Table of Contents Introduction the Birth of Frankenstein

Total Page:16

File Type:pdf, Size:1020Kb

Table of Contents Introduction the Birth of Frankenstein < Day Day Up > Google Hacks, 2nd Edition By Tara Calishain, Rael Dornfest Publisher: O'Reilly Pub Date: December 2004 ISBN: 0-596-00857-0 Pages: 479 Table of • Contents • Index • Reviews Reader • Reviews • Errata • Academic Copyright Dedication Foreword Foreword to the First Edition Credits About the Authors Contributors Acknowledgments Preface Why Google Hacks? How This Book Is Organized How to Use This Book How to Run the Hacks Where to Go for More Conventions Using Code Examples Safari Enabled How to Contact Us Got a Hack? Chapter 1. Web Hacks 1-20 Section 1.2. Google Web Search Basics Section 1.3. Full-Word Wildcards Section 1.4. The 10-Word Limit Section 1.5. Special Syntax Section 1.6. Mixing Syntax Section 1.7. Advanced Search Section 1.8. Quick Links Section 1.9. Language Tools Section 1.10. Anatomy of a Search Result Section 1.11. Setting Preferences Section 1.12. Understanding Google URLs Hack 1. Browse the Google Directory Hack 2. Glean a Snapshot of Google in Time Hack 3. Graph Google Results over Time Hack 4. Visualize Google Results Hack 5. Check Your Spelling Hack 6. Google Phonebook: Let Google's Fingers Do the Walking Hack 7. Think Global, Google Local Hack 8. Track Stocks Hack 9. Consult the Dictionary Hack 10. Look Up Definitions Hack 11. Search Article Archives Hack 12. Find Directories of Information Hack 13. Seek Out Weblog Commentary Hack 14. Cover Your Bases Hack 15. Repetition Matters Hack 16. Search a Particular Date Range Hack 17. Calculate Google Centuryshare Hack 18. Hack Your Own Google Search Form Hack 19. Go Beyond Google's Advanced Search Hack 20. Use Google Tools for Translators Chapter 2. Advanced Web Hacks 21-49 Section 2.2. Assumptions Hack 21. Like a Version Hack 22. Capture Google Results in a Google Box Hack 23. Build Google Directory URLs Hack 24. Find Recipes Hack 25. Track Result Counts over Time Hack 26. Feel Really Lucky Hack 27. Get Random Results (on Purpose) Hack 28. Permute a Query Hack 29. Weight a Query Keyword Hack 30. Restrict Searches to Top-Level Results Hack 31. Search for Special Characters Hack 32. Dig Deeper into Sites Hack 33. Summarize Results by Domain Hack 34. Measure Google Mindshare Hack 35. SafeSearch Certify URLs Hack 36. Search Google Topics Hack 37. Find the Largest Page Hack 38. Perform Proximity Searches Hack 39. Meander Your Google Neighborhood Hack 40. Run a Google Popularity Contest Hack 41. Scrape Yahoo! Buzz for a Google Search Hack 42. Compare Google's Results with Other Search Engines Hack 43. Scattersearch with Yahoo! and Google Hack 44. Yahoo! Directory Mindshare in Google Hack 45. Glean Weblog-Free Google Results Hack 46. Spot Trends with Geotargeting Hack 47. Bring the Google Calculator to the Command Line Hack 48. Build a Custom Date Range Search Form Hack 49. Search Yesterday's Index Chapter 3. Images Hacks 50-53 Section 3.2. Google Images Advanced Search Interface Section 3.3. Google Images Search Syntax Hack 50. Borrow a Corporate or Product Logo Hack 51. Browse the World Wide Photo Album Hack 52. Google Cartography: Street Art in Your Neighborhood Hack 53. Capture the Map Chapter 4. News and Groups Hakcs 54-58 Section 4.2. Google News Section 4.3. Google News Search Syntax Section 4.4. Advanced News Search Section 4.5. Making the Most of Google News Section 4.6. Receive Google News Alerts Section 4.7. Beyond Google for News Search Hack 54. Scrape Google News Hack 55. Visualize Google News Section 4.10. Google Groups Section 4.11. 10 Seconds of Hierarchy Funk Section 4.12. Browsing Groups Section 4.13. Google Groups Search Syntax Section 4.14. Advanced Groups Search Hack 56. Go Deeper into Groups with Google Groups 2 Hack 57. Scrape Google Groups Hack 58. Simplify Google Groups URLs Chapter 5. Add-Ons Hacks 59-70 Hack 59. Keep Tabs on Your Searches with Google Alerts Hack 60. Add Google to Your Toolbar or Desktop Hack 61. Google Your Desktop Hack 62. Google with Bookmarklets Hack 63. Google from Word Hack 64. Google by Email Hack 65. Google by Instant Messenger Hack 66. Google from IRC Hack 67. Google on the Go Hack 68. Visit the Google Labs Hack 69. Find Out What Google Thinks ___ Is Hack 70. The Search Engine Belt Buckle Chapter 6. Gmail Hacks 71-80 Section 6.2. Gmail Search Syntax Section 6.3. Additional Resources Hack 71. Glean a Gmail Invite Hack 72. Create and Use Custom Addresses Hack 73. Import Your Contacts into Gmail Hack 74. Import Mail into Gmail Hack 75. Export Your Gmail Hack 76. Take a Walk on the Lighter Side Hack 77. Gmail on the Go Hack 78. Use Gmail as a Linux Filesystem Hack 79. Use Gmail as a Windows Drive Hack 80. Program Gmail Chapter 7. Ads Hacks 81-85 Section 7.2. Google AdSense Section 7.3. Google AdWords Hack 81. Get the Most out of AdWords Hack 82. Generate Google AdWords Hack 83. Scrape Google AdWords Hack 84. Determine the Worth of AdWords Words Hack 85. Serve Backup Ads Chapter 8. Webmastering Hacks 86-91 Section 8.2. Google's Importance to Webmasters Section 8.3. The Mysterious PageRank Section 8.4. The Equally Mysterious Ranking Algorithm Section 8.5. Keeping Up with Google's Changes Section 8.6. In a Word: Relax Hack 86. A Webmaster's Introduction to Google Hack 87. Get Inside the PageRank Algorithm Hack 88. 26 Steps to 15K a Day Hack 89. Be a Good Search Engine Citizen Hack 90. Clean Up for a Google Visit Hack 91. Remove Your Materials from Google Chapter 9. Programming Google Hacks 92-100 Section 9.2. Signing Up and Google's Terms Section 9.3. The Google Web APIs Developer's Kit Section 9.4. Using Your Google API Key Section 9.5. What's WSDL? Section 9.6. Understanding the Google API Query Section 9.7. Understanding the Google API Response Section 9.8. A Note on Spidering and Scraping Hack 92. Program Google in Perl Hack 93. Install the SOAP::Lite Perl Module Hack 94. Program Google with the Net::Google Perl Module Hack 95. Loop Around the 10-Result Limit Hack 96. Program Google in PHP Hack 97. Program Google in Java Hack 98. Program Google in Python Hack 99. Program Google in C# and .NET Hack 100. Program Google in VB.NET Colophon Index < Day Day Up > < Day Day Up > Copyright © 2005 O'Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O'Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O'Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Nutshell Handbook, the Nutshell Handbook logo, and the O'Reilly logo are registered trademarks of O'Reilly Media, Inc. The Hacks series designations, Google Hacks, the image of locking pliers, and related trade dress are trademarks of O'Reilly Media, Inc. All other trademarks are property of their respective owners. Google, PageRank, AdSense, AdWords, Gmail, and I'm Feeling Lucky are trademarks of Google Technology, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O'Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and authors assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. < Day Day Up > < Day Day Up > Dedication To our Grannies: Olivia and Miriam < Day Day Up > < Day Day Up > Foreword When the first edition of Google Hacks appeared, we were frankly a bit surprised that there was enough hacking going on to make up a whole book. No longer. People continue to discover more ways than we ever imagined to tweak, tone, and otherwise futz around with Google bits for myriad uses. In the 18 months since Google Hacks first appeared, search has, if possible, only grown in importance. Not only is there more information than ever to be found-via email, computer hard drives, and newly digitized repositories of previously offline content-there is also a greater need to automate tasks and to locate that needle of information in a haystack that just will not stop growing. We hope that you enjoy this new Google Hacks effort and continue to help us make the most of the world's information by making it universally accessible and useful. --Craig Silverstein, Director of Technology, Google < Day Day Up > < Day Day Up > Foreword to the First Edition When we started Google, it was hard to predict how big it would become. That our search engine would someday serve as a catalyst for so many important web developments was a distant dream. We are honored by the growing interest in Google and offer many thanks to those who created this book-the largest and most comprehensive report on Google search technology that has yet to be published. Search is an amazing field of study, because it offers infinite possibilities for how we might find and make information available to people. We join with the authors in encouraging readers to approach this book with a view toward discovering and creating new ways to search.
