Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Perl One-Liners: 130 Programs That Get Things Done

Buy

Part of the fun of programming in Perl lies in tackling tedious tasks with short, efficient, and reusable code. Often, the perfect tool is the one-liner, a small but powerful program that fits in one line of code and does one thing really well.

In Perl One-Liners, author and impatient hacker Peteris Krumins takes you through more than 100 compelling one-liners that do all sorts of handy things, such as manipulate line spacing, tally column values in a table, and get a list of users on a system. This cookbook of useful, customizable, and fun scripts will even help hone your Perl coding skills, as Krumins dissects the code to give you a deeper understanding of the language.

You'll find one-liners that:

  • Encode, decode, and convert strings
  • Generate random passwords
  • Calculate sums, factorials, and the mathematical constants π and e
  • Add or remove spaces
  • Number lines in a file
  • Print lines that match a specific pattern
  • Check to see if a number is prime with a regular expression
  • Convert IP address to decimal form
  • Replace one string with another
And many more! Save time and sharpen you coding skills as you learn to conquer those pesky tasks in a few precisely placed keystrokes with Perl One-Liners.
(HTML tags aren't allowed.)

Passive Components for Circuit Design
Passive Components for Circuit Design

Despite the very considerable increase in the use of ICs over the past ten years, passive components are still the mainstay of the electronics industry. The strong emphasis that is given to semiconductors, and ICs in particular, in teaching courses at all levels, however, causes the subject of passive components to be neglected, and many...

Information Security Management Handbook, Fifth Edition
Information Security Management Handbook, Fifth Edition

Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated...

Secure Programming Cookbook for C and C++ : Recipes for Cryptography, Authentication, Input Validation & More
Secure Programming Cookbook for C and C++ : Recipes for Cryptography, Authentication, Input Validation & More
Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix® (including Linux®) and Windows® environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation,...

Aesthetic Rejuvenation: A Regional Approach
Aesthetic Rejuvenation: A Regional Approach

A Complete Head-to-Toe Guide to the Most Current Techniques and Technologies for Aesthetic Rejuvenation -

Uniquely Organized by Body Region

Written by three of the field's leading experts, Aesthetic Rejuvenation is a practical, in-depth guide covering the most up-to-date anti-aging techniques...

Redmine Plugin Extension and Development
Redmine Plugin Extension and Development

If you'd like to customize Redmine to meet your own precise project management needs, this is the ideal guide to understanding and realizing the full potential of plugins. Full of real-world examples and clear instructions.

Overview

  • Gain access to powerful and useful features by hooking into...
Rootkits for Dummies (Computer/Tech)
Rootkits for Dummies (Computer/Tech)
A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can use...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy