skip to main content
Skip header Section
Programming PerlJuly 2000
Publisher:
  • O'Reilly & Associates, Inc.
  • 103A Morris St. Sebastopol, CA
  • United States
ISBN:978-0-596-00027-1
Published:01 July 2000
Pages:
850
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

From the Publisher:

Perl is a powerful programming language that has grown in popularity since it first appeared in 1988. The first edition of this book, Programming Perl , hit the shelves in 1990, and was quickly adopted as the undisputed bible of the language. Since then, Perl has grown with the times, and so has this book.

Programming Perl is not just a book about Perl. It is also a unique introduction to the language and its culture, as one might expect only from its authors. Larry Wall is the inventor of Perl, and provides a unique perspective on the evolution of Perl and its future direction. Tom Christiansen was one of the first champions of the language, and lives and breathes the complexities of Perl internals as few other mortals do. Jon Orwant is the editor of The Perl Journal, which has brought together the Perl community as a common forum for new developments in Perl.

Any Perl book can show the syntax of Perl's functions, but only this one is a comprehensive guide to all the nooks and crannies of the language. Any Perl book can explain typeglobs, pseudohashes, and closures, but only this one shows how they really work. Any Perl book can say that my is faster than local , but only this one explains why. Any Perl book can have a title, but only this book is affectionately known by all Perl programmers as The Camel.

This third edition of Programming Perl has been expanded to cover version 5.6 of this maturing language. New topics include threading, the compiler, Unicode, and other new features that have been added since the previous edition.

