Symbols
|
A
| B |
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
|
N
|
O
|
P
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
X
|
Y
|
Z
Index: B
B-tree implementation (DB_File)
:
14.6. Sorting Large DBM Files
backreferences ($1, $2, ...)
:
6.0. Introduction
finding duplicate words :
6.16. Detecting Duplicate Words
backslash (\)
escaping characters :
1.13. Escaping Characters
operator
10.5. Passing Arrays and Hashes by Reference
11.5. Taking References to Scalars
backsniff program (example)
:
17.17. Program: backsniff
backtick (`)
expanding :
1.10. Interpolating Functions and Expressions Within Strings
operator
16.1. Gathering Output from a Program
19.6. Executing Commands Without Shell Escapes
qx(�) :
4.1. Specifying a List In Your Program
backtracking in pattern matching
:
6.0. Introduction
bad hyperlinks, finding
:
20.7. Finding Stale Links
base class
:
13.0. Introduction
empty base class test :
13.9. Writing an Inheritable Class
basename(�)
:
9.10. Splitting a Filename into Its Component Parts
=begin pod directive
:
12.16. Documenting Your Module with Pod
bell, ringing
:
15.7. Ringing the Terminal Bell
Berkeley DB library
:
14.0. Introduction
bgets program (example)
:
8.14. Reading a String from a Binary File
biased random numbers
:
2.10. Generating Biased Random Numbers
biclient program (example)
:
17.10. Writing Bidirectional Clients
bidirectional clients
:
17.10. Writing Bidirectional Clients
bigfact program (example)
:
2.19. Program: Calculating Prime Factors
binary files
processing :
8.11. Processing Binary Files
reading strings from :
8.14. Reading a String from a Binary File
binary numbers
arithmetic on :
2.0. Introduction
convering with decimal numbers :
2.4. Converting Between Binary and Decimal
binary tree structures
:
11.15. Program: Binary Trees
bind(�)
:
17.0. Introduction
binmode(�)
:
8.11. Processing Binary Files
bintree program (example)
:
11.15. Program: Binary Trees
bitwise operators
:
1.9. Controlling Case
bless(�)
13.0. Introduction
13.1. Constructing an Object
blessing
:
13.0. Introduction
blocking file access
7.11. Locking a File
7.21. Program: netlock
region-specific locks :
7.22. Program: lockarea
blocking signals
:
16.20. Blocking Signals
Boolean connectives in patterns
:
6.17. Expressing AND, OR, and NOT in a Single Pattern
Boolean truth
:
1.0. Introduction
buffered input/output
7.0. Introduction
7.12. Flushing Output
8.0. Introduction
controlling for other programs :
16.8. Controlling Input and Output of Another Program
socket programming and :
17.3. Communicating over TCP
building modules from CPAN
:
12.17. Building and Installing a CPAN Module
bysub1 program (example)
:
10.17. Program: Sorting Your Mail
bysub2 program (example)
:
10.17. Program: Sorting Your Mail
bysub3 program (example)
:
10.17. Program: Sorting Your Mail
Symbols
|
A
| B |
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
|
N
|
O
|
P
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
X
|
Y
|
Z
Copyright © 2001
O'Reilly & Associates. All rights reserved.