start page | rating of books | rating of authors | reviews | copyrights

Book Home

Book TitleSearch this book

Symbols & Numbers | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: K

-k (sticky) file test: 3.10. Named Unary and File Test Operators
kernels
autoreaping zombies on: 16.1.2. Reaping Zombies
generating signals: 16.1. Signals
signal reliability on: 16.1.2. Reaping Zombies
threads and: 17.2. The Thread Model
Unix, set-id script bug in: 23.2.1. Unix Kernel Security Bugs
key mapping, pseudohashes: 12.7.1. Field Declarations with use fields
keyboard sequences, generating signals with: 16.1. Signals
keys function: 1.8. List Processing
2.9. Hashes
14.3.1. Hash-Tying Methods
29.2.79. keys
keys, hash
braces { }, enclosing in: 1.2.1.2.2. Hashes.
providing references as: 32.1.14. Convenient Classes
keys( ): 1.2.1.2.2. Hashes.
key/value pairs, hashes: 2.3. Built-in Data Types
deleting: 14.3. Tying Hashes
modules, %INC hash: 11.1. Using Modules
organizing and accessing data in: 9.1.5. Common Mistakes
returning with each function: 29.2.30. each
symbol tables: 10.1. Symbol Tables
keywords (see reserved words)
kill function: 16.1. Signals
16.1. Signals
29.2.80. kill
Microsoft systems and: 16.1.1. Signaling Process Groups


Symbols & Numbers | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Library Navigation Links

Copyright © 2002 O'Reilly & Associates, Inc. All Rights Reserved.