Cited By

  1. Vinarskii E, López J, Kushik N, Yevtushenko N and Zeghlache D A Model Checking Based Approach for Detecting SDN Races Testing Software and Systems, (194-211)
  2. Fu X, Niu Z and Yeh M (2016). Research trends in sustainable operation, Cluster Computing, 19:4, (2211-2223), Online publication date: 1-Dec-2016.
  3. ACM
    Grathwohl B, Henglein F, Rasmussen U, Søholm K and Tørholm S (2016). Kleenex: compiling nondeterministic transducers to deterministic streaming transducers, ACM SIGPLAN Notices, 51:1, (284-297), Online publication date: 8-Apr-2016.
  4. ACM
    Lemos A, Daniel F and Benatallah B (2015). Web Service Composition, ACM Computing Surveys, 48:3, (1-41), Online publication date: 8-Feb-2016.
  5. ACM
    Grathwohl B, Henglein F, Rasmussen U, Søholm K and Tørholm S Kleenex: compiling nondeterministic transducers to deterministic streaming transducers Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, (284-297)
  6. Stock B, Lekies S, Mueller T, Spiegel P and Johns M Precise client-side protection against DOM-based cross-site scripting Proceedings of the 23rd USENIX conference on Security Symposium, (655-670)
  7. Kaliszyk C and Urban J (2014). Learning-Assisted Automated Reasoning with Flyspeck, Journal of Automated Reasoning, 53:2, (173-213), Online publication date: 1-Aug-2014.
  8. ACM
    Kell S The operating system Proceedings of the Seventh Workshop on Programming Languages and Operating Systems, (1-7)
  9. Grathwohl N, Henglein F, Nielsen L and Rasmussen U Two-Pass greedy regular expression parsing Proceedings of the 18th international conference on Implementation and Application of Automata, (60-71)
  10. Cammarota R, Nicolau A, Veidenbaum A, Kejariwal A, Donato D and Madhugiri M On the determination of inlining vectors for program optimization Proceedings of the 22nd international conference on Compiler Construction, (164-183)
  11. ACM
    Bloom B and Hirzel M (2012). Robust scripting via patterns, ACM SIGPLAN Notices, 48:2, (29-40), Online publication date: 23-Jan-2013.
  12. ACM
    Bloom B and Hirzel M Robust scripting via patterns Proceedings of the 8th symposium on Dynamic languages, (29-40)
  13. Savidis A Supporting cross-language exception handling when extending applications with embedded languages Proceedings of the Third international conference on Software engineering for resilient systems, (93-99)
  14. Merelo J, Romero G, Arenas M, Castillo P, Mora A and Laredo J Implementation matters Proceedings of the 11th international conference on Artificial neural networks conference on Advances in computational intelligence - Volume Part II, (333-340)
  15. ACM
    Goldman M, Little G and Miller R Collabode Proceedings of the 4th International Workshop on Cooperative and Human Aspects of Software Engineering, (65-68)
  16. ACM
    T S, Akram S and Varaprasad G (2010). Design and development of framework for diagnosing intermediate nodes, ACM SIGARCH Computer Architecture News, 38:5, (7-11), Online publication date: 29-Dec-2011.
  17. Gelade W (2010). Succinctness of regular expressions with interleaving, intersection and counting, Theoretical Computer Science, 411:31-33, (2987-2998), Online publication date: 1-Jun-2010.
  18. ACM
    Tripp O, Pistoia M, Fink S, Sridharan M and Weisman O TAJ Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation, (87-97)
  19. ACM
    Tripp O, Pistoia M, Fink S, Sridharan M and Weisman O (2009). TAJ, ACM SIGPLAN Notices, 44:6, (87-97), Online publication date: 28-May-2009.
  20. Ploski J, Scherp G, Petroliagis T, Büchner O and Hasselbring W (2009). Grid-based deployment and performance measurement of the Weather Research & Forecasting model, Future Generation Computer Systems, 25:3, (346-350), Online publication date: 1-Mar-2009.
  21. ACM
    Bruce K and Freund S (2008). Programming languages as part of core computer science, ACM SIGPLAN Notices, 43:11, (50-54), Online publication date: 30-Nov-2008.
  22. ACM
    Chang W, Streiff B and Lin C Efficient and extensible security enforcement using dynamic data flow analysis Proceedings of the 15th ACM conference on Computer and communications security, (39-50)
  23. Gelade W Succinctness of Regular Expressions with Interleaving, Intersection and Counting Proceedings of the 33rd international symposium on Mathematical Foundations of Computer Science, (363-374)
  24. Lumpe M Growing a language Proceedings of the 7th international conference on Software composition, (1-19)
  25. ACM
    Nethercote N and Seward J Valgrind Proceedings of the 28th ACM SIGPLAN Conference on Programming Language Design and Implementation, (89-100)
  26. ACM
    Nethercote N and Seward J (2007). Valgrind, ACM SIGPLAN Notices, 42:6, (89-100), Online publication date: 10-Jun-2007.
  27. ACM
    Cesarini F, Larsson L and Ślaski M From HTTP to HTML Proceedings of the 2006 ACM SIGPLAN workshop on Erlang, (52-57)
  28. ACM
    Johnson J, Krandick W, Lynch K, Richardson D and Ruslanov A High-performance implementations of the Descartes method Proceedings of the 2006 international symposium on Symbolic and algebraic computation, (154-161)
  29. Lumpe M GLoo Proceedings of the 9th international conference on Component-Based Software Engineering, (17-32)
  30. Acquisti A and Gross R Imagined communities Proceedings of the 6th international conference on Privacy Enhancing Technologies, (36-58)
  31. Kotsakis E XML fuzzy ranking Proceedings of the 7th international conference on Flexible Query Answering Systems, (159-169)
  32. ACM
    Ammons G Grexmk Proceedings of the 2006 international workshop on Dynamic systems analysis, (81-87)
  33. ACM