Recommended publications
  • EN-Google Hacks.Pdf
    Table of Contents Credits Foreword Preface Chapter 1. Searching Google 1. Setting Preferences 2. Language Tools 3. Anatomy of a Search Result 4. Specialized Vocabularies: Slang and Terminology 5. Getting Around the 10 Word Limit 6. Word Order Matters 7. Repetition Matters 8. Mixing Syntaxes 9. Hacking Google URLs 10. Hacking Google Search Forms 11. Date-Range Searching 12. Understanding and Using Julian Dates 13. Using Full-Word Wildcards 14. inurl: Versus site: 15. Checking Spelling 16. Consulting the Dictionary 17. Consulting the Phonebook 18. Tracking Stocks 19. Google Interface for Translators 20. Searching Article Archives 21. Finding Directories of Information 22. Finding Technical Definitions 23. Finding Weblog Commentary 24. The Google Toolbar 25. The Mozilla Google Toolbar 26. The Quick Search Toolbar 27. GAPIS 28. Googling with Bookmarklets Chapter 2. Google Special Services and Collections 29. Google Directory 30. Google Groups 31. Google Images 32. Google News 33. Google Catalogs 34. Froogle 35. Google Labs Chapter 3. Third-Party Google Services 36. XooMLe: The Google API in Plain Old XML 37. Google by Email 38. Simplifying Google Groups URLs 39. What Does Google Think Of... 40. GooglePeople Chapter 4. Non-API Google Applications 41. Don't Try This at Home 42. Building a Custom Date-Range Search Form 43. Building Google Directory URLs 44. Scraping Google Results 45. Scraping Google AdWords 46. Scraping Google Groups 47. Scraping Google News 48. Scraping Google Catalogs 49. Scraping the Google Phonebook Chapter 5. Introducing the Google Web API 50. Programming the Google Web API with Perl 51. Looping Around the 10-Result Limit 52.
    [Show full text]
  • Proceedings YAPC::Europe 2012 .Com Perl Software Development Services Table of Contents 
    Proceedings YAPC::Europe 2012 .com Perl Software Development Services Table of contents Foreword 5 FatPacker: understanding and appreciating the insanity 6 Vorbild::Beitrag::POD 8 CGI.pm MUST DIE - Together we shall annihilate CGI.pm! 9 CPANTS: Kwalitative website and its tools 10 Designing the Internet of Things: Arduino and Perl 11 Dancing with WebSockets 12 Dancer 2 - Official status: 14 Practical Dancer: moving away from CGI 16 Bringing Perl to a Younger Generation 18 Asynchronous programming FTW! 22 Mojolicious 24 Continuous deployment with Perl 36 Array programming for mere mortals 37 Ontology Aware Applications 42 Distributed Code Review in Perl - State of the Practice 48 address-sanitizer - A fast memory error detector 52 Exceptional Perl 6 55 The joy of breaking stuff 59 Macros in Rakudo 66 Why statement modifiers can harm maintainability! 70 A discussion on how to organize a Perl Mongers group 72 Building C/C++ libraries with Perl 74 8PSMET#1*O0OMJOF"DDPNNPEBUJPO3FTFSWBUJPOTBOETUJMMHSPXJOH 8FOFFE1FSM%FWFMPQFST .Z4RM%#"T 8FVTF1FSM 1VQQFU "QBDIF 4PGUXBSF%FWFMPQFST 4ZT"ENJOT .Z42- .FNDBDIF (JU -JOVY $JTDP 8FC%FTJHOFST 'SPOU&OE%FWFMPQFST +VOJQFSBOENPSF /FUXPSL&OHJOFFSTBOENPSFw /08)*3*/( (SFBUMPDBUJPOJOUIFDFOUFSPG"NTUFSEBN $PNQFUJUJWF4BMBSZ3FMPDBUJPO1BDLBHF *OUFSOBUJPOBM SFTVMUESJWFOEZOBNJDXPSLFOWJSPONFOU *OUFSFTUFE XXXCPPLJOHDPNKPCT Foreword 5 Welcome to YAPC::Europe 2012. This is the fourteenth European Perl conference! The Frankfurt 8PSMET#1*O0OMJOF"DDPNNPEBUJPO3FTFSWBUJPOTBOETUJMMHSPXJOH Perlmongers have great pleasure in hosting this event this year. We‘d like to welcome you here in Frankfurt. The city that is now the heart of the Perl community for at least days. We have attendees from more than 40 countries all over the world, so there is a rich mix of different cultures and different people.
