Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: R

race conditions : 19.4. Writing a Safe CGI Program
rad2deg() (example) : 2.11. Doing Trigonometry in Degrees, not Radians
radians vs. degrees : 2.11. Doing Trigonometry in Degrees, not Radians
radiobuttons : 15.14. Creating Menus with Tk
rand()
2.7. Generating Random Numbers
8.6. Picking a Random Line from a File
randcap program (example) : 1.9. Controlling Case
random
email signatures : 16.22. Program: sigrand
lines from files : 8.6. Picking a Random Line from a File
numbers
2.0. Introduction
2.7. Generating Random Numbers
biasing : 2.10. Generating Biased Random Numbers
ordering of lines in files : 8.7. Randomizing All Lines
random-access I/O : 8.12. Using Random-Access I/O
randomizing arrays : 4.17. Randomizing an Array
range (.. and ...) operators : 6.8. Extracting a Range of Lines
read()
8.0. Introduction
8.15. Reading Fixed-Length Records
readdir()
9.0. Introduction
9.5. Processing All Files in a Directory
reading email : (see email)
reading files : (see file access; file contents)
reading input : (see input)
reading Usenet news : 18.4. Reading and Posting Usenet News Messages
Received: header line : 3.11. Program: hopdelta
recno_demo program (example) : 14.7. Treating a Text File as a Database Array
records : 11.0. Introduction
binary tree structures : 11.15. Program: Binary Trees
closures as objects : 11.7. Using Closures Instead of Objects
comma-separated : (see CSV)
constructing : 11.9. Constructing Records
counting in files : 8.2. Counting Lines (or Paragraphs or Records) in a File
fixed-length
8.0. Introduction
8.15. Reading Fixed-Length Records
lastlog file : 8.20. Program: laston
with pattern separators, reading : 6.7. Reading Records with a Pattern Separator
random-access I/O : 8.12. Using Random-Access I/O
reading/writing to text files : 11.10. Reading and Writing Hash Records to Text Files
variable-length : 8.9. Processing Variable-Length Text Fields
wtmp file : 8.18. Program: tailwtmp
recursively processing files in directories : 9.7. Processing All Files in a Directory Recursively
redirect() : 19.8. Redirecting to a Different Location
redirecting
CGI error messages : 19.2. Redirecting Error Messages
CGI requests : 19.8. Redirecting to a Different Location
ref()
11.0. Introduction
13.0. Introduction
references : 11.0. Introduction
to arrays : 11.1. Taking References to Arrays
arrays of scalar references : 11.6. Creating Arrays of Scalar References
as hash keys : 13.15. Creating Magic Variables with tie
autovivification : 11.0. Introduction
closures as objects : 11.7. Using Closures Instead of Objects
to functions : 11.4. Taking References to Functions
as hash values : 5.12. Hashing References
to hashes : 11.3. Taking References to Hashes
hashes of arrays : 11.2. Making Hashes of Arrays
iterating over arrays by : 4.5. Iterating Over an Array by Reference
to methods : 11.8. Creating References to Methods
to packages, indirect : 12.13. Referring to Packages Indirectly
passing by : 10.5. Passing Arrays and Hashes by Reference
reference count : 11.0. Introduction
returning by : 10.9. Returning More Than One Array or Hash
to scalars : 11.5. Taking References to Scalars
self-referential structures : 13.13. Coping with Circular Data Structures
symbolic
1.8. Expanding Variables in User Input
12.13. Referring to Packages Indirectly
referents : 11.0. Introduction
"referrer" vs. "referer" : 20.1. Fetching a URL from a Perl Script
regular expressions
(see also pattern matching)
1.16. Soundex Matching
checking if strings are valid numbers : 2.1. Checking Whether a String Is a Valid Number
commenting : 6.4. Commenting Regular Expressions
fuzzy matching : 6.13. Approximate Matching
honoring locale settings : 6.12. Honoring Locale Settings in Regular Expressions
multiple-byte matching : 6.18. Matching Multiple-Byte Characters
tcgrep program : 6.22. Program: tcgrep
testing for invalid patterns : 6.11. Testing for a Valid Pattern
urlify program : 6.21. Program: urlify
useful and interesting (list) : 6.23. Regular Expression Grabbag
removing HTML tags : 20.6. Extracting or Removing HTML Tags
rename script (example) : 9.9. Renaming Files
renaming files : 9.9. Renaming Files
rep program (example) : 15.12. Managing the Screen
reporting errors : (see errors; warnings)
require statement : 12.0. Introduction
trapping errors in : 12.2. Trapping Errors in require or use
resizing : (see size)
restarting servers on demand : 17.16. Restarting a Server on Demand
retrieve() (Storable module) : 11.13. Storing Data Structures to Disk
retrieving URLs : 20.1. Fetching a URL from a Perl Script
return context, subroutines : 10.6. Detecting Return Context
return statement : 10.10. Returning Failure
return values of subroutines
returning by reference : 10.9. Returning More Than One Array or Hash
returning failure : 10.10. Returning Failure
skipping selected : 10.8. Skipping Selected Return Values
reverse()
1.6. Reversing a String by Word or Character
4.10. Reversing an Array
inverting hashes : 5.8. Inverting a Hash
reversing
array elements : 4.10. Reversing an Array
words/characters in strings : 1.6. Reversing a String by Word or Character
revhash_demo program (example) : 13.15. Creating Magic Variables with tie
rewinddir() : 9.5. Processing All Files in a Directory
rmdir() : 9.8. Removing a Directory and Its Contents
rmtree program (example) : 9.8. Removing a Directory and Its Contents
robots for web traversal : 20.11. Creating a Robot
Roman module : 2.6. Working with Roman Numerals
roman numerals : 2.6. Working with Roman Numerals
roman() (Roman module) : 2.6. Working with Roman Numerals
root directory (/) : 9.0. Introduction
rounding floating-point numbers : 2.3. Rounding Floating-Point Numbers
run time, loading modules at : 12.3. Delaying use Until Run Time
run-time scoping : 10.13. Saving Global Values


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.