Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Perl, 5th Edition

Buy
Learning Perl, 5th Edition, 9780596520106 (0596520107), O'Reilly, 2008
Learning Perl is designed for those who seek a rapid working knowledge of Perl. A public domain language, Perl has established itself as the premier UNIX scripting language--replacing facilities such as the shell, sed and awk. It is currently taking root in non-UNIX markets as well. Perl is a high-level, multi-purpose language. It is used in diverse system administration tasks, while also playing an endless variety of roles in other areas. These range from data reduction and report generation to distributed computing and assorted auxiliary roles in software development. Perl has even encroached upon the territory of C and other programming languages. Perl allows the programmer to combine in one script functions that previously had to be divided between the shell, sed, awk, various other UNIX utilities, and C programs. With this breadth of capability, Perl is an extraordinarily powerful and flexible language. Learning Perl, written by a leading Perl instructor, provides a systematic, step-by-step, tutorial approach to learning the language. There are numerous short code examples punctuating a relaxed, informal, and precise tour of all the main features of the language. In addition, each chapter contains exercise problems, together with their solutions. Anyone who works through the book will be capable of programming with a broad and productive range of Perl features. For a comprehensive and detailed guide to advanced programming with Perl, read O'Reilly's companion book, Programming Perl. 

About the Author

Randal L. Schwartz is a two-decade veteran of the software industry. He is skilled in software design, system administration, security, technical writing, and training. Randal has coauthored the "must-have" standards: Programming Perl, Learning Perl, Learning Perl for Win32 Systems, and Effective Perl Learning, and is a regular columnist for WebTechniques, PerformanceComputing, SysAdmin, and Linux magazines.

Tom Phoenix has been working in the field of education since 1982. After more than thirteen years of dissections, explosions, work with interesting animals, and high-voltage sparks during his work at a science museum, he started teaching Perl classes for Stonehenge Consulting Services, where he's worked since 1996. Since then, he has traveled to many interesting locations, so you might see him soon at a Perl Mongers' meeting. When he has time, he answers questions on Usenet's comp.lang.perl.misc and comp.lang.perl.moderated newsgroups, and contributes to the development and usefulness of Perl. Besides his work with Perl, Perl hackers, and related topics, Tom spends his time on amateur cryptography and speaking Esperanto. His home is in Portland, Oregon.

brian d foy has been an instructor for Stonehenge Consulting Services since 1998, a Perl user since he was a physics graduate student, and a die-hard Mac user since he first owned a computer. He founded the first Perl user group, the New York Perl Mongers, as well as the Perl advocacy nonprofit Perl Mongers, Inc., which helped form more than 200 Perl user groups across the globe. He maintains the perlfaq portions of the core Perl documentation, several modules on CPAN, and some stand-alone scripts. He's the publisher of The Perl Review, a magazine devoted to Perl, and is a frequent speaker at conferences including the Perl Conference, Perl University, MarcusEvans BioInformatics '02, and YAPC. His writings on Perl appear in The O'Reilly Network, The Perl Journal, Dr. Dobbs, and The Perl Review, on use.perl.org, and in several Perl usenet groups.
(HTML tags aren't allowed.)

Programming JavaScript Applications: Robust Web Architecture with Node, HTML5, and Modern JS Libraries
Programming JavaScript Applications: Robust Web Architecture with Node, HTML5, and Modern JS Libraries

Take advantage of JavaScript’s power to build robust web-scale or enterprise applications that are easy to extend and maintain. By applying the design patterns outlined in this practical book, experienced JavaScript developers will learn how to write flexible and resilient code that’s easier—yes, easier—to...

Authentication and Access Control: Practical Cryptography Methods and Tools
Authentication and Access Control: Practical Cryptography Methods and Tools
The advent of the Internet has allowed for many services and applications, most notably in communications between users, servers, and devices. Unfortunately, this has led to many security challenges and problems. Recent examples include password leakage on large social network sites and defacement of websites. It is, therefore,...
Referent Similarity and Nominal Syntax in Task-Based Language Teaching
Referent Similarity and Nominal Syntax in Task-Based Language Teaching
This volume addresses an important gap in the literature on task design and second language use. Building on insights from over 50 years of research on the relationship between task demands and language use, it examines how referent similarity relates to developmentally-relevant variation in the use of nominal structures, comparative structures...

CCSP Cisco Secure VPN Exam Certification Guide (CCSP Self-Study)
CCSP Cisco Secure VPN Exam Certification Guide (CCSP Self-Study)
The primary goal of this book is to help you prepare to pass either the 9E0-121 or 642-511 Cisco Secure
VPN (CSVPN) exams as you strive to attain the CCSP certification or a focused VPN certification. Adhering
to the premise that, as individuals, we each retain information better through different media, this book provides
a variety
...
Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

Chest Sonography
Chest Sonography

Chest sonography is an established procedure in the stepwise imaging diagnosis of pulmonary and pleural disease. It is the method of choice to distinguish between solid and liquid lesions and allows the investigator to make an unequivocal diagnosis without exposing the patient to costly and stressful procedures. This book presents the state...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy