Index

Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: N

-n command-line option : 7.7. Writing a Filter
Nagle's algorithm : 17.3. Communicating over TCP
named pipes
16.11. Making a Process Look Like a File with Named Pipes
16.22. Program: sigrand
names of current subroutines : 10.4. Determining Current Function Name
natural logarithms : 2.13. Taking Logarithms
navigation web with robots : 20.11. Creating a Robot
NDBM files : 14.0. Introduction
nested HTML tags : 20.6. Extracting or Removing HTML Tags
nested subroutines : 10.16. Nesting Subroutines
Net::DNS module : 18.9. Program: expn and vrfy
Net::FTP module : 18.2. Being an FTP Client
Net::NNTP module : 18.4. Reading and Posting Usenet News Messages
Net::POP3 module : 18.5. Reading Mail with POP3
Net::Telnet : 18.6. Simulating Telnet from a Program
Net::Whois module : 18.8. Using Whois to Retrieve Information from the InterNIC
Net:\Ping module : 18.7. Pinging a Machine
netlock program : 7.21. Program: netlock
Netscape history.db file : 14.11. Program: ggh - Grep Netscape Global History
new(�) : 13.0. Introduction
new_tmpfile(�) (IO::File) : 7.5. Creating Temporary Files
newline characters : (see line breaks)
newlines : (see line breaks; whitespace)
news messages (Usenet) : 18.4. Reading and Posting Usenet News Messages
NFA (non-deterministic finite automata) : 6.0. Introduction
noecho input mode : 15.10. Reading Passwords
NOFILE constant : 7.17. Caching Open Output Filehandles
non-blocking I/O : 7.14. Doing Non-Blocking I/O
non-deterministic finite automata : 6.0. Introduction
non-forking servers : 17.13. Non-Forking Servers
non-greedy pattern matching
6.0. Introduction
6.15. Greedy and Non-Greedy Matches
nonforker program (example) : 17.13. Non-Forking Servers
NOT functionality in regular expressions : 6.17. Expressing AND, OR, and NOT in a Single Pattern
nounder_demo program (example) : 13.15. Creating Magic Variables with tie
nstore(�) : 11.13. Storing Data Structures to Disk
numbers
(see also values)
1.4. Converting Between ASCII Characters and Values
2.0. Introduction
adding commas to : 2.17. Putting Commas in Numbers
complex (imaginary) : 2.15. Using Complex Numbers
converting binary with decimal : 2.4. Converting Between Binary and Decimal
converting with ASCII characters : 1.4. Converting Between ASCII Characters and Values
decimal places, controlling : 13.14. Overloading Operators
floating-point : 2.0. Introduction
comparing : 2.2. Comparing Floating-Point Numbers
rounding : 2.3. Rounding Floating-Point Numbers
logarithms : 2.13. Taking Logarithms
matrix multiplication : 2.14. Multiplying Matrices
octal and hexadecimal : 2.16. Converting Between Octal and Hexadecimal
operating on integer series : 2.5. Operating on a Series of Integers
plural words based on : 2.18. Printing Correct Plurals
primes, calculating : 2.19. Program: Calculating Prime Factors
random
2.0. Introduction
2.7. Generating Random Numbers
biasing : 2.10. Generating Biased Random Numbers
roman numerals : 2.6. Working with Roman Numerals
strings as valid numbers : 2.1. Checking Whether a String Is a Valid Number
trigonometry : 2.11. Doing Trigonometry in Degrees, not Radians


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.