line from a File
numbers
2.0. Introduction
2.7. Generating Random Numbers
biasing :
2.10. Generating Biased Random Numbers
ordering of lines in files :
8.7. Randomizing All Lines
random-access I/O :
8.12. Using Random-Access I/O
randomizing arrays
:
4.17. Randomizing an Array
range (.. and ...) operators
:
6.8. Extracting a Range of Lines
read( )
8.0. Introduction
8.15. Reading Fixed-Length Records
readdir( )
9.0. Introduction
9.5. Processing All Files in a Directory
reading email
: (see
email
)
reading files
: (see
file access
;
file contents
)
reading input
: (see
input
)
reading Usenet news
:
18.4. Reading and Posting Usenet News Messages
Received: header line
:
3.11. Program: hopdelta
recno_demo program (example)
:
14.7. Treating a Text File as a Database Array
records
:
11.0. Introduction
binary tree structures :
11.15. Program: Binary Trees
closures as objects :
11.7. Using Closures Instead of Objects
comma-separated : (see
CSV
)
constructing :
11.9. Constructing Records
counting in files :
8.2. Counting Lines (or Paragraphs or Records) in a File
fixed-length
8.0. Introduction
8.15. Reading Fixed-Length Records
lastlog file :
8.20. Program: laston
with pattern separators, reading :
6.7. Reading Records with a Pattern Separator
random-access I/O :
8.12. Using Random-Access I/O
reading/writing to text files :
11.10. Reading and Writing Hash Records to Text Files
variable-length :
8.9. Processing Variable-Length Text Fields
wtmp file :
8.18. Program: tailwtmp
recursively processing files in directories
:
9.7. Processing All Files in a Directory Recursively
redirect( )
:
19.8. Redirecting to a Different Location
redirecting
CGI error messages :
19.2. Redirecting Error Messages
CGI requests :
19.8. Redirecting to a Different Location
ref( )
11.0. Introduction
13.0. Introduction
references
:
11.0. Introduction
to arrays :
11.1. Taking References to Arrays
arrays of scalar references :
11.6. Creating Arrays of Scalar References
as hash keys :
13.15. Creating Magic Variables with tie
autovivification :
11.0. Introduction
closures as objects :
11.7. Using Closures Instead of Objects
to functions :
11.4. Taking References to Functions
as hash values :
5.12. Hashing References
to hashes :
11.3. Taking References to Hashes
hashes of arrays :
11.2. Making Hashes of Arrays
iterating over arrays by :
4.5. Iterating Over an Array by Reference
to methods :
11.8. Creating References to Methods
to packages, indirect :
12.13. Referring to Packages Indirectly
passing by :
10.5. Passing Arrays and Hashes by Reference
reference count :
11.0. Introduction
returning by :
10.9. Returning More Than One Array or Hash
to scalars :
11.5. Taking References to Scalars
self-referential structures :
13.13. Coping with Circular Data Structures
symbolic
1.8. Expanding Variables in User Input
12.13. Referring to Packages Indirectly
referents
:
11.0. Introduction
"referrer" vs. "referer"
:
20.1. Fetching a URL from a Perl Script
regular expressions
(see also
pattern matching
)
1.16. Soundex Matching
checking if strings are valid numbers :
2.1. Checking Whether a String Is a Valid Number
commenting :
6.4. Commenting Regular Expressions
fuzzy matching :
6.13. Approximate Matching
honoring locale settings :
6.12. Honoring Locale Settings in Regular Expressions
multiple-byte matching :
6.18. Matching Multiple-Byte Characters
tcgrep program :
6.22. Program: tcgrep
testing for invalid patterns :
6.11. Testing for a Valid Pattern
urlify program :
6.21. Program: urlify
useful and interesting (list) :
6.23. Regular Expression Grabbag
removing HTML tags
:
20.6. Extracting or Removing HTML Tags
rename script (example)
:
9.9. Renaming Files
renaming files
:
9.9. Renaming Files
rep program (example)
:
15.12. Managing the Screen
reporting errors
: (see
errors
;
warnings
)
require statement
:
12.0. Introduction
trapping errors in :
12.2. Trapping Errors in require or use
resizing
: (see
size
)
restarting servers on demand
:
17.16. Restarting a Server on Demand
retrieve( ) (Storable module)
:
11.13. Storing Data Structures to Disk
retrieving URLs
:
20.1. Fetching a URL from a Perl Script
return context, subroutines
:
10.6. Detecting Return Context
return statement
:
10.10. Returning Failure
return values of subroutines
returning by reference :
10.9. Returning More Than One Array or Hash
returning failure :
10.10. Returning Failure
skipping selected :
10.8. Skipping Selected Return Values
reverse( )
1.6. Reversing a String by Word or Character
4.10. Reversing an Array
inverting hashes :
5.8. Inverting a Hash
reversing
array elements :
4.10. Reversing an Array
words/characters in strings :
1.6. Reversing a String by Word or Character
revhash_demo program (example)
:
13.15. Creating Magic Variables with tie
rewinddir( )
:
9.5. Processing All Files in a Directory
rmdir( )
:
9.8. Removing a Directory and Its Contents
rmtree program (example)
:
9.8. Removing a Directory and Its Contents
robots for web traversal
:
20.11. Creating a Robot
Roman module
:
2.6. Working with Roman Numerals
roman numerals
:
2.6. Working with Roman Numerals
roman( ) (Roman module)
:
2.6. Working with Roman Numerals
root directory (/)
:
9.0. Introduction
rounding floating-point numbers
:
2.3. Rounding Floating-Point Numbers
run time, loading modules at
:
12.3. Delaying use Until Run Time
run-time scoping
:
10.13. Saving Global Values
Symbols & Numbers
|
A
|
B
|
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
|
N
|
O
|
P
|
Q
| R |
S
|
T
|
U
|
V
|
W
|
X
|
Y
|
Z
Copyright © 2002
O'Reilly & Associates. All rights reserved.