Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: M

-M option : 19.4. Adding Extensions
machine independence : 10.1. Persistence Issues
macros to manipulate stacks : 20.4.2. The Called Side: Hand-Coding an XSUB
magic variables : 20.3.6. Magic Variables
main (top-level) window, Perl/Tk : 14.2. Starting with Perl/Tk
Makefile, generating automatically : 18.2.1. Fractals Using SWIG
malloc command (C) : 1. Data References and Anonymous Storage
man pages, viewing with perlman : 16.1. man and perlman
Mandelbrot code example
18.2. Example: Fractals with Perl
18.6. A Detour into Fractals
many-to-many associations : 11.2.7. Object Associations
marks : 14.3.5.2. Inserting text at logical positions
markstacks : 20.4. Stacks and Messaging Protocol
marshalling parameters : 13.2. Remote Procedure Calls (RPC)
matrices data structure (example) : 2.2. Example: Matrices
memory
denial of resource attacks : 20.2.2.3. Security features
managing
1.6. A View of the Internals
18.1. Writing an Extension: Overview
XS tool and : 20.5.6. Memory Management Using XS
Menu widgets
A.5. Menus
14.3.8. Menus
MenuButton widget : 14.3.8. Menus
messages, definition of : 13. Networking: Implementing RPC
messaging protocol : 20.4. Stacks and Messaging Protocol
meta-information : B.8. Meta-Information
metadata
10.1. Persistence Issues
10.4.1.3. Query meta-data
10.4.1.6. What DBI does not provide
methods
accessor methods : 7.2.8. Accessor Methods
class (static) methods : 7.2.5. Class Methods and Attributes
instance methods
7.2.3. Behavior
7.2.4. The Need for Polymorphism
searching for : 7.3.1. Searching for Methods
SWIG : 18.3. SWIG Features
widget methods : A. Tk Widget Reference
MLDBM module : 10.3.2. MLDBM
modifiers, event : 14.6. Event Bindings
modules/packages
(see also under specific module name)
6. Modules
6.5. Importing Symbols
Language Syntax
autoloading : 6.7. Autoloading
conventions for : 7.4. Recap of Conventions
files and : 6.2. Packages and Files
initializing and destroying : 6.3. Package Initialization and Destruction
@ISA array : 7.2.6. The Need for Inheritance
nested : 6.6. Nesting Packages
in other languages : 6.9. Language Comparisons
prebuilt clients : 12.6. Prebuilt Client Modules
privacy and : 6.4. Privacy
syntax for : B.4. Modules
monitoring variables (example) : 9.5. Example: Monitoring Variables
mortal calls : 20.3.1. Scalar Values
Msg module : 13.1. Msg: Messaging Toolkit
implementation of : 13.1.1. Msg Implementation
multidimensional arrays : 1.3.2. Final Shortcut: Omit Arrows Between Subscripts
matrix representation with : 2.2. Example: Matrices
multipattern grep (example) : 5.5.1. A Fast Multipattern grep
multiplexing : 12.3.2. Multiplexing Using select
multithreading
12.4. Real-World Servers
20.7. A Peek into the Future
networking and
12.3.1. Multiple Threads of Execution
12.4. Real-World Servers
scratchpads and : 20.3.5.2. How local and my work
my operator : 1.2.3. References to Anonymous Storage
local operator versus : 3.1.2. Lexical Versus Dynamic Scoping
typeglobs and : 3.2.1. Temporary Aliases
my variables : 20.3.5.2. How local and my work


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.