    [Show full text]
  • Table of Contents • Index • Reviews • Reader Reviews • Errata Perl 6 Essentials by Allison Randal, Dan Sugalski, Leopold Tötsch
    • Table of Contents • Index • Reviews • Reader Reviews • Errata Perl 6 Essentials By Allison Randal, Dan Sugalski, Leopold Tötsch Publisher: O'Reilly Pub Date: June 2003 ISBN: 0-596-00499-0 Pages: 208 Slots: 1 Perl 6 Essentials is the first book that offers a peek into the next major version of the Perl language. Written by members of the Perl 6 core development team, the book covers the development not only of Perl 6 syntax but also Parrot, the language-independent interpreter developed as part of the Perl 6 design strategy. This book is essential reading for anyone interested in the future of Perl. It will satisfy their curiosity and show how changes in the language will make it more powerful and easier to use. 1 / 155 • Table of Contents • Index • Reviews • Reader Reviews • Errata Perl 6 Essentials By Allison Randal, Dan Sugalski, Leopold Tötsch Publisher: O'Reilly Pub Date: June 2003 ISBN: 0-596-00499-0 Pages: 208 Slots: 1 Copyright Preface How This Book Is Organized Font Conventions We'd Like to Hear from You Acknowledgments Chapter 1. Project Overview Section 1.1. The Birth of Perl 6 Section 1.2. In the Beginning . Section 1.3. The Continuing Mission Chapter 2. Project Development Section 2.1. Language Development Section 2.2. Parrot Development Chapter 3. Design Philosophy Section 3.1. Linguistic and Cognitive Considerations Section 3.2. Architectural Considerations Chapter 4. Syntax Section 4.1. Variables Section 4.2. Operators Section 4.3. Control Structures Section 4.4. Subroutines Section 4.5. Classes and Objects Section 4.6.
    [Show full text]
  • Effective Perl Programming
    Effective Perl Programming Second Edition The Effective Software Development Series Scott Meyers, Consulting Editor Visit informit.com/esds for a complete list of available publications. he Effective Software Development Series provides expert advice on Tall aspects of modern software development. Books in the series are well written, technically sound, and of lasting value. Each describes the critical things experts always do—or always avoid—to produce outstanding software. Scott Meyers, author of the best-selling books Effective C++ (now in its third edition), More Effective C++, and Effective STL (all available in both print and electronic versions), conceived of the series and acts as its consulting editor. Authors in the series work with Meyers to create essential reading in a format that is familiar and accessible for software developers of every stripe. Effective Perl Programming Ways to Write Better, More Idiomatic Perl Second Edition Joseph N. Hall Joshua A. McAdams brian d foy Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The authors and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein.
