Symbols
|
A
|
B
|
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
| N |
O
|
P
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
X
|
Y
|
Z
Index: N
-n command-line option
:
7.7. Writing a Filter
Nagle's algorithm
:
17.3. Communicating over TCP
named pipes
16.11. Making a Process Look Like a File with Named Pipes
16.22. Program: sigrand
names of current subroutines
:
10.4. Determining Current Function Name
natural logarithms
:
2.13. Taking Logarithms
navigation web with robots
:
20.11. Creating a Robot
NDBM files
:
14.0. Introduction
nested HTML tags
:
20.6. Extracting or Removing HTML Tags
nested subroutines
:
10.16. Nesting Subroutines
Net::DNS module
:
18.9. Program: expn and vrfy
Net::FTP module
:
18.2. Being an FTP Client
Net::NNTP module
:
18.4. Reading and Posting Usenet News Messages
Net::POP3 module
:
18.5. Reading Mail with POP3
Net::Telnet
:
18.6. Simulating Telnet from a Program
Net::Whois module
:
18.8. Using Whois to Retrieve Information from the InterNIC
Net:\Ping module
:
18.7. Pinging a Machine
netlock program
:
7.21. Program: netlock
Netscape history.db file
:
14.11. Program: ggh - Grep Netscape Global History
new( )
:
13.0. Introduction
new_tmpfile( ) (IO::File)
:
7.5. Creating Temporary Files
newline characters
: (see
line breaks
)
newlines
: (see
line breaks
;
whitespace
)
news messages (Usenet)
:
18.4. Reading and Posting Usenet News Messages
NFA (non-deterministic finite automata)
:
6.0. Introduction
noecho input mode
:
15.10. Reading Passwords
NOFILE constant
:
7.17. Caching Open Output Filehandles
non-blocking I/O
:
7.14. Doing Non-Blocking I/O
non-deterministic finite automata
:
6.0. Introduction
non-forking servers
:
17.13. Non-Forking Servers
non-greedy pattern matching
6.0. Introduction
6.15. Greedy and Non-Greedy Matches
nonforker program (example)
:
17.13. Non-Forking Servers
NOT functionality in regular expressions
:
6.17. Expressing AND, OR, and NOT in a Single Pattern
nounder_demo program (example)
:
13.15. Creating Magic Variables with tie
nstore( )
:
11.13. Storing Data Structures to Disk
numbers
(see also
values
)
1.4. Converting Between ASCII Characters and Values
2.0. Introduction
adding commas to :
2.17. Putting Commas in Numbers
complex (imaginary) :
2.15. Using Complex Numbers
converting binary with decimal :
2.4. Converting Between Binary and Decimal
converting with ASCII characters :
1.4. Converting Between ASCII Characters and Values
decimal places, controlling :
13.14. Overloading Operators
floating-point :
2.0. Introduction
comparing :
2.2. Comparing Floating-Point Numbers
rounding :
2.3. Rounding Floating-Point Numbers
logarithms :
2.13. Taking Logarithms
matrix multiplication :
2.14. Multiplying Matrices
octal and hexadecimal :
2.16. Converting Between Octal and Hexadecimal
operating on integer series :
2.5. Operating on a Series of Integers
plural words based on :
2.18. Printing Correct Plurals
primes, calculating :
2.19. Program: Calculating Prime Factors
random
2.0. Introduction
2.7. Generating Random Numbers
biasing :
2.10. Generating Biased Random Numbers
roman numerals :
2.6. Working with Roman Numerals
strings as valid numbers :
2.1. Checking Whether a String Is a Valid Number
trigonometry :
2.11. Doing Trigonometry in Degrees, not Radians
Symbols
|
A
|
B
|
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
| N |
O
|
P
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
X
|
Y
|
Z
Copyright © 2001
O'Reilly & Associates. All rights reserved.