    Su Z and Wassermann G (2006). The essence of command injection attacks in web applications, ACM SIGPLAN Notices, 41:1, (372-382), Online publication date: 12-Jan-2006.
  34. ACM
    Su Z and Wassermann G The essence of command injection attacks in web applications Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (372-382)
  35. Jie W, Hung T and Cai W (2018). An Information Service for Grid Virtual Organization, The Journal of Supercomputing, 34:3, (273-290), Online publication date: 1-Dec-2005.
  36. ACM
    Van Lepthien W and Anderson K A metainformatical view of collections Proceedings of the 2005 symposia on Metainformatics, (16-es)
  37. ACM
    Payne L Integrating wireless devices into the IT curriculum Proceedings of the 6th conference on Information technology education, (51-55)
  38. Guyer S and Lin C (2005). Error checking with client-driven pointer analysis, Science of Computer Programming, 58:1-2, (83-114), Online publication date: 1-Oct-2005.
  39. ACM
    Stewart D and Chakravarty M Dynamic applications from the ground up Proceedings of the 2005 ACM SIGPLAN workshop on Haskell, (27-38)
  40. Pietraszek T and Berghe C Defending against injection attacks through context-sensitive string evaluation Proceedings of the 8th international conference on Recent Advances in Intrusion Detection, (124-145)
  41. Ducheneaut N (2018). Socialization in an Open Source Software Community, Computer Supported Cooperative Work, 14:4, (323-368), Online publication date: 1-Aug-2005.
  42. Pistoia M, Flynn R, Koved L and Sreedhar V Interprocedural analysis for privileged code placement and tainted variable detection Proceedings of the 19th European conference on Object-Oriented Programming, (362-386)
  43. ACM
    Minamide Y Static approximation of dynamically generated Web pages Proceedings of the 14th international conference on World Wide Web, (432-441)
  44. Maurer W (2005). Redesigning the data structures course with user-constructed resizable arrays, Journal of Computing Sciences in Colleges, 20:4, (236-241), Online publication date: 1-Apr-2005.
  45. Adams D (2004). Teaching web application development using Zope, Journal of Computing Sciences in Colleges, 20:1, (63-70), Online publication date: 1-Oct-2004.
  46. ACM
    Huang Y, Yu F, Hang C, Tsai C, Lee D and Kuo S Securing web application code by static analysis and runtime protection Proceedings of the 13th international conference on World Wide Web, (40-52)
  47. Liang C (2004). Programming language concepts and Perl, Journal of Computing Sciences in Colleges, 19:5, (193-204), Online publication date: 1-May-2004.
  48. Maurer W (2004). Why matrix manipulation should be done in C++, Journal of Computing Sciences in Colleges, 19:4, (115-127), Online publication date: 1-Apr-2004.
  49. ACM
    King S and Chen P (2003). Backtracking intrusions, ACM SIGOPS Operating Systems Review, 37:5, (223-236), Online publication date: 1-Dec-2003.
  50. ACM
    King S and Chen P Backtracking intrusions Proceedings of the nineteenth ACM symposium on Operating systems principles, (223-236)
  51. Guyer S and Lin C Client-driven pointer analysis Proceedings of the 10th international conference on Static analysis, (214-236)
  52. Knight D Data driven design optimization methodology a dynamic data driven application system Proceedings of the 2003 international conference on Computational science, (329-336)
  53. Kobayashi I, Fujiwara T, Nakano J and Yamamoto Y (2002). A Procedural and Object-Oriented Statistical Scripting Language, Computational Statistics, 17:3, (395-410), Online publication date: 1-Sep-2002.
  54. ACM
    Moors T, Veeraraghavan M, Tao Z, Zheng X and Badri R Experiences in automating the testing of SS7 signalling transfer points Proceedings of the 2002 ACM SIGSOFT international symposium on Software testing and analysis, (154-158)
  55. ACM
    Moors T, Veeraraghavan M, Tao Z, Zheng X and Badri R (2002). Experiences in automating the testing of SS7 signalling transfer points, ACM SIGSOFT Software Engineering Notes, 27:4, (154-158), Online publication date: 1-Jul-2002.
  56. ACM
    Maurer W (2002). The comparative programming languages course, ACM SIGCSE Bulletin, 34:1, (336-340), Online publication date: 1-Mar-2002.
  57. ACM
    Maurer W The comparative programming languages course Proceedings of the 33rd SIGCSE technical symposium on Computer science education, (336-340)
  58. Evans D and Larochelle D (2019). Improving Security Using Extensible Lightweight Static Analysis, IEEE Software, 19:1, (42-51), Online publication date: 1-Jan-2002.
  59. Tu Q and Godfrey M The Build-Time Software Architecture View Proceedings of the IEEE International Conference on Software Maintenance (ICSM'01)
  60. Roger M and Goubault-Larrecq J Log Auditing through Model-Checking Proceedings of the 14th IEEE workshop on Computer Security Foundations
  61. Oppenheim K and McCormick P Deployme: Tellme's Package Management and Deployment System Proceedings of the 14th USENIX conference on System administration, (187-196)
  62. Miller A and Donnini A Relieving the Burden of System Administration Through Support Automation Proceedings of the 14th USENIX conference on System administration, (167-180)
  63. Kranenburg P Monitoring utilization in an NT workstation lab Proceedings of the 1998 Conference on Large Installation System Administration of Windows NT, (2-2)
  64. ACM
    Griswold R and Griswold M History of the Icon programming language The second ACM SIGPLAN conference on History of programming languages, (53-68)
  65. ACM
    Griswold R and Griswold M (2019). History of the Icon programming language, ACM SIGPLAN Notices, 28:3, (53-68), Online publication date: 1-Mar-1993.
Contributors

Recommendations