    [Show full text]
  • Mojolicious Web Clients Brian D Foy Mojolicious Web Clients by Brian D Foy
    Mojolicious Web Clients brian d foy Mojolicious Web Clients by brian d foy Copyright 2019-2020 © brian d foy. All rights reserved. Published by Perl School. ii | Table of contents Preface vii What You Should Already Know . viii Some eBook Notes ........................... ix Installing Mojolicious ......................... x Getting Help .............................. xii Acknowledgments . xiii Perl School ............................... xiv Changes ................................. xiv 1 Introduction 1 The Mojo Philosophy .......................... 1 Be Nice to Servers ........................... 4 How HTTP Works ........................... 6 Add to the Request ........................... 15 httpbin ................................. 16 Summary ................................ 18 2 Some Perl Features 19 Perl Program Basics .......................... 19 Declaring the Version ......................... 20 Signatures ................................ 22 Postfix Dereference ........................... 25 Indented Here Docs ........................... 25 Substitution Returns the Modified Copy . 26 Summary ................................ 27 3 Basic Utilities 29 Working with URLs .......................... 30 Decoding JSON ............................. 34 Collections ............................... 45 Random Utilities ............................ 50 TABLE OF CONTENTS | iii Events .................................. 52 Summary ................................ 55 4 The Document Object Model 57 Walking Through HTML or XML ................... 57 Modifying
    [Show full text]
  • Linux Operating System Configuration Management Framework: a Scalable And
    Linux Operating System Configuration Management Framework: A Scalable and Efficient Approach Using Open Source Utilities A thesis presented to the faculty of the Russ College of Engineering and Technology of Ohio University In partial fulfillment of the requirements for the degree Master of Science Srinivas R. Kalidindi November 2007 2 This thesis titled Linux Operating System Configuration Management Framework: A Scalable and Efficient Approach Using Open Source Utilities by SRINIVAS R. KALIDINDI has been approved for the School of Electrical Engineering and Computer Science and the Russ College of Engineering and Technology by Chang Liu Assistant Professor of Electrical Engineering and Computer Science Dennis Irwin Dean, Russ College of Engineering and Technology 3 Abstract KALIDINDI, SRINIVAS R., M.S., November 2007, Computer Science Linux Operating System Configuration Management Framework: A Scalable and Efficient Approach Using Open Source Utilities (120 pp.) Director of Thesis: Chang Liu With the steady growth in Information Technology sector, managing complex infrastructure has proven to be a challenge for organizations, both big and small, in terms of maintaining a consistent environment across the board. In a product development industry, this consistency in the environment plays a key role in maintaining the overall productivity of the organization. Current Information Technology administrators have access to a wide array of open source and commercial tools for infrastructure management in terms of hardware as well as software configuration changes. As hardware support is provided by the appliance vendor, the complexity in managing the underlying operating system configuration changes poses a challenge. Although there is a wide array of open source tools available to achieve this objective, they may be far more complex than required, and may not be entirely portable within an existing environment.
    [Show full text]
  • Perl by Example, Third Edition—This Book Is a Superb, Well-Written Programming Book
    Praise for Ellie Quigley’s Books “I picked up a copy of JavaScript by Example over the weekend and wanted to thank you for putting out a book that makes JavaScript easy to understand. I’ve been a developer for several years now and JS has always been the ‘monster under the bed,’ so to speak. Your book has answered a lot of questions I’ve had about the inner workings of JS but was afraid to ask. Now all I need is a book that covers Ajax and Coldfusion. Thanks again for putting together an outstanding book.” —Chris Gomez, Web services manager, Zunch Worldwide, Inc. “I have been reading your UNIX® Shells by Example book, and I must say, it is brilliant. Most other books do not cover all the shells, and when you have to constantly work in an organization that uses tcsh, bash, and korn, it can become very difficult. However, your book has been indispensable to me in learning the various shells and the differences between them…so I thought I’d email you, just to let you know what a great job you have done!” —Farogh-Ahmed Usmani, B.Sc. (Honors), M.Sc., DIC, project consultant (Billing Solutions), Comverse “I have been learning Perl for about two months now; I have a little shell scripting experience but that is it. I first started withLearning Perl by O’Reilly. Good book but lacking on the examples. I then went to Programming Perl by Larry Wall, a great book for intermediate to advanced, didn’t help me much beginning Perl.
    [Show full text]
  • Programming Perl, 3Rd Edition
    Programming Perl Programming Perl Third Edition Larry Wall, Tom Christiansen & Jon Orwant Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Programming Perl, Third Edition by Larry Wall, Tom Christiansen, and Jon Orwant Copyright © 2000, 1996, 1991 O’Reilly & Associates, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly & Associates, Inc., 101 Morris Street, Sebastopol, CA 95472. Editor, First Edition: Tim O’Reilly Editor, Second Edition: Steve Talbott Editor, Third Edition: Linda Mui Technical Editor: Nathan Torkington Production Editor: Melanie Wang Cover Designer: Edie Freedman Printing History: January 1991: First Edition. September 1996: Second Edition. July 2000: Third Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly & Associates, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly & Associates, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. The association between the image of a camel and the Perl language is a trademark of O’Reilly & Associates, Inc. Permission may be granted for non-commercial use; please inquire by sending mail to [email protected]. While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. Library of Congress Cataloging-in-Publication Data Wall, Larry. Programming Perl/Larry Wall, Tom Christiansen & Jon Orwant.--3rd ed. p. cm. ISBN 0-596-00027-8 1.
    [Show full text]
  • Introduction to Perl
    Introduction to Perl #!/usr/bin/perl −w # find−a−func use strict; $_=’$;="per l";map{map {s}^\s+}} ;$_{$_}++unless(/[^a− z]/)}split(/ [\s,]+/)i f(/alpha. *$;/i../w ait/)}‘$; doc\040$; toc‘;;;@[=k eys%_;$; =20;$:=15;;for(0..($;*$:−1 )){$;[$_]="_" ;}until($%++>3*$;||@]>2*$:−3){@_=split(//,splice(@[,rand( @[),1));if(3>@_){next;}$~=int(rand($;));$^=int(rand($:)); $−=$~+$^*$;;my$Erudil=0;{if($Erudil++>2*$:){next;}$a=(−1, 0,1)[rand(3)];$b=(−1,0,1)[rand(3)];unless(($a||$b)&&$~ +$a*@_<=$;&&$~+$a*@_>=0&&$^+$b*@_<=$:&&$^+$b*@_>=0){re do;;}my$llama=0;;for(0..$#_){unless($;[$−+$a*$_+$b* $;*$_]eq$_[$_]||$;[$−+$a*$_+$b*$;*$_]eq"_"){$llam a++;last;}}if($llama){redo;}push@],join("",@_);f or(0..$#_){$;[$−+$a*$_+$b*$;*$_]=$_[$_];}}}@_ =sort@];unshift@_ ,"Find:","−"x5;for$a(0. .$:−1){for$b(0. .$;−1){$~=("a".."z") [rand(26)];$_ ="$;[$a*$;+$b]". $";s;_;$~; ;print;}$_=s hift@_|| $";;print$ ",$", $_,$ /;$_ =shi ft@_ ||$ ";pr int $"x $;, $"x $;, $", $", $_ ,$/;; ;}’ ;;; s[\s+] $$g; eval; Kirrily Robert Paul Fenwick Jacinta Richardson Introduction to Perl by Kirrily Robert, Paul Fenwick, and Jacinta Richardson Copyright © 1999-2000 Netizen Pty Ltd Copyright © 2000 Kirrily Robert Copyright © 2001 Obsidian Consulting Group Pty Ltd Copyright © 2001-2005 Paul Fenwick ([email protected]) Copyright © 2001-2005 Jacinta Richardson ([email protected]) Copyright © 2001-2005 Perl Training Australia Open Publications License 1.0 Cover artwork Copyright (c) 2000 by Stephen B. Jenkins. Used with permission. The use of a llama image with the topic of Perl is a trademark of O’Reilly & Associates, Inc.
