Index: K - e-Reading Library
start page | rating of books | rating of authors | reviews | copyrights
Symbols & Numbers
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: K
- -k (sticky) file test: 3.10. Named Unary and File Test Operators
- kernels
- autoreaping zombies on: 16.1.2. Reaping Zombies
- generating signals: 16.1. Signals
- signal reliability on: 16.1.2. Reaping Zombies
- threads and: 17.2. The Thread Model
- Unix, set-id script bug in: 23.2.1. Unix Kernel Security Bugs
- key mapping, pseudohashes: 12.7.1. Field Declarations with use fields
- keyboard sequences, generating signals with: 16.1. Signals
- keys function: 1.8. List Processing
- 2.9. Hashes
- 14.3.1. Hash-Tying Methods
- 29.2.79. keys
- keys, hash
- braces { }, enclosing in: 1.2.1.2.2. Hashes.
- providing references as: 32.1.14. Convenient Classes
- keys( ): 1.2.1.2.2. Hashes.
- key/value pairs, hashes: 2.3. Built-in Data Types
- deleting: 14.3. Tying Hashes
- modules, %INC hash: 11.1. Using Modules
- organizing and accessing data in: 9.1.5. Common Mistakes
- returning with each function: 29.2.30. each
- symbol tables: 10.1. Symbol Tables
- keywords (see reserved words)
- kill function: 16.1. Signals
- 16.1. Signals
- 29.2.80. kill
- Microsoft systems and: 16.1.1. Signaling Process Groups
Symbols & Numbers
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2002
O'Reilly & Associates, Inc.
All Rights Reserved.