Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: B

B-tree implementation (DB_File) : 14.6. Sorting Large DBM Files
backreferences ($1, $2, ...) : 6.0. Introduction
finding duplicate words : 6.16. Detecting Duplicate Words
backslash (\)
escaping characters : 1.13. Escaping Characters
operator
10.5. Passing Arrays and Hashes by Reference
11.5. Taking References to Scalars
backsniff program (example) : 17.17. Program: backsniff
backtick (`)
expanding : 1.10. Interpolating Functions and Expressions Within Strings
operator
16.1. Gathering Output from a Program
19.6. Executing Commands Without Shell Escapes
qx( ) : 4.1. Specifying a List In Your Program
backtracking in pattern matching : 6.0. Introduction
bad hyperlinks, finding : 20.7. Finding Stale Links
base class : 13.0. Introduction
empty base class test : 13.9. Writing an Inheritable Class
basename( ) : 9.10. Splitting a Filename into Its Component Parts
=begin pod directive : 12.16. Documenting Your Module with Pod
bell, ringing : 15.7. Ringing the Terminal Bell
Berkeley DB library : 14.0. Introduction
bgets program (example) : 8.14. Reading a String from a Binary File
biased random numbers : 2.10. Generating Biased Random Numbers
biclient program (example) : 17.10. Writing Bidirectional Clients
bidirectional clients : 17.10. Writing Bidirectional Clients
bigfact program (example) : 2.19. Program: Calculating Prime Factors
binary files
processing : 8.11. Processing Binary Files
reading strings from : 8.14. Reading a String from a Binary File
binary numbers
arithmetic on : 2.0. Introduction
convering with decimal numbers : 2.4. Converting Between Binary and Decimal
binary tree structures : 11.15. Program: Binary Trees
bind( ) : 17.0. Introduction
binmode( ) : 8.11. Processing Binary Files
bintree program (example) : 11.15. Program: Binary Trees
bitwise operators : 1.9. Controlling Case
bless( )
13.0. Introduction
13.1. Constructing an Object
blessing : 13.0. Introduction
blocking file access
7.11. Locking a File
7.21. Program: netlock
region-specific locks : 7.22. Program: lockarea
blocking signals : 16.20. Blocking Signals
Boolean connectives in patterns : 6.17. Expressing AND, OR, and NOT in a Single Pattern
Boolean truth : 1.0. Introduction
buffered input/output
7.0. Introduction
7.12. Flushing Output
8.0. Introduction
controlling for other programs : 16.8. Controlling Input and Output of Another Program
socket programming and : 17.3. Communicating over TCP
building modules from CPAN : 12.17. Building and Installing a CPAN Module
bysub1 program (example) : 10.17. Program: Sorting Your Mail
bysub2 program (example) : 10.17. Program: Sorting Your Mail
bysub3 program (example) : 10.17. Program: Sorting Your Mail


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.