    [Show full text]
  • Perl Cookbook
    ;-_=_Scrolldown to the Underground_=_-; Perl Cookbook http://kickme.to/tiger/ By Tom Christiansen & Nathan Torkington; ISBN 1-56592-243-3, 794 pages. First Edition, August 1998. (See the catalog page for this book.) Search the text of Perl Cookbook. Index Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z Table of Contents Foreword Preface Chapter 1: Strings Chapter 2: Numbers Chapter 3: Dates and Times Chapter 4: Arrays Chapter 5: Hashes Chapter 6: Pattern Matching Chapter 7: File Access Chapter 8: File Contents Chapter 9: Directories Chapter 10: Subroutines Chapter 11: References and Records Chapter 12: Packages, Libraries, and Modules Chapter 13: Classes, Objects, and Ties Chapter 14: Database Access Chapter 15: User Interfaces Chapter 16: Process Management and Communication Chapter 17: Sockets Chapter 18: Internet Services Chapter 19: CGI Programming Chapter 20: Web Automation The Perl CD Bookshelf Navigation Copyright © 1999 O'Reilly & Associates. All Rights Reserved. Foreword Next: Preface Foreword They say that it's easy to get trapped by a metaphor. But some metaphors are so magnificent that you don't mind getting trapped in them. Perhaps the cooking metaphor is one such, at least in this case. The only problem I have with it is a personal one - I feel a bit like Betty Crocker's mother. The work in question is so monumental that anything I could say here would be either redundant or irrelevant. However, that never stopped me before. Cooking is perhaps the humblest of the arts; but to me humility is a strength, not a weakness.
    [Show full text]
  • Effective Perl.Pdf
    Effective Perl Programming Second Edition The Effective Software Development Series Scott Meyers, Consulting Editor Visit informit.com/esds for a complete list of available publications. he Effective Software Development Series provides expert advice on Tall aspects of modern software development. Books in the series are well written, technically sound, and of lasting value. Each describes the critical things experts always do—or always avoid—to produce outstanding software. Scott Meyers, author of the best-selling books Effective C++ (now in its third edition), More Effective C++, and Effective STL (all available in both print and electronic versions), conceived of the series and acts as its consulting editor. Authors in the series work with Meyers to create essential reading in a format that is familiar and accessible for software developers of every stripe. Effective Perl Programming Ways to Write Better, More Idiomatic Perl Second Edition Joseph N. Hall Joshua A. McAdams brian d foy Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The authors and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein.
    [Show full text]
  • Introduction to Perl
    Introduction to Perl Instructor: Dr. Nicholas C. Maliszewskyj Textbook: Learning Perl on Win32 Systems (Schwartz, Olson & Christiansen) Resources: Programming Perl (Wall, Christiansen, & Schwartz) Perl in a Nutshell (Siever, Spainhour, & Patwardian) Perl Mongers http://www.perl.org/ Comprehensive Perl Archive Network http://www.cpan.org · Initializing 1. Introduction · Looping over elements · History & Uses · Sorting · Philosophy & Idioms · Resources 9. Pattern Matching · Regular expressions 2. Perl Basics · Matching and substitution · Script Naming · Atoms and assertions · Language Properties · Invocation 10. Subroutines and Functions · Structure & Invocation 3. Built-In Data Types · Parameter passing · Scalars, lists, & hashes · Scope · Variable contexts · Special variables (defaults) 11. Files and I/O · Understanding filehandles 4. Scalars · Predefined filehandles · Numbers (STDIN, STDOUT, STDERR) · Strings · Opening, closing, reading, writing 5. Basic Operators · Formats · Manipulating files · Types of operators · Operator precedence 12. Modules 6. Control Structures · Extending Perl functionality · Obtaining and installing · If-elsif-else, unless · Object-oriented Perl · Loops: do, while, until, for, foreach 13. CGI Programming · Labels: next, last · CGI Concepts · The infamous goto · Generating HTML 7. Lists · Passing parameters · Simple Forms · Initializing · Using the CGI.pm module · Accessing elements · Special operators 14. Advanced Topics 8. Associative Arrays (Hashes) · To be determined · Keys and values 1 Introduction What is Perl? Depending on whom you ask, Perl stands for “Practical Extraction and Report Language” or “Pathologically Eclectic Rubbish Lister.” It is a powerful glue language useful for tying together the loose ends of computing life. History Perl is the natural outgrowth of a project started by Larry Wall in 1986. Originally intended as a configuration and control system for six VAXes and six SUNs located on opposite ends of the country, it grew into a more general tool for system administration on many platforms.
    [Show full text]